<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Strategy of Security</title>
        <link>https://strategyofsecurity.com</link>
        <description>Strategy of Security's data-driven research and analysis gives you cybersecurity-focused market intelligence you can take action on.</description>
        <lastBuildDate>Wed, 08 Apr 2026 02:40:55 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>Strategy of Security RSS Feed</generator>
        <language>en</language>
        <copyright>All rights reserved 2026</copyright>
        <item>
            <title><![CDATA[An Interview with Matt Mills About SailPoint in the AI Era]]></title>
            <link>https://strategyofsecurity.com/an-interview-with-matt-mills-about-sailpoint-in-the-ai-era/</link>
            <guid>69cc0bcdcb6ae9000181705e</guid>
            <pubDate>Wed, 01 Apr 2026 12:01:31 GMT</pubDate>
            <description><![CDATA[An in-depth discussion about the past, present, and future of SailPoint as it moves into the AI era.]]></description>
            <content:encoded><![CDATA[<p>It’s exceptionally rare to find a company that’s been through a journey like the one SailPoint has been on over the course of 20 years. Their 2026 fiscal year was arguably their best one yet, full of major product launches and milestones — including over $1 billion of Annual Recurring Revenue (ARR).</p><p>I spoke with Matt Mills, SailPoint’s President, about a wide range of topics. We spent time reflecting on the journey to $1 billion ARR, then moved towards the future: authorization, business drivers, AI fear and progress, adaptive identity, application integrations, competition, and…<em>mainframes?!</em></p><p>This was a candid discussion about what it takes to be an identity company serving the world’s largest customers as we enter the AI era. I hope you enjoy it as much as I did.</p><p><em>Note: This interview has been lightly edited for clarity.</em></p><h2 id="the-billion-dollar-milestone">The billion dollar milestone</h2><p><strong>Cole Grolmus:</strong> SailPoint just surpassed $1 billion ARR in its last fiscal year, so this discussion is coming at a perfect time. I'd love for you to reflect on that for a minute. It's such a significant milestone that's been building over the course of 20 years.</p><p><strong>Matt Mills:</strong> If you haven't spent time in the startup world or these emerging markets, you might not fully appreciate the Mark McClain story: doing a startup, taking it from zero to $150-200 million, taking it public, taking it back private, and then taking it back out again.&nbsp;</p><p>When you start looking at the odds, what percent of startups actually make it to a public market? It's really, really small. Then you start asking what percent actually make it to a billion dollars, and what percent of those actually have the same founder CEO for 20 years going through all of that. It's a pretty incredible story.</p><p>Breaking down our business at a billion dollars ARR: we typically do three-year contracts, so when you look at remaining purchase obligations and the size of the business, it's probably a $3 billion business. It's a big business.</p><p>I've only been here for six and a half years, so I've been here on Mark's coattails. It's a great story.&nbsp;</p><p>We talked about being a billion-dollar company when I got here, but there's a ton of work by everybody that goes into it. It's a pretty nice thing for the company to rally around and celebrate. Everybody contributes because you don't get there any other way.</p><h2 id="authorization-is-having-a-moment">Authorization is having a moment</h2><p><strong>Cole Grolmus:</strong> The core thesis of an <a href="https://strategyofsecurity.com/p/sailpoints-authorization-opportunity?ref=content.strategyofsecurity.com"><u>article</u></a> I published recently was that authorization is about to have a moment.</p><p>As someone who's been doing this for a long time and has done several enterprise identity implementations, I think authorization (broadly) and SailPoint (specifically) are more relevant than ever, even after a 20-year run.&nbsp;</p><p>What evidence or anecdotes have you seen from a customer perspective that make you believe this is happening?</p><p><strong>Matt Mills:</strong> There are a lot of things happening that are all coming together and changing the context of what SailPoint is.&nbsp;</p><p>If you go back even five years ago, we were still doing traditional identity governance. Having been in the business a while yourself, you understand that when you thought about governance originally, you were always thinking about compliance and audit. That was it.</p><p>With the acceleration of agentic AI, it's really accelerated the idea that governance is still important, but it's going to have to manifest itself very differently in this world.</p><p>We're moving to a real-time world. We've been authenticating and authorizing for a lot of years, but now it takes on a new meaning.</p><p>When you start talking about zero standing privilege, that's the operating model. But now we're talking about authorization in a different context: just in time, time-bound, purpose-bound. We're looking for immediate or real-time remediation. The permissions are revocable.</p><p>When companies are looking for a new solution, what's causing them to go down this path? A big chunk of it is still compliance, but a big chunk of it now is risk.</p><p>The conversation changes from "are we compliant?" to "is access justified right now?" Not just is it justified, but is it justified <em>right now</em>.&nbsp;</p><p>If you listen to our CTO Chandra Gnanasambandam talk, he talks about context: <em>When Cole is logging on, does he have access to this?&nbsp;</em></p><p>The answer might be yes, Cole has access to that. But does he have access to it at 3:00 in the morning on an IP address I've never seen in China? I'm probably going to say no, I don't think he does right now. I'm going to poke at that and make sure he's authorized to do what he's doing, where he's doing it, when he's doing it.</p><p>Those are the things that bring this whole new perspective around authorization.</p><h2 id="compliance-and-security-not-eitheror">Compliance and security, not either/or</h2><p><strong>Cole Grolmus:</strong>&nbsp; You probably have the broadest allocation of customer discussions of anybody at SailPoint.&nbsp;</p><p>What percentage of customers are still coming in with regulation as a driver versus moving towards the risk and security end of the spectrum?</p><p><strong>Matt Mills:</strong> I hate to say it, because the industry's been around this long, but there's a ton of regulation that we deal with already in regular business. Every time I turn around, there's another cottage industry coming up with their own level of certification or compliance regulations.</p><p>I think we're just on the cusp of a new set of regulations that are going to come at us from an AI perspective.</p><p>The auditors I talk with ask questions about when we are going to get to the point where AI agents are actually doing things on our behalf, making relevant and material decisions.</p><p>If you're going to secure your enterprise, I don't think you can do it through human hands on a keyboard. You cannot keep up.&nbsp;</p><p>At some point, somebody's going to have to make a call: do we trust what's happening here? Can we put the right constructs in place that allow us to have some level of confidence? Is there enough transparency?</p><p>The bad guys don't have to deal with that. They just use the technology and wreak havoc.</p><p>There's a balance we're going to have to get to. As providers of these solutions, we're going to have to be transparent. It's going to have to be auditable. I think that's coming. It’s not that far away.</p><p><strong>Cole Grolmus:</strong> It sounds like an "and" not an "or." The reality is we're living in a world that's more regulated <em>and</em> there are more risks driving security. It's actually the combination of both things that's going to be a factor.</p><p><strong>Matt Mills:</strong> I think so. There's a little bit of a fear factor that companies are dealing with. They don't want to go too far down this path until they understand exactly what they're dealing with — not only from a regulation perspective but from a security perspective.</p><p>I don't believe applications as we know them today are going to act and behave like they did five years ago. You're going to have embedded agents in virtually every off-the-shelf software product available.&nbsp;</p><p>Companies are going to say, <em>"I don't have a choice. I'm going to have to somehow certify and regulate these agents to make sure they're doing things like they're supposed to do and not causing problems with security or having access to the wrong data."</em></p><h2 id="having-your-foot-on-the-gas-and-the-brake-simultaneously">Having your foot on the gas and the brake simultaneously</h2><p><strong>Cole Grolmus:</strong> I covered this topic in my <a href="https://youtu.be/DiQrpOQBXuI?si=N_NpO9U-Y7B61A93&ref=content.strategyofsecurity.com"><u>interview</u></a> with Mark McClain, and he had an interesting take on it. He described it as: <em>“I’ve never seen this many customers with their foot on both the gas and the brake at the same time.”&nbsp;</em></p><p>There is so much upside with both AI and agents, and it gets more incredible by the week. But once you realize what's possible, you also become way more afraid. How do you reconcile that?</p><p><strong>Matt Mills:</strong> He says it well. He and I sit on a number of investor calls, and we get a ton of questions because the investors and analysts want to understand how fast this is going to go.</p><p>At the end of the day, it's hard to understand how quickly the update will be on these technologies. You're seeing C-suite executives saying, <em>"We need to take advantage of these efficiencies. We need to start being able to get the benefits of this in our business."</em></p><p>Meanwhile, the practitioners and security experts are saying this scares the heck out of them. It scares them that we're going to have the ability to build human-like digital agents that are going to go out and work under my guidance with permissions that maybe a human is going to pass through to them.</p><p>You hear these cornerstone cases that people repeat, like the story about so-and-so who had forty-six agents running in their business that nobody knew anything about.&nbsp;</p><p>I've heard that story over and over. The numbers change, but it’s the same story. Nobody knew, then it did something bad, and everybody got in trouble. I hear a ton of those stories, and they scare the living daylights out of people.</p><p>I don't think you hear enough about how people are actually using this effectively today in very pointed solutions and starting to get those benefits. People will get more comfortable with AI and agents eventually.&nbsp;</p><p>One of the big accelerators for companies like us is when we can get our product out and start getting people comfortable with the level of security and transparency we can provide around agents. Then you're going to see some acceleration.</p><p>The big next step is what we call the "base agents.” Those are the vendor agents that come from the Salesforces and the Workdays of the world, delivered in the products. If you can govern those — discover them, categorize them, assign ownership to them, certify them — then you can start making progress. It's the autonomous agents that give people pause.</p><h2 id="are-security-teams-ready-for-adaptive-identity">Are security teams ready for adaptive identity?</h2><p><strong>Cole Grolmus:</strong> Another question I asked Mark was whether security teams are ready for adaptive identity.&nbsp;</p><p>The reason I asked with some consternation is that, if I put my implementer hat back on and consider what an operational identity program is like most of the time, the median implementation is just trying to keep its head above water.</p><p>There's a lot to integrate, a lot to roll out. It's hard enough to manage human identities…and then we're talking about adding agents on top of that?!</p><p>Mark's answer, which I agree with, was: <em>"Look, I get it, but I don't think we have a choice. It's going to happen whether we want it to or not. Better to get ready for it, and better to use tools like SailPoint to enable it instead of trying to make it stop."</em></p><p><strong>Matt Mills:</strong> I'm with you 100%. We acquired Savvy to help with this, which is now our Accelerated Application Management solution. It's probably our fastest-scaling product. The pipeline is going through the roof because people are now starting to understand what it does.</p><p>It's not just about discovering all your apps. It's also being able to tell you that apps use embedded agents.&nbsp;</p><p>When companies realize <em>"I have 1,000 apps, and 900 of them are using agents,"</em> it's not like you can just disable them. They are probably running your business. You can't just turn them all off.</p><p>So what do you do? You discover them. You categorize them. You assign ownership to them. You give them human owners and certify them just like any other kind of identity. That's significant.</p><p>When we look at Tier 1, Tier 2, Tier 3 connectors, the Tier 3s are probably 15-20% of your total applications. The Tier 2s were always at 20-25%. It's quite possible the Tier 2s may end up being 80-90% of all your applications now because they're all using agents.</p><p>To Mark's point, I don't think agent adoption is going to go backwards. Agents are coming down the tracks. You're going to have to deal with it as a company because agents are not going away.</p><p>Your other choice is to not manage them, not assign ownership, leave them orphaned and therefore not certified and not governed. We'd all agree this is a really bad idea.</p><h2 id="the-under-appreciated-shift-to-managing-every-app">The under-appreciated shift to managing every app</h2><p><strong>Cole Grolmus:</strong> Let's go to the topic of integrations — or in SailPoint terms, accelerated application management. This is a major product strategy shift, which I believe is underappreciated.&nbsp;</p><p>Some historical context: SailPoint has historically focused on helping customers manage regulated and high-risk applications. That’s an <em>important</em> slice, but still only a slice of the application portfolio.&nbsp;</p><p>With Savvy and accelerated application management, we're headed towards a place where customers can manage every app at some degree of depth.</p><p>Tell me more about the shift from your point of view.</p><p><strong>Matt Mills:</strong> It's hugely underappreciated. One of the biggest challenges we have is that identity governance has gone from a back-office solution stuck somewhere down in IT operations to showing up front and center on the threat vector. Especially over the last five years, it turns out identity is the path where 80-90% of all these breaches are actually occurring. We've got to think about this differently.</p><p>We always get criticized because <em>"these guys are only governing 10-15%, like 100 applications out of 5,000."</em> Nobody's doing anything with the other 4,900. That's why we went out and acquired Savvy.&nbsp;</p><p>I think of Savvy as a bit of posture management. It's the discovery component saying, <em>"I'm going to go out and not only identify the applications, but keep the pulse on them — ones coming in, ones going out, and changes to them."</em></p><p>When you start looking at the complexity of what we're trying to solve in Tier 2 and Tier 3 apps, this is where we get a little high and mighty. Our competitors say they can do this, but they don't have the depth.&nbsp;</p><p>We always say they don't have the ability to handle this complexity, and people say, <em>"Well, what's the complexity?"</em></p><p>You've got thousands of identities: humans, machines, services. You've got millions of access relationships. You've got roles, groups, permissions. All of this adds complexity, especially in a large company.&nbsp;</p><p>We'll go down to 30 or 40 levels deep of nested entitlements. That's not abnormal for our world. We go over 250 levels deep sometimes.&nbsp;</p><p>People hear that and they're like, <em>"That's got to be one in a million."</em> It's not. There's a lot of complexity out there. If you don't have those levels of capability to handle the complexity in a Tier 3 fully governed auto-provisioning environment, you have no hope.</p><p>I've said this a hundred times to analysts: people can't handle the complexity that we handle. That's why we do well in the 5,000+ employee segment. Nobody there says, <em>"Explain the complexity."</em> They just don't.&nbsp;</p><p>If somebody says, <em>"Well, it's because of your fine-grained entitlements"</em> — of course, but nobody wants to get under the hood because if they did, they'd really start to understand the differentiation between us and the others.</p><p>You'll hear Mark try to be humble about the Veza (ServiceNow), Zilla (CyberArk), even Okta (Identity Governance) that say, <em>"We're coming up to enterprise.</em>" They’re really not. It's going to take more than just newer technology or newer architecture. I'm not suggesting there's not a place for them. There is. It's just not up here. Not today. Maybe down the road.</p><p>One of our customers has 50 million entitlements. My reaction when I heard that was somebody ought to get fired over there. But then we find out we've got a bunch of customers out there with 10, 20, and 30 million entitlements. It's just a fact of life in enterprises. We can sit here and debate if that's smart or not, but it's there.</p><p>This is where we get a little indignant when you've got 200+ companies out there today saying, <em>"We do identity security."</em> If you go to the Gartner event, if there are 200 vendor suites, they all say identity security on them. <em>"We do identity security. We do agent security."</em></p><p>Maybe there are cursory-level things they can do. But to secure an agent, you've got to secure the data. You've got to take identity context, tie it with the data, and drive it into the entitlement level all the way down. It gets pretty hard.</p><h2 id="competitive-dynamics">Competitive dynamics</h2><p><strong>Cole Grolmus:</strong> Give me some thoughts on the competitive dynamics in the identity market today. Obviously there's been a lot of market activity, probably in some ways starting with SailPoint going private a few years ago. Even if you look at the last few months, it was one of the most interesting periods in the history of the identity market.</p><p>You've got a billion-dollar acquisition with ServiceNow and Veza, Saviynt raising $700 million, Palo Alto Networks closing the acquisition of CyberArk…plus all of the major product announcements and earlier stage startups raising capital.&nbsp;</p><p>What are your thoughts on the competitive landscape as it stands in 2026?</p><p><strong>Matt Mills:</strong> We're all competitive, and I think it's in our nature. If you've ever heard Mark, he talks about being humble, hungry, and proud. We try to stay humble. It's not our nature to sling mud.</p><p>When I look at this market, I segment it between what I'll call the broader market (3,000-4,000 employees and under) and the enterprise. That broader space is really noisy. That's where everybody is at. You've got Zilla, Veza, Lumos, Oasis, and others. That's where Okta lives. That's where a lot of Microsoft Entra’s customers are, too.&nbsp;</p><p>They bang heads down there. We're not down there much. We've done a good job of understanding where we're differentiated and trying to stay there.&nbsp;</p><p>When you look at the progress we've made over the last number of years, we now own 50% of the Fortune 500 and 26-27% of the Global 2000. We live off this thing we call our target account list. We've got a bunch of companies we've done our first line of qualifying on. They look like SailPoint customers, and we've only converted about 15% of those so far. We've got a ton of runway ahead of us.</p><p>I fight this battle all the time about people wanting to go down-market. Over time, that happens naturally. Gravity gets a hold of your company. If you don't stay up and stay relevant and continue to innovate, you get sucked into it.</p><p>Down-market is competitive, noisy, with less sophisticated buyers. When everybody says they do everything, I think it's a terrible place to be if you're trying to buy something because it's really confusing.</p><p>When you get up into the market where we really live, it's not that noisy. We see Saviynt the most. They show up everywhere because nobody wants to run a process with a single source. They want to see multiple players.</p><p>We'll get the occasional deal where somebody on the board says, <em>"We own Microsoft, why aren't we using those guys?,"</em> and we'll get into a little bake-off with them. It doesn't really end well for them because they can't execute with the level of complexity that we can.</p><p>When we stay in our 5,000+ employee segment, we win 82-83% of the time. We have a rigorous methodology and good products that solve the problems and handle the complexity.</p><p>We'll lose some to Saviynt, to be fair. They're pretty good marketers. They realize our goal is to get high and get strategic. Their goal is the battle down in the trenches. In the trenches they can say, <em>"I can make this do whatever you want to do."</em> It's literally a bespoke solution — they say it's not, but that's what it is.</p><p>Time and time again, I'll read our win-loss reports and they'll say,<em> "Oh, we lost on price."</em> I'm like, we didn't lose on price. We lost because we ran a subpar sales campaign and got sucked into their methodology. It'll happen on occasion with Okta where somebody maybe hasn't gotten the value out of our stuff.</p><p>We just did a deal with a large enterprise customer. On an investor call, they said they heard about several big companies, including that one, who are now Okta customers. We responded and said, <em>“We just did a deal with them. Where does this come from?”&nbsp;</em></p><p>Okta actually does their access management, but not identity governance. If I was sitting here trying to make sense of it, they probably threw in all their other stuff in the renewal. That happens quite a bit.</p><p>What many of our competitors are continuing to do is salt the renewal with other products to keep it from going negative. They can say <em>"hey, we just did a pretty big deal with this product" </em>even if it’s not being used.</p><p>We compete and get challenged every day by competitors. There are things they do well. But when you look at things holistically, we continue to beat them pretty handsomely.</p><p><strong>Cole Grolmus:</strong> A couple quick things to tidy up that thought:</p><p>First, I'd bet your ideal accounts that aren’t SailPoint customers yet are probably running legacy identity systems, right? Most of them aren’t using your current competitors. They're using Oracle, IBM, or something really old.&nbsp;</p><p>That's a completely different animal from a competition standpoint. It’s not like you’ve lost those accounts — it’s that <em>nobody</em> has won them yet.</p><p>Also, the entitlement depth and variety of connectors is a <em>major</em> factor that gets an aspiring competitor out of the downmarket group and into SailPoint’s enterprise-level group.&nbsp;</p><p>That's why there isn't much competition at the enterprise level. It's way different to manage a bunch of cloud apps than it is to manage my gnarly mainframe.</p><p><strong>Matt Mills:</strong> 100%. That's something Mark always goes to. You're not going to find a Fortune 100 company that doesn't have a bunch of 40-year-old IBM stuff in it. It's not a cloud app. It's something far more sophisticated to build a connector for and manage and govern.</p><p>There's way more of that out there than you would ever imagine. There are still tens of millions of lines of COBOL.&nbsp;</p><p>Believe it or not, I was an old COBOL programmer. When I hear that, it makes me smile because I potentially could have another gig in semi-retirement.</p><p><strong>Cole Grolmus:</strong> If AI doesn't take your job first. I haven't tried writing any COBOL with Claude Code yet, so your semi-retirement gig might be safe!</p>]]></content:encoded>
            <category>Public Companies</category>
            <category>#Interviews</category>
            <category>#SailPoint</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2026/04/header-sailpoint-matt-mills-interview-1.png"/>
        </item>
        <item>
            <title><![CDATA[SailPoint's Authorization Opportunity]]></title>
            <link>https://strategyofsecurity.com/sailpoints-authorization-opportunity/</link>
            <guid>6931c0cc9edc6d0001a319e2</guid>
            <pubDate>Thu, 04 Dec 2025 17:20:25 GMT</pubDate>
            <description><![CDATA[Authorization is about to have a moment, and SailPoint is here for it.]]></description>
            <content:encoded><![CDATA[<p>Sometimes the right opportunity takes decades to materialize. You just have to be patient and prepared to seize it when the moment comes.</p>
<p>This is the moment SailPoint is entering right now.</p>
<p>They've made it to nearly a billion dollars of ARR by managing and governing human identities over the course of 20 years. A nice business, for sure — but only a fraction of what's coming next.</p>
<p>It’s not a “legacy” company. It’s a company that has been patiently preparing for its time to come.</p>
<p>Authorization is about to have a moment. Nobody is in a better position for that than SailPoint.</p>
<p>Let me tell you why.</p>
<h2 id="authentication-is-importantbut-not-sufficient">Authentication is important...but not sufficient</h2>
<p>Something I have always found baffling is our industry's fixation on authentication.</p>
<p>There is a perception, especially outside the identity-deep parts of the industry, that SSO and MFA <em>are</em> identity security.</p>
<p>You authenticate, and you're good to go. Security is handled. Simple.</p>
<p>My quick summary of this point of view is <em>oversimplified</em>, of course — but you know what I mean if you've been working in or around enterprise identity programs long enough.</p>
<p>We've worried about authentication for a long time — making it simple and easy for people to log in to apps they need to use. We're still chipping away at other authentication-related things like MFA and passkeys.</p>
<p>That's all great stuff. I've <a href="https://strategyofsecurity.com/p/why-were-stuck-with-passwords?ref=content.strategyofsecurity.com">written</a> plenty about this topic.</p>
<p>Authentication is an important first step. But it's not the whole picture.</p>
<p>I don't have to tell you how important identity has become to security. <em>'Identity is the new perimeter.' 'Attackers aren't breaking in, they're logging in.'</em> All of that. The case has already been made ad nauseam.</p>
<p>The finer point here is what it means to do something about it.</p>
<p>What happens <em>after</em> the credentials you use for authentication are compromised?</p>
<p>Authorization becomes a whole lot more important.</p>
<p>SailPoint CEO Mark McClain uses a physical security analogy that captures this well:</p>
<p><em>"Go into a New York skyscraper. You check in at the bottom floor, show your license to a security guard. Once you go past that security guard, you're authenticated. You're in the building, which is like logging in. The security guard loses track of you. He doesn't know where you go in the building, what floor you're on, what room you're trying to get into."</em></p>
<p>That's the difference between authentication and authorization. Authentication gets you into the building. Authorization determines where you can actually go and what you can do once you're inside.</p>
<p>Authorization is where everyone's mind is shifting — from who you are to <em>what you can do.</em> The 'what you can do' part is so, so important.</p>
<p>Here's something you can only learn from hard-won cybersecurity experience, though: managing authorization is <em>really hard</em>.</p>
<p>Managing thousands of identities is a nightmare already. The challenge gets exponentially more difficult when you do the math on how many entitlements every identity has.</p>
<p>The numbers I saw recently from SailPoint were staggering. I intuitively knew they managed a lot of entitlements, but I didn't realize they were at this scale across their customer base:</p>
<ul>
<li>125 million identities in production</li>
<li>5 billion entitlements under management</li>
<li>35 billion SaaS account changes processed (last twelve months)</li>
</ul>
<p>And it's going to get even harder when more than just people trying to access apps and data. Wait until it's <em>also</em> a bunch of non-human identities and AI agents trying to access that data, too.</p>
<p>It doesn't really matter if you believe agents are going to be a big deal or not. Things are difficult enough with just the regular threats we're facing.</p>
<p>Authorization is going to matter a lot more <em>with or without</em> AI agents.</p>
<p>That doesn't mean give up on authentication. It means we need to keep working on authentication while doubling down on authorization.</p>
<p>Next, let's get into a few more of the nuances with authorization and why I think this opportunity is so significant for SailPoint.</p>
<h2 id="breadth-more-apps-more-entitlements">Breadth: more apps, more entitlements</h2>
<p>Fundamentally, SailPoint manages access to apps and infrastructure — which identities get access, and what they can do once they're in there.</p>
<p>There's an important philosophical detail inside of this: for SailPoint's entire existence, its customers have mostly focused on managing static permissions to business applications that matter for regulatory compliance.</p>
<p>The implication is the time, focus, and investment on deploying SailPoint gets directed towards applications that are critical to either compliance, business operations, or both.</p>
<p>There's a long tail of other applications that <em>don't get touched</em>. Implementations historically run out of time, money, and patience by this point.</p>
<p>The shift that's been happening recently is the transition of IGA (broadly) and SailPoint (specifically) from being compliance-driven to being security-driven.¹</p>
<p>Because attacks have shifted so dramatically towards credentials, we've hit a point where visibility into all of the applications, identities, and entitlements across an organization is a must. We can't avoid this anymore.</p>
<p>The highly regulated app isn't always the one that gets compromised. The random SaaS app (which IT may not even know about) that has a random credential breach is just as likely. Those credentials get stolen and used to log into other high-profile systems. You know how the rest of the story goes.</p>
<p>This is why the collective mindset is changing. It's not just a handful of critical systems we need to tightly control. We need deep controls over the entire application portfolio with much more dynamic and granular management of authorization.</p>
<p>Having better coverage of the entire portfolio means you have a better understanding of the access the user has, what the risk might be, and what actions need to be taken if there's a compromise.</p>
<p>Let's talk about the depth part next.</p>
<h2 id="depth-not-all-connectivity-is-the-same">Depth: not all connectivity is the same</h2>
<p>Here's the other thing they don't tell you about integrating applications with identity platforms: not all connectivity is the same.</p>
<p>There's lightweight connectivity, and then there's real, in-depth connectivity. One "integration" might be worlds apart from another in terms of features and sophistication.</p>
<p>I've integrated thousands of different applications and...let me tell you: they come in <em>all different</em> shapes and sizes.</p>
<p>Why? Authorization and entitlements are a very slippery concept from a technical standpoint. They're difficult to integrate with because <em>apps make it difficult</em>.</p>
<p>The potential variations of how apps implement authorization are endless:</p>
<ul>
<li>Entitlements in APIs with varying levels of detail</li>
<li>SCIM endpoints that expose some attributes but not others</li>
<li>Active Directory groups that map to application permissions</li>
<li>Custom authorization tables buried in proprietary databases</li>
<li>Role-based access control models with nested hierarchies</li>
<li>Attribute-based policies that require context to evaluate</li>
<li>Mainframe security systems that predate modern standards</li>
</ul>
<p>It's not even the variety of authorization models alone that makes this tricky — it's literally the representation of what an entitlement really is.</p>
<p>If you're lucky, you get details about the entitlements represented as data or fields in a database, so you have data to pull and tell what they are.</p>
<p>Other times, the entitlement-level details are obfuscated. You may have information about the application roles in the database, but the detailed entitlements are written in the code.</p>
<p>Worst case, authorization is entirely written in code, and none of it's available in the database or an API. You have limited visibility and limited ability to manage authorization.</p>
<p>Miraculously, SailPoint has been able to address a lot of this chaos. They wouldn't claim to have it all covered (and you shouldn't believe anyone who does).</p>
<p>SailPoint has been in the business of managing authorization longer than anybody. They've seen every variation you could imagine of the variety and complexity I just described.</p>
<p>Historically, SailPoint was selective about what level of integration they were willing to natively provide (largely based on what an application was capable of).</p>
<p>Their preference is very deep integration that allows customers to manage the full identity lifecycle (down to the entitlement level) and access reviews. In other words, the full treatment an enterprise IGA platform is capable of giving.</p>
<p>SailPoint's mindset is evolving, though. They're now taking a three-tier approach to application integration:</p>
<ul>
<li><strong>Tier 1: Basic visibility</strong> – Discover all applications across the environment, even shadow IT</li>
<li><strong>Tier 2: Quick compliance connectors</strong> – Lightweight integrations for basic provisioning and access reviews</li>
<li><strong>Tier 3: Deep governance connectors</strong> – Full lifecycle management with entitlement-level control, business logic embedded in the integration, and rich context from logs and usage analytics</li>
</ul>
<p>The combination of SailPoint's existing deep governance connectors, the progress they've made on their Atlas (SaaS) platform, and the <a href="https://investor.sailpoint.com/news-releases/news-release-details/introducing-sailpoint-accelerated-application-management?ref=content.strategyofsecurity.com">Savvy acquisition</a> (which brought broad, quick app discovery capabilities) has them on the path to covering the full spectrum of apps, from breadth to depth.</p>
<p>Authorization is always going to be difficult. What matters here is that SailPoint already manages more authorization than anybody. Now, they have the breadth of integration capabilities to handle more.</p>
<p>Here's the gotcha, though: everything we've talked about so far only describes the past and current state of authorization.</p>
<p>When you factor in persistent identity-related threats and more productive use cases like AI agents, the needs and capabilities customers require from identity platforms start to go way beyond what we've been talking about here.</p>
<p>These future needs are a big part of SailPoint's opportunity. Let me tell you about that next.</p>
<h2 id="beyond-todays-identity-challenges">Beyond today's identity challenges</h2>
<p>Once you've climbed the mountain of integrating all of your applications and deepening the level of integration you have with them, you're only at the <em>starting line</em> for the brave new world we're entering.</p>
<p>What matters next is what you do to secure all the identities and entitlements your identity platform now knows about.</p>
<p>To be clear, what we're about to talk about here is beyond what most enterprises have implemented, SailPoint customers or not.</p>
<p>But many of the specific features are already here, and they're going to become more relevant quickly.</p>
<h3 id="1-privileged-access-redefined">1. Privileged access, redefined</h3>
<p>SailPoint has a well-grounded and insightful point of view about its role in managing privileged access: the definition of privileged access is moving from developer and engineering-focused admin access to a broader realization that many other kinds of users' access is privileged, at least some of the time.</p>
<p>This could be access like:</p>
<ul>
<li>Admin access to a non-regulated application</li>
<li>Business-critical access within a regulated application</li>
<li>HR, payroll, and benefits access</li>
<li>New vendor creation in the ERP accounts payable module</li>
<li>Treasury access within the banking application</li>
<li>Customer data access in the CRM</li>
</ul>
<p>Historically, a challenging part for enterprise identity programs has been the separation of privileged access management and identity governance. It isn't as easy as it should be to identify, request, or manage privileged entitlements.</p>
<p>SailPoint's platform already manages a lot of privileged entitlements. The part that was missing was simply the classification of whether an entitlement was privileged or not.</p>
<p>Some implementations took care of this on their own through relatively trivial things like noting access as privileged in the description of an entitlement that would show up when a user was requesting that access. That's not really a feature though — it's more like a workaround.</p>
<p>Where we're heading (and what SailPoint announced at their Navigate conference) is that privileged access is going to have a specific meaning within SailPoint going forward.</p>
<p>This means being able to classify entitlements as privileged, formally request and review them, and all kinds of other details. Bigger picture, the strategy is helping to bring a paradigm that was already happening into reality.</p>
<h3 id="2-just-in-time-access-and-the-end-of-static-privileges">2. Just-in-time access and the end of static privileges</h3>
<p>SailPoint now believes static privilege is dead. Color me surprised. I never thought I'd hear a well-known identity company utter these words.</p>
<p>They're, right though — and credit to them for being brave enough to say it.</p>
<p>The typical workflow is for authorization to be given in advance and stay there. That's what "static privilege" means. The process goes something like this...</p>
<p>When a person starts working at a company, they're granted access to several applications based on other people similar to their job function.</p>
<p>Any access that's not granted right away is requested later as needed. An access request gets made, reviewed, approved or denied, and (if approved), provisioned — which sometimes takes a few days because managers have to approve.</p>
<p>The just-in-time access model flips this. It's our industry's solution to eliminating standing privileges.</p>
<p>Access is granted dynamically, right when it's needed, then revoked immediately after. No one has standing access sitting around indefinitely, which lowers the risk of access being exploited if an identity is compromised.</p>
<h3 id="3-adaptive-identity">3. Adaptive identity</h3>
<p>The most exciting (and, empathetically, most ambitious – but hear me out) direction we're being pulled towards is adaptive identity.</p>
<p>The nature of the identity lifecycle has traditionally been asynchronous:</p>
<ul>
<li>"We'll set your access up within a day or two."</li>
<li>"We'll eventually disable your access if you leave."</li>
<li>"Let's validate access is correct quarterly or annually."</li>
</ul>
<p>A lot of this work was manual or semi-manual. SailPoint has already helped make processes more automated and efficient, especially for enterprise customers who do all of this at scale.</p>
<p>Things are about to move a lot faster, though.</p>
<p>We're heading for a world where waiting days to get access and reviewing it once a year is borderline ridiculous. We need to have much more real-time understanding of the environment.</p>
<p>Mark McClain explains the shift this way:</p>
<p><em>"On the positive side, you want to have identities that are very responsive and rapid so that you can quickly do things that you want to do and do them safely. On the other side, you want to just as quickly take away things or stop them or block them if they appear to be problems or anomalous or dangerous."</em></p>
<p>That's the core concept behind adaptive identity: very rapid and dynamic changes are happening with identities all the time. You can't declare an identity "secure" or access "approved" at one point in time and expect it to stay that way.</p>
<p>Instead, authorization decisions need to be made at runtime (when the authorization needs to be used) <em>with context</em> about why the access is needed and what the status of the identity is at the time. It goes from being a one-time decision to a continuous set of decisions.</p>
<p>If access is truly granted and revoked between uses, it means that the volume of provisioning and deprovisioning actions customers need SailPoint to manage is going to go up exponentially.</p>
<p>Are we really ready for this?!</p>
<p>Mark McClain's take on this is both nuanced and practical. He told me he's never seen a situation where customers have their foot on both the gas and the brake at the same time:</p>
<p><em>"They're trying to press the gas and go faster. 'We've got to adopt these new technologies. They're going to change everything. It's going to make us more effective, more efficient, competitive in our business.' And then the brake is just as heavy right now with people going, 'Whoa, whoa, whoa, this is risky. We don't understand it. We don't know what this is going to expose.'"</em></p>
<p>This tension is visible in the industry right now. There's a reason for it — especially with AI agents.</p>
<p>If you've used any of the really powerful agents, you know how they pull you into putting your foot on the gas. There's this different level of inertia you're not used to with a regular app.</p>
<p>They're innocent and they're addicting. They want you to do more. And their sole purpose in life is to complete work on your behalf. That's the part that makes you want to get on the gas.</p>
<p>But the flip side is that even the best agents go off the rails once in a while. Whenever that happens, you quickly get pulled back into reality and realize why we need guardrails on them.</p>
<p>SailPoint was early to market with its Agent Identity Security solution and first among the major identity companies to hit <a href="https://investor.sailpoint.com/news-releases/news-release-details/sailpoint-ushers-new-era-adaptive-identity-sailpoint-platform?ref=content.strategyofsecurity.com">general availability</a>. There’s even more to come, though.</p>
<p>This tension between wanting to move fast and not quite trusting new technology like AI yet is exactly where privileged access, just-in-time access, and adaptive identity become critical.</p>
<p>We may have no other choice, even if we don't feel ready yet.</p>
<h2 id="welcome-to-the-authorization-era">Welcome to the authorization era</h2>
<p>Authorization was always going to matter eventually. The question was when and who would be ready when the time came.</p>
<p>The 'when' is now.</p>
<p>Credential-based attacks have made it impossible to ignore what happens after authentication. AI agents are creating pressure from business and engineering counterparts to enable rapid access while maintaining control.</p>
<p>The old model of annual access reviews and static privileges isn't going to cut it.</p>
<p>The shift from compliance-driven to security-driven identity governance is happening. The shift from static privileges to adaptive authorization is coming. The shift from annual reviews to real-time decision-making is inevitable.</p>
<p>The 'who' is SailPoint.</p>
<p>Head starts matter in this business.</p>
<p>Customer trust at enterprise scale can't be manufactured overnight. Integration depth takes years to build. The data estate they already manage (those 5 billion entitlements) is a level of data gravity that's hard to replicate.</p>
<p>They've been patiently building this moat for two decades while authentication got all the attention and funding.</p>
<p>Authorization is about to have its moment. SailPoint has been waiting for this all along.</p>
<hr>
<h3 id="footnotes">Footnotes</h3>
<p>¹Compliance is always going to matter, of course. The imminent demise of access reviews, flawed or not, is greatly overstated. We're still going to be doing access reviews when I retire.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <category>#SailPoint</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/12/header-sailpoints-authorization-opportunity.png"/>
        </item>
        <item>
            <title><![CDATA[Varonis and the Price of Accountability at Scale]]></title>
            <link>https://strategyofsecurity.com/varonis-and-the-price-of-accountability-at-scale/</link>
            <guid>690276cb0f29770001a6492a</guid>
            <pubDate>Wed, 29 Oct 2025 20:35:33 GMT</pubDate>
            <description><![CDATA[A look at the long-term strategy for Varonis beyond the near-term questions from their Q3'25 earnings report.]]></description>
            <content:encoded><![CDATA[<p>Sometimes you just have to rip the band-aid off.</p>
<p>Varonis had a near miss on its Q3'25 earnings guidance and lowered revenue guidance for the full fiscal year. The result was placed squarely on the shoulders of their on-premise subscription business.</p>
<p>Many people will call it a stumble. I see it differently. It’s the start of a sprint towards the future.</p>
<p>They took this opportunity to formally announce what we've all known for a while: they're ending support for their on-premise product and only supporting the SaaS platform moving forward.</p>
<p>This is no surprise. They've been alluding to it all year. The only major change here was that they made the decision a formality and put a specific date on it.</p>
<p>I expect this was earlier than they planned or wanted to make this announcement (and several other hard decisions). Sometimes you choose the timing, and sometimes the timing chooses you.</p>
<p>When you rip the band-aid off, it hurts for a minute. It hurt when I was a kid. It hurts my kid now. Honestly, it still hurts me today even though I’m better at hiding the pain.</p>
<p>The thing you learn about ripping band-aids off as an adult is that the anticipation is worse than the burn you feel after taking it off. That's where we're at right now with this earnings report and SaaS transition.</p>
<p>A near miss on revenue and conservative guidance should not overshadow what is clearly the correct strategic decision for Varonis moving forward. It’s the right call for them to end support for their on-premise products and be 100% all-in on SaaS.</p>
<p>That's the part I want to dig into more — both why it's the right decision now and what it means for the future of Varonis.</p>
<h2 id="saas-transitions-in-cybersecurity">SaaS transitions in cybersecurity</h2>
<p>The cybersecurity industry has enough SaaS transition battle scars to see the pattern. The common thread: lengthy timelines, customer friction, and compressed margins.</p>
<p>Public markets don't have patience for this. Many cybersecurity companies have needed private equity air cover to finish the job.</p>
<p>Varonis's SaaS transition has been remarkably pain-free until this quarter. Their conversions have gone both quickly and smoothly from a metrics standpoint. They're two years ahead of their original schedule and have technically completed the SaaS transition, at least by the percentage of revenue marker they set at the beginning.</p>
<p>The part that makes Varonis's SaaS transition different is also one of their biggest strategic differentiators moving forward.</p>
<p>They’re going to finish the job and go all-in on SaaS.</p>
<p>No legacy products hanging around. No “we’ll let customers migrate at their own pace.” Just a clear declaration of 100% cutover by the end of next year.</p>
<p>The nuance and context behind this decision matters a lot here. It's worth explaining in detail why Varonis's strategy makes their SaaS transition different from others.</p>
<p>It's also the reason why they had to make the hard but necessary decision to announce the end of their on-premise product during this earnings report.</p>
<h2 id="accountability-at-scale">Accountability at scale</h2>
<p>Varonis takes accountability for customer outcomes in a way I have rarely seen in cybersecurity, especially for a product-focused company.</p>
<p>Growing up on the services side of the industry at PwC, I'm very familiar with what it means to take deep accountability for customers (and have the scars to prove it).</p>
<p>In a services engagement, especially the long-term transformational programs that I did, client outcomes become your life. It's all-consuming in a way that's very hard to describe unless you've been there.</p>
<p>You wake up in the morning and go to sleep at night consumed by the massive problems you're trying to solve. You put most of your mental energy toward inching closer to the goal every single day.</p>
<p>Care doesn't scale, though. This mode of operation can only handle one or two clients at any given time.</p>
<p>The nature of services demands a different level of accountability than what most clients or industry professionals would typically expect of a product-focused company.</p>
<p>Product companies aren't irresponsible. They operate on a different accountability spectrum.</p>
<p>At one end: ship software, provide documentation, offer support tickets. At the other: own outcomes end-to-end, automate fixes, guarantee results.</p>
<p>Most cybersecurity product companies cluster in the first third of the range because deeper accountability hasn't historically scaled — or at least, it hasn't until now.</p>
<p>Varonis is betting they can move the median.</p>
<p>Something I have grown to admire about Varonis is the extraordinary level of ownership and accountability they aspire to take as a product company. Their find, fix, alert mantra is all-encompassing and all-consuming in a way that's rare to see in the industry.</p>
<p>They literally aspire for a world where their customers barely have to lift a finger to protect their data.</p>
<p>It's remarkable to even make or assert a statement like that in the first place (and actually mean it).</p>
<p>Most cybersecurity companies won't go that far. It's a completely next-level thing to actually be far down the path of doing it, but there is a ton of substance and evidence of execution that shows how Varonis is bringing their vision closer to reality.</p>
<p>More tactically, for Varonis and the data security market at large, that means a few things.</p>
<h3 id="finding-and-classifying-data-is-table-stakes">Finding and classifying data is table stakes.</h3>
<p>That's the easy part, at least in theory. It's surprisingly not though, especially when you get into the larger enterprise customer segment who has a significant amount of sensitive data both on-premise and spread across multiple cloud providers, data stores, and SaaS applications.</p>
<p>For this kind of customer, the ideal customer profile for a data security platform, just finding cloud data isn't good enough. You have to be able to find and classify their data across every data store imaginable, including the old gnarly on-premise ones that most startups don't want to touch.</p>
<p>Varonis has exhaustively done this, maybe in some ways to their own detriment. They built, enhanced, and supported on-premise data stores for a long time because that's what matters to their customers. By their own admission, they were later than they should have been to the cloud, but they've caught up quickly with the SaaS product.</p>
<p>Basic data security posture management products aren't at a point where they're able to be accountable for even discovering and classifying every piece of data. Focusing on cloud data stores is a nice start, but enterprise CISOs need everything. Even that old <a href="https://www.pcmag.com/encyclopedia/term/filer?ref=content.strategyofsecurity.com">filer</a> over there. You know, the one with a bunch of credit cards sitting on it.</p>
<h3 id="things-really-start-to-get-difficult-when-you-try-fixing-problems">Things really start to get difficult when you try fixing problems.</h3>
<p>For an enterprise security leader, there is a massive difference between finding data security issues and opening tickets for them versus automatically fixing the issues without intervention.</p>
<p>Tickets may work for smaller organizations with less data and modern tech stacks, but this approach to fixing does not scale at enterprise level.</p>
<p>If Varonis hadn't taken deep accountability for fixing the data security issues they find, they would have been at risk of going the way of the vulnerability management companies, who notoriously found vulnerabilities and left the patching and remediation to somebody else.</p>
<p>The fixing for Varonis goes beyond the traditional data security domain when necessary. To me, this is strategic, not overreaching.</p>
<p>One example: if the reason data is exposed is because of an identity-related permissions issue, Varonis believes it is their responsibility to fix the issue. The easy route would be to hand this off through a ticket or to another identity product and say "this is not my problem."</p>
<p>Varonis continues to double down on owning more and more of the accountability for fixing data security problems they identify, regardless of which domain the fix is in.</p>
<h3 id="a-more-recent-extension-of-accountability-is-through-services">A more recent extension of accountability is through services.</h3>
<p>Varonis's Managed Data Detection and Response (MDDR) service offering was a surprise to me, mainly because it is so rare for cybersecurity product companies to willfully operate a managed services business themselves. Historically, an overwhelming majority of companies outsource this to managed services partners.</p>
<p>I'll admit that I was a bit skeptical of this offering when Varonis first announced it, but in hindsight, this tracks with the overall accountability theme.</p>
<p>I don't think Varonis really cared what the financial profile of the services business was. They just felt like it was the best thing for their customers, so they did it.</p>
<p>The offering has performed amazingly well by almost any account (and certainly exceeded my expectations.)</p>
<p>I think this could even be a model for other product companies in the future. It sounds trite, but this is a tangible example of delivering outcomes, not just products. The product (the SaaS product, in particular) is certainly an enabler of the outcome, but (at least for now) you need people too.</p>
<h2 id="hard-strategic-decisions">Hard strategic decisions</h2>
<p>Hard strategic decisions are the cost of accountability at scale.</p>
<p>Without strategic context, I can see how announcements like we heard yesterday seem jarring. It feels like an extreme and binary decision to end support for a product that carried the company for 20 years (and risk churning customers who aren't along for the ride).</p>
<p>I think the <em>aha</em> moment for Varonis was acknowledging how much they want to be accountable for customer outcomes, then laying the groundwork across many tactical decisions to make it happen.</p>
<p>This buildup has been happening for years. It just feels more real now.</p>
<p>Ending support for the on-premise product and going all-in on SaaS isn't about cutting costs — it's about closing the delta between the level of accountability they can take on-premise versus what can do now (and going forward) with the SaaS product.</p>
<p>The choice is obvious.</p>
<p>Varonis made it far enough in their SaaS transition to build conviction and make this call now.</p>
<p>Long after the drama from the earnings report cycles through the news and the stock volatility settles, it will be clear this was the right move.</p>
<p>The band-aid is off. The anticipation was worse than the sting. That short-term sting clears the path for what matters: accountability at scale.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <category>#Varonis</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/header-varonis-price-of-accountability.png"/>
        </item>
        <item>
            <title><![CDATA[What's Next for Netskope]]></title>
            <link>https://strategyofsecurity.com/whats-next-for-netskope/</link>
            <guid>68ef04a80f29770001a63c75</guid>
            <pubDate>Wed, 15 Oct 2025 21:28:43 GMT</pubDate>
            <description><![CDATA[A deep dive into Netskope's past, present, and future as a public company.]]></description>
            <content:encoded><![CDATA[<p><strong><em>I'm honored to team up with Francis Odum (</em></strong><a href="https://softwareanalyst.io/?ref=content.strategyofsecurity.com" rel="noreferrer"><strong><em>Software Analyst Cyber Research</em></strong></a><strong><em>) and CJ Gustafson (</em></strong><a href="https://www.mostlymetrics.com/?ref=content.strategyofsecurity.com" rel="noreferrer"><strong><em>Mostly Metrics</em></strong></a><strong><em>) for this deep dive article. Enjoy!</em></strong></p><p>Netskope just became the second cybersecurity-related IPO of 2025. The company filed its S-1 on August 22, 2025 and went public 27 days later at a $7.26 billion offering valuation.</p>
<p>The journey of Netskope is a remarkable one. The company was founded in 2012, raised $1.44 billion in capital, and played a defining role in shaping the market category we know as Secure Access Service Edge (SASE) today.</p>
<p>For Netskope, going public represents both a significant milestone and an inflection point that could alter the trajectory of the company for better or worse. Their performance over the next few quarters will set the tone going forward, as will their ability to execute and capture market share in AI Security.</p>
<p>Inside this analysis, you’ll find:</p>
<ul>
<li>The story of Netskope’s history and evolution, from its origins as a CASB pioneer to a broad SASE platform</li>
<li>An assessment of Netskope’s technical capabilities across SASE, DLP, and AI Security</li>
<li>Netskope’s AI strategy, future vision, and potential competitive advantages</li>
<li>A financial analysis based on Netskope’s S-1 filing and evaluation of the company’s valuation metrics</li>
<li>Netskope’s business strategy and competitive landscape</li>
<li>A summary thesis, including the bull and bear cases for Netskope’s next chapter as a public company</li>
</ul>
<p>Use this report to understand the evolution of Netskope’s business, its product strategy, financial performance, competitive landscape, and path forward as a public company.</p>
<h2 id="company-history-and-evolution">Company History and Evolution</h2>
<h3 id="origins-as-casb-pioneer">Origins as CASB pioneer</h3>
<p>The story of Netskope is closely aligned with the story of SaaS. Without the rise of the large enterprise SaaS applications, we wouldn’t be talking about a Netskope IPO.</p>
<p>Salesforce started gaining enterprise adoption in the early 2000s as an early pioneer of SaaS, but one (generally unregulated) application isn’t enough to set off alarms for security leaders.</p>
<p>Amazon AWS launched in 2006. Their primary business is IaaS/PaaS, not SaaS — but moving infrastructure workloads to the cloud was the hook enterprises needed to start getting comfortable with SaaS.</p>
<p>Several of our current SaaS juggernauts started reaching enterprise-grade scale and security by the late 2000s. Microsoft Office 365 started around that time, as did Google Workspace (formerly Google Apps and G Suite). Workday (HRMS) and ServiceNow (ITSM) also brought essential enterprise functions to the cloud.</p>
<p>Once you've got email, docs, spreadsheets, HR, and ITSM in the cloud, the enterprise floodgates are open. SaaS started to go mainstream for enterprises in the early 2010s. Collaboration joined the party — names like Box, Dropbox, Atlassian, collaboration apps (Yammer, HipChat, Skype Enterprise, Slack), and dozens more.</p>
<p>Enter Netskope. The company was founded in 2012 as one of the defining Cloud Access Security Brokers (CASB) on a mission to secure SaaS apps. Network security was very different in 2012. Firewalls and VPNs were the way enterprises secured their perimeters. B2B SaaS effectively broke the architecture when cloud-first started becoming the default option for CIOs.</p>
<p>CISOs needed an answer for widespread SaaS adoption as core business processes and sensitive data moved out of the network and into the cloud. Netskope and CASB quickly became a major part of the solution for securing SaaS apps outside the network perimeter. Traditional Secure Web Gateways (SWG) weren’t enough (and were designed for broad traffic filtering, not deep integration and inspection for specific apps). Netskope became famous for its granular controls and data-centric visibility over a wide range of B2B SaaS applications.</p>
<p>The secure networking and cloud security markets moved quickly, though. The emerging CASB market Netskope helped pioneer started to converge with adjacent market segments. The race to the market we now know as Secure Access Service Edge (SASE) was on by the middle of the 2010s.</p>
<p>Netskope stepped up with world-class execution and financial backing to scale from its CASB roots to a multi-product platform. The company grew rapidly as SaaS became the default for new enterprise software purchases. Netskope <a href="https://www.netskope.com/press-releases/netskope-closes-75-million-funding-round-led-by-iconiq-capital?ref=content.strategyofsecurity.com#:~:text=In%20the%20past%20year%2C%20Netskope,Europe%20to%20meet%20growing%20demand">disclosed</a> 600% year-over-year revenue growth and 500% year-over-year customer growth in 2015, grew by 400% <a href="https://www.netskope.com/press-releases/netskope-posts-triple-digit-growth-2016?ref=content.strategyofsecurity.com#:~:text=Netskope%2C%20the%20leader%20in%20cloud,percent%20to%20meet%20increasing%20demand">again</a> by 2016, and followed it up by <a href="https://www.prnewswire.com/news-releases/netskope-closes-100-million-funding-round-led-by-lightspeed-venture-partners-and-accel-300469143.html?ref=content.strategyofsecurity.com#:~:text=The%20oversubscribed%20round%20brings%20the,success%2C%20and%20threat%20research%20teams">tripling revenue</a> the following year. Unsurprisingly, they were a <a href="https://techcrunch.com/2018/11/13/netskope-raises-168-7m-at-a-1b-valuation-for-its-cloud-security-platform/?ref=content.strategyofsecurity.com#:~:text=The%20valuation%20was%20not%20disclosed,the%20company%E2%80%99s%20valuation%20above%20that">unicorn by 2018</a>.</p>
<p>Their early financing rounds mirrored their growth, with $400.1 million raised across six rounds (Series A-F) between their founding date in 2012 and the end of the decade.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/netskope-total-financing-2012-2019.png" class="kg-image" alt="" loading="lazy" width="830" height="717" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/10/netskope-total-financing-2012-2019.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/netskope-total-financing-2012-2019.png 830w" sizes="(min-width: 720px) 720px"></figure><h3 id="transformation-through-market-evolution">Transformation through market evolution</h3>
<p>From a market perspective, buyer demand and analyst influence started driving the convergence of SWG, CASB, Zero Trust (ZTNA), SD-WAN, and NGFW. Gartner <a href="https://vertassets.blob.core.windows.net/download/4b40e73f/4b40e73f-a2f0-4e01-93ce-351e5512590a/gartner_wp___sase___the_future_of_network_security_is_in_the_cloud_08_30_19.pdf?ref=content.strategyofsecurity.com">coined</a> the term SASE in 2019 and put a name (and serious analyst clout) behind the market convergence that was already happening.</p>
<p>Nothing drives market change like a crisis, though — and the COVID-19 pandemic was exactly that. The rapid shift to remote work and acceleration of digital transformations pulled forward years of change into a short and intense period of time.</p>
<p>Combine a global pandemic with peak cybersecurity <a href="https://strategyofsecurity.com/p/themes-from-momentum-cybers-2022-cybersecurity-almanac%5D?ref=content.strategyofsecurity.com">market hype</a> for investors, and you’ve got the ingredients for IPO-level scale. Netskope was a promising company before the pandemic, but the early 2020s changed its trajectory forever.</p>
<p>Netskope entered the decade as a unicorn with $400.1 million in total financing. By the end of 2021, they had raised another $640 million of later-stage capital and reached a $7.5 billion valuation, one of ~15 privately held cybersecurity-related companies to <a href="https://strategyofsecurity.com/p/dry-january-the-sobering-state-of-public-markets-for-cybersecurity-companies?ref=content.strategyofsecurity.com">reach a valuation</a> of $5 billion or higher.</p>
<p>Add on a $401 million convertible note in 2023 to create some breathing room from 2021 venture round to…<em>whenever</em> the software IPO window opened again…and you get to a grand total of $1.44 billion in financing. That’s the third highest total ever by a cybersecurity-related company after Wiz and Lacework.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/netskope-total-financing-2020-present.png" class="kg-image" alt="" loading="lazy" width="830" height="757" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/10/netskope-total-financing-2020-present.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/netskope-total-financing-2020-present.png 830w" sizes="(min-width: 720px) 720px"></figure><p>As they say, it is <a href="https://strategyofsecurity.com/p/how-much-capital-does-it-take-for-a-cybersecurity-company-to-go-public?ref=content.strategyofsecurity.com">expensive</a> to build important cybersecurity companies. Netskope is no exception.</p>
<p>To their credit, they executed. Netskope deployed their capital wisely and made a critical strategic choice: becoming a multi-product security platform instead of sticking to their core CASB market. This graphic from the S-1 is a nice visual summary of the timeline and evolution of their platform:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/data-src-image-364919d1-fb7c-4768-af61-e44cb902dc47.jpeg" class="kg-image" alt="" loading="lazy" width="1237" height="1600" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/10/data-src-image-364919d1-fb7c-4768-af61-e44cb902dc47.jpeg 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2025/10/data-src-image-364919d1-fb7c-4768-af61-e44cb902dc47.jpeg 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/data-src-image-364919d1-fb7c-4768-af61-e44cb902dc47.jpeg 1237w" sizes="(min-width: 720px) 720px"></figure><p>They expanded from CASB into SWG, ZTNA, and eventually a full SASE offering (and beyond). They also invested heavily in building their own global private network (NewEdge, not to be confused with the New Edge Labs acquisition) to support inline traffic steering and performance.</p>
<p>Netskope’s rapid platform expansion was driven by both organic product development and inorganic M&amp;A. They’re one of the most low-key active acquirers in cybersecurity, with eight disclosed acquisitions (no price disclosures) and at least a couple more undisclosed deals:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/netskope-pre-ipo-acquisitions.png" class="kg-image" alt="" loading="lazy" width="830" height="905" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/10/netskope-pre-ipo-acquisitions.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/netskope-pre-ipo-acquisitions.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Netskope could go down as one of the all-time greats for tuck-in M&amp;A execution. Customers generally like their products, analysts consistently rate them highly in market maps, and (as the S-1 shows) they’ve performed relatively well financially. This trifecta is extraordinarily difficult to pull off.</p>
<h3 id="brand-recognition-challenges-and-market-perception">Brand recognition challenges and market perception</h3>
<p>Despite their rocketship growth (by pre-AI standards), valuation, capital raised, analyst rankings, and all of the other reasons companies make noise and get recognized, Netskope hasn’t yet become a household name like Wiz and a few other cybersecurity <a href="https://strategyofsecurity.com/p/cybersecuritys-ipo-pipeline-2025-candidates?ref=content.strategyofsecurity.com">contemporaries</a>.</p>
<p>Increasing awareness and brand recognition is such a big strategic priority for Netskope that co-founder and CEO Sanjay Beri has named it as a driver for going public multiple times. From the <a href="https://www.wsj.com/articles/cyber-vendor-netskope-plans-2025-ipo-56c800e6?ref=content.strategyofsecurity.com">WSJ</a>: “Our biggest focus is just awareness. We know if we get an at‑bat, in baseball terms, we have a great chance of getting on base and doing well, so when I look at going public, for me, it’s an awareness event.”</p>
<p>That may seem like a bizarre strategy, but you need all the brand recognition you can get when you’re directly competing against the likes of Palo Alto Networks, Fortinet, Check Point, Zscaler, and other well-known companies.</p>
<p>Industry analysts know and recognize them, which is a good place to start. They’re consistently recognized as a leader in various market reports by Gartner, Forrester, and IDC. Strong analyst ratings are helpful, but not sufficient, for building a successful cybersecurity company at scale.</p>
<p>Most cybersecurity leaders are familiar with Netskope, but familiarity doesn’t always translate to pipeline and growth. For some, Netskope is the CASB company that raised a bunch of money and fell off the radar during the economic downturn.</p>
<p>That’s not true, of course. Netskope is going to be one of the first ZIRP-era companies who made it through to the other side. Perception can take time to catch up with reality, though — especially in a noisy cybersecurity market where buyers are tired of hearing about Zero Trust.</p>
<p>Combine all of this with an outsized international customer base, and you can see why brand recognition and perception are an ongoing thing Netskope has to keep working on.</p>
<h2 id="technology-and-product-analysis">Technology and Product Analysis</h2>
<p>Netskope is increasingly positioning itself not just as a SSE leader but as a full SASE platform. While its reputation was built on best-in-class cloud security controls such as CASB, SWG, and ZTNA, Netskope has steadily expanded its portfolio to include networking capabilities like FWaaS in 2021 and SD-WAN in 2022.</p>
<p>By integrating these networking and security layers into a single cloud-native fabric, Netskope delivers on the original Gartner vision of SASE, being a leader in Gartner® Magic Quadrant™ for SASE Platforms in 2024 and 2025. It is a converged platform that ensures users can securely and efficiently connect to applications, data, and services from anywhere.</p>
<p>The market opportunity is significant. Netskope believes its unified solution addresses a large TAM that is projected to reach $138.9 billion by 2028, growing at a 16.8% CAGR from 2024 to 2028.</p>
<p>The graphic below (from the S-1) shows a comprehensive overview on the Netskope One Platform, a cloud-native, converged security and networking platform that delivers a single stack rather than a patchwork of point tools.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/data-src-image-90e5cc36-23ab-4917-829c-9ff97de7ba4f-1-1.png" class="kg-image" alt="" loading="lazy" width="1412" height="843" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/10/data-src-image-90e5cc36-23ab-4917-829c-9ff97de7ba4f-1-1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2025/10/data-src-image-90e5cc36-23ab-4917-829c-9ff97de7ba4f-1-1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/data-src-image-90e5cc36-23ab-4917-829c-9ff97de7ba4f-1-1.png 1412w" sizes="(min-width: 720px) 720px"></figure><p>Rather than building separate AI Security tools, Netskope has intentionally made AI and Data its two key pillars in its entire NewEdge Network, attempting to weave these ideologies into all its products. This image showcases how Netskope brings together DSPM and context-aware DLP capabilities together across its entire stack to mitigate data risks and ensure compliance.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/data-src-image-aa3347db-0fb3-4325-b328-82dbdb311a8b.png" class="kg-image" alt="" loading="lazy" width="1600" height="898" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/10/data-src-image-aa3347db-0fb3-4325-b328-82dbdb311a8b.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2025/10/data-src-image-aa3347db-0fb3-4325-b328-82dbdb311a8b.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/data-src-image-aa3347db-0fb3-4325-b328-82dbdb311a8b.png 1600w" sizes="(min-width: 720px) 720px"></figure><p>Below is a deeper analysis on the core SASE platform as well as how Netskope is leveraging its SSE infrastructure to wedge into AI and Data Security.</p>
<h3 id="core-netskope-one-sse-products">Core Netskope One SSE Products</h3>
<p><strong>CASB:</strong> Netskope’s CASB delivers comprehensive and adaptive visibility and security controls for cloud and SaaS. Part of their CASB operates out-of-band, connecting to SaaS platforms through API integrations to monitor activity and enforce policies instead of requiring all traffic to be routed for inspection.</p>
<p>It provides access control, threat protection, and data protection across sanctioned and unsanctioned apps. The CASB combines out-of-band capabilities such as data and threat detection, SaaS app inventory, remediation, and event log analysis with real-time preventive enforcement for both human and non-human entities. This dual inline and out-of-band approach gives enterprises visibility into SaaS data at rest through APIs, while also enforcing inline controls on live traffic.</p>
<p>Netskope is the industry’s first Gen AI powered CASB, which is intended to expedite and automate the process of risk categorization for new SaaS applications. In addition, security teams can leverage self-serve risk categorization for novel SaaS applications and can use natural language queries for detailed LLM-driven risk insights of SaaS applications.</p>
<p>At the same time, Netskope prides itself on having a strong DLP integration, providing a high degree of data protection and compliance across all apps and users. The solution uses AI, ML, deep learning, Natural Language Processing (NLP), Convolutional Neural Networks (CNN), and trainable ML to proactively identify and protect critical data. Netskope One CASB delivers this protection using a catalog of over 3,000 data classifiers and 1,800 file types.</p>
<p>Compared to competitors such as Zscaler, Netskope has historically been stronger on DLP integration and granular data controls within CASB. Zscaler, by contrast, emphasizes scale, performance, and ecosystem reach, leveraging its Zero Trust Exchange to inspect all SSL and internet traffic globally with proven throughput and speed.</p>
<p><strong>SWG:</strong> Netskope’s SWG is positioned as the foundation of SSE for inline web and SaaS security. It provides real-time traffic inspection, URL categorization, malware detection, SSL/TLS decryption, and deep content inspection, with threat defenses delivered consistently across all controls, including sandboxing and AI/ML-based malware detection. Unlike traditional web proxies that primarily focus on URL filtering, Netskope’s SWG decodes SaaS applications, analyzes content and context, and applies adaptive access policies. It also extends protections to cover non-web traffic, risky websites, and unmanaged remote access, consolidating functionality that previously required multiple tools.</p>
<p>Netskope’s SWG uses ML models for URL categorization, analyzing not just domains but page content, metadata, and visual elements to more accurately classify sites beyond traditional URL filtering. The SWG also leverages AI/ML for threat detection and anomaly detection, with models trained on cloud-scale traffic patterns to identify suspicious behaviors and cloud-enabled threats. Netskope documentation notes that SkopeAI includes behavioral anomaly detection and other adaptive learning techniques, which allow the platform to flag and respond to emerging attack vectors more effectively than static signature approaches.</p>
<p>While this enables the SWG to detect both known and previously unseen threats in real time, the company’s capabilities are more so an evolution of machine-learning–based classification and detection rather than as novel generative AI. Combined with its deep DLP integration and single-pass inspection architecture, Netskope’s SWG acts as a more context- and data-aware enforcement point than traditional web proxies, though independent validation of its AI advantages over competitors remains limited.</p>
<p>While Netskope’s SWG is formidable, Zscaler pioneered the large-scale, cloud-delivered SWG and still dominates in terms of customer base and deployment scale. Zscaler’s SWG is proven at very high throughputs and global volumes. Netskope differentiates itself with its single-pass architecture, AI-driven inspection engines, tight DLP integration, and performance SLAs tied to the NewEdge network. In fact, performance testing Netskope conducted in May 2025 demonstrated a lower latency for connections to its NewEdge network in leading cities globally than those of Palo Alto Networks and Zscaler.</p>
<p>However, Zscaler remains the “safe” choice for many enterprises due to its long-standing scale proof points, especially in handling massive SSL/TLS traffic. To overtake incumbents, Netskope must continue to prove that its AI-enhanced SWG can scale as reliably as Zscaler and other established players while maintaining the performance and visibility advantages promised by its architecture.</p>
<p><strong>DLP:</strong> Netskope’s DLP is one of the strongest pillars of its SASE platform and sits at the heart of its “secure data everywhere” vision. Unlike point products that focus only on specific layers, Netskope extends DLP consistently across web, SaaS, IaaS, private applications, endpoints, and even email. By running through its NewEdge backbone, DLP policies are applied close to the user in real time, reducing the latency challenges that often plague intensive inspection. This convergence is intended to make DLP a unifying control plane, allowing enterprises to set a single policy for sensitive data and have it follow workloads seamlessly across all environments.</p>
<p>AI plays a central role in Netskope’s DLP architecture, but in a measured way. Machine learning classifiers, OCR for images and screenshots, and behavioral context enrich the platform’s ability to recognize sensitive content more accurately than traditional regex-based rules.</p>
<p>Netskope also extends DLP directly into generative AI workflows for monitoring prompts, preventing sensitive uploads into public models, and inspecting AI-generated outputs for inadvertent leakage. In practice, this means that employees cannot paste intellectual property into ChatGPT or accidentally exfiltrate regulated data through a Copilot response without Netskope detecting and enforcing policy. The company’s framing of this as “secure enablement of AI” reflects its intent to make AI safe to use in enterprise rather than simply blocking it altogether.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/data-src-image-611a35b4-7092-4503-a370-4d152863b61a.png" class="kg-image" alt="" loading="lazy" width="1600" height="789" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/10/data-src-image-611a35b4-7092-4503-a370-4d152863b61a.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2025/10/data-src-image-611a35b4-7092-4503-a370-4d152863b61a.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/data-src-image-611a35b4-7092-4503-a370-4d152863b61a.png 1600w" sizes="(min-width: 720px) 720px"></figure><p>Where Netskope is most credible is in its multi-surface enforcement and unified policy fabric. Many API-only or SaaS-native DLP vendors can discover data risks after the fact, but Netskope’s inline presence means it can act immediately to block or redact risky transactions. The ability to apply the same DLP controls to SaaS traffic, private applications, and web browsing is a real differentiator, particularly for organizations that want consistent governance across hybrid work environments.</p>
<p>Enterprises also benefit from the operational simplicity of a single policy console and the global enforcement made possible by the NewEdge footprint.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/data-src-image-3d407e75-54e0-4aab-be15-d347752f40b2.png" class="kg-image" alt="" loading="lazy" width="1600" height="895" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/10/data-src-image-3d407e75-54e0-4aab-be15-d347752f40b2.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2025/10/data-src-image-3d407e75-54e0-4aab-be15-d347752f40b2.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/data-src-image-3d407e75-54e0-4aab-be15-d347752f40b2.png 1600w" sizes="(min-width: 720px) 720px"></figure><p>That said, some of Netskope’s claims require context. The assertion of being the “most comprehensive and advanced cloud DLP” is ambitious given that competitors like Zscaler, Palo Alto, and Microsoft Purview offer equally broad capabilities, each with its own edge. Zscaler, for example, still leads in proven global scale and throughput for TLS/SSL inspection, which can be critical when AI data flows grow in size. Palo Alto Networks delivers deeper threat intelligence integration through Unit 42 and WildFire, something Netskope cannot match at the same breadth. Specialized data security vendors such as Varonis, Cyera, and BigID also offer exhaustive DSPM, data classification, and (primarily) out-of-band DLP for complex data estates, albeit without the dual inline and out-of-band prevention Netskope provides.</p>
<p>Another area to watch is how well Netskope can keep up with evolving AI risks. Current policies cover prompts, embeddings, and outputs, but threats like prompt injection, model inversion, and inference leakage are emerging quickly. Netskope’s AI is primarily machine-learning, data-driven classification rather than novel generative AI techniques.While effective today, it risks being perceived as “incremental” compared to newer  AI-native players. Similarly, while the platform reduces false positives with ML, tuning remains a challenge for enterprises with highly diverse data, and blind spots may remain in legacy data stores or niche SaaS apps with weak APIs.</p>
<p>Looking forward, Netskope’s growth hinges on demonstrating that its AI-driven enforcement can scale as reliably as Zscaler’s and match Palo Alto Networks’ breadth of ecosystem integration. If it succeeds, Netskope is well-positioned to benefit from enterprises consolidating point products into unified SASE stacks, a trend analysts expect to accelerate as hybrid workforces and generative AI reshape network and data security priorities.</p>
<h2 id="netskopes-ai-ambitions-and-pillars">Netskope's AI Ambitions and Pillars</h2>
<p>Netskope's three-pillar AI security framework includes:</p>
<ul>
<li><strong>Data Protection:</strong> DLP, sensitive data monitoring, policy enforcement</li>
<li><strong>Threat Protection:</strong> Runtime security, supply chain protection</li>
<li><strong>Content Moderation:</strong> Filtering profanity, bias, harmful content (upcoming capability)</li>
</ul>
<p>This represents far more than a tactical response to emerging AI risks. It's a calculated positioning for what the company envisions as the inevitable convergence of AI and enterprise infrastructure.</p>
<p>By anchoring data protection, threat protection, and content moderation within their existing SSE platform rather than building standalone AI security tools, Netskope is making a bet that AI will become so deeply embedded in business operations that separating "AI security" from "enterprise security" will become meaningless.</p>
<p>Their consolidated architecture positions them to enable enterprises to confidently embrace AI transformation at scale, transforming from a network security vendor into the foundational infrastructure that governs how organizations interact with artificial intelligence.</p>
<p>This isn't just about securing AI applications — it's about becoming the control plane through which all AI-human collaboration flows. If Netskope’s strategy works, they can position themselves as kingmakers in both security and determining which AI technologies enterprises can safely adopt.</p>
<p>Their strategic advantage lies in leveraging their existing customer relationships and nine years of API intelligence to create switching costs that would make it prohibitively expensive for enterprises to replace them. Netskope wants to embed their platform so deeply into the AI decision-making process that they become indispensable to digital transformation itself. In essence, while competitors are building point solutions for today's AI security problems, Netskope is architecting the nervous system for tomorrow's AI-native enterprise.</p>
<h3 id="architecture-how-netskope-is-leveraging-its-sse-infrastructure-to-wedge-into-ai-security">Architecture: How Netskope is leveraging its SSE infrastructure to wedge into AI Security</h3>
<p>Netskope's approach to AI security builds upon their architectural leverage, using their decade-long investment in SASE infrastructure and deep packet inspection capabilities as a moat against pure-play AI security startups.</p>
<p>Their existing SSE platform already has a strong vantage point to monitor AI runtime behavior, intercepting every API call, JSON payload, and data exchange between users and AI applications in real-time. This positioning allows them to extend their DLP engines to understand not just what sensitive data is moving, but how it's being transformed and utilized within AI workflows.</p>
<p>If this strategy works, they can create a comprehensive view of AI supply chain risk that competitors would need years to replicate.</p>
<p>Netskope’s competitive advantage becomes particularly pronounced when examining their use case execution.</p>
<p>For user access security, Netskope doesn't need to build identity integrations from scratch because they already authenticate and authorize millions of users daily through their existing zero trust framework.</p>
<p>When protecting custom AI applications, their DLP on-demand service can instantly plug into any homegrown AI tool through APIs they've been perfecting for nearly a decade, while startups struggle to achieve enterprise-grade integration depth.</p>
<p>For data pipeline safeguarding, their DSPM capabilities naturally extend to protect training datasets and vector databases because they already understand data lineage and classification at scale.</p>
<p>Their strategic insight is recognizing that AI runtime protection and posture management aren't net-new security categories. They’re natural extensions of network security fundamentals.</p>
<p>While AI security startups are required to invest in building basic infrastructure capabilities, Netskope transforms existing customer deployments into AI security platforms through software updates, creating immediate time-to-value and eliminating the friction of new vendor evaluation cycles.</p>
<p>This architectural inheritance means they can focus their R&amp;D entirely on AI-specific threat detection and response rather than rebuilding networking, identity, and data protection foundations.</p>
<h2 id="financial-analysis">Financial Analysis</h2>
<p>If you want a comprehensive look into Netskope’s financials, CJ Gustafson has a <a href="https://www.mostlymetrics.com/p/netskope-ipo-s1-breakdown?ref=content.strategyofsecurity.com">full breakdown</a> of the S1 over at Mostly Metrics. This part of the report includes the key points from CJ’s analysis in the context of Netskope’s broader strategy and market positioning.</p>
<h3 id="revenue-scale-and-growth-dynamics">Revenue scale and growth dynamics</h3>
<p>Netskope’s ARR was $707M as of July 2025, growing at +33% YoY. Their TTM Revenue was $616M (as of July 2025, +31% YoY). This is real revenue they recognized, looking back over the last 12 months.</p>
<p>This makes them one of largest scale cybersecurity companies ever to go public, but we’re also in a period where investors value revenue scale. Netskope may have gone public years ago (with far less revenue) if the market hadn’t turned on subscale IPO candidates.</p>
<p>They have 4,300 customers, growing at +21% YoY. Their customer mix slants towards enterprise, with 30% of the Fortune 100 and 18% of the Global 2000. They’re not just selling to Series B CTOs. Their ICP is a public company CIO.</p>
<p>Netskope’s revenue scale and growth are all about large customers. They have 111 customers spending +$1M a year, representing 37% of total ARR and 32% YoY growth. There are also 1,372 customers with ARR +$100K, representing 86% of ARR and 29% YoY growth. One customer makes up ~3% of revenue.</p>
<p>41% of revenue comes from outside the U.S., which is unusually high for a security company still sub $1B in scale. Much of this is already routed through their global NewEdge infra — not just hyperscaler data centers. This suggests Netskope may actually be ahead of rivals in building a true global GTM. And it justifies infra spend more than initially assumed.</p>
<p>Netskope’s contracts are typically multi-year, priced per user, and sold top-down into large enterprises. This is a classic field sales motion, supercharged through the channel — not a PLG tool you swipe a credit card for.</p>
<p>Most deals are brokered by partners, not direct AEs (although reps still get paid handsomely to work with partners and usher deals over the finish line). It allows for global scale, and access to juicy multi national CIO budgets, but it distances Netskope from end-user feedback loops and pricing power.</p>
<p>Upsell is a big lever. Netskope’s products are modular, which means once they land with one or two services, there’s plenty of room to tack on more — like data loss prevention (DLP), zero trust access, or browser isolation.</p>
<p>They also charge more if you want traffic to run through their private NewEdge network — think of it like a fast lane on the highway…that you pay extra for.</p>
<h3 id="profitability-roadmap-and-unit-economics">Profitability roadmap and unit economics</h3>
<p>Netskope lost $170M in the first half of FY26. That’s down from $223M the year before, which is progress, but still deep in the red.</p>
<p>The company managed $9M in positive operating cash flow for the first time ever right before the filed the S1. This could be real efficiency gains or some well-timed invoicing. Either way, they’ll need to prove it sticks.</p>
<p>Their headcount growth is keeping up with, and has historically outpaced, revenue growth. They’ve more than doubled staff over the last two years. They are very much a security company born in the 2010’s applying the field sales / cloud based / reseller / ENT SaaS playbook.</p>
<p>They will not be breaking any world records when it comes to “doing more with less people”. Their revenue per head is closer to Series C or D levels than that of a public company.</p>
<p>The path to sustained profitability travels through S&amp;M. Looking at the last six month period, Sales and Marketing dropped from 60% of revenue to 45% YoY without a hit to growth. That’s a sign they’ve found some GTM efficiency, likely due to scale and channel leverage.</p>
<p>In absolute terms, Sales and Marketing costs only grew 7% year on year while GAAP revenue grew 31%. Total S&amp;M dollars spent actually decreased when you compare the most recent 6 month period to that in the prior year.</p>
<h3 id="valuation-framework-and-multiple-analysis">Valuation framework and multiple analysis</h3>
<p>Netskope last raised money in 2021 at a $7.5B valuation. They’ve pulled in $1.4B total from a deep bench of crossover names: ICONIQ, Lightspeed, Accel, Sequoia, and SoftBank.</p>
<p>They still had $261M in cash on the books as of July 31. So while some extra padding would be nice, this IPO wasn’t about plugging a hole. It was about giving those early investors a path to liquidity, and giving the sales team a new slide for the next QBR with [Big Bank XYZ] on it.</p>
<p>Netskope priced its IPO at $19.00 per share, bringing in $908.2 million in net proceeds at a $7.26 billion opening valuation. It’s fair to assume they wanted to clear that $7.5B mark. That said, a (roughly) flat round in public is still a win in this market. Especially if it buys you brand equity and a path to liquidity.</p>
<p>Companies that are burning money (as Netskope is) are valued using multiples of revenue, estimated to occur over the next twelve months, relative to their enterprise value.</p>
<p>For context, the median SaaS company is trading in the 5x forward revenue range.</p>
<p>Within the security sector more specifically, CheckPoint is clocking in at 6x, Fortinet at 8x, and SailPoint at 10x. Anything over 10x is historically considered a premium multiple reserved for the best companies. Palo Alto is trading at 12x, Zscaler at 15x, and and CrowdStrike, while not a direct comp, at 20x.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/data-src-image-67564886-3de1-4566-9781-5373176975d8.png" class="kg-image" alt="" loading="lazy" width="1078" height="327" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/10/data-src-image-67564886-3de1-4566-9781-5373176975d8.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2025/10/data-src-image-67564886-3de1-4566-9781-5373176975d8.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/data-src-image-67564886-3de1-4566-9781-5373176975d8.png 1078w" sizes="(min-width: 720px) 720px"></figure><p>At 31% GAAP revenue growth, Netskope is at the high end of this range, but at the low to mid point in terms of absolute revenue as they are still sub $1B.</p>
<p>The biggest difference is all of these companies are profitable, or break even (Rubrik being the exception). If Netskope’s sales slow, it will make their cash burning profile even less attractive, and decrease their multiple accordingly.</p>
<h2 id="business-strategy-competitive-landscape-and-benchmarking">Business Strategy, Competitive Landscape, and Benchmarking</h2>
<h3 id="direct-competitive-assessment">Direct competitive assessment</h3>
<p>Netskope's positioning relative to a strong set of (mostly public) competitors in the SASE market is one of the most interesting insights we get from having their financial data.</p>
<p>Revenue disclosures aren't perfect because SASE is just a business unit for a lot of these companies, so they don't have to disclose revenue (or any other metrics).</p>
<p>A few interesting data points from relevant company disclosures:</p>
<ul>
<li>Netskope itself disclosed $707M ARR growing at 35%. Customers include more than 30% of the Fortune 100 and 18% of the Global 2000.</li>
<li>Palo Alto Networks <a href="https://investors.paloaltonetworks.com/news-releases/news-release-details/palo-alto-networks-unveils-protection-highly-evasive-threats?ref=content.strategyofsecurity.com">just disclosed</a> $1.3B SASE ARR growing at 35% YoY. They have over 6,300 SASE customers, including one-third of the Fortune 500.</li>
<li>Fortinet disclosed $1.15B SASE ARR growing at 22% in its Q2'25 report. They're currently investing $2B to build their own SASE infrastructure (conceptually similar to Netskope's NewEdge network). They also made a bold prediction: "We do believe we'll be the #1 SASE player in the next few years."</li>
<li>Zscaler disclosed $2.9B of total ARR in its Q3'25 report. Their product/BU revenue disclosures are hard to break out. Roughly assume most, but not all, of their ARR is from their core SSE/ZTNA business.</li>
<li>HPE disclosed $1.16B of revenue (not ARR) for its Intelligent Edge business segment in Q2'25 with 45% ARR growth. This includes more than SASE, but that's a big part of it.</li>
<li>Cato Networks isn't public yet, but they disclosed $250M ARR growing at 46% back in February. This disclosure is highly relevant both as one of Netskope's closest competitors and as a future IPO candidate.</li>
<li>Cisco, Check Point, Broadcom, Cloudflare, Versa Networks, and other regulars in SASE/SSE-related analyst reports don't disclose revenue, but all are relevant players.</li>
</ul>
<p>Netskope’s primary SASE market is both busy and intensely competitive, with both established and emerging companies competing to be the market leaders. It's also a big market, which is part of the reason why you see several companies putting up large revenue figures and double-digit market share.</p>
<p>Netskope is holding their own against the competition, both financially and strategically. They clearly feel there is enough room in the public markets for another company in this category and now is the time to take their next step.</p>
<h3 id="market-positioning-and-security-sector-benchmarking">Market positioning and security sector benchmarking</h3>
<p>Competition is the crux of the story for Netskope, both strategically and financially. Public markets are all about comps, which means Netskope is always and forever going to get compared to companies like Zscaler, Cloudflare, and Palo Alto Networks.</p>
<p>Comparisons to public market superstars can be both good and bad. Netskope is hoping the comparisons are good for them post-IPO, and they could be right. Their stock has been holding at just under 20% above the IPO price, but they’re still in the early days of being a public company. They’re going to need to keep putting up Rubrik-like numbers post-IPO to maintain (let alone exceed) their valuation.</p>
<p>Broader cybersecurity (and related) comps matter, too — especially in terms of scale and growth rate. Even at $707 million in ARR, Netskope will be one of the smallest cybersecurity-related companies in public markets once they list. Here’s a sampling of cybersecurity-related companies and their current ARR, including Netskope:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/cybersecurity-highlighted-arr-comps.png" class="kg-image" alt="" loading="lazy" width="830" height="1776" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/10/cybersecurity-highlighted-arr-comps.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/cybersecurity-highlighted-arr-comps.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Netskope’s current scale is well above the sub-$200 million LTM revenue scale some cybersecurity companies were <a href="https://strategyofsecurity.com/p/bigger-faster-stronger-the-new-standard-for-public-cybersecurity-companies?ref=content.strategyofsecurity.com">going public with</a> as recently as 2023. Many of those subscale companies have been <a href="https://strategyofsecurity.com/p/cybersecurity-is-going-private?ref=content.strategyofsecurity.com">taken private</a>. The ones that remain are, for the most part, performing steadily (at worst) and setting the bar for the software sector (at best).</p>
<p>A good post-IPO outcome for Netskope would be following the path of Rubrik, SailPoint, and Varonis (CyberArk too, but excluding them after their recent acquisition announcement). If their ARR growth keeps trending up and profitability metrics keep improving, they’re going to have a home in public markets for a long time.</p>
<h2 id="recent-ipo-context-and-market-timing">Recent IPO Context and Market Timing</h2>
<h3 id="recent-cybersecurity-related-ipo-performance-landscape">Recent cybersecurity-related IPO performance landscape</h3>
<p>The two best comps we have for relative IPO performance are Rubrik and SailPoint, cybersecurity-related companies who went public in late 2024 and early 2025, respectively. Both companies have been solid performers since going public. Rubrik, for its part, has been a (somewhat unexpected) darling of the software sector.</p>
<p>Netskope benchmarks relatively well against both companies’ financial metrics at the time of listing. Rubrik had $784 million subscription ARR at 47% growth. SailPoint had $813 million ARR at 30% growth.</p>
<p>Netskope’s $707 million is just below both, but close enough that most investors won’t lose sleep over it. Their 33% ARR growth isn’t astronomical, but comfortably above the cybersecurity sector median of ~20%.</p>
<h3 id="market-timing">Market timing</h3>
<p>The market timing for Netskope is somewhat of a mixed bag with more good news than bad news. There's rarely a perfect time to go public. This was about as good of a time as any given the market volatility we've seen in the IPO window during the past year.</p>
<p>The good news is that recent cybersecurity-related IPOs have gone well. As mentioned earlier, both Rubrik and SailPoint had successful IPOs. Rubrik has had an even more successful run in the quarters following its IPO. Their stock is up 179% since opening day. SailPoint is currently down 15.9% YTD, but they’ve only had two reported quarters so far.</p>
<p>Cybersecurity stocks in general have performed well this year, with many scaled ($1B+ revenue or ARR) companies significantly outperforming the market. Three cybersecurity-related companies (Cloudflare, CrowdStrike, CyberArk – four if you count Palantir) are in the top ten highest EV/NTM revenue multiples for the overall software industry.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/image.png" class="kg-image" alt="" loading="lazy" width="1080" height="1350" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/10/image.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2025/10/image.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/image.png 1080w" sizes="(min-width: 720px) 720px"></figure><p>The bad news is that it's hard to live up to the standards of the top performing public cybersecurity companies. All of our sub-scale companies (less than $1B revenue) other than Varonis are down YTD. Netskope's revenue profiles as a subscale company, but their growth rate ranks among the best in cybersecurity.</p>
<p>The last bit of bad news for Netskope is that it's hard to follow a generational IPO like Figma, plus four other good ones in CoreWeave, Chime, Circle, and StubHub. Figma had an unbelievable debut spike and has been volatile since, but is still sitting well above its IPO price. Everyone besides StubHub had strong debuts but leveled off in the time since listing.</p>
<p>Paraphrasing Vanguard founder John Bogle: “In investing, you can’t time the market. You can only give it time.” Netskope is taking a long-term view here and giving themselves time to gain visibility and grow into a higher-profile public company.</p>
<h3 id="investor-sentiment-and-reception-dynamics">Investor sentiment and reception dynamics</h3>
<p>Reactions since Netskope's IPO filing have generally been <a href="https://www.saastr.com/the-latest-b2b-ipo-is-netskope-and-its-fire-700m-arr-growing-33-the-next-ipos-will-be-even-better/?ref=content.strategyofsecurity.com#:~:text=The%20latest%20tech%20IPO%20to,Netskope">positive</a> to <a href="https://www.linkedin.com/posts/matthewball2_netskopes-s-1-filing-marks-a-pivotal-moment-activity-7366062899158491136-DRxB?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">neutral</a> with a bit of <a href="https://www.onlycfo.io/p/netskope-ipo-window-dressing-or-real?ref=content.strategyofsecurity.com">negative critique</a> about specific metrics mixed in. Jason Lemkin (SaaStr) called Netskope’s S-1 “a really, really good one.”</p>
<p>It goes without saying that Netskope is not Figma (or Wiz, in cybersecurity parlance). Their IPO did not attract the same level of good karma and buzz. This felt a bit more like Rubrik or SailPoint, and that’s okay.</p>
<p>It's hard to directly compare Netskope to SailPoint because SailPoint spent nearly five years as a public company before being taken private and re-listing in 2025. Investors and analysts were already familiar with them and were never far out of touch during their three years as a private company under Thoma Bravo.</p>
<p>Rubrik was a different story. Much like Netskope, public market investors weren't very familiar with Rubrik either. This explains a lot of the pre-IPO skepticism people had about Rubrik and their good-but-not-great S-1 metrics. We all know the story since then, with Rubrik lighting up the scoreboard quarter after quarter in their time as a public company.</p>
<p>This was a rare feat and something that's unfair to project onto Netskope. The lesson to take from Rubrik is that it's okay to go into public markets as a lesser known company with some skepticism as long as you can perform at a high level after going public.</p>
<h2 id="whats-next">What's Next?</h2>
<p>Netskope has an opportunity to be a memorable cybersecurity company and a fixture in public markets if enough goes right. They were one of the largest scale and fastest growing cybersecurity-related companies ever to hit public markets. However, the standard for public companies is much higher in 2025 than it was in the decade-plus prior when many of our current public cybersecurity companies listed.</p>
<h3 id="bull-case">Bull case</h3>
<p>The bull case for Netskope hinges on the sheer size and stage of the SASE market. Whether you believe their ~$140B TAM estimate or not, it’s a directional proxy that help illustrate how large this market could be.</p>
<p>It's still early days for SASE adoption, especially in large enterprises with perimeter-based, firewall-heavy network architectures to modernize. There are still a lot of legacy VPNs out there. The shift to distributed and cloud-based work isn't going away. Netskope has a huge opportunity to help the world get there.</p>
<p>The main competitive advantage Netskope has is focus. SASE is the only thing they do. Most of their public market competitors have diversified security businesses that span beyond SASE into secure networking and other cybersecurity domains. Even Zscaler has expanded its focus into security operations in the past couple years.</p>
<p>Netskope has to use focus to its advantage and keep delivering a top-tier product experience while leveraging the brand uplift and capital infusion it gets from being a public company to raise its profile.</p>
<p>The software market is dying for high-growth stories during an extended period of muted SaaS growth rates and questions about impending AI doom for traditional SaaS companies. Netskope can outperform if it delivers sustained high growth on its path toward billion-dollar scale and beyond.</p>
<h3 id="bear-case-and-execution-risks">Bear case and execution risks</h3>
<p>The bear case for Netskope is mostly about competitive pressure from larger, better-resourced players. The SASE market is basically a who's who of high-powered cybersecurity and diversified technology companies who are highly motivated to win this important market.</p>
<p>This brings all sorts of strategic risks for Netskope. Larger competitors have the financial flexibility to price and package Netskope out of the market, especially in the enterprise customer segment. Many security leaders view SASE as an undifferentiated product and choose to buy it as part of larger platform consolidation deals. Some large companies also choose to execute staged migrations to SASE and prefer to buy it from their existing firewall vendors.</p>
<p>From an execution standpoint, the standard of performance is significantly different as a public company. Several other recent cybersecurity IPOs that quickly turned into take-privates learned this the hard way. In fairness, the market's expectations changed significantly as investor preferences moved from growth at all costs to profitable, efficient growth.</p>
<p>The advantage Netskope has is knowing the market's expectations in advance. They know what they're getting into. Top-tier execution is easier said than done, of course. Anything less than that is going to put Netskope in the subscale/low-growth cohort of cybersecurity companies, which almost certainly means repressed public market valuation.</p>
<h3 id="critical-success-factors">Critical success factors</h3>
<p>Netskope needs a few things to go right to be sustainable as a scaled public company — and better yet, find a realistic path to a premium valuation multiple.</p>
<p>Other cybersecurity-related public companies have proven out the playbook for growth within a single domain. It’s worked for CyberArk, Okta, and SailPoint in identity. It’s worked for Varonis in data security. It’s worked (so far) for Rubrik in cyber resilience. Netskope needs to make it work for them in SASE.</p>
<p>As we've said throughout this analysis, the pattern for Netskope’s success is Rubrik. For Netskope to reach the bull case, they're going to have to execute like Rubrik — and maybe even better given the strong competitors in SASE.</p>
<p>A high-level abstraction of the Rubrik playbook means a handful of things when you apply it to Netskope.</p>
<p>First, they need to reduce their losses while sustaining (or even accelerating) growth. Netskope will enter public markets in a very similar position as Rubrik, with ~$350 million of net losses (TTM) as of their S-1.</p>
<p>Rubrik was actually getting more unprofitable year over year, but made dramatic improvements during their first few quarters as a public company. They're still not profitable, but industry-leading growth has been enough to make investors forgive them.</p>
<p>Netskope's losses have been improving sequentially across the periods disclosed in the S-1. In that sense, they're in a better starting position than Rubrik was. It's not easy to keep growth going without significant investment in sales and marketing and R&amp;D. Netskope needs to find a way to hit Rubrik's level of performance.</p>
<p>Second, they need to keep expanding their platform. This is the focus thing we mentioned earlier and one of the primary advantages Netskope has over competitors as a SASE-only company. From an analyst point of view, they already have a relatively complete SASE platform and rank among the leaders in multiple market reports.</p>
<p>Expansion is likely to come from building on top of their existing SASE footprint and making logical extensions into other cybersecurity domains. They've given us some clues already, like their acquisition of Dasera to add Data Security Posture Management (DSPM).</p>
<p>Lastly, they need to share their story and articulate their vision. This is the hardest part to measure, but it’s impactful when it works.</p>
<p>Rubrik did an amazing job with this, going from a relatively unknown company to a much more widely recognized thought leader in just a year. All of the high-performing public companies, both cybersecurity and cybersecurity-related, are great storytellers.</p>
<p>Netskope has an interesting story of its own. Going public was the next big step. What they do next is going to determine if they can be a generational company.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <category>#Netskope</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/10/header-whats-next-for-netskope.png"/>
        </item>
        <item>
            <title><![CDATA[How Much Capital Does It Take for a Cybersecurity Company to Go Public?]]></title>
            <link>https://strategyofsecurity.com/how-much-capital-does-it-take-for-a-cybersecurity-company-to-go-public/</link>
            <guid>68757e453a0f3b00013f2a0d</guid>
            <pubDate>Thu, 07 Aug 2025 16:17:12 GMT</pubDate>
            <description><![CDATA[A data-driven analysis of funding trends and outcomes for cybersecurity's public and later-stage companies.]]></description>
            <content:encoded><![CDATA[<blockquote>
<p>It is expensive to build important cybersecurity companies. —Gili Raanan</p>
</blockquote>
<p>How's that for a bold proclamation?!</p>
<p>Whether you agree or disagree with Gili Raanan and the Cyberstarts regime, this observation is spot on.</p>
<p>And the evidence keeps on mounting.</p>
<p>Raanan's <a href="https://www.linkedin.com/posts/giliraanan_wiz-raises-1b-at-12b-valuation-quite-incredible-activity-7193683555808411649-mZya?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">full commentary</a> was in the context of Wiz and their $1 billion Series E round last year, but it broadly applies to many other later-stage cybersecurity companies.</p>
<p>Even more so lately.</p>
<p>Earlier this month, Cyera <a href="https://www.cyera.com/press-releases/ai-native-security-leader-cyera-doubles-customer-base-in-six-months-reaching-6-billion-valuation?ref=content.strategyofsecurity.com">became</a> one of the five most highly funded companies in cybersecurity history. The $540 million Series E round they announced in June put them at $1.3 billion of total capital raised.</p>
<p>Less than a month later, Cato Networks announced a $359 million Series G round that put them at just over $1.1 billion in capital raised — the sixth highest total ever by a cybersecurity-related company.</p>
<p>This recent funding activity brought me back to Raanan's observation — and behind it, one of our industry's most important questions:</p>
<p><em>How much capital does it take for a cybersecurity company to go public?</em></p>
<p>A lot more than it used to, that's for sure. But how much, exactly?</p>
<p>I teamed up with Altitude Cyber to find out. We analyzed two decades of financing to give you a nearly precise answer and the supporting data to answer this exact question.</p>
<p>First, let's rewind the clock and taking a look at the fundraising journey of our current public companies.</p>
<hr><h2 id="navigating-ma-what-every-security-leader-needs-to-know-by-1password"><a href="https://1password.com/webinars/cybersecurity-for-mergers-acquisitions?ref=content.strategyofsecurity.com">Navigating M&amp;A: What Every Security Leader Needs to Know by 1Password</a></h2>
<p><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/08/1p-navigating-ma-webinar-final.jpg" alt="1p-navigating-ma-webinar-final.jpg" loading="lazy"></p>
<p>Handling the security side of an M&amp;A transaction can be just as difficult as the commercial parts. Especially when you factor in the long tail of work (and risk exposure) that happens after the deal closes.</p>
<p>I've been on both the security and corporate development sides of the equation several times now. I have a ton of empathy for everyone involved.</p>
<p>Navigating security during M&amp;A is one of the hardest things to do in all of cybersecurity. It's a unique blend of business and technical acumen, capital, and pressure that you don't find many other places in business.</p>
<p>So, how do you function in such a high-stakes situation?</p>
<p>That's exactly what Dave Lewis, Wendy Nather, and Kane Narraway recently discussed on 1Password's Navigating M&amp;A webinar.</p>
<p>The full replay is available now if you missed it live. <a href="https://events.zoom.us/e/hub/channel/Ax_s3OwgRF-bFRI-T1S4fw/recording/4EfRtU3KSzCdCRirOwgU2A?ref=content.strategyofsecurity.com">Check it out.</a></p>
<hr><h2 id="how-much-capital-did-our-current-public-companies-need-to-go-public">How much capital did our current public companies need to go public?</h2>
<p>None of the cybersecurity-related companies listed in public markets today required a billion dollars of capital to reach public markets.</p>
<p>Here's how much funding most of them (excluding several smaller cap companies) raised before going public:</p>
<p><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/07/current-public-co-total-financing.png" alt="current-public-co-total-financing.png" loading="lazy"></p>
<p>The companies who went public a decade ago (or more) all raised less than $100 million total. This includes Palo Alto Networks, the first cybersecurity company to reach a $100 billion valuation.</p>
<p>Varonis did it with ~$30 million (give or take, might be off by a little).</p>
<p>CrowdStrike, Cloudflare, Tenable, Okta, and Zscaler all raised a lot of capital too, but not the massive totals we're seeing today.</p>
<p>SentinelOne raised $697 million on its way to being the largest cybersecurity IPO ever (by money raised and pre-market valuation).</p>
<p>Rubrik is the only other cybersecurity-related public company who raised over $500 million. They're one of our most recent IPOs, so this tracks with the overall trend.</p>
<p>And then there's SailPoint (not included in the chart above, but worth mentioning).</p>
<p>The company went public for the first time in 2017 with only $26.1 million in total financing, including $4.8 million in debt. For the sake of discussion, this tracks consistently with the data we have on other cybersecurity-related companies who went public in 2017 or earlier.</p>
<p>SailPoint was later taken private (and recapitalized) by Thoma Bravo for $6.9 billion, then <a href="https://strategyofsecurity.com/sailpoints-second-act/?ref=content.strategyofsecurity.com">went public again</a> in Q1 2025 at a $12.8 billion valuation.</p>
<p>They were remarkably efficient the first time, but...<em>guess what?!</em> Setting themselves up to be an important cybersecurity was still expensive. The expensive part just happened the second time around with private equity sponsorship. Still a great outcome, but expensive.</p>
<p>We're going to see the SailPoint movie over again for an entire segment of private companies in the <a href="https://strategyofsecurity.com/cybersecuritys-ipo-pipeline-2025-candidates/?ref=content.strategyofsecurity.com">current</a> <a href="https://strategyofsecurity.com/cybersecuritys-ipo-pipeline-2026-and-beyond/?ref=content.strategyofsecurity.com">IPO pipeline</a>. Companies who went public (generally raising significant but modest amounts of capital by today's standards) were <a href="https://strategyofsecurity.com/cybersecurity-is-going-private/?ref=content.strategyofsecurity.com">taken private</a>, recapitalized, and are preparing to follow SailPoint's path back to public markets.</p>
<p>In context, you could infer Gili Raanan's observation was about high growth startups following the traditional venture-backed path to public markets. It's also going to end up applying to companies who were taken private, just with a different wrinkle of significant <em>private equity</em> financing to get them back to public markets for the long run.</p>
<p>It's still expensive to build important cybersecurity companies — regardless of whether the capital is coming from venture capital or private equity.</p>
<p>This has never been more true than it is for our current private companies. Let's talk about them next.</p>
<h2 id="a-majority-of-the-most-funded-cybersecurity-companies-ever-are-still-private">A majority of the most-funded cybersecurity companies ever are still private</h2>
<p>Here's a telling stat about why the next generation of important cybersecurity companies is on a completely different planet financially:</p>
<p><em>Eight of the 10 (and 26 of the 30) most-funded cybersecurity companies of all time are still private.</em></p>
<p>Let that sink in.</p>
<p>Here's the dataset for the top 30¹:</p>
<p><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/08/largest-total-financing-q3-25.png" alt="largest-total-financing-q3-25.png" loading="lazy"></p>
<p>Lacework raised the most equity funding by any company in the industry so far. You know <a href="https://www.linkedin.com/posts/colegrolmus_fortinet-needed-to-do-a-transformative-deal-activity-7206341789455134720-QqEN?utm_source=share&utm_medium=member_desktop">the story</a>.</p>
<p>Wiz raised $1.9 billion in total before Alphabet's (still pending) <a href="https://strategyofsecurity.com/w-is-for-wiz-alphabets-audacious-acquisition/?ref=content.strategyofsecurity.com">infamous $32 billion acquisition</a> announced in March.</p>
<p>Netskope has raised $1.4 billion and looks to be among our top IPO candidates this year if public markets hold steady.</p>
<p>Cyera raised two of the largest rounds <a href="https://strategyofsecurity.com/themes-from-and-beyond-altitude-cybers-2024-cybersecurity-year-in-review/?ref=content.strategyofsecurity.com">in 2024</a> and just added another $540 million this year.</p>
<p>ReliaQuest jumped into the top five with a private equity round earlier this year.</p>
<p>Cato Networks jumped into the top ten last month after a wild sequence of <a href="https://en.globes.co.il/en/article-cato-networks-freezes-ipo-and-explores-sale-1001511062?ref=content.strategyofsecurity.com">speculation</a> and <a href="https://www.linkedin.com/posts/shlomokramer_in-a-recent-article-in-an-israeli-newspaper-activity-7333834773682884610-NCg-?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">denial</a> of a potential sale earlier in 2025.</p>
<p>OneTrust, Snyk, and Tanium are all later-stage companies who are holding steady after raising significant capital. They haven't disclosed raises since 2023 (or earlier).</p>
<p>Fireblocks is debatable as a cybersecurity-related company, but I decided to include them. They build security and governance infrastructure for Web3/cryptocurrency. No additional funding has been disclosed since a $550M round in late 2021.</p>
<p>Cybereason made the top ten with its Series H round this March. You know the <a href="https://www.calcalistech.com/ctechnews/article/skyp5fajjg?ref=content.strategyofsecurity.com">story</a> here, too.</p>
<p>The list goes on. Arctic Wolf, <a href="https://strategyofsecurity.com/1passwords-blue-ocean-strategy?ref=content.strategyofsecurity.com">1Password</a>, and many others are promising companies in our IPO pipeline who are preparing and patiently awaiting their turn to go public.</p>
<p>So far, it's been a wide distribution of fortunes for our most-funded companies. Wiz had a great exit.² Lacework didn't.</p>
<p>The fate of the other 28 cybersecurity companies on this list (and dozens of more well-capitalized startups right behind them) is still to be determined. Some companies have grown into their massive valuations. Others look pretty even. A few may never live up to expectations.</p>
<p>That's the hell of it: raising massive amounts of capital alone is necessary but insufficient for achieving a large outcome.</p>
<h2 id="raising-more-money-means-raising-the-stakes">Raising more money means raising the stakes</h2>
<p>So, what does all of this mean for our industry?</p>
<p><em>It has never been more expensive to build important cybersecurity companies.</em></p>
<p>And, in general, it's just going to keep getting more expensive.</p>
<p>"Important" is relative, of course. Significant impact and good exits have been accomplished with far less capital than the companies we discussed here.</p>
<p>We'll see an occasional <a href="https://www.linkedin.com/posts/colegrolmus_saviynt-is-going-to-be-one-of-sailpoints-activity-7293681944200925184-ZlBF?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">Saviynt</a> — an IPO-track company who has been remarkably capital efficient — but examples like these are clear anomalies in a mass of data that clearly shows a pattern of rising capitalization.</p>
<p>But to reach the exceptionally rare pinnacle of business, a generational company who produces billions (or more) of economic value, significant capital has to be invested.</p>
<p>In many cases, our next wave of public companies are going to require $1 billion or more to reach public markets.</p>
<p>Why is this happening?</p>
<p>Companies are staying private longer. Competition is more intense than ever. Growth is happening faster. Lots of <a href="https://strategyofsecurity.com/bigger-faster-stronger-the-new-standard-for-public-cybersecurity-companies/?ref=content.strategyofsecurity.com">other reasons</a>.</p>
<p>Large capital raises and massive funding totals mean something else, too:</p>
<p><em>It's more important than ever to remember that funding doesn't equal success.</em></p>
<p>As Marc Andreessen said:</p>
<blockquote>
<p>Raising money is never an accomplishment in and of itself — it just raises the stakes for all the hard work you would have had to do anyway: actually building your business.</p>
</blockquote>
<p>We forgot about the <em>'actually building your business'</em> part for a while, but he's right.</p>
<p>This is exactly the stage many of the companies in our industry are at right now — actually building businesses with very high stakes.</p>
<hr><h3 id="acknowledgements">Acknowledgements</h3>
<p>Thank you to <a href="https://www.linkedin.com/in/konstantinosboukouris/?ref=content.strategyofsecurity.com">Dino Boukouris</a>, <a href="https://www.linkedin.com/in/john-gould18/?ref=content.strategyofsecurity.com">John Gould</a>, and the team at <a href="https://www.altitudecyber.com/?ref=content.strategyofsecurity.com">Altitude Cyber</a> for partnering with me on the research and data analysis for this piece.</p>
<h3 id="footnotes">Footnotes</h3>
<p>¹RSA Security has <em>technically</em> raised the most total financing (~$2B) if you include debt. We wanted to keep this analysis focused on equity funding rounds for private companies, so we excluded debt.</p>
<p>²Assuming the transaction closes, which still seems promising but...<a href="https://www.reuters.com/sustainability/boards-policy-regulation/googles-32-billion-deal-wiz-gets-antitrust-review-bloomberg-news-reports-2025-06-13/?ref=content.strategyofsecurity.com">who knows</a>.</p>
]]></content:encoded>
            <category>Startups</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/07/header-how-much-capital-to-go-public.png"/>
        </item>
        <item>
            <title><![CDATA[The Case For and Against Palo Alto Networks Acquiring CyberArk]]></title>
            <link>https://strategyofsecurity.com/the-case-for-and-against-palo-alto-networks-acquiring-cyberark/</link>
            <guid>688adf1f594b1e000126dcc1</guid>
            <pubDate>Thu, 31 Jul 2025 14:06:27 GMT</pubDate>
            <description><![CDATA[A deep dive into the strategic and financial rationale for Palo Alto Networks' industry-altering acquisition of CyberArk.]]></description>
            <content:encoded><![CDATA[<p>Does it make sense for Palo Alto Networks to acquire CyberArk?</p>
<p><em>...wait a minute, weren't we just doing exactly the same thing for SentinelOne?!</em></p>
<p>Yep. You can't make this stuff up.</p>
<p>Reports of a CyberArk acquisition surfaced before the ink was even dry on my <a href="https://strategyofsecurity.com/p/the-case-for-and-against-palo-alto-networks-acquiring-sentinelone?ref=content.strategyofsecurity.com">analysis</a> of a potential Palo Alto Networks-SentinelOne deal.</p>
<p>The news <a href="https://www.paloaltonetworks.com/palo-alto-networks-in-agreement-to-acquire-cyberark?ref=content.strategyofsecurity.com">became official</a> less than 24 hours later: Palo Alto Networks will acquire CyberArk for $25 billion.</p>
<p>There's no need to do an analysis of a theoretical deal this time. This is really happening.</p>
<p>I'm still shocked at how fast the deal materialized once the details became public. There's a lot to process here, both for Palo Alto Networks and the broader ecosystem.</p>
<p>The purpose of this article is still to analyze the case for and against the deal. It's just a different thought process knowing the deal has been announced and having the public version of Palo Alto Networks' strategic rationale to evaluate.</p>
<p>I'm mostly going to take the case for the deal as the rationale Palo Alto Networks provided and layer on some more context and analysis of my own. The case against the deal is based on my own judgment, discussions I've had, and points others have raised since the deal was first reported.</p>
<p>Here's the short of it: acquiring CyberArk is an excellent move by Palo Alto Networks from a business strategy standpoint. Emphasis <em>business.</em></p>
<p>It makes a lot of sense commercially, and certainly a lot more sense than acquiring SentinelOne.</p>
<p>Whether this move is good or not for customers remains to be seen and will take years to play out.</p>
<p>It's going to depend a lot on whether Palo Alto Networks can expedite and improve the product integrations CyberArk already had in front of it with recent acquisitions. It's also going to depend on how effective the integrations are with Palo Alto Network's <em>other</em> platforms, especially Cortex and Prisma.</p>
<p>That's the flip side of identity market fragmentation:  If Palo Alto Networks blows this up, there are hundreds of other companies who would be happy to take CyberArk's place in the market.</p>
<p>As Nikesh Arora might say, they still have to execute.</p>
<p>This is a long article. Transformative deals like this don't happen very often, so they're worth digging into when they do. Let's get into it.</p>
<h2 id="the-case-for-a-deal">The case for a deal</h2>
<p>If Palo Alto Networks was going to do identity, they had to do it big.</p>
<p>Commercially, there was no way they were going to build a successful identity business if they had just picked up a bunch of small companies and tried to put them together. They needed to bootstrap their entry into the market, so a scaled acquisition made sense.</p>
<p>The identity market is at a completely different level of maturity compared to the situation when Palo Alto Networks built its cloud security business by stitching together smaller companies. That approach worked because the cloud security market was still forming. There essentially was no market leader to acquire.</p>
<p>Identity has been through multiple generations of market leaders (Sun, IBM, CA, Oracle, and others. The market has already gone through multiple phases of disruption and M&amp;A. For the most part, we've seen it all.</p>
<p>Currently, we've landed with a handful of specialist identity players — some public, some owned by private equity firms. You know them: CyberArk, Okta, SailPoint, and Ping Identity. And then there's Microsoft. We'll get to that.</p>
<p>Palo Alto Networks had zero chance of competing with those four companies (plus Microsoft and the other incumbents who still hold material market share) by building, buying, and partnering their way to a coherent identity offering.</p>
<p>If there was one market where a massive deal had to be done, identity had to be it.</p>
<h3 id="accelerating-platformization">Accelerating platformization</h3>
<p>Palo Alto Networks' multi-platform evolution of the last seven years has been a story for the ages.</p>
<p>Acquiring a scaled identity company like CyberArk and entering the identity market as a de facto market leader accelerates the platformization strategy that Palo Alto Networks has been working on for years.</p>
<p>It's worth reiterating the common misunderstandings around Palo Alto Networks' <a href="https://strategyofsecurity.com/p/how-could-platformization-work-in-cybersecurity?ref=content.strategyofsecurity.com">platformization</a> strategy. They are not, and never have been, building a single end-all-be-all cybersecurity platform.</p>
<p>They have established and grown three core platforms on top of their existing NGFW/Network Security business in the Nikesh Arora era: SASE, Security Operations, and Cloud Security — collectively, their Next-Generation Security (NGS) portfolio.</p>
<p>For the most part, <a href="https://strategyofsecurity.com/p/the-audacious-future-of-palo-alto-networks?ref=content.strategyofsecurity.com">their strategy</a> has worked. They have established a significant product portfolio and revenue traction in the NGS businesses, now over $5 billion ARR even without CyberArk.</p>
<p>They clearly felt like it was time to take the next step and enter the identity market.</p>
<p>Identity will become the fourth platform based on the details they've shared so far in the announcement.</p>
<p>This is a significant milestone both for Palo Alto Networks and the cybersecurity industry in general. It's the first time a company has held leading positions across all of the major cybersecurity categories.</p>
<p>We've never seen a company operate a footprint across this many domains. There are still open questions about whether this strategy is going to work long term and if it can be sustained. This is the furthest along the experiment has gone.</p>
<h3 id="why-cyberark">Why CyberArk?</h3>
<p>Did the acquisition target for Palo Alto Networks' identity market entry absolutely have to be CyberArk?</p>
<p>No, but CyberArk was the best option they had among scaled identity companies. There just aren't that many viable targets with the right financial profile and product suite. CyberArk is a great option. I'm surprised they got it.</p>
<p>CyberArk has more pieces of a comprehensive workforce identity offering than most other scaled alternatives. They have PAM, SSO (albeit third or fifth in the market), and they just acquired IGA with Zilla, an early-stage company.</p>
<p>Any other targets Palo Alto Networks could have acquired would have required add-on acquisitions to round out the full workforce identity offering.</p>
<p>Okta likely isn't willing to sell at their current market cap of ~$17 billon, roughly half its all-time high (and now below CyberArk, even before the acquisition report). Todd McKinnon is still a relatively young CEO who looks committed for the long haul.</p>
<p>Ping Identity could have made sense, but their product portfolio doesn't have well-established IGA or PAM capabilities, even with ForgeRock. Palo Alto Networks likely didn't want to be in the customer identity business, either. They do have a directory product, which is nice — but again, directory is not the way the identity market will be won.</p>
<p>SailPoint just went public again and has had a <a href="https://strategyofsecurity.com/p/sailpoints-second-act?ref=content.strategyofsecurity.com">successful return</a>. They're primarily an IGA company that has acquired its way into PAM — nowhere near the depth of CyberArk there. They don't do SSO. Great company, not as great of a strategic fit for Palo Alto Networks.</p>
<p>There is a long tail of smaller companies in the identity market with varying shapes and sizes of a product portfolio. Some have eight and nine figures of revenue — Saviynt, RSA Security, SecureAuth, 1Password, Keeper, Veza, StrongDM, and dozens more.</p>
<p>Palo Alto Networks was playing an entirely different game here. The plan wasn't to do value acquisitions of different market leaders in multiple identity segments and slowly grow an identity business. The quest to win the competition against both hyperscalers and large competitors like CrowdStrike needed a transformative deal.</p>
<h3 id="product-expansion">Product expansion</h3>
<p>From a product standpoint, this is a completely different discussion from the SentinelOne deal in terms of product overlap. CyberArk brings a set of net new capabilities for Palo Alto Networks with a relatively minimal amount of overlap.</p>
<p>With CyberArk, Palo Alto gets a complete workforce identity suite: PAM, SSO, IGA, Machine Identity, Secrets Management, and more. There's almost no product overlap — just a few ITDR-related features, a secure browser most people didn't know CyberArk had, and some other minor tools.</p>
<p>They don't get a directory services product, but the best strategy is probably to concede that one to Microsoft. There is no viable strategy for beating Microsoft — not in security, and not in identity. Microsoft is going to be Microsoft.</p>
<p>I've done directory migrations, and let me tell you: they're gnarly.  Even if Palo Alto Networks did gain a first-class directory product with this deal, it doesn't mean customers would buy it. Just ask Oracle how that went.  Customers will change out their IGA, PAM, and SSO products many times over before they'll change directories. It's just not worth the pain.</p>
<p>The way to tame the Microsoft dragon is to keep it well fed with directory revenue so it doesn't get hangry and start breathing fire. Put the dragon in its directory corner, and go take the market for everything else.</p>
<p>Palo Alto Networks is not entering the identity market to beat Microsoft. They want to be competitive, of course —&nbsp;but they're savvy enough to know Microsoft isn't going anywhere. This move is about marginalizing standalone, single-platform identity companies.</p>
<p>Are there products out there that practitioners like using more than CyberArk? Of course. Product and usability were secondary factors at best. This was primarily driven by commercial and financial considerations.</p>
<p>I do have some hope that progress will be made on the product side if they apply the Cortex platformization playbook to CyberArk. While not perfect, what I've seen of the Cortex product did turn out relatively well, especially considering the breadth and scope of what they're doing.</p>
<h3 id="market-convergence-and-timing">Market convergence and timing</h3>
<p>The first part of the "why now" thesis Palo Alto Networks outlined is interesting. As a longtime identity person, I generally share their view the market, but with some specific nuances.</p>
<p>I've always seen identity as a security function, although this admittedly could be a factor of working within a cybersecurity consulting practice where CISOs are the primary buyer. Either way, the evidence is clear that identity and security are converging in a way they haven't before.</p>
<p>I directionally agree with their overall thesis, though I would have framed the PAM expansion differently. Maybe I'm being particular as an identity person. The differences of opinion are negligible.</p>
<p>I'm not completely sold on the narrative that identity is fully aligned with the PAM vision and that PAM should be deployed across the entire employee base. The PAM part is what CyberArk had been saying, especially prior to machine identity, about their own growth story.</p>
<p>It's not so much that PAM needs to go to everybody — it's that the very definition of PAM is changing. A broad workforce identity platform is going to have aspects of PAM that are now becoming unbundled and usable by more people. Every identity needs better security, not just the special ones.</p>
<p>I wouldn't over-index on the PAM part, even though that alone is a good reason to be in the identity market. To me, the narrative here is offering a broad, integrated identity platform that works for various different users.</p>
<h3 id="the-need-for-platformization-in-identity">The need for platformization in identity</h3>
<p>The second part of the "why now" thesis is the one I wholeheartedly agree with. Identity is an established market, but at the same time, there's still a lot of room for change.</p>
<p>As a former systems integrator who understands the pain of identity implementations, I fully subscribe to the need for convergence in identity security. Everything they said about fragmentation on a market basis is true.</p>
<p>Even with some consolidation that has happened recently, the enterprise market is clearly headed in the direction where converged workforce identity platforms are the way of the future. We've made a lot of progress, but it's still fair to say this is more theory than practice right now.</p>
<p>Okta has expanded from its SSO roots and has become a more well-rounded identity platform with SSO, PAM, IGA and many other features through a combination of organic and inorganic activity. While there are early signs of success, it's still pretty early in the journey and just starting to gain meaningful traction in the enterprise segment.</p>
<p>SailPoint has also become a much broader platform, especially as it retooled for its second incarnation as a public company. They still don't have SSO, and the PAM acquisition they made is nowhere near the level of scope and maturity as CyberArk.</p>
<p>The interesting part about platformization and identity security is that even with acquiring CyberArk, Palo Alto Networks is still not getting a fully baked platform.</p>
<p>CyberArk, for its part, is still more of a suite than a platform by the strict definition. They've had PAM for a long time. Their SSO product consistently ranks in the top three to five and likely has tens of millions of dollars in ARR. They recently acquired Zilla for IGA, which is still an early stage addition to the product portfolio.</p>
<p>There are pieces that haven't been fully integrated across PAM, SSO, Machine Identity/Secrets Management, and especially not IGA. CyberArk is close enough as is, but there's still work to be done from a product perspective.</p>
<h3 id="machine-identity-and-ai-positioning">Machine identity and AI positioning</h3>
<p>The third "why wow" pillar about the rise of machine identity and AI agents is where things start to get a bit more speculative, especially the AI agent part. It's also the part with the highest upside if things go well.</p>
<p>The case for machine identity was already pretty well established by CyberArk at the time of their Venafi acquisition. This was more than just theory. The partnership had worked for a long time leading up to the acquisition. The demand was already proven to a point where it made more sense for CyberArk to own Venafi than work with them as a partner.</p>
<p>The deal is fresh enough that the full upside remains to be seen, but it's helpful for Palo Alto Networks to already have that acquisition in the bag and de-risk the machine identity part of the equation (to some extent).</p>
<p>Venafi is an established machine identity company, not some newfangled NHI startup. It's really about certificates and cert-based authentication and authorization for machines, plus management of rotation.</p>
<p>I know that sounds super boring, but it's the most likely solution for how enterprises are going to handle security for AI agents.</p>
<p>There are a lot of theories being thrown around about how AI agents should be secured. Several of them are good, and I hope we do eventually get to standards and protocols that are the ideal implementation.</p>
<p>Knowing how application development works in large enterprises, my guess is that identity for AI agents is going to look fairly similar to how it already looks for apps today. This means secrets, API keys, certificates, service accounts, and the like. In other words, exactly what CyberArk already does well in PAM, secrets management, and now machine identity.</p>
<p>Maybe the implementations will get better eventually, but this is probably how it's going to work — especially for internal-facing stuff in big enterprises.</p>
<h3 id="financial-terms-and-valuation">Financial terms and valuation</h3>
<p>It's easy to see a $25 billion headline and get sideways about how much Palo Alto Networks paid. I get it, but the price tag is at least within reason.</p>
<p>One of the closest comps out there is Cisco's acquisition of Splunk for $28 billion. This had a much more reasonable multiple with Splunk at around $4 billion of revenue at the time of acquisition compared to CyberArk being just over a billion.</p>
<p>Another comp is Alphabet's acquisition of Wiz, which is one of the highest multiples ever recorded for a cybersecurity-related acquisition.</p>
<p>CyberArk falls closer to the Splunk side of the multiple spectrum, arguably with more upside and momentum at the time of acquisition.</p>
<p>From CyberArk's point of view, they had no need to sell. I take the $25 billion as a "make me move" price where they were only willing to sell at a significant premium. That's the position they put themselves in by completing their SaaS transition, rounding out at least the beginnings of a complete workforce identity suite and generally executing well across the board.</p>
<p>Acquiring CyberArk is definitely on the upper bound of Palo Alto Networks' financial guardrails, but it's also important to remember that Palo Alto Networks is trading close to all-time highs.</p>
<p>In this particular case, a substantial portion of the deal was equity. The cash consideration was still meaningful (roughly $1.5-2 billion based on the information they disclosed), but it's still a relatively small percentage of the overall consideration.</p>
<p>This is Palo Alto Networks using its momentum and current market cap to its advantage.</p>
<h3 id="upselling-and-cross-selling">Upselling and cross-selling</h3>
<p>Go-to-market and revenue synergies (<em>bleh</em>) could go either way in terms of whether they're part of the case for or against a deal. I think they're more likely to work in favor of Palo Alto Networks, so I'm including the analysis here.</p>
<p>Why?</p>
<p>Palo Alto Networks has significantly more customers (70,000+) compared to CyberArk's 10,000. The customer profile generally matches too, with buyers of PAM being heavily regulated large enterprises in mature industries.</p>
<p>Palo Alto Networks has a bit broader customer base, but many of the large eight-figure deals you see them talk about in earnings releases are the typical profile of a CyberArk customer.</p>
<p>The pull-through is hard to know without seeing exact customer lists, but I expect it could work both ways. Palo Alto Networks will be in more companies where CyberArk doesn't currently have a footprint. The opposite is also true, especially in some larger enterprise accounts where CyberArk is already a customer but Palo Alto Networks is not.</p>
<p>With the scale and ambitions of Palo Alto Networks, it's hard to understate the value of gaining new customers any way they can. Acquiring CyberArk gives Palo Alto Networks a first point of entry into many new accounts with hopes of not only keeping the customers, but also adding other platforms in the future.</p>
<h3 id="tam-and-revenue-impact">TAM and revenue impact</h3>
<p>Palo Alto Networks already had one of the largest TAMs in cybersecurity with their existing platforms. Adding identity unlocks significantly more TAM, with some estimates like both Okta and CyberArk measuring the TAM for workforce identity at $50 billion, not the $29 billion Palo Alto Networks quoted from IDC in their release.</p>
<p>Either way, the more impactful part now is the serviceable obtainable market (SOM) it unlocks for Palo Alto Networks — and even more specifically, the accretive revenue and free cash flow it adds.</p>
<p>CyberArk is a billion-dollar run rate business, which is a nice way to start your foray into the identity security market. It puts Palo Alto Networks at $10 billion of revenue already and, as discussed in the SentinelOne analysis, significantly accelerates and de-stresses its path to $15 billion.</p>
<h3 id="integration-strategy-and-future-vision">Integration strategy and future vision</h3>
<p>I expect we're going to see Palo Alto Networks execute the playbook they followed with Cortex.</p>
<p>They spent significant R&amp;D effort building out a centralized data model, refactoring and reintegrating multiple products into a much more cohesive platform and user interface.</p>
<p>What Palo Alto Networks has to do (okay, <em>should</em> do) over the next two to five years is apply the Cortex integration strategy to CyberArk and finish their product integrations across the board.</p>
<p>I've seen Cortex and what they did with it — integrating what they built and acquired, adding cloud security, data security, AppSec, etc. They did a great job making it look coherent on the front end.</p>
<p>The next level beyond integrating all of the identity parts is integrating data into Cortex for SecOps. All this identity log data is going to get fed into Cortex for much higher-fidelity logging than we're used to with identity.</p>
<p>If you can get really high-fidelity authentication and authorization data into Cortex, plus cloud security, application security, data security, and more — you have a much better ability to see what's going on in your environment and then drill down and triage alerts that didn't have much visibility before.</p>
<p>There are definite connections to the networking and SASE sides as well. You can already see other companies doing interesting things with identity, secure browsers, SASE, network security (zero trust...<em>gasp</em>) and lots of other things Palo Alto Networks already does.</p>
<p>Acquiring CyberArk is about adding identity, but the next-level strategic move here is bringing identity to other core security functions in a more comprehensive way.</p>
<h3 id="ai-is-the-bull-case">AI is the bull case</h3>
<p>Even if you completely take any upside from the agentic market and strike that from the deal, this still looks like a smart acquisition commercially.</p>
<p>Palo Alto Networks is entering an important new market while adding a billion dollars of ARR that's growing at a market-leading growth rate.</p>
<p>None of us really know how big the market for securing AI agents is going to be. The assessment of that emerging market and the upside and downside is a completely different article, so we're not going to get into that here.</p>
<p>In the context of this deal, whatever happens with AI agents is part of the upside. The downside is relatively limited. If you strike that part entirely from the deal or imagine a worst case scenario where AI agents are a complete dud, this still looks like a pretty good deal.</p>
<p>Competing in a market for human identity alone is pretty good business. There's enough validation on the traditional side of machine identity where that's a safe bet, too.</p>
<p>This acquisition may not be worth the full $25 billion without some AI upside, but is it still worth over $20 billion? Probably.</p>
<h2 id="the-case-against-a-deal">The case against a deal</h2>
<p>Here's the punch line: I don't see much of a bear case at all (again, from a <em>business strategy</em> standpoint). This was a savvy acquisition. Expensive, but savvy.</p>
<p>Most of the criticism I've seen so far is people airing out grievances with Palo Alto Networks, CyberArk, or both.</p>
<p>If you look at this from a hardcore business strategy standpoint and take away the other incentives and biases, it's hard to argue with their rationale.</p>
<p>There are risks, though. Lots and lots of risks. <em>Those</em> are what we need to talk about.</p>
<h3 id="valuation-and-financial-tradeoffs">Valuation and financial tradeoffs</h3>
<p>The financial risk of a transaction this large is obvious. $25 billion is a lot of capital no matter what the split is between cash and equity.</p>
<p>This means another scaled acquisition like SentinelOne is off the table for now. In fairness, I can't think of a scaled acquisition that would have made more of a difference to Palo Alto Networks than entering the identity market.</p>
<p>They'll continue to make tuck-in acquisitions within their existing NGS platforms, including CyberArk, wherever they feel like it might be lacking.</p>
<p>Palo Alto Networks has reached a point where building from scratch is often close the same level of effort as integrating an acquisition. They don't <em>need</em> to buy as many companies going forward as they did in the previous seven years now that their NGS platforms are more established.</p>
<p>They will still make some relatively large tuck-in acquisitions like they did with Talon or Protect AI, but the burden of proof is now a little higher and their financial position is such that deals may have to clear higher financial and technical hurdles than they did in the past.</p>
<h3 id="go-to-market">Go-to-market</h3>
<p>If we learned anything from other large identity acquisitions this decade, it's that GTM is a huge gotcha post-acquisition.</p>
<p>The GTM integration between Okta and Auth0 went very sideways. Combining the orgs didn't work. As it turns out, selling a top-down workforce/customer identity platform and a bottom-up, developer-focused customer identity platform are two wildly different things.</p>
<p>Palo Alto Networks has to tread lightly on the GTM side of this. Selling firewalls and the NGS portfolio is not the same as selling identity. They're probably better off keeping most or all of CyberArk's GTM org in tact and doing what they can to make their lives easier.</p>
<p>On the customer side, the risk of churn is real — but I certainly don't expect a material part of CyberArk's customer base to churn even if they'd rather not work with Palo Alto Networks. Complaining is one thing. Switching is another.</p>
<p>A specific nuance about Identity, and PAM in particular, is the products are incredibly sticky. They take millions of dollars and years to implement. Changing vendors isn't like just install a different agent to move from CrowdStrike to SentinelOne on the endpoint. There are meaningful switching costs.</p>
<p>Most existing CyberArk customers are just going to put up with Palo Alto Networks even if they don't use or want to use any of their products across the rest of the security or IT portfolio.</p>
<p>If there's going to be any customer impact at all, it's more likely to be on the net new customer acquisition side. CyberArk was doing fairly well in this category, especially given the macroeconomic circumstances.</p>
<p>Rather than existing customers churning, the more likely impact is going to be new customers choosing to go a different direction for their PAM and workforce identity solutions. This is generally good for other companies in the workforce identity market, but that's for another discussion.</p>
<p>The cross-selling opportunities are the wild card here. I'm sure the Palo Alto Networks Corp Dev team and their bankers modeled this and have good assumptions around it.</p>
<p>I expect some level of success with cross-selling — and possibly enough to not only net out any churn or slowdown in new customer growth, but vastly exceed it.</p>
<p>This could be especially true if Palo Alto Networks is able to do good things on the product side and simplify the overall purchasing, financing, licensing and transaction process that many CyberArk customers complain about.</p>
<h3 id="channel-relationships">Channel relationships</h3>
<p>Channel is another area where you could argue there is downside, or at least substantial risk.</p>
<p>CyberArk is the gold standard in cybersecurity for how to grow and run a partner program. They have amazing relationships with all of the GSIs as well as several other niche boutique integrators. Palo Alto Networks works with most of them anyway, but identity will be a different capacity.</p>
<p>We're not going to see the channel just stop working with CyberArk now that they will be owned by Palo Alto Networks. Due care has to be taken to make sure the channel relationships and model CyberArk already has in place continues to be successful.</p>
<p>Palo Alto Network has its own successful channel relationships, and they already work with many of the same GSIs and partners CyberArk does. Identity implementations are a different muscle, but the GTM side is still similar.</p>
<h3 id="integration-and-culture">Integration and culture</h3>
<p>Palo Alto Networks is no stranger to integrating acquisitions, now with more than 20 reps of experience. Integrating a scaled public company with $1 billion of revenue and over 4,000 employees is a <em>lot</em> trickier than making things work with a startup.</p>
<p>As we discussed earlier, I actually like their chances with the technical side of the integration over the long run. People and process are the parts that worry me.</p>
<p>Tough personnel decisions have to be made. This inevitably means layoffs, as we already saw with Cisco-Splunk, Proofpoint's acquisitons, and many others.</p>
<p>CyberArk has a specific method and culture that's worked for them over the course of 25 years. Palo Alto Networks has it own culture — one that largely mirrors the towering ambitions and personality of Nikesh Arora.</p>
<p>How CyberArk responds to the limelight that inevitably follows Palo Alto Networks is one of the biggest open questions about this deal.</p>
<h2 id="so-what-now">So, what now?</h2>
<p>Large, multi-domain cybersecurity companies have historically stayed away from the identity market.</p>
<p>That era appears to be over. This is an industry-altering deal.</p>
<p>The place to watch next is what happens with the rest of the market.</p>
<p>CrowdStrike, Fortinet, Check Point, Zscaler, and anyone else who wants to be a broad cybersecurity market leader is now under tremendous pressure to enter the identity market.</p>
<p>This acquisition also changes the game for Okta, SailPoint, Ping, Saviynt, and several other standalone identity companies. They need to finish the job of building end-to-end workforce identity platforms and find other ways to differentiate. Or, they need to sell.</p>
<p>The gloves are off now. Palo Alto Networks made its move, and the ripple effect across the rest of the industry is going to be just as big.</p>
]]></content:encoded>
            <category>M&amp;A</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/07/header-panw-cyberark.png"/>
        </item>
        <item>
            <title><![CDATA[The Case For and Against Palo Alto Networks Acquiring SentinelOne]]></title>
            <link>https://strategyofsecurity.com/the-case-for-and-against-palo-alto-networks-acquiring-sentinelone/</link>
            <guid>688937b6594b1e000126d27a</guid>
            <pubDate>Tue, 29 Jul 2025 21:24:54 GMT</pubDate>
            <description><![CDATA[A thought exercise about the strategic and financial rationale behind the speculation about Palo Alto Networks and SentinelOne.]]></description>
            <content:encoded><![CDATA[<p>Does it make sense for Palo Alto Networks to acquire SentinelOne?</p>
<p>That was the multi-billion dollar question many people were talking about last week after (speculative) <a href="https://www.calcalistech.com/ctechnews/article/kfqzwg5wr?ref=content.strategyofsecurity.com">reports</a> came out about a potential deal.</p>
<p>And now we have another one, with WSJ and Reuters <a href="%5Bhttps://www.reuters.com/business/palo-alto-networks-talks-buy-cyberark-deal-worth-over-20-billion-wsj-reports-2025-07-29/%5D(https://www.reuters.com/business/palo-alto-networks-talks-buy-cyberark-deal-worth-over-20-billion-wsj-reports-2025-07-29/)">reporting</a> a potential acquisition of CyberArk (right before I was about to hit publish!).¹</p>
<p>I normally wait until after deals are announced to do a detailed analysis. Both the <a href="https://www.linkedin.com/posts/colegrolmus_i-wouldnt-take-these-palo-alto-networks-activity-7353817404709212163-jehX?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">SentinelOne</a> and CyberArk reports had so much interest and would be so consequential (if either were to materialize) that it makes sense to explore now.</p>
<p>Even as the CyberArk report gains steam, there are some generalized factors here that apply to either scenario.</p>
<p>Consider these preliminary analyses to be a thought exercise.² Even if the reports are totally unfounded and/or a deal never materializes, it's still a helpful learning experience for us to analyze transactions of this scale.</p>
<p>Why?</p>
<p>Most of the <a href="https://strategyofsecurity.com/cybersecurity-is-going-private/?ref=content.strategyofsecurity.com">take-private activity</a> we've seen in cybersecurity so far has been private equity firms acquiring public companies. There have been acquisitions of public companies by strategic buyers, of course. <a href="https://strategyofsecurity.com/ciscos-cybersecurity-shopping-spree-part-2/?ref=content.strategyofsecurity.com">Cisco-Splunk</a> and <a href="https://www.linkedin.com/posts/colegrolmus_the-sophos-secureworks-deal-gives-us-a-bunch-activity-7254520731328299009-9Xla?utm_source=share&utm_medium=member_desktop">Sophos-Secureworks</a> are a couple recent examples. They're far less common, though.</p>
<p>Disclaimers aside, here's the punch line: I wouldn't take these Palo Alto Networks/SentinelOne acquisition reports too seriously (yet). The combination of strategy and dollars for this aren't a clear "go" or "no-go."³</p>
<p>Let's walk through the case for and against the deal, starting with the reasons why it <em>could</em> happen.</p>
<h2 id="the-case-for-a-deal">The case for a deal</h2>
<p>First off, I still think we have to consider SentinelOne as an option that's still on the table, even with qualified reports of a CyberArk acquisition.</p>
<p>In some ways, CyberArk makes the SentinelOne report more credible than it was on its own. There are now two signals of Palo Alto Networks having the appetite to do a transformative deal.</p>
<p>I agree with others that CyberArk makes a SentinelOne deal seem less likely — just that it shouldn't be written off yet either.</p>
<p>Neutralizing a top‑three rival in endpoint security and adding ~$1 billion of ARR is appealing, both strategically and financially.</p>
<p>Market leadership (commercially) in endpoint security is still just out of reach for Palo Alto Networks, despite good effort to date in building an offering and a good stretch of favorable analyst ratings.</p>
<p>Combine the market reality with ambitious long-term financial goals, strong financial metrics, and competitive pressure, and you can start to see why a large acquisition like SentinelOne could be on the table.</p>
<p>Let's dig in.</p>
<h3 id="market-share-consolidation">Market share consolidation</h3>
<p>If this deal happens, market share consolidation is going to be one of the main reasons.</p>
<p>Even though endpoint security is one of the largest and most mature markets in cybersecurity, it's still highly fragmented. Here's a <a href="https://www.microsoft.com/en-us/security/blog/2024/08/21/microsoft-again-ranked-number-one-in-modern-endpoint-security-market-share/?ref=content.strategyofsecurity.com">market share snapshot</a> from IDC (via Microsoft) to give you an idea of how pervasive the fragmentation is. The snapshot is a couple years old, but we can take the numbers as directionally correct.</p>
<p>Microsoft (25.8%) and CrowdStrike (18.1%) control ~45% of the market, and things get choppy from there. SentinelOne had ~4% market share at the time but was growing 43.1% year over year. Palo Alto Networks had less than 4% — their exact number buried somewhere in the 32% "rest of market" slice.</p>
<p>Acquiring SentinelOne would get Palo Alto Networks to ~10% market share (ballpark).⁴ That's still around half the market share CrowdStrike likely has today. It's good for third place, just above established companies like Trellix, Broadcom (<a href="https://www.linkedin.com/posts/colegrolmus_for-broadcom-merging-carbon-black-into-symantec-activity-7173319101723983872-hBzJ/?ref=content.strategyofsecurity.com">Symantec and Carbon Black</a>), Sophos, and Trend Micro.</p>
<p>A secondary but still important point is further consolidation of the next-gen SIEM market. Adding SentinelOne's customers to the ~270 customers XSIAM already has (as of their Q3'25) clearly helps the case for acquisition.⁵</p>
<p>We haven't seen market share consolidation happen very often in cybersecurity. It does, but it's not our default playbook. The cybersecurity industry has mostly been a collection of emerging markets and companies.</p>
<p>The Thoma Bravo backed combinations of Ping-ForgeRock and <a href="https://www.linkedin.com/posts/colegrolmus_we-finally-know-the-new-ownership-structure-activity-7221167381602013186-OqcL?utm_source=share&utm_medium=member_desktop">Exabeam-LogRhythm</a> are two large, recent examples. In <a href="https://strategyofsecurity.com/p/cybersecuritys-class-conundrum-winner-take-all-market-dynamics?ref=content.strategyofsecurity.com"><em>Cybersecurity's Class Conundrum: Winner-Take-All Market Dynamics</em></a>, I made a case about why we're going to see market forces cause things like consolidation.</p>
<p>There is already a little bit of precedent with Palo Alto Networks doing market share consolidation. Their partial acquisition of IBM's QRadar SIEM portfolio was primarily about accelerating market share for Cortex XSIAM.</p>
<p>Palo Alto Networks essentially acquired customer pipeline (IBM's existing QRadar customers), not tech. Their objective is to migrate QRadar customers over to XSIAM (with IBM's blessing and professional services help), not to keep them on QRadar or integrate any part of the product into Cortex.</p>
<p>QRadar isn't a direct comp for SentinelOne, which has both a broader and more diversified product suite. I'm just making this connection to say that market share consolidation has been a factor for Palo Alto Networks before, even with a slightly different flavor.</p>
<p>SentinelOne would be a bigger, bolder iteration of a similar playbook —&nbsp;and perhaps a necessary one for Palo Alto Networks in their quest for multi-platform market leadership in cybersecurity.</p>
<h3 id="revenue-acceleration">Revenue acceleration</h3>
<p>Palo Alto Networks has an <a href="https://strategyofsecurity.com/the-audacious-future-of-palo-alto-networks/?ref=content.strategyofsecurity.com">audacious</a> long-term financial goal: $15 billion in Next-Generation Security (NGS) ARR by 2030.</p>
<p>They hit $5 billion of NGS ARR in Q3'25. This is impressive on its own, and it also shows how far they still have to go if they want to hit $15 billion.</p>
<p>This is where the math starts to impact the strategy. Hitting $15 billion by 2030 from $5 billion today implies a ~20% CAGR. It <em>could</em> happen on its own...but we're currently living in a world where median revenue growth for public software companies is 11%, and 20% growth puts you in the top ten.</p>
<p>Acquiring SentinelOne quickly adds ~$1  billion of ARR to Palo Alto Networks' NGS portfolio. The growth rate to $15 billion suddenly becomes 16-17% (napkin math, just showing what revenue acceleration looks like). Still aggressive, but a lot more doable.</p>
<p>So, accelerating the timeline for reaching this milestone is very appealing — assuming a reasonable acquisition price and revenue multiple.</p>
<p>This assumes strong growth continues (or even accelerates) post-acquisition, customer retention is high, and overlaps in product portfolios get worked out (more on this later). All big assumptions, but part of the territory in large scale acquisitions.</p>
<h3 id="scale-and-financial-position">Scale and financial position</h3>
<p>Palo Alto Networks is now big enough to afford larger deals. History says that billion-dollar-plus acquisitions are uncharacteristic for them. But Palo Alto Networks is a much different company in mid-2025 than they were when Nikesh Arora took over seven years ago.</p>
<p>As I observed in a related LinkedIn post, the reported price tag of $7 billion (or more) for SentinelOne would a atypical — 10x larger than their largest acquisition level of atypical. They have never made an acquisition over $800 million.</p>
<p>Here are the ten largest disclosed acquisitions they've made so far:</p>
<p><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/07/panw-largest-acquisitions.png" alt="panw-largest-acquisitions.png" loading="lazy"></p>
<p>A commenter correctly <a href="https://www.linkedin.com/feed/update/urn:li:activity:7353817404709212163?commentUrn=urn%3Ali%3Acomment%3A%28activity%3A7353817404709212163%2C7354531325376163842%29&dashCommentUrn=urn%3Ali%3Afsd_comment%3A%287354531325376163842%2Curn%3Ali%3Aactivity%3A7353817404709212163%29&ref=content.strategyofsecurity.com">pointed out</a> that Palo Alto Networks has grown beyond their original M&amp;A playbook.</p>
<p>In fact, you could make the case that the investment required to inorganically grow their current NGS portfolio was proportionally larger and riskier (in aggregate) than a large acquisition is now.</p>
<p>Over the past decade, Palo Alto Networks spent just over 11% of its weighted average market cap on acquisitions. This isn't a banking-grade calculation, but it's precise enough for comparison.</p>
<p>Even though the individual deal sizes were smaller, the total was a material investment relative to its size at the time. The plan worked, too. Palo Alto Networks wouldn't be today's most valuable standalone cybersecurity company without these acquisitions.</p>
<p>This brings us to today and the current situation with SentinelOne (or any comparably large acquisition target <em>...cough...CyberArk...</em>).</p>
<p>Palo Alto Networks' current financial metrics can support larger acquisitions than they've done in the past. You know...like buying a public company for several billion dollars.</p>
<p>A few metrics to further illustrate the point: Palo Alto Networks currently has $136 billion of market cap, $2.3 billion of cash and equivalents, and essentially zero long-term debt obligations.</p>
<p>Enterprise value has quadrupled since 2020. They can comfortably finance a $7–8 billion purchase.</p>
<p>Palo Alto Networks has made plenty of acquisitions, but they haven't fully exercised their enviable financial position. This is only theoretical because they haven't <em>chosen</em> to exercise it.</p>
<p>The strategic choice is theirs to make, of course. Nobody says they have to do this deal, or <em>any</em> deal they don't have strategic and financial conviction.</p>
<p>The point is they <em>can</em>.</p>
<p>Strategic buyers make acquisitions up to ~10 % of enterprise value all the time. We just don't see deals like those very often in cybersecurity because they haven't <em>needed</em> to happen.</p>
<p>A ~$7 billion acquisition (ballkpark for SentinelOne) at their current $136 billion market cap is about 5%. A ~$20 billion acquisition (ballpark for CyberArk) is 14.7%. More of a stretch, for sure — but both within reason as a proportion of the company's current scale.</p>
<p>Acquiring either SentinelOne or CyberArk would be a large transaction, but it's not outside normal strategic M&amp;A guardrails for a $130 billion company.</p>
<p>If the priority for Palo Alto Networks is to accelerate NGS revenue, neutralize a rival, and position itself better against large competitors, SentinelOne’s $1 B ARR at a mid-single-digit multiple is attractive...<em>financially.</em></p>
<p>But for a deal like this, the strategic rationale have to clear a higher bar than “we can afford it.”</p>
<p>Factors like product overlap, cannibalization risk, and whether consolidating share in endpoint security is worth the distraction from PANW’s platform-expansion roadmap (Prisma Cloud, XSIAM, etc.). More on this later.</p>
<p>The financial drivers could make sense, but qualitative fit still matters.</p>
<h3 id="timing-and-competitive-dynamics">Timing and competitive dynamics</h3>
<p>Companies and their leaders will often downplay the role of timing and competitive dynamics in M&amp;A decisions, but the reality is they're always a factor.</p>
<p>The Nikesh Arora era Palo Alto Networks is notoriously ahead of competitors on the timing of most acquisitions — <a href="https://strategyofsecurity.com/p/palo-alto-networks-protect-ai-and-the-platformization-of-ai-security?ref=content.strategyofsecurity.com">Protect AI</a> being the most recent example in a nascent market to secure AI models.</p>
<p>Large cybersecurity competitors aren't letting up, and several have already made large moves of their own.</p>
<p>Alphabet <a href="https://strategyofsecurity.com/w-is-for-wiz-alphabets-audacious-acquisition/?ref=content.strategyofsecurity.com">acquired Wiz</a> for $32 billion.</p>
<p>CrowdStrike's valuation is $117.6 billion, up 29.2% since last year. At this point, they're <a href="https://www.linkedin.com/posts/colegrolmus_crowdstrikes-q126-report-was-a-solid-start-activity-7336061206496993281-3BL3?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">past material impact</a> from last summer's outage.</p>
<p>Microsoft is Microsoft. No large acquisitions, but <a href="https://softwareanalyst.substack.com/p/the-future-of-the-soc-how-microsoft?ref=content.strategyofsecurity.com">lots of action</a> within a well-rounded security portfolio that directly competes with most of Palo Alto Networks' NGS portfolio.</p>
<p><a href="https://www.linkedin.com/posts/colegrolmus_it-seems-like-every-quarter-is-a-solid-quarter-activity-7328776551611723777-rnTZ?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">Fortinet</a>, <a href="https://www.linkedin.com/posts/colegrolmus_were-100-days-into-the-nadav-zafrir-era-activity-7326278635638644736-knqZ?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">Check Point</a>, and others are doing their part, too.</p>
<p>Competition has never been more intense on either front — both traditional competitors and hyperscalers. External pressures and urgency are higher than ever.</p>
<p>Timing and competition won't be the main driver, but it could be time for a big move.</p>
<p>We're probably at a point where organic growth and tuck-in acquisitions aren't going to move the needle enough on driving growth at scale.</p>
<p>Acquisitions like Talon and Protect AI still matter, of course, but they're in emerging markets that need time to grow. There are only a finite amount of these emerging market leader opportunities out there.</p>
<p>Palo Alto Networks is big enough where they need multiple levers to pull.</p>
<p>Next, let's move on and discuss the case <em>against</em> a deal.</p>
<h2 id="the-case-against-a-deal">The case against a deal</h2>
<p>As a person who's been part of billion-dollar cybersecurity acquisition discussions before, I can assure you the burden of proof required to get a deal done is incredibly high.</p>
<p>Most of our larger companies wouldn't bat an eye at spending $50 or $100 million on a smaller company that's obviously complementary. You still have to make the case, but it's much easier to do.</p>
<p>For Palo Alto Networks and SentinelOne, there <em>is</em> a case for a deal — as we just discussed in the first half of this article. I just don't know if it's enough to overcome the relatively substantial case against the deal.</p>
<p>Everything basically starts and ends with overlap in product portfolios and how to rationalize the differences. Several other sub-points stem from this core issue.</p>
<p>Let's start at the top.</p>
<h3 id="product-overlap">Product overlap</h3>
<p>There is significant overlap in the product portfolios. It's hard to put an exact number on the amount of overlap without an internal data room. I'd call it something like 50-75% overlap based this high-level analysis:</p>
<p><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/07/panw-s-product-portfolio-analysis.png" alt="panw-s-product-portfolio-analysis.png" loading="lazy"></p>
<p>Endpoint security is obviously the core product and crown jewel of SentinelOne. It's a valuable asset, for sure — but Palo Alto Networks is no slouch.</p>
<p>Palo Alto Networks doesn't disclose product line level revenue within the Cortex platform, so it's hard to say exactly how big their endpoint security business is commercially.</p>
<p>It usually ranks well in analyst reports and performs among the leaders on MITRE ATT&amp;CK evaluations, to the extent that external benchmarks and analyst ratings matter.</p>
<p>As we discussed earlier, the overall endpoint security market share probably isn't where Palo Alto Networks ideally wants to be, but it's not a gaping hole in their product portfolio either.</p>
<p>Another nuance worth noting is that Palo Alto Networks has historically viewed endpoint security as an add-on to its Cortex platform, not as a standalone product. I don't have the data around this (and Palo Alto Networks doesn't discloses it), but I would guess the number of times where endpoint security is a standalone sale or the entry point into a new customer is somewhere between "never" and rarely.</p>
<p>That's not to say they don't <em>want</em> to lead with endpoint security, just that leading with an endpoint security product would represent a change to their go-to-market philosophy.</p>
<p>There is also a lot of overlap in the broader SecOps portfolio. SentinelOne has shown some traction in the next-gen SIEM market, but this directly overlaps with Cortex XSIAM.</p>
<p>It's a similar story for CNAPP, SOAR/hyperautomation, threat intelligence, exposure management, ITDR...you get the picture.</p>
<p>The only cases where there is little to no overlap are capabilities that Palo Alto Networks already has and SentinelOne doesn't.</p>
<p>ITDR is probably the product category where SentinelOne is the closest to bringing something net new to the table, but Palo Alto Networks does have an offering already.</p>
<p>Purple AI is the wildcard. SentinelOne has done some interesting things and shared anecdotes of customer traction in recent earnings calls.</p>
<p>Palo Alto Networks is no stranger to AI, though. They have their own unique approach with Cortex XSIAM and many other customer-facing and internal use cases across the board that Nikesh Arora has openly discussed for years.</p>
<p>Rationalizing this many products, agents, data repositories, and automation suites is a recipe for customer churn and channel confusion. They might decide the upside is worth the pain, but make no mistake about it: there would be a lot of pain.</p>
<h3 id="financial-tradeoffs">Financial tradeoffs</h3>
<p>Palo Alto Networks may be in a fortunate position where they can afford a large acquisition, but a move like this comes with tradeoffs.</p>
<p>Spending $7 billion or more on a single acquisition with significant overlap in the product portfolio could limit their ability to execute the playbook that's worked for them so far: multiple acquisitions of emerging market leaders.</p>
<p>They also limit optionality for acquiring a different company at or around SentinelOne's scale. You can see where this tradeoff matters with the CyberArk report we just heard. If I was Palo Alto Networks and had to pick between SentinelOne and CyberArk, I'm buying CyberArk 100/100 times.</p>
<p>A large acquisition could also limit their ability to invest in R&amp;D. Their product teams have proven to be capable of both integrating acquired products and developing new ones within each of the three major platforms.</p>
<p>Inorganic growth gets a lot of attention, but Palo Alto Networks wouldn't be as successful as it is without meaningful R&amp;D investments.</p>
<h3 id="customer-perception-and-retention">Customer perception and retention</h3>
<p>A secondary point against the deal is how customers will receive it and whether Palo Alto Networks can retain a meaningful portion of SentinelOne's customer base. This one is harder to quantify, so I'll just describe the point anecdotally.</p>
<p>Here's a paraphrased comment from a CISO in the LinkedIn post I wrote about the potential deal:</p>
<blockquote>
<p>Many SentinelOne customers explicitly chose SentinelOne to avoid Cortex XDR...many SentinelOne customers will switch to CrowdStrike.</p>
</blockquote>
<p>There would be some amount of churn from SentinelOne customers that don't have a Palo Alto Networks footprint today (and don't want one). This isn't everyone, or even a majority, but there is an undercurrent of hard-to-explain industry contempt for Palo Alto Networks.</p>
<p>The churn could end up being negligible. Or, it could manifest itself in different ways, like a slowdown in net new customer additions. This alone isn't a reason not to do the deal, but it has to factor into the rationale.</p>
<h3 id="regulatory-and-antitrust-scrutiny">Regulatory and antitrust scrutiny</h3>
<p>Combining two industry leaders in endpoint security could attract regulatory (DOJ and EU) scrutiny, as most large deals do.</p>
<p>Ping and ForgeRock made it through under the previous administration. HPE's acquisition of Juniper Networks was <a href="https://www.reuters.com/business/us-doj-settles-antitrust-case-hpes-14-billion-takeover-juniper-2025-06-28/?ref=content.strategyofsecurity.com">finally settled</a>, too.</p>
<p>The review of Alphabet-Wiz is <a href="https://www.reuters.com/sustainability/boards-policy-regulation/googles-32-billion-deal-wiz-gets-antitrust-review-bloomberg-news-reports-2025-06-13/?ref=content.strategyofsecurity.com">still in progress</a> and isn't predicted to close until 2026.</p>
<p>I'm certainly not an antitrust expert, but anecdotally it seems like Palo Alto Networks-SentinelOne should also be approved if it was to happen.</p>
<p>The question is how long it would take, as any major delays affect the upside of the deal. Again, not enough of a concern to prevent the deal on its own, but a factor that has to be considered.</p>
<h2 id="best-alternative-to-a-negotiated-agreement-batna">Best Alternative to a Negotiated Agreement (BATNA)</h2>
<p>This wouldn't be a proper case study without a BATNA! We won't drain this topic, but it's worth mentioning the alternatives for each company if a deal doesn't come together.</p>
<p>If Palo Alto Network believes the trajectory for Cortex (and NGS overall) is already set up for success (between organic growth and continued tuck-ins), the price premium plus integration risk could outweigh the bump in endpoint security market share.</p>
<p>As discussed earlier, it also leaves them the optionality to do a different large scale acquisition like CyberArk or other late-stage cybersecurity companies.</p>
<p>SentinelOne still has decent options too. An acquisition and take-private by private equity would follow a pattern many other public cybersecurity companies have taken in the past few years.</p>
<p>Continuing along as a public company is a perfectly good option, too. They are still one of the better performing pure play cybersecurity companies since they've been public. The path ahead isn't easy, but it's certainly possible.</p>
<h2 id="unlikely-but-interesting-to-think-about">Unlikely, but interesting to think about</h2>
<p>In probabilistic terms, I think this acquisition is unlikely (but still possible — and even less possible with CyberArk on the table).</p>
<p>Even before hearing the CyberArk report, I didn't expect this acquisition would happen.</p>
<p>It's hard to rationalize the overlap between SentinelOne and the product portfolio Palo Alto Networks already has.</p>
<p>While the price is digestible for Palo Alto Networks, overlapping portfolios and integration complexity make the overall value thesis challenging.</p>
<p>If nothing else, a scenario like this is fascinating to think about.</p>
<p>And now, we get to think about another one — this time with CyberArk. More on that soon.</p>
<hr><h3 id="acknowledgements">Acknowledgements</h3>
<p>There are too many people to name, but I want to thank all of the commenters who shared their thoughts and opinions on the LinkedIn post I wrote about this acquisition. The discussion sharpened my point of view considerably and helped a ton with this longer-form analysis.</p>
<h3 id="footnotes">Footnotes</h3>
<p>¹There are a handful of CyberArk-related comments sprinkled in for context, but most of this analysis was already written when the potential acquisition was reported. More analysis on <em>that</em> report soon.</p>
<p>²You should literally treat it like the Harvard MBA case studies people do in business school, not a credible news report.</p>
<p>³There are reasons why Nikesh Arora is a <a href="https://x.com/shravvmehtaa/status/1909298886419910680?ref=content.strategyofsecurity.com">highly compensated</a> CEO. Making decisions like these is one of them.</p>
<p>⁴Give or take, depending on factors like growth rates, attrition from the CrowdStrike incident, continued market share decay from the legacy competitors, and more.</p>
<p>⁵There's more to it than adding customers, though. Unlike the QRadar acquisition, most of SentinelOne's SIEM deployments are relatively new. Customers aren't going to scrap their deployments and cut over to XSIAM right away. It's way more likely they will be furious, which means retention could be hard.</p>
]]></content:encoded>
            <category>M&amp;A</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/07/header-panw-sentinelone-report.png"/>
        </item>
        <item>
            <title><![CDATA[Palo Alto Networks, Protect AI, and the Platformization of AI Security]]></title>
            <link>https://strategyofsecurity.com/palo-alto-networks-protect-ai-and-the-platformization-of-ai-security/</link>
            <guid>68234aac5a1d58000121d82f</guid>
            <pubDate>Tue, 13 May 2025 13:39:17 GMT</pubDate>
            <description><![CDATA[Palo Alto Networks acquiring Protect AI is a decisive, platform-level play to shape the nascent AI/ML-security market while it's still early.]]></description>
            <content:encoded><![CDATA[<p>Palo Alto Networks just put everyone else who is hoping to compete in AI/ML Security on notice.</p>
<p>Their <a href="https://www.crn.com/news/security/2025/palo-alto-networks-to-acquire-protect-ai-for-deeper-push-into-ai-spm?ref=content.strategyofsecurity.com">~$500M+</a> (intended) <a href="https://www.paloaltonetworks.com/company/press/2025/palo-alto-networks-announces-intent-to-acquire-protect-ai--a-game-changing-security-for-ai-company?ref=content.strategyofsecurity.com">acquisition of Protect AI</a> is nothing short of a declaration to win this emerging market before competitors get their strategy together.</p>
<p>This is going to be one of the headline deals for 2025. Maybe even the entire decade if everything goes right.</p>
<p>A deal like this is comes with a lot of questions and skepticism, though. We only see strategic buyers making $500M+ cybersecurity acquisitions a <a href="https://strategyofsecurity.com/themes-from-and-beyond-altitude-cybers-2024-cybersecurity-year-in-review/?ref=content.strategyofsecurity.com">few times per year</a>. Major cybersecurity markets get created even less frequently.</p>
<p>The Palo Alto Networks-Protect AI deal was an extra special blend of combustible ingredients. A dash of Palo Alto Networks, platformization, AI, and a high revenue multiple is a recipe for uproar in the cybersecurity industry.</p>
<p>A lot of things had to come together across the market for AI/ML Security, Protect AI,  Palo Alto Networks, and more over several years to make a transaction like this possible.</p>
<p>Let's talk about everything that made this happen, starting with the wildest early stage market I've ever seen.</p>
<h2 id="aiml-security-is-the-definition-of-an-embryonic-market">AI/ML Security is the definition of an embryonic market</h2>
<p>AI/ML Security is a hard market for strategic buyers because there isn't a recognized pattern or product architecture to follow yet. This is still a very <a href="https://strategyofsecurity.com/an-intro-to-consolidation-and-aggregation-in-cybersecurity/?ref=content.strategyofsecurity.com">embryonic</a> market — or, in Nikesh Arora's words, a "rapidly evolving market."</p>
<p>Financing activity in the market is a pretty good indicator for how messy and embryonic this market really is.</p>
<p>According to <a href="https://www.returnonsecurity.com/p/the-state-of-the-cybersecurity-market-in-2024?ref=content.strategyofsecurity.com">Return on Security data</a>, financing for this market more than doubled from 2023 to 2024. Investment activity went from $181.5 million in 2023 to $369.9 million in 2024, a 96% year-over-year growth rate.</p>
<p>A disproportionate amount of the money went to Series A and earlier stage companies — so, basically the definition of an embryonic market.</p>
<p>Protect AI was one of the most well-funded pure AI/ML Security companies, with $108.5 million raised across three rounds. They raised a $60 million Series B in August 2024, which made them one of the most mature (but still relatively early stage) companies in the space.</p>
<p>Here's the thing, though. All of this early stage startup activity means we have terms like AI-SPM, AI Detection and Response, and MLSecOps — but most buyers don't intuitively recognize them yet. They just know they have AI problems and need a way to solve them.</p>
<p>Enter the <a href="https://www.linkedin.com/posts/colegrolmus_deepseek-just-stress-tested-the-current-state-activity-7290059343897505793-60NP?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">DeepSeek problem.</a></p>
<p>AI/ML security got real for people quickly during one fateful week back in late January. The conversation went from, "hey, LLM scaling might be <a href="https://time.com/7178328/is-ai-progress-slowing-down/?ref=content.strategyofsecurity.com">slowing down</a>" to "oh, &amp;@%$, this DeepSeek thing is out of control" in 0.002 seconds.</p>
<p>I can't think of another example where an AI app became so popular so quickly.¹</p>
<p>This meant security teams didn't have much time to act. We basically had to rely on tools and processes that were already implemented. There was no time to put something new in place.</p>
<p>The sudden rise of DeepSeek stress-tested the current state of security controls for AI in every large enterprise. Researchers discovered a <a href="https://krebsonsecurity.com/2025/02/experts-flag-security-privacy-risks-in-deepseek-ai-app/?ref=content.strategyofsecurity.com">few</a> <a href="https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak?ref=content.strategyofsecurity.com">bad</a> <a href="https://www.wired.com/story/deepseeks-ai-jailbreak-prompt-injection-attacks/?ref=content.strategyofsecurity.com">vulnerabilities</a>, but (thankfully) no widespread attacks or breaches were reported.</p>
<p>Security for AI/ML was on our radar long before then, of course. In hindsight, DeepSeek was a wake-up call that contributed to some of the market activity we're seeing today.</p>
<p>Securing user inputs directly to DeepSeek (opposed to self-hosted models) is an adjacent problem to what Protect AI's product suite does. It was close enough to get business and security leaders thinking about the power and risks of both self-hosted and first-party models.</p>
<p>Right now, the tailwinds for the AI/ML security market are looking exponentially better than they did during our "LLMs aren't scaling" spell in Q4 2024.</p>
<p>Back then, I would have said we were only going to have three to five third party models that everyone was going to use (OpenAI, Anthropic, etc.). In that scenario, there is basically no need for AI/ML security (for the models themselves, I mean) outside the handful of companies building the models.</p>
<p>After DeepSeek (and other open source models), it seems a lot more likely that companies with enough motivation and resources are going to both host and post-train third-party models. Ambitious companies will even train their own first-party models. We already have some good examples of this in cybersecurity with <a href="https://security.googleblog.com/2025/04/google-launches-sec-gemini-v1-new.html?ref=content.strategyofsecurity.com">Google's Sec-Gemeni v1</a> and <a href="https://www.linkedin.com/posts/colegrolmus_if-you-still-werent-sure-why-cisco-paid-activity-7323720735888134144-0bot?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">Cisco's Foundation-sec-8b</a>.</p>
<p>It sure looks like this trend of open source models, reinforcement learning, post-training, and model proliferation is going to continue. This is a fundamentally different world for security than big tech and AI labs controlling a majority of model development and training.</p>
<p>In this version of the story, security teams have to play an active role in protecting their companies' own models — not just prompts and data coming in and out of other people's models.</p>
<p>Training bespoke models is definitely a first world (read: enterprise and tech company) problem, but the addressable market for first-party models (and, by proxy, securing them) is probably going to be bigger than we thought a few months ago.</p>
<p>Let's hop back in time again and talk about how Protect AI put itself on the map with a highly counter-intuitive strategy.</p>
<h2 id="protect-ai%E2%80%99s-rapid-platform-build">Protect AI’s rapid platform build</h2>
<p>The story of how Protect AI put itself in a position to be acquired by Palo Alto Networks is a case study for the ages in cybersecurity industry history.² There are a bunch of interesting strategic moves that the Protect AI founders made to make the company (and acquisition) of today possible.</p>
<p>Protect AI was one of the OG companies in AI/ML Security, founded way back in 2022 (ha) by a team of AI/ML experts with successful exits in the past.</p>
<p>I know 2022 doesn't seem like very long ago, but remember: ML security wasn't an obvious domain for a startup back in 2022. ChatGPT wasn't released until late November that year, and it took even longer for businesses to start adopting it at scale.³</p>
<p>Securing ML code at the source in Jupyter notebooks with NB Defense was even less obvious. They knew what they were doing.</p>
<p>They swiftly built out their "AI Radar" platform strategy from there. Next was a central console and data layer, followed by static analysis for ML models (Guardian), dynamic testing (Recon), and runtime (Layer).</p>
<p>They used four acquisitions to help build their product suite. This is <em>highly atypical</em> for a less than five-year-old company who raised just over $100 million in total.</p>
<p>Protect AI already did the grubby integration work, which ended up being an appealing option for Palo Alto Networks over doing this post-acquisition.</p>
<p>Protect AI broke all kinds of "conventional" rules to build a platform early...and rapidly. From Jupyter notebook plugin to one of the industry's leading AI/ML security platforms in three years is the definition of moving fast.</p>
<p>It takes two sides to make a deal happen, though. Let's talk about the trajectory of Palo Alto Networks' product strategy for AI and how it led to an acquisition.</p>
<h2 id="the-convergence-of-palo-alto-networks%E2%80%99-ai-strategy-and-protect-ai">The convergence of Palo Alto Networks’ AI strategy and Protect AI</h2>
<p>A cynic might argue Palo Alto Networks is a mature company jumping on the AI bandwagon, but history tells a different story.</p>
<p>They acquired an ML-based behavioral analytics company in 2017 (LightCyber) before Nikesh Arora became CEO. This iteratively evolved into the Cortex platform we know today.</p>
<p>ML was embedded into their core NGFW product in 2020 (the PAN-OS 10.0 Nebula release). The rest is history.</p>
<p>They doubled down on AI <em>for</em> security after that. The launch of Cortex XSIAM in February 2022 was the beginning of the AI-powered-everything movement.</p>
<p>But in 2025, why would Palo Alto Networks spend half a billion or more on a company in the AI/ML Security market instead of building their own solution or piecing together a few smaller acquisitions?</p>
<p>They could have done either, but it would have cost them time to market. Here's an abbreviated explanation from Nikesh Arora shortly after the acquisition was announced:</p>
<blockquote>
<p>What I’m most excited about is making sure that we get this AI thing right…there’s a whole new series of security challenges…I’m really excited that we’re taking a very assertive and aggressive view.</p>
</blockquote>
<p>In this assertive and aggressive view, it makes a lot more sense to accelerate the roadmap and get to market faster.</p>
<p>Palo Alto Networks had the beginnings of AI/ML security products, but there still wasn't a ton of product overlap. So, they went for a platform instead of buying piecemeal.</p>
<p>Prisma AIRS is their platform of the future. They <a href="https://tv.paloaltonetworks.com/video/6371948357112/transforming-cybersecurity-with-ai-on-demand?autoStart=true&ref=content.strategyofsecurity.com">wasted no time</a> telling the world about it after the acquisition was announced.</p>
<p>Give them credit for having the conviction to buy an early stage platform instead of trying to do multiple acquisitions and stitch all of this together at a cost of months or years on the roadmap.⁴</p>
<p>Was this the right strategic decision, though? Let's talk about a few of the counterarguments and risks I've seen since the deal was announced.</p>
<h2 id="demand-competition-moats-and-more">Demand, competition, moats, and more</h2>
<p>Tom Le, the CISO at Mattel, wrote an <a href="https://www.linkedin.com/feed/update/urn:li:activity:7323035900941168642?commentUrn=urn%3Ali%3Acomment%3A%28activity%3A7323035900941168642%2C7323304201009201152%29&dashCommentUrn=urn%3Ali%3Afsd_comment%3A%287323304201009201152%2Curn%3Ali%3Aactivity%3A7323035900941168642%29&ref=content.strategyofsecurity.com">incredibly thoughtful counter</a> to my LinkedIn post about the transaction. I had to include and expand upon it in the full article.</p>
<p>The summary version of the counterargument is that Palo Alto Networks is throwing market cap (or cash — terms weren't officially disclosed) to buy an AI model protection capability with questionable demand, intense competition, a limited moat, and a risk of being subsumed into existing platforms.</p>
<p>How's that for a counterargument?! Valid points, for sure — and worth discussing in detail here.</p>
<h3 id="will-customers-buy-the-product-or-does-it-have-to-be-bundled-for-free">Will customers buy the product, or does it have to be bundled for free?</h3>
<p>Palo Alto Networks obviously wants to monetize the product and is betting on that happening eventually. They've shown willingness to be both patient and creative with emerging markets, which is going to be the case here.</p>
<p>A similar situation happened with Talon and the secure enterprise browser market. Palo Alto Networks was roundly criticized for paying $700-million-plus to acquire a promising but early stage startup in a promising but embryonic market.</p>
<p>They started out by giving the product away for free to existing customers. Now, it's generating a fair (and growing) amount of revenue — $30 million in total bookings as of their fiscal Q2'25 earnings report.</p>
<p>I'd expect a similar playbook here. They may not proactively give the product away. It could be bundled on a case-by-case basis depending on the customer and circumstances. Either way, there will be an incubation period while the product gets integrated and market demand becomes more established and predictable.</p>
<h3 id="how-are-they-going-to-compete-with-25-other-ai-startups">How are they going to compete with 25+ other AI startups?</h3>
<p>If you were at RSAC, you probably saw an expo hall lined with companies selling AI guardrail/model/firewall/injection protection. As we discussed earlier, an embryonic market means a highly competitive market with everyone trying to gain traction.</p>
<p>This is another instance of the platformization debate. Sure, there are 25+ startups that can do flavors of AI/ML security — just like many other markets in cybersecurity.</p>
<p>The question becomes if you want to manage another vendor relationship...or just push the easy button and buy the AI security module from Palo Alto Networks. The answer is even easier if you're already a customer, and easier still if they're willing to let you try it for free.</p>
<p>I'm not saying this is the best option for every organization, nor that the however-many-other AI/ML Security startups are hosed.</p>
<p>A relatively complete product suite from an established company is a big deal for a lot of buyers, though — especially large enterprises who want to make this problem go away and would rather not deal with startups in the process.</p>
<h3 id="does-model-protection-have-a-low-barrier-to-entry">Does model protection have a low barrier to entry?</h3>
<p>This could be the case. It's hard to answer definitively without seeing the underlying economics for a bunch of private companies building in this space.</p>
<p>Anecdotally, the financing data says otherwise — but it's obviously questionable to conclude large amounts of capital invested mean AI/ML security is expensive to build.</p>
<p>Meta <a href="https://ai.meta.com/blog/ai-defenders-program-llama-protection-tools/?ref=content.strategyofsecurity.com">released</a> several AI/ML security tools the same week the Protect AI acquisition was announced. The tools aren't a one-for-one match with everything Protect AI does, but still impressive.</p>
<p>You might be able to conclude tech company building and open sourcing a bunch of AI tools as a hobby means model protection isn't difficult or expensive — but this side of the case is anecdotal, too. Meta built Llama, an entire frontier model, and open sourced it. Time and money have different laws of gravity in big tech.</p>
<p>Regardless, we've seen this movie before. Every major cybersecurity product category has respectable free, low cost, and/or open source alternatives. Companies still pay for products. Sometimes top dollar.</p>
<p>A lot of factors go into making moats and creating barriers for market entry. Technical difficulty and cost are two of them. Palo Alto Networks has distribution, brand equity, and several other factors that are equally hard (or harder) to replicate.</p>
<h3 id="are-licensing-fair-use-and-ip-infringement-the-more-complex-challenge-for-ai">Are licensing, fair use, and IP infringement the more complex challenge for AI?</h3>
<p>They definitely could be. Matthew Prince at Cloudflare has talked about this exact topic on at least two recent earnings calls. From their <a href="https://seekingalpha.com/article/4755873-cloudflare-inc-net-q4-2024-earnings-call-transcript?ref=content.strategyofsecurity.com">Q4'24 report</a>:</p>
<blockquote>
<p>Cloudflare counts many of the most important AI companies as customers. We also count a huge portion of the world's content creators as our users. Being between those two puts us in an important role to help figure out the business model of the post-search web. Cloudflare sits in a unique position to help figure out how content creators are compensated, what agents are allowed where, and on what terms, and how the AI-driven web of the future will fit together. It's early days, but the conversations we're having with all the relevant parties feel foundational for the future. Watch this space, definitely exciting times.</p>
</blockquote>
<p>I think he's right, at least for the <em>open</em> web. Internal and proprietary data is a slightly different story.</p>
<p>One of the biggest reasons (and advantages) sophisticated companies are going to have with using first-party models is access to their own data.</p>
<p>If you've worked in or around an enterprise, you know a lot of the data is trash, and too many people have access to it. But, presumably, at least <em>some of it</em> is highly advantageous for AI.</p>
<p>The fundamental difference between the Matthew Prince view of the world and enterprises is this: they own their data, dumpster fire and all.</p>
<p>Protecting their data and the first-party models that consume it is priority number one. Their general counsel obviously doesn't want them getting into legal issues either, but that's more about managing risk.</p>
<p>Cybersecurity companies like Palo Alto Networks don't care about content on the open web in the same way Cloudflare does. Their enterprise customers come first, which means helping them secure their AI/ML stack top to bottom.</p>
<h3 id="will-third-party-ai-platforms-build-all-this-protection-in-natively">Will third-party AI platforms build all this protection in natively?</h3>
<p>They could, but they have plenty of other high priority problems to solve.</p>
<p>Fragmentation of models, constant one-upping on benchmarks, and...oh, protecting against <a href="https://openai.com/index/updating-our-preparedness-framework/?ref=content.strategyofsecurity.com">severe harm</a> are going to keep them busy enough to let the cybersecurity companies deal with the cybersecurity problems.</p>
<p>Companies do build security and privacy features into platforms, of course. GitHub and GitLab building things like vulnerability scans, secrets management, and more into code repositories is a recent example.</p>
<p>The many other cases where native security <em>didn't</em> happen seem like better precedent here, though.</p>
<p>Cloud infrastructure is the closest one I can think of in terms of magnitude. AWS, Microsoft, and Google Cloud all prioritized features and growth over security for years...which, as we just saw, produced a <a href="https://strategyofsecurity.com/w-is-for-wiz-alphabets-audacious-acquisition/?ref=content.strategyofsecurity.com">$32 billion company named Wiz</a>.</p>
<p>Even with the relative success GitHub and GitLab have had with native security features, there was still plenty of room left for companies in AppSec, Secrets Management, and more to hit nine figures of revenue.</p>
<p>Uncertainty is part of the deal when you're making strategic decisions in early stage markets. As a wise cybersecurity CEO (not named Nikesh Arora) once told me, “we’re all just making bets about the future.”</p>
<p>Palo Alto Networks made its bet. Let's talk about what comes next for the company and the rest of the industry.</p>
<h2 id="palo-alto-networks-made-its-move-%E2%80%94-where-do-we-go-from-here">Palo Alto Networks made its move — where do we go from here?</h2>
<p>Palo Alto Networks acquiring Protect AI puts significant pressure on their relative peer group and other market-specific competitors to respond with moves of their own.</p>
<p>This doesn't necessarily mean everyone is going to make similarly sized acquisitions. There is more than one way to put together a product portfolio, of course.</p>
<p>What changed was the timing. After the deal closes, Palo Alto Networks will have put together the most complete AI/ML Security product portfolio outside of Cisco and Robust Intelligence.</p>
<p>This is likely going to mark the beginning of an AI security consolidation rush. Palo Alto Networks has spoken and made their move. The clock was already ticking for everyone else, but the window to deliver just got cut in half.⁵</p>
<p>As for Palo Alto Networks, I expect history is going to look back on this deal as another good one by the current leadership team. They made a reasonable bet on a complimentary market with high upside while it was still relatively early.</p>
<p>It's not over, though. Palo Alto Networks still has to keep innovating and building on top of Protect AI — but they have demonstrated a reasonably good track record at integrating past acquisitions.</p>
<p>Palo Alto Networks did everything they could within their control, which is to accelerate delivery of their AI security product suite and give customers a concrete option if they want to buy into a platform.</p>
<p>The strategic bet behind Palo Alto Networks' platformization strategy is that the sum of the parts is better than others can offer as standalone products.</p>
<p>For Palo Alto Networks, this now becomes a market question: how big will the market for AI/ML Security get in the long term?</p>
<p>They don't have to completely and utterly dominate the AI security market for this to be a good deal.</p>
<p>Anything under a $1 billion acquisition price is a reasonable bet (and breakeven point) for Palo Alto Networks — especially in a market with this much upside.</p>
<hr>
<h3 id="footnotes">Footnotes</h3>
<p>¹I know it's fundamentally a model – I'm referring to their hosted web and mobile apps.</p>
<p>²This is the short, strategy-focused version. Ed Sim and the boldstart team have you covered on the <a href="https://boldstart.vc/news/from-inception-to-ai-security-leader-protectais-journey-to-exit-to-palo-alto-networks/?ref=content.strategyofsecurity.com">full timeline</a>.</p>
<p>³It's still debatable whether businesses have adopted it at scale or not yet. "Scale" is such a relative term in AI that you could easily argue we're not even close to scale today, and you'd probably be right.</p>
<p>⁴Also, credit to their early investors for investing in AI/ML security super early. The thesis for this market isn't totally clear even today. It definitely wasn't back in 2022 when boldstart and Acrew Capital cut the first checks for Protect AI's seed round. Evolution Equity Partners led both the A and B rounds, and everyone kept doubling down well before an outcome like this was obvious.</p>
<p>⁵Waiting for the market to develop or sitting it out entirely are viable strategic options, although I doubt many peers will intentionally choose to sit on the sidelines.</p>
]]></content:encoded>
            <category>M&amp;A</category>
            <category>#Palo Alto Networks</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/05/header-panw-protectai-deal.png"/>
        </item>
        <item>
            <title><![CDATA[Mapping the U.S. Federal Government Ecosystem for Cybersecurity, Privacy, and Trust]]></title>
            <link>https://strategyofsecurity.com/mapping-the-u-s-federal-government-ecosystem-for-cybersecurity-privacy-and-trust/</link>
            <guid>680bd86edecdcd0001970982</guid>
            <pubDate>Fri, 25 Apr 2025 19:06:06 GMT</pubDate>
            <description><![CDATA[A deep dive into federally-funded cybersecurity, privacy, and trust initiatives in the United States in the wake of our near-miss with the NVD.]]></description>
            <content:encoded><![CDATA[<p>Quick —&nbsp;tell me where the Center for Internet Security (CIS) gets its money.</p>
<p>Tough one?!</p>
<p>What about FS-ISAC?</p>
<p>FIDO Alliance?</p>
<p>Let's Encrypt?</p>
<p>Maybe you got some of them. Questions like these are tough ones for regular civilians like me, though.</p>
<p>The whole <a href="https://www.reuters.com/technology/us-funding-running-out-critical-cyber-vulnerability-database-manager-says-2025-04-15/?ref=content.strategyofsecurity.com">funding situation</a> with MITRE and the National Vulnerability Database (NVD) made me realize my understanding of the <em>dependencies</em> between federally-funded organizations is lacking.</p>
<p>If you've worked in cybersecurity for a while, your knowledge was probably something like mine before I did the research for this article. I knew about most of the headline organizations, have used many of their frameworks and tools, and generally suspected taxpayer dollars provided some or all of the funding.</p>
<p>What I didn't know turns out to be important: <em>who and where the money comes from.</em></p>
<p>This is exactly the challenge with the current administration in the United States and its quest for government efficiency.</p>
<p>For the first 20 years of my career, it was fine for me to think this government-backed cybersecurity stuff just works.</p>
<p>I've got news for you: it does not 'just work'. There's a lot of effort, coordination, and money that makes it all go.</p>
<p>Many of the institutions and resources we know and love rely upon layers and layers of complex government mandates, legislation, executive orders, and (importantly) — federal funding.¹</p>
<p>After seeing what happened with the NVD, it sure looks like some of these things could disappear at any minute without much warning.</p>
<p>I <em>want</em> to have an opinion. Humbly, I realized the first step towards having an opinion was understanding all of this better.</p>
<p>This article is literally the (polished) output of the work I've been doing over the past week or so to understand the structure and intricacies of the federally funded cybersecurity, privacy, and trust ecosystem.²</p>
<p>Admittedly, we're crossing over from pure cybersecurity into some broader privacy, trust and safety, ICS/IoT, AI safety, and national security topics. I still think it's important to reference all of them in this context to try and paint a picture of what's relevant for people in the mainline cybersecurity industry.</p>
<p>This is obviously a U.S. centric view of things. That alone was a lot to bite off for this research. I'm sure other countries have similar scenarios, although this research now makes me wonder if the complexity is uniquely American.</p>
<p>Let me start by telling you why I care about this topic in the first place.</p>
<h2 id="im-a-product-of-federally-funded-research">I'm a product of federally funded research</h2>
<p>My first real security job was at a public policy research department in college. Some of their grants were state funded, and some were federally funded.</p>
<p>It wasn't a large department, especially compared to the size of some organizations we're going to discuss in this article. We had seven or low eight figures of research funding in any given academic year.</p>
<p>During my senior year of college, I was a research team member for a $16.5 million federal project to explore road use taxes in the United States. The project was a massive experiment in both taxation and user privacy for thousands of field study participants.</p>
<p>This project was a little different than the cybersecurity-specific ones we're going to be talking about in this article. I still think it's relevant because it gave me a taste of how federally funded research works.</p>
<p>Since then, I've assessed companies against NIST standards, audited based on PCAOB standards, implemented passkeys, and (this month!) used MITRE ATT&amp;CK and D3FEND on a product strategy project for a consulting client.</p>
<p>I use the outputs of federally funded research a lot, and sometimes even without realizing it.</p>
<p>My first reaction to the NVD situation was, <em>"oh $#@%, a lot more of this stuff could be going away."</em></p>
<p>Once you have that realization, a lot of important questions start coming up:</p>
<ul>
<li>What type of organization is MITRE in the first place?</li>
<li>Where does its money come from?</li>
<li>Which other organizations are like MITRE?</li>
<li>Which institutions and research is the federal government funding in the first place?</li>
</ul>
<p>And so on.</p>
<p>I had a partial understanding, but definitely not enough to know the ramifications if some or all of the federally backed institutions and research start disappearing.</p>
<p>The strategic part of this situation has very little to do with whether you politically agree or disagree with government efficiency. It's okay to voice an opinion, but that's not enough. The savvy thing to do is prepare for the worst.</p>
<p>The first step is knowing the blast radius, so to speak. This means mapping out the whole federally funded ecosystem of cybersecurity, privacy, and trust.³</p>
<p>Spoiler alert: there is a whole lot more to the ecosystem than I realized.</p>
<h2 id="a-high-level-view-of-the-federally-funded-ecosystem">A high-level view of the federally funded ecosystem</h2>
<p>Before we get into the individual entity types, examples, and what they do, I think it's helpful to see everything at once. I'm giving you the punch line before we dive off the deep end.</p>
<p>This is the top-down view of how power, authority, and funding for cybersecurity, privacy, and trust flows through the U.S. federal government:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/federal-cybersecurity-ecosystem-map.png" class="kg-image" alt="" loading="lazy" width="830" height="1172" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/04/federal-cybersecurity-ecosystem-map.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/federal-cybersecurity-ecosystem-map.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Yeah, I know. There's a lot more going on here than I was aware of before putting it all in a single visual.</p>
<p>The important takeaway is that there is a trickle down effect for both money and authority.</p>
<p>Proper departments are the "parent" organizations. There are only 15 of them. Departments have policymaking, budgetary, and executive oversight authority. They receive the money and hand it out to downstream entities for execution.</p>
<p>Federal agencies are the operational arms that perform a particular mission or function. They can either be part of a department or operate independently. This is usually where the actual work happens, or at least gets mobilized.</p>
<p>Things get a lot more complicated from there. Agencies give funding to several other different entity types. Sometimes the funding is sole-sourced, and sometimes it's competitive. Sometimes it's another formal government entity, and sometimes it's not.</p>
<p>The dependencies and nuances keep going.</p>
<p>This is where the controversy starts to come in. It's a question of whether and to what extent the federal government has the authority to use and distribute funds. By extension, this brings up questions about the scope of the federal government's mission.</p>
<p>A core thesis of the current administration's stance on government spending is questioning whether the federal government has the authority to finance activities through administrative power instead of pure legislation.</p>
<p>The answer to this question sways the landscape dramatically.</p>
<p>Why?</p>
<p><em>A whole lot of administrative power has been used for decades to make all of this happen.</em></p>
<p>And what administrative power gives, administrative power can take away.</p>
<h2 id="the-a-to-z-of-federally-funded-entities">The A to Z of federally funded entities</h2>
<p>This is the part where we go down the rabbit hole. It's a deep, dark, and treacherous one. You should still read it, but consider yourself warned.</p>
<p>We need to start at the top with a little bit more detail about federal government departments and agencies, then work our way down through the other types of federally funded entities.</p>
<h3 id="federal-government-departments">Federal Government Departments</h3>
<p>As we said earlier, federal government departments receive the money and hand it out to downstream entities for execution. Here's the surprising part: most of them are involved in funding cybersecurity, privacy, and trust institutions and research.</p>
<p>There are only 15 federal government departments in the United States. Eleven of them control or allocate a material portion of funding for various cybersecurity, privacy and trust activities:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/federal-department-list.png" class="kg-image" alt="" loading="lazy" width="830" height="1172" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/04/federal-department-list.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/federal-department-list.png 830w" sizes="(min-width: 720px) 720px"></figure><p>As if 11 wasn't enough, two other closely related entities get honorable mention:</p>
<ul>
<li><strong>Executive Office of the President (EOP)</strong>: Controls major funding and policy decisions via OMB, ONCD (cyber director), and OSTP.</li>
<li><strong>Department of the Treasury / IRS</strong>: Funds trust infrastructure for identity verification and anti-fraud.</li>
</ul>
<p>The only four departments who <em>don't</em> provide direct funding are the Department of the Interior (DOI), Department of Agriculture (USDA), Department of Housing and Urban Development (HUD), and the Department of Labor (DOL).</p>
<p>Now that we know who hands out the money, let's start talking about who does the work.</p>
<h3 id="federal-government-agencies">Federal Government Agencies</h3>
<p>Agencies make everything go, regardless of whether they are part of a department or operate independently. These agencies are where the real execution happens.</p>
<p>There are <em>a lot</em> of them:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/federal-agency-list.png" class="kg-image" alt="" loading="lazy" width="830" height="2442" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/04/federal-agency-list.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/federal-agency-list.png 830w" sizes="(min-width: 720px) 720px"></figure><p>This list includes a bunch of names you've heard of (CISA, NIST, NSA, and more),  plus some you haven't.</p>
<p>The outputs of our federal government agencies are vast. They are the driving force behind most of the activity we're going to discuss in the rest of the article. Most importantly, they are in control of funding and power.</p>
<h3 id="operators-of-federally-funded-research-and-development-centers-ffrdcs">Operators of Federally Funded Research and Development Centers (FFRDCs)</h3>
<p>Technically speaking, MITRE is a 501(c)(3) nonprofit. This is a charitable nonprofit, the most common type of nonprofit organization in the United States.</p>
<p>The similarities end here.</p>
<p>MITRE is the operator and manager for several FFRDCs across multiple government sponsors. It exists solely to serve the federal government. It's barred from competing with commercial firms or lobbying.</p>
<p>Think of MITRE like a general contractor who is exclusively licensed by the government to manage certain federal research centers, but the research centers themselves are the FFRDCs.</p>
<p>Seems rare? Sure is.</p>
<p>There are very few organizations like MITRE. Only a handful of nonprofits exist to operate FFRDCs. Here are other cybersecurity-related nonprofits in the same category:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/ffrdc-operators-list.png" class="kg-image" alt="" loading="lazy" width="830" height="844" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/04/ffrdc-operators-list.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/ffrdc-operators-list.png 830w" sizes="(min-width: 720px) 720px"></figure><p>The outputs of the FFRDC operators are tricky to understand, mainly because they're so closely associated with the actual FFRDCs they operate. Their role is to, well —&nbsp;<em>operate FFRDCs</em>, which is where the actual outputs come from.</p>
<h3 id="federally-funded-research-and-development-centers-ffrdcs">Federally Funded Research and Development Centers (FFRDCs)</h3>
<p>Okay, it's cool that we know who operates the FFRDCs — but what <em>are</em> FFRDCs in the first place?</p>
<p>They are private-sector entities who have long-term relationships with the federal government for special R&amp;D needs. There <a href="https://en.wikipedia.org/wiki/Federally_funded_research_and_development_centers?ref=content.strategyofsecurity.com#:~:text=match%20at%20L171%20Facility%20Administrator,El%20Segundo%2C%20California%3B%20Chantilly%2C%20Virginia">aren't very many</a> FFRDCs — only 42 active ones today, and an all-time high of 74 back in 1969.</p>
<p>FFRDCs technically operate autonomously from both the federal government and their sponsoring organizations. They're deeply embedded and fully reliant on funding though, so it's debatable how autonomous they actually are.</p>
<p>It's essentially a captive relationship with the government because FFRDCs run on federal funding and aren't allowed to compete or market products and services externally.</p>
<p>This may sound tricky, but it's a pretty sweet deal because most of their projects and funding are sole-sourced from the government without a competitive bidding process.</p>
<p>In theory, FFRDCs do specialized R&amp;D work that can't be done by the government or commercial organizations. This assumption is part of what's being questioned by the current administration: <em>"Are you sure this can't be done by a private company?"</em></p>
<p>As it stands today, these are the FFRDCs who are closely related to cybersecurity, privacy, and trust:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/ffrdc-list.png" class="kg-image" alt="" loading="lazy" width="830" height="1422" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/04/ffrdc-list.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/ffrdc-list.png 830w" sizes="(min-width: 720px) 720px"></figure><p>They produce a lot — way too much to name here. A few examples you've heard of are the NIST special publications, the CERT Coordination Center (CERT/CC), MITRE ATT@CK and D3FEND, and (as we now know) managing the NVD.</p>
<h3 id="university-affiliated-research-centers-uarcs">University-Affiliated Research Centers (UARCs)</h3>
<p>UARCs share some similarities with FFRDCs, but they're Department of Defense-flavored research centers. Unsurprisingly, they're focused on national security and defense, which sometimes crosses over into cybersecurity.</p>
<p>Like FFRDCs, they have long-term contracts and focus areas, but they are specifically tied to a university. Unlike FFRDCs, they get to bid for projects and grants from other agencies.</p>
<p>There are under 20 total UARCs. The cybersecurity-related ones are:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/uarc-list.png" class="kg-image" alt="" loading="lazy" width="830" height="735" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/04/uarc-list.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/uarc-list.png 830w" sizes="(min-width: 720px) 720px"></figure><p>The outputs of UARCs are important but harder to spot. Penn State's Applied Research Lab worked on some heavy infrastructure around secure underwater communication for the Navy. Other UARCs may perform specialized research that gets factored into NIST and or other cybersecurity standards.</p>
<h3 id="federally-supported-nonprofits">Federally Supported Nonprofits</h3>
<p>Federally supported nonprofits are the more traditional organizations (typically 501(c)(3) charities or institutes) that partner with the government. Even though they're the same nonprofit entity type as FFRDC operators like MITRE, these nonprofits are not directly operating FFRDCs.</p>
<p>They rely heavily on federal support (grants, cooperative agreements, or designated roles) to execute cybersecurity, privacy, or digital trust missions. They are NGOs with their own governance and aren't tied to one agency.</p>
<p>Their work is more project-based and non-recurring, which means they have to clearly demonstrate value and seek renewal or new grants continuously.</p>
<p>There are a lot of federally supported non-profits, including several well-known ones. Here are a few highlights:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/regular-nonprofits-list.png" class="kg-image" alt="" loading="lazy" width="830" height="751" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/04/regular-nonprofits-list.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/regular-nonprofits-list.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Many of the outputs of federally supported nonprofits are highly visible. One of the most well-known ones is CIS's Critical Security Controls. The National Cybersecurity Alliance also does work on privacy awareness and consumer education on behalf of the Federal Trade Commission (FTC).</p>
<h3 id="public-private-collaboratives">Public-Private Collaboratives</h3>
<p>This is where we start moving away from formal government structures. It's also where the private sector starts coming in.</p>
<p>Public-private collaboratives are exactly what they sound like — partnerships between the government and the private sector to work together on joint cybersecurity, privacy, and trust initiatives.</p>
<p>It's a shared governance model, and both parties contribute time and money. Participation is voluntary. No captive relationships here, at least not directly.</p>
<p>Practically, this means things like information sharing, advisory committees, task forces, joint development of frameworks, coordinated incident response, and co-investment in R&amp;D. A few examples:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/public-private-collaboratives-list.png" class="kg-image" alt="" loading="lazy" width="830" height="999" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/04/public-private-collaboratives-list.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/public-private-collaboratives-list.png 830w" sizes="(min-width: 720px) 720px"></figure><p>The NIST Cybersecurity Framework (CSF) is probably the most widely used and well known output from public-private collaboratives. The federal government covered most of the cost, and the private sector contributed time and expertise.</p>
<p>The DHS/CISA Cybersecurity Advisory Committee and Cyber Safety Review Board (CSRB) highlighted in the table <em>were</em> two other well-known examples. They were <a href="https://thehackernews.com/2025/01/trump-terminates-dhs-advisory-committee.html?ref=content.strategyofsecurity.com">swiftly</a> <a href="https://www.securityweek.com/dhs-disbands-cyber-safety-review-board-ending-one-of-cisas-few-bright-spots/?ref=content.strategyofsecurity.com">disbanded</a> in January 2025.</p>
<p>It seems reasonable to expect that anything created by an executive order from Joe Biden is going to be put to an end. We have two examples already. There are probably more coming.</p>
<h3 id="information-sharing-and-analysis-centers-isacs-and-isaos">Information Sharing and Analysis Centers (ISACs) and ISAOs</h3>
<p>ISACs and ISAOs are special-purpose collaboratives for information sharing and analysis. ISACs are industry/sector-specific, and ISAOs are more general. Bill Clinton signed off on starting these back in 1998, and they're still going strong today.</p>
<p>Most are still nonprofit entities, but they're funded by member companies. The government just supports them, provides some coordination, and supplies warnings and intel (like new malware campaigns the FBI discovers). They're not doing much research, just sharing relevant information.</p>
<p>Financial Services ISAC (FS-ISAC) is the one I've heard about the most, and there are several others:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/isacs-isaos-list.png" class="kg-image" alt="" loading="lazy" width="830" height="1332" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/04/isacs-isaos-list.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/isacs-isaos-list.png 830w" sizes="(min-width: 720px) 720px"></figure><p>The main output of ISACs and ISAOs is information sharing, but they also produce some targeted reports that inform regulators and policymakers.</p>
<p>This is the ideal model (or at least an acceptable one) from the perspective of the current administration. It also seems like a model that could happen without government involvement if needed.</p>
<h3 id="research-nonprofit-grantees-and-independent-rd-organizations">Research Nonprofit Grantees and Independent R&amp;D Organizations</h3>
<p>...colloquially known as think tanks, independent labs, open-source projects, and university centers. These entities exist on their own but receive periodic, project-based funding from the federal government.</p>
<p>Their missions and objectives vary. The spectrum spans all the way from deep technical research to policy research and building community research.</p>
<p>Several of the organizations who fit into this category are well-known, especially the open source projects and technical standards organizations:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/think-tanks-labs-open-source-list.png" class="kg-image" alt="" loading="lazy" width="830" height="1125" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/04/think-tanks-labs-open-source-list.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/think-tanks-labs-open-source-list.png 830w" sizes="(min-width: 720px) 720px"></figure><p>The DOT study I worked on in college (and mentioned at the beginning of the article) loosely fits into this bucket. It was primarily a study in road use taxation, but the research involved a study of the privacy implications resulting from the proposed methods. In this case, the <a href="https://sunflowerstatejournal.com/wp-content/uploads/2021/11/iowastudy-1.pdf?ref=content.strategyofsecurity.com">output</a> was a policy recommendation.</p>
<p>You've definitely heard of the FIDO Alliance, or at least an output they helped bring into reality: <a href="https://www.linkedin.com/feed/update/urn:li:activity:7201252725131460609/?ref=content.strategyofsecurity.com">passkeys</a>. <a href="https://letsencrypt.org/?ref=content.strategyofsecurity.com">Let's Encrypt</a> is another downstream beneficiary who basically brought TLS to the masses.</p>
<h3 id="national-academies-committees-and-boards">National Academies Committees and Boards</h3>
<p>The National Academies of Science, Engineering, and Medicine (MASEM) bring together their own independent expert committees to study specific issues on behalf of Congress or federal agencies.</p>
<p>They can exist as either an ad hoc group for a specific study, or as standing boards/forums around specific topics. Members are independent experts from academia, industry, and former government officials. Their role is purely advisory.</p>
<p>A few examples of cybersecurity-related committees are:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/national-academies-list.png" class="kg-image" alt="" loading="lazy" width="830" height="667" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/04/national-academies-list.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/national-academies-list.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Their main outputs are studies and reports. Rigor, objectivity, and consensus are the name of the game here. They've written on all kinds of topics, including: <a href="https://nap.nationalacademies.org/catalog/25010/decrypting-the-encryption-debate-a-framework-for-decision-makers?ref=content.strategyofsecurity.com#:~:text=Contributor,Intelligence%20Access%20to%20Plaintext%20Information">encryption</a>, <a href="https://www.nationalacademies.org/our-work/cybercrime-classification-and-measurement?ref=content.strategyofsecurity.com#:~:text=Cybercrime%20Classification%20and%20Measurement%20,enabled">cybercrime classification and measurement</a>,  <a href="https://www.nationalacademies.org/our-work/cyber-resilience-workshop-series-ii?ref=content.strategyofsecurity.com#:~:text=Cyber%20Resilience%20Workshop%20Series%20II,resilience%20of%20the%20nation%27s">cyber resilience</a>, and more.</p>
<h3 id="emerging-federally-funded-initiatives">Emerging Federally Funded Initiatives</h3>
<p>There's a lot going on in AI safety, identity, quantum security, and more that doesn't cleanly fit into the buckets we've already discussed. So, we're just going to broadly call these "emerging federally funded initiatives" until they find a home or get cut.</p>
<p>This group is a bit fuzzy, but here are a few examples:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/emerging-initiatives-list.png" class="kg-image" alt="" loading="lazy" width="830" height="837" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/04/emerging-initiatives-list.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/emerging-initiatives-list.png 830w" sizes="(min-width: 720px) 720px"></figure><p>The outputs here vary, but are generally similar to some of the other entity types above: research, reports, and advice for the federal government and the general public.</p>
<h2 id="what-isnt-federally-funded">What isn't federally funded</h2>
<p>Unpacking the laundry list of federally funded organizations may have left you wondering what else is out there and whether it's affected or not. Good for you if you were thinking this far ahead. It's totally reasonable.</p>
<p>The good news is that many of the important organizations in and around our industry are privately funded.</p>
<p>Obviously, public and private cybersecurity companies are neither owned nor funded by the government. Many of our public companies have relatively large federal businesses, though. This has been cause for concern on earnings reports since the election, but it's a different topic than we're talking about here.</p>
<p>A more comprehensive list of non-federally funded organizations is probably a social media post or article of its own. I wanted to include a few highlights just to take a few big names off the board of potential cuts:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/not-federally-funded-list.png" class="kg-image" alt="" loading="lazy" width="830" height="1338" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/04/not-federally-funded-list.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/not-federally-funded-list.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Some of these may seem obvious, and some may not. The outputs of these organizations vary quite a bit, but the part they have in common is immaterial or no reliance at all on federal funding.</p>
<p>Like it or not, this is probably the model going forward. Knowing which organizations are already self-supported is a decent starting point to prove it can be done.</p>
<h2 id="all-of-this-isnt-going-away-but-any-of-it-could">All of this isn't going away, but any of it could</h2>
<p>NVD was not an isolated incident. Near-misses and actual cuts are going to keep happening.</p>
<p>And remember — the situation with NVD&nbsp;isn't&nbsp;even fixed. They just <a href="https://www.nextgov.com/cybersecurity/2025/04/cisa-extends-mitre-backed-cve-contract-hours-its-lapse/404601/?ref=content.strategyofsecurity.com">kicked the can down the road</a> by 11 months.</p>
<p>The message was loud and clear, though: <em>"You have 11 months to fix this before we cut off funding for good."</em></p>
<p>NVD was a wakeup call, but I don't think the sky is falling. DOGE is not going to use this article as a punch list of items for the chopping block.⁴</p>
<p>Several parts are legitimately essential, especially when they're directly supporting national security.</p>
<p>Many of the flagship programs are multiyear appropriations with advance procurement authority. They're harder to cancel, but as we're seeing, anything is possible.</p>
<p>Our federally funded cybersecurity institutions, research, and projects are not <em>all</em> going to get cut.</p>
<p><em>Some</em> of them definitely will, though.</p>
<p>"Cut" is a relative term, too. The impact of a cut varies based on the situation.</p>
<p>One-off work that's already completed will still be available. We just won't get more of it. If MITRE ATT@CK and D3FEND eventually get cut, the frameworks are still there — but it's on us to keep working on them.</p>
<p>Ongoing things will just stop working until someone else maintains them. When funding for the NVD gets cut, the federal government isn't going to up and delete the database. They're just going to stop paying for the updates.</p>
<p>Some things seem like they could be just fine on their own. The ISACs are one good example. So is anything else that's mostly self-funded and self-organized.</p>
<p>A few things will disappear. The DHS/CISA Cybersecurity Advisory Committee and Cyber Safety Review Board (CSRB) committees that were already cut are just gone. They can always be reconvened, of course — but in the meantime, nothing is happening.</p>
<p>The real challenge is going to be the randomness. Much like tariffs, we aren't going to know <em>what</em> is happening or <em>when</em>. We're just going to get <a href="https://www.linkedin.com/posts/tib3rius_breaking-from-a-reliable-source-mitre-activity-7317960862332293120-t6yt?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">sudden announcements</a> like the one MITRE inexplicably put out <em>a day before</em> their funding for CVE was supposed to end.</p>
<p>Acting as though something is going away tomorrow is paranoid, but coming up with a backup plan starting tomorrow is a good idea if it's mission-critical.</p>
<p>This situation is an opportunity, too. A lot of this federally funded stuff just works, but not all that well. I was surprised with how many Centers-For-This and Institutes-For-That existed.</p>
<p>There wasn't overwhelming consensus from the security community on the current state of NVD, either. Several people pointed out the <a href="https://x.com/cyb3rops/status/1912278248995586187/?ref=content.strategyofsecurity.com">questionable timing</a> of the announcement and systemic issues with the program itself. The current system works, but there's room for improvement.</p>
<p>Good or bad, we're in for a turbulent year-plus. Or four. Or longer. Sacred cows will be sacrificed. There is going to be a lot of near-term pain.</p>
<p>I'm still hopeful we can make some good out of this.</p>
<p>There probably are ways our government-backed cybersecurity apparatus could run more efficiently. It very well could be holding the bag for some things the government shouldn't need to be responsible for.</p>
<p>It's a lot to ask of the private sector to take on work the government has operated and/or funded for years. Dismantling decades of work this quickly comes with a ton of risk.</p>
<p>I do know this: the resourcefulness and resilience of Americans (miraculously) never fails.</p>
<hr><h3 id="footnotes">Footnotes</h3>
<p>¹I thought James Berthoty's <a href="https://www.linkedin.com/posts/james-berthoty_okay-its-really-hard-to-say-how-disastrous-activity-7318033864096972802-2TyH?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">"I'm just a vuln" diagram</a> was well done and exceptionally timely. You could roughly think of this research as a commercial, macro-level derivative where we try and explain the organizational structure and financial dependencies for cybersecurity related federal funding.</p>
<p>²I am definitely not the end-all-be-all expert here, though. Please fact check anything you're relying on and send me edits if you find anything wrong.</p>
<p>³This research is only about federal <em>funding</em>. State and Local Government funding is out of scope. So is federal <em>spending</em> — that is, departments and agencies buying cybersecurity products and services (which they do a lot of, too). This was a big topic on the last round of earnings calls, but it's orthogonal to this discussion.</p>
<p>⁴<em>Probably</em> not. Stranger things have happened, though.</p>
]]></content:encoded>
            <category>Ecosystem</category>
            <category>#trending</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/04/header-us-federal-cybersecurity-ecosystem-mapping.png"/>
        </item>
        <item>
            <title><![CDATA[W is for Wiz: Alphabet’s Audacious Acquisition]]></title>
            <link>https://strategyofsecurity.com/w-is-for-wiz-alphabets-audacious-acquisition/</link>
            <guid>67daec6df50bde00017b1878</guid>
            <pubDate>Wed, 19 Mar 2025 16:22:10 GMT</pubDate>
            <description><![CDATA[Starting to make sense of Alphabet, Wiz, and the day that changed the cybersecurity industry forever.]]></description>
            <content:encoded><![CDATA[<p>Alphabet just made one of the biggest bets in the history of cybersecurity.</p>
<p>Maybe all of tech.</p>
<p>Yesterday was an industry-defining day. You'll remember where you were and what you were doing the day you found out Alphabet acquired Wiz.¹</p>
<p>It was the day cybersecurity's future veered in a radically different direction.</p>
<p>As Alphabet's founders famously said in a shareholder letter 21 years ago, "Google is not a conventional company. We do not intend to become one."</p>
<p>It takes one to know one.</p>
<p>Wiz is anything but a conventional cybersecurity company — which, ironically, led Alphabet to make the most unconventional acquisition in its history.</p>
<p>Just like that, the spectacular rise of Wiz as an independent company appears to be over. It's changing course and continuing the ride aboard a blue, red, yellow, and green-colored rocketship.</p>
<p><em>And I have so many questions about what all of this means.</em></p>
<p>Let's start by talking about how massive this deal was in economic terms, then work our way through the strategic and competitive impact.²</p>
<h3 id="just-how-big-of-a-deal-was-this-really">Just how big of a deal was this, really?</h3>
<p>Short answer: one of the largest deals in history across almost any measure.</p>
<p>This deal is basically in a class of its own — definitely in cybersecurity, and arguably across all of tech.</p>
<p>Alphabet is buying Wiz for one of the highest (disclosed) revenue multiples in the history of large cybersecurity M&amp;A.</p>
<p>Wiz falls somewhere between a 45-65x revenue multiple based on current estimates. Their most recent public disclosure was $500 million of ARR. Sources said their current ARR is closer to $700 million. They were reportedly on track for $1 billion later this year.</p>
<p>This is how Wiz's multiple compares to a selection of other high-profile deals in cybersecurity:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/alphabet-wiz-cybersecurity-comps.png" class="kg-image" alt="" loading="lazy" width="830" height="1036" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/03/alphabet-wiz-cybersecurity-comps.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/alphabet-wiz-cybersecurity-comps.png 830w" sizes="(min-width: 720px) 720px"></figure><p>There's only one other cybersecurity-related transaction with a relatively similar profile: Okta's acquisition of Auth0 in 2021.</p>
<p>I say <em>relatively</em> similar because Wiz's ARR is much higher than Auth0 had at the time of acquisition, among other reasons. The Okta-Auth0 deal had a 42.7x revenue multiple, which is easily the highest among large ($2.5B+) cybersecurity acquisitions that have actually closed.</p>
<p>But Auth0's revenue was much smaller when they were acquired. Okta was also a much smaller acquirer. They're a big company, but nowhere near the scale of Alphabet.</p>
<p>The story doesn't end there, though.</p>
<p>Alphabet's proposed acquisition price for Wiz had among the highest dollar values and revenue multiples we've ever seen in the <em>entire software industry</em>.</p>
<p>Here's a look at the most relevant comps for software M&amp;A³:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/alphabet-wiz-tech-comps.png" class="kg-image" alt="" loading="lazy" width="830" height="1048" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/03/alphabet-wiz-tech-comps.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/alphabet-wiz-tech-comps.png 830w" sizes="(min-width: 720px) 720px"></figure><p>WhatsApp is the undisputed champion of the world for billion-dollar-plus M&amp;A revenue multiples. Meta (then Facebook) paid $17.2 billion for ~$30 million of revenue (according to PitchBook, reportedly lower in other sources). That's a ~573x revenue multiple!</p>
<p>It's a consumer app with a completely different business model, though. I only included this example to show how high the ceiling can go with a motivated strategic buyer.</p>
<p>The Adobe-Figma deal (RIP) is a more accurate comp (even though it didn't close) because it has a similar size and narrative to Alphabet-Wiz. Mainly: it costs a lot of money to buy a market-leading growth company in its prime. A 50x multiple in the case of Figma. Wiz is right around the valuation Adobe was willing to pay for Figma.</p>
<p>The rest of this chart looks like a hall of fame for software industry M&amp;A — large B2B acquisitions that mostly turned out well.</p>
<p>Microsoft-GitHub is a good example because revenue was relatively similar at the time of purchase. GitHub is now a $1B+ business unit for Microsoft.</p>
<p>SAP-Qualtrics also had similar revenue scale. The acquisition didn't last, but it was still a fairly good outcome. Qualtrics was spun off as a public company and later taken private again for $12.5B.</p>
<p>Alphabet is paying a lot for Wiz, but deals like this aren't completely unheard of. Buying one of the top startups in cybersecurity is expensive, and paying top dollar is what it takes to make a deal like this happen.</p>
<h3 id="why-is-wiz-worth-so-much-to-alphabet">Why is Wiz worth so much to Alphabet?</h3>
<p>To answer why Wiz is worth $32 billion to Alphabet, we need to look at a trillion-dollar question⁴: <em>What will it take to win the public cloud infrastructure market?</em></p>
<p>This is the problem at hand for Alphabet and Google Cloud today:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/cloud-infra-market-share-q424.png" class="kg-image" alt="" loading="lazy" width="830" height="783" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/03/cloud-infra-market-share-q424.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/cloud-infra-market-share-q424.png 830w" sizes="(min-width: 720px) 720px"></figure><p>They're the number three cloud provider by market share, hovering around 10% for years at a <a href="https://www.linkedin.com/posts/jamin-ball-49366137_cloud-giants-update-aws-amazon-115b-activity-7293381023696830465-uaga?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">$48 billion annual run rate</a>. AWS is over double the size of Google Cloud. You know Alphabet doesn't like losing to Microsoft, either.</p>
<p>Wiz is a big part of Alphabet's answer for how they're going to beat AWS and Microsoft. Not the <em>only</em> part, but a big one.</p>
<p>This was a deeply calculated move.</p>
<p>Alphabet&nbsp;didn’t&nbsp;rush out to acquire a competitor. They clearly wanted Wiz.</p>
<p>Sure, there are other cloud security products in the market — including some built by private companies who, on the surface, would have been logical and cheaper acquisition targets.</p>
<p>But there really is no substitute for Wiz.</p>
<p>Buying Wiz is about more than just a cloud security product.&nbsp;It’s&nbsp;a brand. A mystique. A promise. A chance to reinvent Google Cloud and transform it into the cloud infrastructure market leader.</p>
<p>Wiz is the combined cybersecurity and cloud infrastructure market aspirations of Alphabet, all rolled into a bright and shiny $32 billion package.</p>
<p>You have to look way beyond Alphabet's cybersecurity acquisitions to get a true appreciation for the magnitude and strategic importance of Wiz.</p>
<p>Alphabet has done big deals before, with eight other acquisitions over $1 billion. The list includes one other cybersecurity company with their $5.3 billion purchase of Mandiant in 2022:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/alphabet-1b-acquisitions.png" class="kg-image" alt="" loading="lazy" width="830" height="949" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/03/alphabet-1b-acquisitions.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/alphabet-1b-acquisitions.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Cybersecurity is such a big priority for Alphabet that the acquisition price for Wiz is more than $3 billion more than their eight other largest acquisitions combined.</p>
<p>Alphabet acquired Motorola Mobility for $9.6 billion in 2011, which was a high stakes move to solidify their lead in the smartphone market and add in-house hardware manufacturing capabilities. Devices are a huge priority, and the acquisition price for Wiz is $22.4 billion (or 3.3x) higher than Alphabet paid for Motorola Mobility.</p>
<p>Sundar Pichai called Alphabet's shot on investing in cybersecurity years ago. Here's one example from a 2021 earnings call:</p>
<blockquote>
<p>"[Cybersecurity] is definitely an area where we are seeing a lot of conversations, a lot of interest. It's our strongest product portfolio, and we are continuing to enhance our solutions...a definite source of strength, and you'll continue to see us invest here."</p>
</blockquote>
<p>It's one thing to say cybersecurity is strategic. It's another to back it up with over $40 billion in cybersecurity-related acquisitions and billions more in R&amp;D.</p>
<p>Alphabet has been steadily building their cybersecurity portfolio ever since, both organically and inorganically.</p>
<p>It's a classic Jim Collins <a href="https://www.jimcollins.com/concepts/fire-bullets-then-cannonballs.html?ref=content.strategyofsecurity.com">"bullets and cannonballs"</a> concept. Fire bullets to figure out what will work. Once you have validation, fire a cannonball (a big bet):</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/bullets-and-cannonballs-strategy.png" class="kg-image" alt="" loading="lazy" width="830" height="783" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/03/bullets-and-cannonballs-strategy.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/bullets-and-cannonballs-strategy.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Alphabet has been firing bullets in cybersecurity for a few years now. They have some empirical validation with Chronicle and <a href="https://strategyofsecurity.com/the-mirage-of-mandiant/?ref=content.strategyofsecurity.com">Mandiant</a>. Wiz is the cannonball.</p>
<p>An <em>expensive</em> cannonball, no doubt — but well-calibrated cannonballs are the way big companies get outsized results.</p>
<p>The results depend on exactly how well calibrated the cannonball is.</p>
<p>The base case is Alphabet building a strong, relatively standalone cybersecurity business within Google Cloud. They already have a promising security operations business. Adding Wiz is rocket fuel. The base case alone could make Alphabet's cybersecurity investments look brilliant.</p>
<p>The bull case is Alphabet's cybersecurity business driving meaningful market adoption of Google Cloud. It's the answer to the trillion-dollar question. It's Wiz's ticket to ride.</p>
<p>In a trillion-dollar cloud infrastructure game, Alphabet is willing to buy a cybersecurity market leader while it's still private no matter what it costs.</p>
<p>Alphabet simply wasn't willing to take "no" for an answer. Not for the company they so clearly wanted.</p>
<p>Tuck-in acquisitions alone weren't going to get the job done. Audacious moves are part of the territory, and&nbsp;that’s&nbsp;exactly what we saw happen here.</p>
<p>The full answer to the trillion-dollar question is a complex, multi-part strategy, of course — but becoming the cybersecurity leader among public cloud infrastructure providers is one of the best shots Alphabet has at winning the market.⁵</p>
<h3 id="why-did-wiz-decide-to-sell-this-time">Why did Wiz decide to sell this time?</h3>
<p>As they say, everyone has a number. I'm sure their reasoning is a lot more nuanced, but price is one of the main factors that changed between last July and today.</p>
<p>$23 billion is a lot to begin with, but $9 billion more is a big deal. Wiz sold for 39.1% higher just by waiting this out for nine months.</p>
<p>Marc Andreessen was still probably pounding the table yelling at the founders not to sell (like he famously and successfully <a href="https://www.businessinsider.com/marc-andreessen-told-mark-zuckerberg-not-to-sell-facebook-for-1-billion-2015-5?ref=content.strategyofsecurity.com">did to Mark Zuckerberg</a> at Facebook), but the reality is this was too much money for Wiz and its other investors to turn down. He'll get over it once the wire hits a16z's bank account.</p>
<p>Another major factor that changed was CrowdStrike. The Wall Street Journal <a href="https://www.wsj.com/business/deals/google-near-23-billion-deal-for-cybersecurity-startup-wiz-622edf1a?ref=content.strategyofsecurity.com">reported</a> Alphabet's offer to buy Wiz on July 14, 2024 — the beginning of a fateful week in cybersecurity industry history.</p>
<p>CrowdStrike caused a massive IT outage five days later. Wiz declined Alphabet's offer shortly after, partly due to the opportunity presented by CrowdStrike's uncertain future during a time where their situation looked dire.</p>
<p>Nine months later, CrowdStrike has ostensibly <a href="https://www.linkedin.com/posts/colegrolmus_sentinelone-just-reminded-us-you-can-have-activity-7307437996817993728-2w4I?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">put the incident behind them</a>. They look stronger than ever as a company with no meaningful decline in financial performance from the incident.</p>
<p>That's not to say Wiz isn't competitive against CrowdStrike in cloud security — just that the path to victory looks a lot better without CrowdStrike.</p>
<p>The third major factor is the state of public markets and the IPO window. The good news is that we <em>have</em> an IPO window in the first place. SailPoint <a href="https://strategyofsecurity.com/p/sailpoints-second-act/">went public</a> already. Wiz was at the <a href="https://strategyofsecurity.com/p/cybersecuritys-ipo-pipeline-2025-candidates/">top of the list</a> of remaining candidates in the pipeline.</p>
<p>The bad news is markets have been unstable so far in 2025. The S&amp;P 500 is down 8.6% in the past month. Ironically, the market is almost exactly where it was when this whole saga started in July 2024.</p>
<p>Wiz almost certainly would have been the largest cybersecurity IPO in history...but could they have topped a $32 billion valuation? I don't think so, at least not right away.</p>
<p>They still had the option to keep going and wait things out — but again, everyone has a number. I don't blame them for taking $32 billion to the bank now over a much longer and less certain path to...<em>someday, maybe</em>...topping $32 billion the hard way.</p>
<p>I called this cybersecurity's <a href="https://www.linkedin.com/posts/colegrolmus_wiz-walking-away-from-alphabet-is-cybersecuritys-activity-7221524085506195456-fLOi?utm_source=share&utm_medium=member_desktop">"Zuckerberg moment"</a> the first time around. As it turns out, it was more like cybersecurity's <a href="https://www.startups.com/founder-interviews/kevin-systrom?ref=content.strategyofsecurity.com">Instagram moment</a> instead — a high-profile exit with a reasonable chance at a "better together" story.</p>
<h3 id="is-this-acquisition-going-to-get-past-regulatory-approval">Is this acquisition going to get past regulatory approval?</h3>
<p>Yes, I think it will. Other than CrowdStrike, a hostile regulatory environment for M&amp;A was the other reason the Alphabet-Wiz deal fell apart the first time around.</p>
<p>There are still questions about the new administration's stance on M&amp;A with the HP-Juniper acquisition being held up, but this one looks a lot different.</p>
<p>It’s easier to make a monopoly argument in an old-ish industry segment like secure networking and a transaction oriented around market share between large, established players.</p>
<p>I don’t know how a regulator could argue against there being intense competition in the cloud security market, even with Alphabet owning Wiz.</p>
<p>Regulatory approval certainly isn't a slam dunk. It's going to face intense scrutiny, lobbying by competitors, and probably delays. But the probable outcome is a close sometime in 2025 or early 2026.</p>
<h3 id="what-does-this-mean-for-alphabet-and-wiz-going-forward">What does this mean for Alphabet and Wiz going forward?</h3>
<p>This could be a whole article in itself, so I'm going to focus on two things: corporate strategy and retention.</p>
<p>Alphabet buying Wiz means they are pot committed to seeing their cybersecurity strategy through. As wild as it sounds, that <em>wasn't the case</em> before acquiring Wiz. Not even after spending $4.5 billion on Mandiant.</p>
<p>Mandiant is a rounding error for a company like Alphabet. They can afford Wiz, but you can bet they're going to put their full resources behind making this acquisition successful once it closes.</p>
<p>Perhaps ironically, I suspect this means <em>more</em> acquisitions. Who, what, and when are a separate discussion — I'm just saying they have now proven they're willing to do whatever it takes to be a major cybersecurity player now.</p>
<p>Retention of Wiz's amazingly talented team is a central pillar of this strategy actually working in practice. Wiz is Wiz because they have one of the best teams ever assembled across every aspect of their business — product, engineering, GTM, you name it. The longer they can keep Wiz's execution functioning at a high level, the better this deal is going to look.</p>
<p>...but they're probably going to have a hard time retaining the team. Founders and key employees are easy enough — they have lockup periods, earnouts, and other incentives in deals like this. Alphabet kept the Mandiant team as long as they could, but it's been slowly trickling away across all levels.</p>
<p>Wiz is going to end up being one of cybersecurity's biggest and best mafias. We're probably going to see multiple successful companies founded by Wiz alumni in the next five years, and multiple more funded by the wealth this exit just created.</p>
<p>Builders gonna build, and there is only so much Alphabet can do about that.</p>
<h3 id="what-does-this-mean-for-customers">What does this mean for customers?</h3>
<p>Let me tell you what it <em>doesn't</em> mean: mass defection of Wiz's existing customers to competitors.</p>
<p>We've seen different versions of this movie before — some major event happens, FUD takes over, and lots of people speculate about mass defection of customers and the end of times for the company.</p>
<p>That's not going to happen, especially if Alphabet plays its cards right and successfully positions Wiz as a standalone, multi-cloud security product.</p>
<p>Are some customers going to have concerns about Wiz being owned by Google Cloud and churn out? Of course. Those are edge cases, not a majority.</p>
<p>Just because there are grumblings and paranoia about the nefarious things Alphabet might do with Wiz doesn't mean customers are going to pick up and leave. Imagine going to your CFO (after already pounding the table to buy Wiz) and saying you want a new cloud security product now because of...<em>reasons.</em></p>
<p>Get out of my office.</p>
<p>The base reality for enterprises today is a multi-cloud, multi-vendor existence. If they're already using Wiz and love it, which <a href="https://www.linkedin.com/posts/kelleymak_blockbuster-deal-between-wiz-and-google-activity-7307782981408935936-oANa?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">a lot of people do</a>, they're not going anywhere.</p>
<p>Back to the execution and retention points: this changes years later if Wiz can't maintain the pace and quality of execution its pre-acquistion customers expect. We're years away from that. The near-term customer impact is going to be minimal.</p>
<h3 id="what-does-this-mean-for-competitors">What does this mean for competitors?</h3>
<p>It's a mixed bag, but Wiz being acquired is more good than bad news for competitors. Especially their pure-play cybersecurity competitors.</p>
<p>Wiz no longer being an independent company eliminates one of the biggest threats (the SWOT definition of threat, that is) for larger cybersecurity competitors like Palo Alto Networks and CrowdStrike. Yes, there was and will continue to be competition at the product level in cloud security. That's fine.</p>
<p>The big competitive win here is Wiz not becoming a large public company and continuing to grow its platform. Wiz is still going keep building its platform, but in a different, Google Cloud-oriented way than it would have as a standalone company.</p>
<p>The gap between the large, multi-domain cybersecurity companies and everyone else looks a whole lot wider without Wiz.</p>
<p>The news isn't quite as good for Google Cloud's competitors in the public cloud infrastructure market.</p>
<p>AWS and Microsoft have to take Google Cloud more seriously. It's not like Alphabet was totally off the radar before they bought Wiz, though. The competition is still going to be intense across multiple fronts —&nbsp;especially in AI, and now in cybersecurity.</p>
<p>But remember, Google Cloud is still sitting at number three. There's a long, arduous journey between announcing a major acquisition like Wiz and becoming the number one cloud provider.</p>
<p>The biggest implication I hope we'll see as an industry is AWS and Microsoft taking their cybersecurity businesses more seriously. I don't expect this will set off a major acquisition spree by either company, but it does raise the competitive bar in a meaningful way.</p>
<h3 id="what-does-this-mean-for-partners">What does this mean for partners?</h3>
<p>Cybersecurity partnerships have complex dynamics. The impact really depends on the type of partnership, incentives, competitive positioning, and many other factors.</p>
<p>One major theme I do have conviction about: we're not going to see a mass defection of partners from either Google Cloud or Wiz.</p>
<p>There is some risk to Wiz itself on the partner side. Roughly <a href="https://www.linkedin.com/posts/colegrolmus_this-is-one-of-the-most-surprising-stats-activity-7223719045211009025-zCP8?utm_source=share&utm_medium=member_desktop">50-60% of their revenue</a> goes through marketplaces. Assuming this revenue is roughly distributed by cloud infrastructure market share, only ~10% of it is coming from Google Cloud. Having ~90% of your marketplace revenue in flux is a big risk, but it's definitely not insurmountable.</p>
<p>As we discussed in the last section, this move has the biggest impact on AWS and Microsoft, Google Cloud's direct competitors in the cloud infrastructure market. They're obviously going to be more paranoid and less forthcoming about product roadmaps and collaborations with Wiz.</p>
<p>They're not going to kick Wiz out of their marketplaces or take any other drastic action, though. They might <em>want</em> to, but other parties affect their decisions.</p>
<p>Limiting customer choice isn't a good look with regulators already scrutinizing their broader business practices. More importantly, if customers want to buy Wiz, it's foolish not to let them. AWS and Microsoft will happily take their cut of Wiz's revenue and keep their own cloud infrastructure customers happy.</p>
<p>Don't expect them to help out on the GTM side, though. Any boost Wiz got from AWS and Microsoft sales teams is effectively over. Alphabet obviously knew this and was willing to absorb the hit.</p>
<p>Most other channel and technology partners are going to start taking their Google Cloud partnerships a lot more seriously. This was already trending up, but acquiring Wiz accelerates partner effort and investment.</p>
<p>Large <a href="https://www.linkedin.com/posts/colegrolmus_global-system-integrators-gsis-are-the-activity-7300930950262149121-i4pW?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">cybersecurity GSIs</a> were already taking Google Cloud seriously based on their recent traction in the SIEM market. But, believe it or not, they weren't all that serious about Wiz yet. GSIs are deeply skeptical of startups, and it was hard to know with certainty whether Wiz was a passing fad or the next big thing in cybersecurity.</p>
<p>Google Cloud owning Wiz is the best possible scenario in the eyes of a GSI. They already have multi-billion dollar partnerships with Google Cloud. The acquisition gives them enough certainty that Wiz is here to stay. It slides in nicely as another large cybersecurity service offering to build under the Google Cloud alliance.</p>
<p>I expect status quo for most other technology partners post-acquisition. Cybersecurity already exists in a state of co-opetition, with many competing companies and products begrudgingly integrating with each other to meet shared customer needs.</p>
<p>The Check Point and Cisco partnerships that were recently announced are probably the most unique and impactful technology partnership changes from the acquisition.</p>
<p>Cisco looks like the least impacted of the two. They generally have a co-opetition relationship with Google Cloud, so they may decide to proceed as planned. But, this also increases the probability they decide to enter the CNAPP market and acquire one of Wiz's competitors.</p>
<p>Check Point has a bigger strategic decision on their hands — and not an ideal one for the first major partnership of the <a href="https://www.linkedin.com/posts/colegrolmus_checking-in-on-check-point-im-overdue-activity-7298764650366586880-EEbB?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">Nadav Zafrir era</a>. They were set to migrate customers from its CloudGuard CNAPP platform to Wiz under the terms of this partnership. That may still happen, but they may also rethink their situation and take another look at build and buy scenarios to stay in the CNAPP market.</p>
<h3 id="what-does-this-mean-for-the-industry">What does this mean for the industry?</h3>
<p>Wiz exiting feels bittersweet. It's a good outcome, but I worry about the long-term implications on the industry side.</p>
<p>Putting one of the largest exits in the history of tech on the board is a big win for the cybersecurity industry at large. It's de facto validation for everything we've been doing and the importance of cybersecurity in the broader tech landscape.</p>
<p>An acquisition this large also makes it (more) okay for other large strategic buyers to pay high multiples for cybersecurity market leaders. A lot of this is driven by comps, and this completely resets the benchmark during a time where <a href="https://strategyofsecurity.com/p/no-way-out-the-changing-world-of-cybersecurity-exits/">more large exits are needed</a>.</p>
<p>Wiz is unique in so many ways, though. The size and scale of its exit doesn't automatically mean we're going to see other cybersecurity unicorns attracting the same level of interest and capital. It doesn't hurt, though.</p>
<p>On the other hand, Wiz was almost certainly going to be cybersecurity's largest ever IPO. $32 billion looks good in the near-term, but we'll never know what would have happened if Wiz had a sustained run as an independent company.</p>
<p>It sure looked like Wiz had a shot at reaching a $100B+ valuation someday. Now, we'll never know.</p>
<p>I keep wondering if cybersecurity has a glass ceiling we haven't fully recognized yet.</p>
<p>Early stage market leaders are <a href="https://strategyofsecurity.com/p/themes-from-and-beyond-altitude-cybers-2024-cybersecurity-year-in-review/">being acquired early</a>. IPOs are a meaningful milestone, but even reaching public markets is <a href="https://strategyofsecurity.com/p/cybersecurity-is-going-private/">no guarantee</a> a company will stay there.</p>
<p>Wiz being acquired is a visceral reminder that very few standalone cybersecurity companies are untouchable. Two, to be exact: Palo Alto Networks and CrowdStrike. Anyone else is up for grabs at any time.</p>
<p>Wiz might have hit the glass ceiling on the 100th floor, but it was still there.</p>
<p>Larger tech industry dynamics were at play here. Nothing is off limits when trillion-dollar questions are hanging over the heads of the largest and most powerful companies in the world.</p>
<p>Remember: cybersecurity is a pawn in a much larger game of chess.</p>
<hr><h3 id="footnotes">Footnotes</h3>
<p>¹I know, I know: Alphabet <em>announced their intent</em> to acquire Wiz. We'll get to the "will this actually close" question later in the article.</p>
<p>²I wrote this article as fast as I could. I stopped counting how many cups of coffee I drank. I'm sure I missed a lot of details and potential considerations. Please cut me some slack in the spirit of moving fast :)</p>
<p>³This data isn't a banker-level comp set, so don't make any serious decisions from it. I just wanted to give you some context on where the valuation for this potential deal stands against recent history.</p>
<p>⁴<em>Trillion-dollar question</em> is a favorite a16z phrase for big questions with significant industry and market impact.</p>
<p>⁵The other is AI, which is another trillion-dollar question. This tells us a lot about how high the stakes are for Alphabet. They're facing multiple trillion-dollar questions at the same time.</p>
]]></content:encoded>
            <category>M&amp;A</category>
            <category>#Alphabet</category>
            <category>#Wiz</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/header-alphabet-wiz-acquisition-2.png"/>
        </item>
        <item>
            <title><![CDATA[Themes From (And Beyond) Altitude Cyber's 2024 Cybersecurity Year In Review]]></title>
            <link>https://strategyofsecurity.com/themes-from-and-beyond-altitude-cybers-2024-cybersecurity-year-in-review/</link>
            <guid>67c1fa0915bf570001a1e1d0</guid>
            <pubDate>Fri, 28 Feb 2025 18:42:22 GMT</pubDate>
            <description><![CDATA[A deeper look into ten of the most interesting insights from Altitude Cyber's 2024 Cybersecurity Year In Review.]]></description>
            <content:encoded><![CDATA[<p>Altitude Cyber released the 2024 edition of its legendary <a href="https://drive.google.com/file/d/1n7sa5YRWG68efHIofklmhHSOybFY4vyd/?ref=content.strategyofsecurity.com">Cybersecurity Year In Review</a> report at the end of January. It's the best of the best information for the commercially-minded people in our industry.¹</p>
<p>It's so good that I poured my whole month of research this February into analyzing the report.</p>
<p>I've either <a href="https://strategyofsecurity.com/p/themes-from-and-beyond-altitude-cybers-2023-cybersecurity-year-in-review/">reviewed</a> or helped produce the report five times now.² After a thousand-some hours in total, I'm dialed in on spotting subtle trends and anomalies in the data.</p>
<p>An added bonus for this year is our new <a href="https://www.linkedin.com/posts/konstantinosboukouris_excited-to-announce-altitude-cybers-new-activity-7246947927057657856-bQBZ?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">content partnership</a>, which gives me access to the full resources of the Altitude Cyber team for this article, social media posts, and more.</p>
<p>It's a rare opportunity for me to look behind the data, think about what all of it means, and tell you what we've found together.</p>
<p>Here are the ten most interesting insights I found and what they mean for the industry, starting with Altitude Cyber's specialty —&nbsp;M&amp;A.</p>
<h2 id="ma-activity-is-stable-but-the-mix-of-buyers-and-targets-are-shifting">M&amp;A: Activity is stable, but the mix of buyers and targets are shifting</h2>
<p>The tale of cybersecurity M&amp;A is <em>"smooth sailing with strong undercurrents."</em></p>
<p>For all the choppiness on the financing side (we'll get to that), and <em>&lt;name your favorite reason why tech M&amp;A has been unstable&gt;</em>...cybersecurity-related M&amp;A activity has been remarkably steady in the past four years.</p>
<p>We've just been chugging along at ~280 deals and $50-ish billion of (disclosed) dollar volume per year.</p>
<p>Smooth sailing, right? Kind of, but there's a lot more to the story.</p>
<h3 id="ma-hit-an-inflection-point-in-2021-then-stabilized">M&amp;A hit an inflection point in 2021, then stabilized.</h3>
<p>The multi-year cybersecurity M&amp;A activity trend is more interesting than any single year alone. 2021 accelerated M&amp;A activity in a big way, and it's stayed relatively high ever since:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/annual-ma-dollar-volume-since-2016.png" class="kg-image" alt="" loading="lazy" width="830" height="592" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/02/annual-ma-dollar-volume-since-2016.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/annual-ma-dollar-volume-since-2016.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Annual dollar volume (the total of all <em>disclosed</em> cybersecurity-related M&amp;A transactions) averaged $21.5 billion per year for the five-year period from 2016 to 2020. It spiked to $80.9 billion in 2021, then settled in at a $58.5 billion per year average since then.³</p>
<p>The average is still at $51 billion per year <em>without</em> 2021, though. That's over double the average dollar volume from 2016-2020.</p>
<p>It's a similar story for annual deal counts (the literal count of cybersecurity-related transactions, disclosed or not):</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/annual-ma-deal-count-since-2016.png" class="kg-image" alt="" loading="lazy" width="830" height="592" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/02/annual-ma-deal-count-since-2016.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/annual-ma-deal-count-since-2016.png 830w" sizes="(min-width: 720px) 720px"></figure><p>The average count from 2016-2020 was 178 deals. We hit an inflection point, and 2021-2024 was much busier at 280 deals per year.</p>
<p>Sure, 2021 was peak hype for both cybersecurity and tech — but we've clearly settled into a new normal for cybersecurity M&amp;A. We're going to see a sustained increase in both total deals and dollars spent on acquisitions.</p>
<p>It's smooth sailing now, but here's where the <em>"strong undercurrents"</em> part comes in.</p>
<h3 id="strategic-buyers-are-more-active-than-theyve-ever-been">Strategic buyers are more active than they've ever been.</h3>
<p>Strategic buyers accounted for 62% of all deals in 2024 (174 total) —&nbsp;the highest total deal count ever recorded.</p>
<p>It's a subtle but significant shift. We're talking about hundreds of transactions and billions of dollars here.</p>
<p>Strategic buyers always have more total acquisitions per year than financial buyers (there are more of them). But since 2020, the proportion had been shifting towards private equity — until this year:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/annual-ma-deal-count-proportion-since-2019.png" class="kg-image" alt="" loading="lazy" width="830" height="698" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/02/annual-ma-deal-count-proportion-since-2019.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/annual-ma-deal-count-proportion-since-2019.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Put another way: we had a stretch where financial buyers were more active in the industry than they were historically. This was partly due to a major increase in <a href="https://strategyofsecurity.com/p/cybersecurity-is-going-private/">take-private activity</a>, and also because investors took a shine to acquiring cybersecurity companies.</p>
<p>Strategic buyers are back. I expect the trend to continue as valuation expectations adjust and many of the ZIRP-era companies look for reasonable exits.</p>
<p>There's a bigger picture interpretation of this trend that could be even more significant, though.</p>
<p>A macro-level shift back towards strategic buyers is one thing, but the <em>overall mix</em> of the strategic buyers tells us even more about the future of cybersecurity M&amp;A.</p>
<h3 id="the-biggest-acquisitions-were-made-by-non-cybersecurity-buyers">The biggest acquisitions were made by non-cybersecurity buyers.</h3>
<p>The current shift back towards strategics includes a growing minority of "non-traditional" buyers.</p>
<p>Case in point: most of the largest M&amp;A transactions that occurred during the year were led by cybersecurity-related companies, not pure-play cybersecurity companies.</p>
<p>Half of the ten largest acquisitions from 2024 were made by strategics with a majority of revenue generated <em>outside</em> of cybersecurity. Only one of the ten largest acquisitions (CyberArk's $1.5B <a href="https://www.linkedin.com/feed/update/urn:li:activity:7198345514554130433/?ref=content.strategyofsecurity.com">acquisition of Venafi</a>) was by a pure-play cybersecurity company.⁴</p>
<p>Another example is the <a href="https://www.linkedin.com/posts/colegrolmus_i-never-realized-just-how-many-financial-activity-7245092624313782272-x4C_?ref=content.strategyofsecurity.com">trend of financial services buyers</a> acquiring cybersecurity-related companies. It's a multi-year trend, but Mastercard's $2.65 billion <a href="https://strategyofsecurity.com/p/the-strategic-impact-of-mastercards-recorded-future-acquisition/">acquisition of Recorded Future</a> was one of the largest deals of 2024.</p>
<p>I take these data points as signals that cybersecurity capabilities are starting to be viewed as core components of broader business strategies, not just an isolated field.</p>
<p>We're going to keep seeing <a href="https://strategyofsecurity.com/p/the-convergence-of-cybersecurity-and-everything/">more convergence</a> and "hybrid" acquisitions where cybersecurity is wrapped into adjacent offerings (cloud, data analytics, payment networks, etc.).</p>
<p>Buyers from outside the industry aren't the only change in the mix of strategic buyers, though. We're seeing some familiar names get back into the M&amp;A game in a big way.</p>
<h3 id="once-quiet-security-giants-are-emerging-as-more-frequent-buyers">Once-quiet security giants are emerging as more frequent buyers.</h3>
<p>It's no surprise to find companies like <a href="https://strategyofsecurity.com/p/ciscos-cybersecurity-shopping-spree-part-1/">Cisco</a> and <a href="https://strategyofsecurity.com/p/the-audacious-future-of-palo-alto-networks/">Palo Alto Networks</a> among the most active strategic acquirers in the industry.  What's surprising is how active some companies that <em>aren't</em> typically viewed as buyers have been — especially in 2024.</p>
<p>Perception lags reality here. Many of these "quiet" players have been steadily active for years but kept under the radar.</p>
<p>Companies like Zscaler, Check Point, Fortinet, and other companies are rising up the charts again:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/breakdown-of-strategic-acquirers-since-2024.png" class="kg-image" alt="" loading="lazy" width="830" height="541" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/02/breakdown-of-strategic-acquirers-since-2024.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/breakdown-of-strategic-acquirers-since-2024.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Zscaler had a steady run of 1-2 small acquisitions per year, then made a splash with their ~$350M acquisition of Avalor in 2024.</p>
<p>Check Point took 2022 off from M&amp;A, then came roaring back with Perimeter 81, Atomsec, and Cyberint for close to a billion in combined deal value.</p>
<p>Fortinet hadn't done a single deal since 2021 until it shocked the world with its <a href="https://www.linkedin.com/posts/colegrolmus_fortinet-needed-to-do-a-transformative-deal-activity-7206341789455134720-QqEN?utm_source=share&utm_medium=member_desktop">acquisition of Lacework</a>. It followed that deal up with two other deals for Next DLP and Perception Point in 2024, which put them in a tie with CrowdStrike at seven acquisitions over a five year period.</p>
<p>Throw in Rapid7 and Tenable at six acquisitions apiece, and we've got a pretty interesting mix of strategic buyers beyond the likes of Cisco and Palo Alto Networks.</p>
<p>The dynamics among buyers are changing, but there's also an interesting shift happening with the companies who are <em>being</em> acquired.</p>
<h3 id="startups-are-getting-acquired-earlier-than-ever-before">Startups are getting acquired earlier than ever before.</h3>
<p>Does it feel like cybersecurity startups are just getting acquired younger and younger?</p>
<p>Don't worry, it's not just you getting old. <em>(Okay, we might be getting old, but still...)</em></p>
<p>You're right. The data shows that early-stage startup exits are increasing:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/deals-by-time-to-exit-trend.png" class="kg-image" alt="" loading="lazy" width="830" height="588" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/02/deals-by-time-to-exit-trend.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/deals-by-time-to-exit-trend.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Acquisitions of companies younger than three years old jumped from 10% to 15% of deals in 2024. Early stage acquisitions are still a minority of deals by proportion, but a 5% jump is still a big deal.</p>
<p>We could be seeing the beginning of a "glass ceiling" phenomenon where hot early-stage startups get acquired at massive premiums before they get a chance to grow into our next big cybersecurity companies. This starts looking even more plausible when you include the targets in the 3-5 year age range.</p>
<p>So, why is this happening? Lots of reasons, but here are two.</p>
<p>Large acquirers want novel capabilities quickly. Rather than waiting for companies to scale, they make "preemptive" acquisitions and buy them early. Avalor, Gem, Dazz, Eureka, Flow, and Oxeye were all among the leaders in emerging markets who were acquired in 2024.</p>
<p>The other reason is relative value. Earlier stage companies who have raised less capital than comparable later stage companies in the same market aren't as expensive to acquire. Resmo, PingSafe, Vantyr, Wib, and BreachQuest are all examples from the year.</p>
<p>If the story of M&amp;A in 2024 was all about micro-level changes, the plight of financing was a hard reset. Let me tell you why.</p>
<h2 id="financing-more-activity-and-a-shift-towards-safe-or-speculative">Financing: More activity, and a shift towards safe or speculative</h2>
<p>The best possible news about cybersecurity financing in 2024 is that both deal count and total funding are up from 2023.</p>
<p>I know this seems like a small win, but trust me — we needed a small win.</p>
<p>We were in a pretty vicious downward spiral since cybersecurity industry financing peaked in 2021. Investment levels were still well above average in mid-2022, then cratered towards the back half of the year.</p>
<p>There were really no meaningful signs of recovery in 2023. A tiny, tiny bit of hope returned in 2024. Any positive trend is huge, and we got it last year.</p>
<p>Let's talk some more about what our new reality looks like.</p>
<h3 id="a-reset-to-the-pre-boom-baseline">A reset to the pre-boom baseline.</h3>
<p>It's (unfortunately) safe to say that cybersecurity financing has returned (regressed?!) to pre-2021 levels. Total funding in 2024 was $13.2 billion, up 40% from 2023's abysmal $9.4 billion. Deal count was also up 16%.</p>
<p>2024 was a much more active year, for sure. But historically, total dollar volume looked a lot more similar to 2019 (and earlier) than 2021:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/financing-dollar-volume-trend.png" class="kg-image" alt="" loading="lazy" width="830" height="609" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/02/financing-dollar-volume-trend.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/financing-dollar-volume-trend.png 830w" sizes="(min-width: 720px) 720px"></figure><p>An interesting quirk was total deal count, which was 24% above the average from 2017-2020 despite relatively comparable dollar volume:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/financing-deal-count-trend.png" class="kg-image" alt="" loading="lazy" width="830" height="609" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/02/financing-deal-count-trend.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/financing-deal-count-trend.png 830w" sizes="(min-width: 720px) 720px"></figure><p>But in general, the takeaway is that we're back to the pre-2021 baseline for financing.</p>
<p>I take this as both good and bad news.</p>
<p>The bad news is mostly for founders, investors, and employees who are still clinging to the hope that 2021-like financing activity (and valuations) will return. They won't — at least not any time soon.</p>
<p>Things got super out of hand from 2021-2022. That's an anomaly.</p>
<p>Bad things happen when too much capital is flowing into an industry and valuations get inflated. We've hit a point where there's <a href="https://strategyofsecurity.com/p/no-way-out-the-changing-world-of-cybersecurity-exits/">no (good) way out</a> for a material part of an entire generation of companies who are fighting to live up to their valuations.</p>
<p>The good news is that our current baseline is probably where we should be. Companies that have raised or will be seeking capital at post-2022 levels are (for the most part) raising at more responsible amounts and reasonable valuations.</p>
<p>Accepting our new baseline is the practical and mature way of looking at financing going forward. Sure, it stings — but it's a lot better than down rounds, layoffs, fire sales, and other alternatives.</p>
<p>That's not to say cybersecurity companies <em>can't</em> raise large rounds, though.</p>
<h3 id="massive-financing-rounds-are-more-rare-but-theyre-still-happening">Massive financing rounds are more rare, but they're still happening.</h3>
<p>Given our new reality in financing, it shouldn't be a surprise that the number of massive ("massive" = ~$200-million-plus for cybersecurity) financing rounds is down compared to 2021-2022 levels.</p>
<p>2024 did have a few, though — another small but important win.</p>
<p>There were ten cybersecurity-related rounds at $200 million or higher, including two $300 million rounds by Cyera alone:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/large-financing-rounds-2024.png" class="kg-image" alt="" loading="lazy" width="830" height="1112" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/02/large-financing-rounds-2024.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/large-financing-rounds-2024.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Wiz’s billion-dollar round more or less overshadowed everything else, with the next largest round (Kiteworks at $466M) at less than half the size.</p>
<p>The story of financing in 2024 gives us a pretty good idea of how big the reset was. Here's the story in visual form:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/large-financing-rounds-trend.png" class="kg-image" alt="" loading="lazy" width="830" height="652" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/02/large-financing-rounds-trend.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/large-financing-rounds-trend.png 830w" sizes="(min-width: 720px) 720px"></figure><p>There were way, way fewer large financing rounds in 2024 than the tail end of the ZIRP era. Wiz's billion-dollar round still stacks up against the largest rounds in history, but we're not going to see the <em>frequency</em> of large rounds we had in 2021 any time soon.</p>
<p>Why?</p>
<p>In 2024, companies that would have been raising $200M+ during that period did rounds in the $100 million range instead...or not at all.</p>
<p>Going forward, it's going to be a story of outliers. Abundant capital is available for cybersecurity companies with big momentum and clear aspirations of scale. But those are the <em>outliers</em>, not the norm.</p>
<p>Expect ten (or so) large financing rounds per year. That's about where we've been, and where we should be in a healthy and rational version of the industry.</p>
<p>This isn't all about large financing rounds, though. Other stages make up most of the activity — and where the activity is happening has been changing.</p>
<h3 id="early-or-late-not-mid">Early or late, not mid.</h3>
<p>The shifts in the number of capital raises by stage in cybersecurity have been subtle, but the implications are important:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/financing-total-deals-by-stage.png" class="kg-image" alt="" loading="lazy" width="830" height="418" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/02/financing-total-deals-by-stage.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/financing-total-deals-by-stage.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Series A funding was basically flat in 2024, and Series B funding activity was still <em>a little bit</em> down. Early-stage and late-stage activity are on their way back up.</p>
<p>Total dollar volume trends are a similar story, but the differences are even more pronounced:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/financing-total-capital-by-stage.png" class="kg-image" alt="" loading="lazy" width="830" height="400" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/02/financing-total-capital-by-stage.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/financing-total-capital-by-stage.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Series A funding in 2024 was down almost a billion dollars compared to 2022. Series B funding was less than half of 2022.</p>
<p>The Series A and B crunch might <em>seem</em> bad, and I'm sure it <em>feels</em> bad for individual founders and employees at companies caught up in the crunch and struggling to raise.</p>
<p>If we zoom out to the industry level and beyond, we're doing okay given the circumstances.</p>
<p>Across the rest of tech, it's been <em>hard</em> to raise Series A and Series B rounds. Peter Walker at Carta is the authority on <a href="https://www.linkedin.com/posts/peterjameswalker_startups-founders-fundraising-activity-7292988819425923073-KBaU?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">this topic</a>.</p>
<p>The punch line of his team's research is graduation rates at these stages are significantly lower than the ZIRP era. Companies are taking much longer to raise rounds, and many still haven't raised them yet. Some never will.</p>
<p>This Altitude Cyber report didn't go all the way down the rabbit hole into graduation rates, but total capital raises and dollar volume are a decent proxy. Cybersecurity's mid-stage funding decline has been <em>very modest</em> compared to the crater that happened with the rest of tech.</p>
<p>The later stage recovery is the least surprising stage. It's a reflection of the times. As we discussed in the last section, relatively abundant capital is available — but companies have to earn it. Those who do are safe bets.</p>
<p>The recovery of early stage financing isn't a huge surprise to me, either. There's never a shortage of people wanting to start cybersecurity companies. We also have a healthy set of early stage investors across both <a href="https://strategyofsecurity.com/p/syn-ventures-and-the-specialization-of-cybersecurity-venture-capital/">industry specialists and larger agglomerators</a>. Promising early stage companies will keep getting funded.</p>
<p>The investor landscape and activity levels are shifting, though. Things are starting to look different now that the industry hype is back to reasonable levels.</p>
<h3 id="which-investors-are-staying-or-leaving">Which investors are staying or leaving?</h3>
<p>Two of the most interesting observations I noticed in the entire report were how many of the most active investors from 2021-2024 dialed back their activity in 2024, and how many others ramped up activity:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/top-cybersecurity-investors-trend-1.png" class="kg-image" alt="" loading="lazy" width="830" height="489" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/02/top-cybersecurity-investors-trend-1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/top-cybersecurity-investors-trend-1.png 830w" sizes="(min-width: 720px) 720px"></figure><p>I'd be careful about reading too much into this without a detailed look into the data, but it does make me curious about why all of this happened.</p>
<p>Here's what I mean.</p>
<p>Insight Partners has been the most active cybersecurity investor since 2021 with 74 total investments. They were still one of the ten most active in 2024, but their eight investments were down almost half over their five year average.</p>
<p>Ten Eleven, SYN Ventures, Bessemer, and Tiger Global are top ten investors (by volume) since 2021, but not in 2024.</p>
<p>Activity from Sequoia, Accel, and Lightspeed was all stable.</p>
<p>Meanwhile, Andreessen Horowitz, Index, Evolution Equity Partners, and Vertex all cracked the top ten in 2024.</p>
<p>Again, I wouldn't read <em>too much</em> into this based on positive or negative activity variances in a single year. Ten Elevan and SYN Ventures are cybersecurity industry specialists — they're not going anywhere, and they're still doing a lot of deals.</p>
<p>I'm very interested in what the next five years are going to look like, though.</p>
<p>The big question is how many investors (especially the larger agglomerators who are investing in more than cybersecurity) are going to lean in or pull back from our industry based on everything that has changed since 2021-2022.</p>
<p>One cybersecurity market defied all forms of reason and logic in 2024. This goes beyond just M&amp;A or financing. Let's talk about data security.</p>
<h2 id="the-anomaly-data-security-had-a-moment-in-2024">The anomaly: data security had a moment in 2024</h2>
<p>For the first time ever, the data security sector led all industry capital raises. Data security companies raised $2.94 billion in 2024, up 2.5x from $1.16 billion in 2023.</p>
<p>It wasn't just financing. M&amp;A activity was also high, doubling from 12 transactions in 2023 to 24 in 2024.</p>
<p>Altitude Cyber's sector classification includes backup and recovery alongside traditional data security areas like data classification, DLP, DSPM, encryption, and other things you'd expect. As it happened, 2024 was a very active year for basically all of these areas.</p>
<p><a href="https://www.linkedin.com/posts/colegrolmus_cyera-is-cybersecuritys-first-new-unicorn-activity-7183497971152355328-bEhY?utm_source=share&utm_medium=member_desktop">Cyera alone</a> raised $600 million. Several other DSPM companies were acquired or raised capital. The backup and recovery market had its <a href="https://www.linkedin.com/posts/colegrolmus_why-does-the-backup-and-recovery-market-suddenly-activity-7181689899534667776-Ez_f?utm_source=share&utm_medium=member_desktop">most active</a> year ever.</p>
<p>This might only be the beginning of the data security story, too.</p>
<p>Data security is a <a href="https://www.linkedin.com/posts/daniarad_cybersecurity-ciso-marketing-activity-7300863678403223552-dOxe?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAB4EOoBwKBmb4D8BPCVhtDIsTfMc8HtM-Q">top priority (and concern)</a> with AI and transformation programs, especially in larger companies. DeepSeek just <a href="https://www.linkedin.com/posts/colegrolmus_deepseek-just-stress-tested-the-current-state-activity-7290059343897505793-60NP?utm_source=share&utm_medium=member_desktop">stress tested</a> the current state of security controls for AI in every large enterprise. The verdict <a href="https://krebsonsecurity.com/2025/02/experts-flag-security-privacy-risks-in-deepseek-ai-app/?ref=content.strategyofsecurity.com">wasn't good</a>.</p>
<p>We're going to keep hearing stories like this on repeat.</p>
<p>We still have a long way to go on figuring out how to securely use AI. Data security is the best set of tools we have.</p>
<p>2024 was the year data security had a moment, but we're going to look back on this as the inflection point where its trajectory changed for good.</p>
<h2 id="settling-into-our-new-reality">Settling into our new reality</h2>
<p>If there was any doubt left about the direction our industry was heading in the post-ZIRP era, 2024 eliminated most of it.</p>
<p>M&amp;A activity is stable, even with subtle shifts happening among buyers and the profile of their acquisitions.</p>
<p>Financing activity is down from 2021-2022 levels, and it's going to stay down for a while. This is healthy.</p>
<p>Abundant capital is available for our top companies who have earned the right to scale. It's still there for promising early stage companies, too.</p>
<p>Macro trends are as important as ever. This is never going to change. In 2024, the notable one was AI driving data security market activity. Trends like these take years to play out, so we're going to keep seeing this one in 2025 and beyond.</p>
<p>If I had to summarize the vibe heading into 2025 in one sentence, it's this: <em>The cybersecurity industry is maturing.</em></p>
<p>Our adolescence is behind us. We’re entering a period of thoughtful, disciplined growth — exactly what we need to build stronger companies and a more resilient industry.</p>
<hr><h3 id="acknowledgements">Acknowledgements</h3>
<p>Thank you to both the Altitude Cyber and Momentum Cyber teams for years of hard work on this industry research.</p>
<h3 id="footnotes">Footnotes</h3>
<p>¹Hat tip to <a href="https://www.linkedin.com/in/mikeprivette/?ref=content.strategyofsecurity.com">Mike Privette</a> at Return on Security, who writes another <a href="https://www.returnonsecurity.com/p/the-state-of-the-cybersecurity-market-in-2024?ref=content.strategyofsecurity.com">epic annual report</a> on the industry. Several of the observations from my research here align with things he's already said in other ways.</p>
<p>²Including both the Altitude Cyber version and its predecessor, <a href="https://momentumcyber.com/?ref=content.strategyofsecurity.com">Momentum Cyber's </a> Cybersecurity Almanac.</p>
<p>³One caveat for the 2024 dollar volume data: it includes HPE's $14 billion acquisition of Juniper Networks. This is a caveat for multiple reasons, one being that some people don't consider either a cybersecurity company. I'm in the "hybrid" camp here. More importantly, the deal hasn't technically closed, and depending on how the Department of Justice intervention plays out, it may never close. I think it eventually will, but the total could get skewed quite a bit if it doesn't.</p>
<p>⁴The other four (Darktrace-Thoma Bravo, Acronis-EQT, Auditboard-Hg, and the Synopsys software integrity carveout) were made by financial buyers.</p>
]]></content:encoded>
            <category>M&amp;A</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/header-altitude-cyber-2024-themes.png"/>
        </item>
        <item>
            <title><![CDATA[SailPoint’s Second Act]]></title>
            <link>https://strategyofsecurity.com/sailpoints-second-act/</link>
            <guid>679bd36afa084d00018403fd</guid>
            <pubDate>Thu, 30 Jan 2025 19:41:50 GMT</pubDate>
            <description><![CDATA[A look behind the strategic and financial narrative for SailPoint's imminent return to public markets.]]></description>
            <content:encoded><![CDATA[<p><em>"Don’t call it a comeback, I been here for years."</em> —LL Cool J, <a href="https://youtu.be/vimZj8HW0Kg?feature=shared&ref=content.strategyofsecurity.com">Mama Said Knock You Out</a></p>
<p>Cybersecurity's first IPO of 2025 is a triumphant comeback story from a company that's been a towering figure in the industry for years.</p>
<p>That company is SailPoint, who I've been following closely for over a decade now — both directly on client implementations at PwC and covering their business in my industry research.</p>
<p>I have a lot to say about this <a href="https://www.sec.gov/Archives/edgar/data/1627857/000119312517315396/d392110ds1.htm?ref=content.strategyofsecurity.com">S-1 filing</a> and the broader implications of their second IPO.</p>
<p>First, a couple (Midwestern) spicy takes¹:</p>
<ul>
<li>
<p>I still <a href="https://x.com/colegrolmus/status/1513579635103182854?ref=content.strategyofsecurity.com">question</a> whether SailPoint needed to go private in the first place.</p>
</li>
<li>
<p>This is the earliest point in the window SailPoint could have gone public again.</p>
</li>
</ul>
<p><em>Wait, isn't this a contradiction?!</em></p>
<p>Kind of. Let me explain.</p>
<p>Before going private, SailPoint was right around the cutoff line for cybersecurity's "high growth" and "low growth" cohorts. They averaged 21% top line revenue growth from 2019 to 2021.</p>
<p>Decent, not spectacular — and nowhere close to the lower performing companies who were <a href="https://strategyofsecurity.com/p/cybersecurity-is-going-private/">taken private</a>.</p>
<p>They had real business issues to face, though. Accelerating their SaaS transition was the big one. Peers like CyberArk and <a href="https://www.mostlymetrics.com/p/navigating-business-model-transitions?utm_source=publication-search&_readwiseLocation=">Varonis</a> have successfully pulled off this transition in public markets, but it's hard.</p>
<p>Partnering with <a href="https://www.thomabravo.com/behindthedeal/revisiting-how-thoma-bravo-took-sailpoint-public-and-then-private-again?ref=content.strategyofsecurity.com">Thoma Bravo again</a> was an offer too good to refuse. The rest is history.</p>
<p>Fast forward to today...I thought they'd let the SaaS transformation bake a little longer and get back to profitability <a href="https://strategyofsecurity.com/p/what-would-it-take-for-sailpoint-to-go-public-again/">before going back out</a>. Might as well finish the job since they bothered to go private in the first place.</p>
<p>They always felt like a <a href="https://strategyofsecurity.com/p/cybersecuritys-ipo-pipeline-2025-candidates/">lock for 2025</a> (or early 2026, worst case). My guess was the second half of this year, even with the rumblings of a potential IPO starting in Q4 2024.</p>
<p>Instead, SailPoint is all set to be cybersecurity's first IPO in 2025 — and the first pure-play cybersecurity company to go public in <em>almost three and half years</em>.²</p>
<p>It's a big moment for both SailPoint and the cybersecurity industry. Here's why, starting with SailPoint's strategic narrative.</p>
<h2 id="strategic-narrative">Strategic narrative</h2>
<p>SailPoint's timing mostly boiled down to this: they had enough proof to credibly tell the story of being a modern, SaaS-first identity security platform. The essential parts of their strategic narrative shaped up well (with some caveats).</p>
<p>For its part, SailPoint checked most of the boxes, even though some important ones like their SaaS transition and profitability are still a work-in-progress. They did exactly what they needed to support their new strategic narrative while maintaining their market leadership in identity governance.³</p>
<p>The underlying business transformation will continue, but they've likely done enough to change how the market perceives them. Package that up with a general sense of optimism about public markets, and you've got a pretty airtight case. The timing was right to go public again.</p>
<p>And, bigger picture — they did it <em>without</em> causing a major shakeup of the competitive landscape in identity security.</p>
<p>Let me walk you through the core parts of the narrative and show you what I mean.</p>
<h3 id="a-saas-first-company">A "SaaS-first" company</h3>
<p>The first piece of SailPoint's narrative shift was becoming a "SaaS-first" company. They needed to accelerate their transition to both a subscription-based revenue model and a SaaS product. This was basically reason number one for going private.</p>
<p>SailPoint started with an on-premise product (IdentityIQ) back in 2005. Their first SaaS-based product (IdentityNow) launched <a href="https://www.sailpoint.com/blog/sailpoint-identity-security-cloud-most-common-questions?ref=content.strategyofsecurity.com">about ten years ago</a> and evolved into their current Identity Security Cloud offering over the course of a decade.⁴</p>
<p>One of the biggest knocks against SailPoint's strategy was how long the customer transition from the on-premise product to the SaaS product was taking — or if it was even going to happen at all. The leadership team was surprisingly blasé (at least in public) about the pace of transition across the company's final few earnings calls before going private.</p>
<p>I'd speculate that behind closed doors, they knew the transition needed to happen faster. Or, Thoma Bravo knew it needed to happen faster and was willing to finance the acceleration in exchange for a share of the upside. Or both.</p>
<p>Either way, SailPoint has made solid progress with accelerating their SaaS transition and, bigger picture, advancing the narrative of being a modern, SaaS-first company.</p>
<p>They accomplished the objective with some stellar metrics to back it up. Growing SaaS ARR at 40%+ year-over-year and overall ARR at 30%+ year-over-year are very high growth rates relative to just about any public SaaS comp you can come up with.</p>
<p>They've successfully converted most of their revenue to subscriptions, which includes SaaS as a subset. That's impressive given how complex migrations from on-premise to SaaS are, especially with larger customers. It's basically like implementing a completely new product.</p>
<p>They still have work to do, though. According to the S-1, only 60% of their total ARR is coming from SaaS.</p>
<p>This means SailPoint still has a lot of revenue coming from on-premise-related things, like maintenace and other subscription services. Put differently, they still have a material amount of customers using the on-premise product — and I suspect it's their largest ($1M+ ARR) enterprise customers.</p>
<p>Finishing the job is a non-trivial task that's fraught with risk around churn and customer dissatisfaction. Staying private doesn't make these risks go away, though. It just masks them from public consumption. I don't view this issue as a compelling reason to stay private, and SailPoint's management team clearly agrees.</p>
<p>I definitely buy their "new customers are starting with SaaS, and remaining customers are in the process of transitioning" part of the narrative. We should't take this to unilaterally mean <em>all</em> of SailPoint's remaining on-premise customers are transitioning to SaaS — just that the transition has momentum.</p>
<p>Anecdotally, I've heard of several large, high-profile customers who are doing SailPoint SaaS implementations right now. It's definitely happening.</p>
<p>There's more work to do, but SailPoint's SaaS transition slog will eventually end. Sure, seeing 80%+ of subscription revenue coming from SaaS would have been ideal — but they've laid the groundwork for completing this transition faster than ever could have as a public company.</p>
<h3 id="identity-governance-to-identity-security">Identity governance to identity security</h3>
<p>The second piece of SailPoint's strategic narrative was transforming their market positioning from "legacy identity governance vendor" to "modern identity security platform".</p>
<p>When they went private, they were still mainly seen as an IGA vendor (albeit the market leader) in a world where both customers and investors increasingly wanted <a href="https://strategyofsecurity.com/p/how-could-platformization-work-in-cybersecurity/">comprehensive security platforms</a>.</p>
<p>SailPoint methodically addressed this perception through their SaaS transition and, more strategically, a targeted set of tuck-in acquisitions to broaden the platform:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/01/sailpoint-acquisitions.png" class="kg-image" alt="" loading="lazy" width="830" height="901" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/01/sailpoint-acquisitions.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/01/sailpoint-acquisitions.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Since going private, they added basic PAM (Osirium), non-employee access/risk management (SecZetta), and ITDR (Double Zero) for $71.8M of total fair value (not the same as the full acquisition price, but likely in the ballpark).</p>
<p>Add these on top of their previous acquisitions in SSPM (Intello), CIEM (Orkus) Data Security (Whitebox Security), plus others, and you've got the makings of a broader identity security platform.</p>
<p>Here's a quick visual to help illustrate the point (using SailPoint's graphics with my own markups). Everything highlighed in yellow or blue has been added since going private, mostly through M&amp;A:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/01/sailpoint-platform-expansion.png" class="kg-image" alt="" loading="lazy" width="830" height="1035" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/01/sailpoint-platform-expansion.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/01/sailpoint-platform-expansion.png 830w" sizes="(min-width: 720px) 720px"></figure><p>SailPoint had the core components of their SaaS platform in place, but they added an entirely new layer of capabilities to the stack during this period.</p>
<p>Many of their acquisitions are still fresh, so it's too early to tell how much of a financial impact they will have (and how soon). Independently from commercial success, they've effectively addressed the near-term narrative of being a broad(er) identity security platform.</p>
<h3 id="all-without-a-big-merger-or-acqusition">...all without a big merger or acqusition</h3>
<p>SailPoint landed their new strategic narrative perfectly...but the moves they <em>didn't</em> make tell the real story. Here's the twist: they didn't have to merge or make a major acquisition and massively shift the competitive landscape in the identity security market.</p>
<p>A boss move (theoretically) would have been acquiring a scaled PAM or SSO company (from the current PE-owned cohort) to compete head-on with other identity security giants like Okta, CyberArk, Ping, and Microsoft.</p>
<p>There are plenty of later-stage, privately held, 8-9 figure ARR identity companies SailPoint could have acquired:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/01/scaled-identity-security-targets.png" class="kg-image" alt="" loading="lazy" width="830" height="957" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/01/scaled-identity-security-targets.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/01/scaled-identity-security-targets.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Not all of these companies are viable targets, obviously — but nothing feels out of reach for Thoma Bravo right now. The point is just to illustrate how many potential options SailPoint had available if they wanted to make a big move.</p>
<p>And, remember: Thoma Bravo already merged Ping Identity and ForgeRock, two other identity security companies in their portfolio. Merging SailPoint with one or both of these companies would have been challenging, but it certainly wasn't out of the question.</p>
<p>SailPoint didn't have to do <em>any of this</em>. Instead, they took a more measured and pragmatic approach — and it looks like their strategy is going to work (near-term, anyway).</p>
<p>Doing a major acquisition would have been both risky and financially prohibitive.</p>
<p>Most of the major identity security companies have their own lanes, and the market is still big enough (now) for everyone to stay in the lane they've been in. SailPoint will be fine on the competition front for a while.</p>
<p>That's not to say they're <em>without</em> competition — just that there is still enough room for SailPoint to maneuver in both their core identity governance segment and the overall identity security market.</p>
<p>Okta's identity governance product (OIG, the part that competes directly with SailPoint) is still pretty new. It has good traction, but it's still nowhere near the scale or sophistication of SailPoint. Okta's new product will eventually become more competitive in SailPoint's core upper middle market and enterprise customer segments, but that's still years away.</p>
<p>Microsoft's Entra platform is strong, largely thanks to the directory service formerly known as Active Directory and growing momentum in the Single Sign-On (SSO) space. They <em>have</em> an identity governance product, but the overall Entra platform is more competitive with Okta than SailPoint.</p>
<p>Saviynt is a legitimate threat (and likely on a path to <a href="https://strategyofsecurity.com/p/cybersecuritys-ipo-pipeline-2026-and-beyond/">its own IPO</a>), but it's still a much smaller company. They <a href="https://saviynt.com/press-release/saviynt-the-cloud-identity-security-leader-accelerates-growth-and-achieves-record-revenues-in-2023?ref=content.strategyofsecurity.com">disclosed</a> $150 million of ARR at the end of their 2023 fiscal year. They're winning some competitive deals, and there's still a lot of market share left between legacy product migrations and customers who decide to shop around when migrating away from SailPoint's on-premise product.</p>
<p>CyberArk and Ping Identity are both big, important companies in the identity security market — but they're not <em>direct</em> competitors with SailPoint. Current product overlap with SailPoint is minimal, especially not their core identity governance features.</p>
<p>More direct competition feels inevitable, but not today. SailPoint has a nice lane carved out for itself in the market by owning the larger identity governance deployments.</p>
<p>One other thing: they also have significant debt. A large acquisition would have been impossible without a major restructuring. About the debt part...</p>
<h2 id="financial-narrative">Financial narrative</h2>
<p>SailPoint's IPO narrative has several critical financial topics to address, debt being one of them.</p>
<p>On the financial side, I'm focused on the highlights and strategic implications. CJ Gustafson's <a href="https://www.mostlymetrics.com/p/sailpoint-ipo-s1-breakdown?ref=content.strategyofsecurity.com">analysis</a> on Mostly Metrics should be your first stop if you want a professional, CFO-level financial analysis of the S-1.</p>
<p>Through my strategic lens, the financial part of SailPoint's IPO narrative hinges on debt, profitability, margins, and the immediately adjacent impact of each. Here's my interpretation beyond the S-1 print.</p>
<h3 id="debt-and-rd-spend">Debt and R&amp;D spend</h3>
<p>SailPoint has a ton of debt. $1.59 billion via term loan, to be exact. They're spending over $175 million on interest alone, which is just under the $180 million they spent on <em>all of R&amp;D</em> in FY'24.</p>
<p>There's nothing too weird going on here. It's normal for a private equity firm to use debt for partially financing the acquisition. The S-1 is clear about SailPoint's plan to use some of the proceeds to pay down the term loan, so they won't be quite this indebted for long.</p>
<p>Regardless of the exact amount of debt they carry post-IPO, the implications are important — especially in the context of R&amp;D spend.</p>
<p>Identity security in general is a highly competitive space (despite my comments on SailPoint's lack of direct competition earlier). Both late and early stage companies are investing significant capital into improving and building out their products, which falls under R&amp;D.</p>
<p>Okta alone spent $656 million on R&amp;D in their FY'24, and $158 million in Q3'25 alone (~$20M less than SailPoint invested in an entire year). And, according to Altitude Cyber's <a href="https://drive.google.com/file/d/1n7sa5YRWG68efHIofklmhHSOybFY4vyd/edit?ref=content.strategyofsecurity.com">2024 Year In Review</a>, identity security startups raised a total of $1.08 billion in 2024. That's on top of $1.11 billion the year before.</p>
<p>R&amp;D spending isn't a direct indicator of results or product quality, but there's definitely a correlation.</p>
<p>SailPoint clearly demonstrated R&amp;D efficiency by advancing their SaaS transition this far at relatively reasonable R&amp;D costs. This is about more than a SaaS transition, though.</p>
<p>As a public company, SailPoint is going to have to both defend their market leadership position and (eventually) brace for head-on competition with other major players in the identity security market. They need breathing room to keep investing in R&amp;D, which means managing debt is a top priority.</p>
<h3 id="gross-margins">Gross margins</h3>
<p>SailPoint's gross margins are...<em>below average...</em> at 67% for their FY'24. Gross margins for Morgan Stanley's security group are at 81%:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/01/cybersecurity-gross-margin-comps.png" class="kg-image" alt="" loading="lazy" width="830" height="1390" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/01/cybersecurity-gross-margin-comps.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/01/cybersecurity-gross-margin-comps.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Secureworks has the lowest gross margins at 70%. They're primarily a services company that will soon be going private once their <a href="https://www.linkedin.com/posts/colegrolmus_the-sophos-secureworks-deal-gives-us-a-bunch-activity-7254520731328299009-9Xla?utm_source=share&utm_medium=member_desktop">acquisition by Sophos</a> closes.</p>
<p>SailPoint has things like their ongoing SaaS transition, scaling infrastructure costs, and take-private transation related expenses to blame, but profitability is going to have to improve quickly if they want to be valued like the top performing SaaS companies.</p>
<p>Another potential issue is more strategic. If (<em>BIG IF</em>, just intuition and speculation on my part) they're experiencing significant pricing pressure and discounting to retain and win customers, margins are going to keep suffering.</p>
<p>I don't know if this is happening, but it's possible. Like much of enterprise software, every new $1M+ ARR customer opportunity they have is a competitive bid. SailPoint also has the added challenge of <em>not</em> ending up in competitive bids when their customers switch from the on-premise to SaaS product.</p>
<p>There are a lot more nuances to the margin story, and they play out in places like profitability and customer acquisition costs.</p>
<h3 id="profitability-customer-acquisition-costs-and-market-opportunity">Profitability, customer acquisition costs, and market opportunity</h3>
<p>Profitability had become an issue when SailPoint went private, and investors probably aren't going to love their continued (although substantially reduced) losses this time around.</p>
<p>Context matters, though – and there are some specific nuances about the identity security market that make SailPoint's situation very reasonable.</p>
<p>Here's the punch line on SailPoint's profitability: they're currently spending $2.85 to acquire $1 of ARR.</p>
<p>That seems terrible on the surface, but identity security products like SailPoint have a very important property: they're <em>incredibly sticky</em> once implemented. Like, prohibitively expensive and painful to replace. That's part of the reason why SailPoint's retention metrics are outstanding (114% NRR / 97% GRR).</p>
<p>Their CAC payback period is ~2.85 years, which is pretty high, but really no big deal in identity security terms. They keep most customers for much, much longer than that. A decade-plus is common. SailPoint (and their channel partners) are very good at supporting and retaining customers, so the mechanics here should just keep getting better with scale.</p>
<p>(Somewhat) crossing back over into strategy land for a minute: I was surprised how many smaller ACV customers they have. Here's the breakdown from the S-1:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/01/sailpoint-customer-arr-tiers.png" class="kg-image" alt="" loading="lazy" width="830" height="548" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/01/sailpoint-customer-arr-tiers.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/01/sailpoint-customer-arr-tiers.png 830w" sizes="(min-width: 720px) 720px"></figure><p>I would have guessed a much higher count of $1M+ ARR customers and a much lower count of sub-$250K accounts. This tells me two important things. Their customer base is more diversified than I thought, and they still have room to grow in the enterprise customer segment.</p>
<p>They're just going to keep picking off implementations from legacy competitors (Oracle, IBM, etc.) until they have to compete more broadly. SailPoint will almost certainly be over $1 billion of ARR by then.</p>
<p>SailPoint deserves every minute of the spotlight and glory from this milestone, but this move has broader implications for the rest of the industry. Here's why.</p>
<h2 id="industry-impact">Industry impact</h2>
<p>SailPoint being the first cybersecurity company to go public in 2025 is the best thing that could have possibly happened for the rest of our IPO pipeline. They did everyone else a huge favor.</p>
<p>It's <em>wayyyyyy</em> better to re-introduce a well-known company and break the ice before we start rolling out companies the market hasn't seen yet.</p>
<p>Even though people are optimistic, tech IPOs are still warming up from the ice age we've been in for the past ~three years.</p>
<p>We're still figuring out exactly how the market is going to value new companies based on their revenue scale, growth rate, profitability, and other metrics. The benchmarks so far have set a <a href="https://strategyofsecurity.com/p/bigger-faster-stronger-the-new-standard-for-public-cybersecurity-companies/">pretty high bar</a>, especially for revenue scale.</p>
<p>Most of the <a href="https://insidethenetwork.co/episodes/hamza-fodderwala-the-future-of-cybersecurity-2024-retrospective-2025-predictions-and-what-founders-need-to-know/transcript?ref=content.strategyofsecurity.com">expert predictions</a> point to expectations relaxing and subscale (&lt;~$500M ARR) companies being able to go out again, but all of this is still in flux.</p>
<p>SailPoint is the perfect dosage of excitement and familiarity.</p>
<p>Right now, all signs point to this being a good IPO — exactly what we needed to get the pipeline moving in 2025.</p>
<p>Follow this up with another strong candidate or two (Netskope?), and cybersecurity's IPO window is officially open again.</p>
<p><em>Mama said knock you outttttttttt...huuh!</em></p>
<hr><h3 id="footnotes">Footnotes</h3>
<p>¹Midwestern (United States) people are notorious for disliking spicy food, myself included. We prefer to keep things bland. "Midwestern spicy" means a very, very mild level of spice.</p>
<p>²The first traditional, mid-cap IPO for a pure-play cybersecurity company, that is. We've had a few SPACs and nano cap companies go public, but most of the industry focuses on traditional IPOs. Rubrik technically went public in 2024 (and has done well), but many people classify them as a hybrid IT/infra/security company.</p>
<p>³I'm leaving the obligatory AI-enabled-whatever parts of the narrative aside for now. Yes, SailPoint covered them — I just don't think AI is a core part of the narrative here, at least near-term.</p>
<p>⁴Intentionally or unintentionally, SailPoint has thoroughly obfuscated the exact release date of IdentityNow. "About ten years ago" is the most accurate timing from an official source, so we'll go with that.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <category>#SailPoint</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/01/header-sailpoints-second-act.png"/>
        </item>
        <item>
            <title><![CDATA[Cybersecurity's IPO Pipeline: 2026 and Beyond]]></title>
            <link>https://strategyofsecurity.com/cybersecuritys-ipo-pipeline-2026-and-beyond/</link>
            <guid>675b180b5ea97b0001755232</guid>
            <pubDate>Thu, 12 Dec 2024 17:17:35 GMT</pubDate>
            <description><![CDATA[Analyzing cybersecurity-related companies who are further out in the IPO pipeline. When will it be their turn to go public?]]></description>
            <content:encoded><![CDATA[<p>Cybersecurity's IPO pipeline for 2026 and beyond might be even more interesting than the 2025 candidates.</p>
<p>Several of our best companies are (likely) a couple years out from going public. And, let's face it: several of the <a href="https://strategyofsecurity.com/p/cybersecuritys-ipo-pipeline-2025-candidates/">2025 IPO candidates</a> are going to slide into 2026.</p>
<p>Public markets just aren't going to have the stomach to ingest 16 cybersecurity-related companies (plus dozens of other software companies) all at once.</p>
<p>It's definitely still worth gazing off into the distance to see what cybersecurity's longer-term IPO pipeline looks like.¹</p>
<p>Companies further out in our pipeline are going to keep becoming more and more influential. It's like you're seeing the next <a href="https://strategyofsecurity.com/p/cybersecuritys-class-conundrum/">A-list celebrities</a> perform at a small club before most of the world knows their name.</p>
<p>Don't forget about the macro side of this, either. IPO windows also last more than a year. If 2025 is the de facto start of our next window, we're going to see a multi-year run.</p>
<p>We're going to <em>need</em> a multi-year run. On top of the 16 companies who are IPO candidates in 2025, <em>at least</em> 38 more have realistic shot at going public in 2026 or later.</p>
<p>I used time ranges here because making predictions multiple years out is an inexact science. As we've painfully learned, a lot can change (good or bad) in a year or two.</p>
<p>Just like the 2025 candidates, the distinction (and incentives) between private equity owned and venture-backed companies affects the timing. But this time, the venture-backed companies are the star of the show.</p>
<p>We have a <em>lot</em> of companies to talk about here. Let's get to it.</p>
<h2 id="venture-backed-companies">Venture-backed companies</h2>
<p>There are 24 venture-backed companies in the IPO pipeline for 2026 and beyond:</p>
<p><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/12/cybersecuritys-2026-ipo-pipeline-vc-backed.png" alt="cybersecuritys-2026-ipo-pipeline-vc-backed.png" loading="lazy"></p>
<p>This is a flat out amazing group of companies. They're our Forbes Cloud 100-winning, large round-raising, high valuation-seeking superstars. Not <em>all</em> of them will go public, of course — but <em>any</em> of them could (someday).</p>
<p>Part of the criteria we have to go with for venture-backed companies is what they've said about their intent to go public and the timeline. Of the 25 companies in this part of the pipeline, 14 of them have spoken publicly about IPO plans:</p>
<p><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/12/2026-ipo-pipeline-statements.png" alt="2026-ipo-pipeline-statements.png" loading="lazy"></p>
<p>There are too many companies here to discuss them all, but I wanted to highlight five.</p>
<h4 id="1password">1Password</h4>
<p>1Password is one of <a href="https://strategyofsecurity.com/p/1passwords-blue-ocean-strategy">my favorite stories</a>. Over nearly two decades now, they've grown from a bootstrapped company in a once-obscure market to a potential decacorn.</p>
<p>In total, the company has raised $920 million in capital, most recently at a $6.8 billion valuation. They <a href="https://blog.1password.com/introducing-extended-access-management/?ref=content.strategyofsecurity.com">launched</a> a full identity suite earlier this year. 1Password is clearly one of our top IPO candidates and feels like a lock for 2026, if not sooner.</p>
<h4 id="abnormal-security">Abnormal Security</h4>
<p>Abnormal Security <a href="https://abnormalsecurity.com/about/news/series-d-5b-valuation?ref=content.strategyofsecurity.com">recently targeted</a> "being able to operate as a public company" in Q4 2025 after raising a $250 million Series D at a $5.1 billion valuation.</p>
<p>Taken at face value, going public in late 2025 is definitely in range — and if not, early 2026 seems like a lock if markets are ready.</p>
<p>Timing may also depend on when Proofpoint, a direct competitor in email security, decides to re-enter public markets.</p>
<h4 id="cribl">Cribl</h4>
<p>Cribl is a cybersecurity-related company who is part of the emerging <a href="https://www.linkedin.com/posts/colegrolmus_what-is-a-cybersecurity-data-fabric-and-activity-7176979782763450369-jxXT?utm_source=share&utm_medium=member_desktop">security data fabric market</a>. They raised $200 million at a $3.5 billion valuation earlier this year and signaled clear intent to go public in the near future.</p>
<p>Their potential IPO is notable for several reasons, one being the creation of a new market segment for data fabric products. This helped clear the way for several other earlier stage companies I've <a href="https://www.linkedin.com/posts/colegrolmus_there-are-a-lot-more-security-data-fabric-activity-7211714929769222144-e3cz?utm_source=share&utm_medium=member_desktop">covered this year</a>.</p>
<h4 id="saviynt">Saviynt</h4>
<p>Saviynt has been an under-the-radar company for most of its existence, but they put themselves squarely into the IPO pipeline with a recent disclosure of $185 million in ARR.</p>
<p>They've raised a very low amount of capital to date — $375 million in total, which includes $205 million in debt financing. Their latest disclosed valuation is $100 million in 2018...which, needless to say, is well over 10x higher today based on revenue.</p>
<p>CEO and founder Sachin Nayyar also led Securonix to a <a href="https://www.securonix.com/press_release/securonix-receives-1-billion-growth-investment-led-by-vista-equity-partners/?ref=content.strategyofsecurity.com">billion-dollar private equity exit</a> in 2022, then rejoined Saviynt to (presumably) do the same or better.</p>
<p>Some of the disclosed numbers might not add up, but judgment wins out here. They have the revenue, leadership, enterprise customers, channel parterships, and tailwinds in a stellar identity security market. This is either going to be a major strategic acquisition or a public company.</p>
<h4 id="tanium">Tanium</h4>
<p>Tanium is one of the most perplexing companies in the entire IPO pipeline. They've looked like a no-doubt IPO candidate for a long time — yet here they are, still a private company with no definite timeline for going public.</p>
<p>They're valued at $9 billion with over $700 million in revenue. They basically have everything they need to go public. Will it be 2025? 2026? Later? I honestly don't know.</p>
<p>The VC-backed part of our long-term pipeline is by far the most dynamic segment. Timelines can change quickly. Other companies will definitely join the list. This is just the view we have right now.</p>
<p>The private equity part of the list is a bit more systematic. Let's cover these companies next.</p>
<h2 id="private-equity-owned-companies">Private equity owned companies</h2>
<p>There are 14 private equity owned companies in the pipeline for 2026 and beyond:</p>
<p><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/12/cybersecuritys-2026-ipo-pipeline-pe-owned.png" alt="cybersecuritys-2026-ipo-pipeline-pe-owned.png" loading="lazy"></p>
<p>The profile of this group is a bit different than the PE-owned candidates for 2025, though.</p>
<p>The 2025 group is unique because it includes several formerly private companies who were already at hundreds of millions or a billion in revenue scale. It's unusual to have companies like these in private markets. They won't be for long.</p>
<p>The 2026 and beyond group also has some formerly public companies, but the rest are a bit more typical.</p>
<h4 id="former-public-companies">Former public companies</h4>
<p>There are still five former public companies (Barracuda, KnowBe4, McAfee, Ping Identity/ForgeRock, and Trellix), but each had challenges that are more common for private equity to address.</p>
<p>KnowBe4 and Ping Identity (including ForgeRock) were both <a href="https://cloudedjudgement.substack.com/p/clouded-judgement-62824-can-subscale?ref=content.strategyofsecurity.com">subscale companies</a> who didn't quite have the growth or operating metrics to keep up with the top performers.</p>
<p>Fast forward to today: Ping Identity just announced it's <a href="https://press.pingidentity.com/2024-11-14-Ping-Identity-Surpasses-30-Annual-Growth-in-SaaS-Revenue-and-Approaches-800M-ARR-as-an-Enterprise-Identity-Market-Leader?ref=content.strategyofsecurity.com">closing in on $800 million of ARR</a> (with ForgeRock's revenue). They still have some product portfolio overlap and SaaS transition hurdles to overcome, which is why they're not a 2025 candidate. 2026 or 2027 feels very realistic.</p>
<p>KnowBe4 is likely over $500 million in revenue, and it's not even two years into its PE holding period. If they can grow at a 20-30% rate and keep <a href="https://www.knowbe4.com/press/knowbe4-to-acquire-egress?ref=content.strategyofsecurity.com">adding tuck-in acquisitions</a>, they'll be on their way to $1 billion of revenue by the end of their holding period.</p>
<p>Barracuda, Trellix, and McAfee are closer to the typical private equity story, even with their atypically large scale. Here's the quick summary of their activity:</p>
<p>Barracuda has almost completely transitioned into a cybersecurity company. Thoma Bravo <a href="https://www.thomabravo.com/press-releases/kkr-completes-acquisition-of-barracuda-from-thoma-bravo?ref=content.strategyofsecurity.com">sold them to KKR</a> in 2022. They're now two years into the KKR holding period.</p>
<p>Trellix is the result of a merger between FireEye and McAfee's enterprise business unit in 2022.</p>
<p>The standalone version we now know as McAfee is the company's remaining consumer business.</p>
<p>I put a 2-3 year timeline on this group of companies because of their scale. Trellix has over a billion in revenue. McAfee has two billion. It's been a long time since Barracuda disclosed revenue, but rough math says they're likely over $500 million as well.</p>
<h4 id="private-companies">Private companies</h4>
<p>The nine other PE-owned companies in the pipeline all have fairly unique journeys that could eventually lead to public markets.</p>
<p>Acronis and Armis are growth stage companies. Both are majority-owned by private equity firms, which are functioning more like growth equity investors in this situation. These companies need more time to hit revenue scale, which may happen quickly if they can sustain their high growth rates.</p>
<p>BeyondTrust just disclosed $400 million in revenue and <a href="https://www.linkedin.com/posts/colegrolmus_you-probably-heard-about-beyondtrust-acquiring-activity-7186347884135481344-p3If?utm_source=share&utm_medium=member_desktop">acquired Entitle</a>. They're reasonably competitive against CyberArk, Okta, and the large identity security platforms. They're also seven years into their holding period, which means an exit could happen soon.</p>
<p>Fortra was founded in 1982 (!!!) and has since evolved into a cybersecurity-focused company. They <a href="https://www.startribune.com/eden-prairies-helpsystems-announces-10th-acquisition-in-15-months/600155095?ref=content.strategyofsecurity.com">casually disclosed</a>² $800 million of revenue back in 2022, which likely means they're at or above $1 billion now. That's public company scale.</p>
<p>The situation with LastPass is the most tumultuous of any company in the entire IPO pipeline:</p>
<ul>
<li>
<p>They were <a href="https://techcrunch.com/2015/10/09/logmein-acquires-password-management-software-lastpass-for-110-million/?ref=content.strategyofsecurity.com">acquired by LogMeIn</a> for only $110 million back in 2015 when LogMeIn was a public company.</p>
</li>
<li>
<p>LogMeIn itself (including LastPass) was <a href="https://www.globenewswire.com/news-release/2020/08/31/2086214/0/en/Francisco-Partners-and-Evergreen-Coast-Capital-Complete-Acquisition-of-LogMeIn.html?ref=content.strategyofsecurity.com#:~:text=The%20go%2Dprivate%20transaction%20was,trade%20on%20the%20Nasdaq%20exchange.">acquired and taken private</a> by Francisco Partners in 2020.</p>
</li>
<li>
<p>In the midst of all this, people finally realized <a href="https://strategyofsecurity.com/p/1passwords-blue-ocean-strategy">password management is a big market!</a> LastPass became a valuable asset. LogMeIn's PE sponsors announced they were <a href="https://www.channelfutures.com/channel-business/logmein-spinning-off-lastpass-as-separate-company-with-increased-investment?ref=content.strategyofsecurity.com">spinning out LastPass</a> as a standalone company in late 2021.</p>
</li>
<li>
<p>...until <a href="https://www.cybersecuritydive.com/news/lastpass-cyberattack-timeline/643958/?ref=content.strategyofsecurity.com">multiple security issues</a> derailed the plan.</p>
</li>
<li>
<p>The separation <a href="https://www.lastpass.com/company/newsroom/b948ad48-3268-4c9e-8b45-0d6d02d0b4e7?ref=content.strategyofsecurity.com">finally completed</a> in May 2024. LastPass is now a standalone, PE-backed company with hundreds of millions in revenue.</p>
</li>
</ul>
<p>When 1Password (another 2026-2027, maybe even 2025 candidate) goes public, it potentially opens the door for LastPass to follow.</p>
<p>Optiv was ready to go out before the current economic downturn. Reuters also <a href="https://www.reuters.com/business/finance/exclusive-kkr-explores-sale-or-ipo-cybersecurity-consultant-optiv-sources-2022-02-01/?ref=content.strategyofsecurity.com">reported</a> a potential sale or IPO by KKR. Depending on how you feel about <a href="https://www.linkedin.com/feed/update/urn:li:activity:7201610081652682752/?ref=content.strategyofsecurity.com">passthrough VAR revenue</a> and <a href="https://www.linkedin.com/feed/update/urn:li:activity:7201989513143889921/?ref=content.strategyofsecurity.com">Optiv's business model</a>, and <a href="https://strategyofsecurity.com/p/cybersecurity-business-models-a-dollar-of-revenue-doesnt-equal-a-dollar-of-revenue/">cybersecurity services companies</a> in general, Optiv could an IPO-able company in the next 2-3 years.</p>
<p>Veeam is another cybersecurity-related company (backup and data protection) owned by Insight Partners who has the scale to go public soon. They <a href="https://www.veeam.com/company/press-release/veeam-ranked-1-in-the-2024-gartner-market-share-analysis-for-enterprise-backup-and-recovery-software-report.html?ref=content.strategyofsecurity.com#:~:text=Veeam%20is%20the%20top%20vendor,year%20growth%20in%202022%2D2023.">reported $1.5 billion</a> in revenue in late 2024 and just <a href="https://www.inforisktoday.com/veeam-closes-2b-offering-to-boost-data-resilience-eyes-ipo-a-26985?ref=content.strategyofsecurity.com">closed a $2 billion secondary round</a> with TPG in December. With Rubrik performing well and Cohesity on its way to an IPO, it seems likely that Veeam will follow in 2026 or earlier.</p>
<p>Four other PE-backed companies seem destined for 2028 or beyond.</p>
<p>Acronis was publicly considering an IPO before a <a href="https://www.crn.com/news/storage/2024/acronis-is-acquired-in-majority-stake-deal-by-european-private-equity-giant-eqt?ref=content.strategyofsecurity.com">majority acquisition by EQT</a> in August 2024. This pushes their timeline out to the end of a typical PE holding period.</p>
<p>Armis shared IPO plans for 2024-2025 and later disclosed $200 million in ARR. They announced a <a href="https://www.armis.com/newsroom/press/armis-raises-200m-at-4-2b-valuation-as-growth-soars-eyes-ipo/?ref=content.strategyofsecurity.com">$200 million growth equity round</a> in late 2024 with a five year strategic plan.</p>
<p>Exabeam talked about IPO aspirations back in 2021, then <a href="https://www.linkedin.com/posts/colegrolmus_we-finally-know-the-new-ownership-structure-activity-7221167381602013186-OqcL?utm_source=share&utm_medium=member_desktop">merged with LogRhythm</a> under Thoma Bravo earlier this year. The combined company is sizeable, but it's going to take a few years before they're ready.</p>
<p>NetSPI looks like a long shot right now, but they're an interesting company to watch. KKR did a <a href="https://www.prnewswire.com/news-releases/netspi-raises-410-million-in-growth-funding-from-kkr-301640974.html?ref=content.strategyofsecurity.com">$410 million majority recap</a> in 2022. The company is transitioning from offensive security services to products. This might all be coming together for them at the right time.</p>
<p>There's a lot going on with the private equity side of our IPO pipeline, both near-term and long-term.</p>
<p>The implication of so much private equity activity in the industry over the past five-plus years is that the acquired companies will eventually need to exit. We may start to see this play out in 2025, but the real action is going to be in 2026 and beyond.</p>
<h2 id="this-is-all-great-but-two-plus-years-is-an-eternity">This is all great, but two-plus years is an eternity</h2>
<p>It's fun to look at IPO lists, but all of this is going to take years to get sorted out.</p>
<p>Don't take this list too literally, though. Several of these companies <em>will</em> go public. Others will get acquired. A few might falter.</p>
<p>Two-plus years is an eternity.</p>
<p>Any of the 100+ cybersecurity-related <a href="https://strategyofsecurity.com/p/dry-january-the-sobering-state-of-public-markets-for-cybersecurity-companies/">companies valued at a billion or more</a> could technically be considered IPO candidates. Life comes at you fast though — for better and worse.</p>
<p>Just ask anyone at Lacework, who easily would have been considered an IPO candidate 2-3 years ago. They now have the dubious distinction of being one of the most spectacular meltdowns in the history of tech.³</p>
<p>The flip side is also true. Cybersecurity is building large and highly-valued companies <a href="https://softwareanalyst.substack.com/p/the-wiz-playbook-how-they-dominated?ref=content.strategyofsecurity.com">faster than ever</a>.</p>
<p>There will definitely be companies we didn't talk about today that will be obvious IPO candidates in a couple years.</p>
<p>Like I said, two-plus years is an eternity.</p>
<p>For now, let's celebrate that the cybersecurity IPO pipeline is alive and well. The timeline will align when it’s ready.</p>
<hr>
<h3 id="footnotes">Footnotes</h3>
<p>¹Doing this is more speculative, of course. It's hard to accurately predict IPOs even one year out, let alone two or more. Some of my analysis is bound to be wrong in retrospect. Consider this a starting point that we'll adjust over time.</p>
<p>²As humble, understated Minnesotans do.</p>
<p>³Although very salvageable within the <a href="https://www.linkedin.com/posts/colegrolmus_fortinet-needed-to-do-a-transformative-deal-activity-7206341789455134720-QqEN?utm_source=share&utm_medium=member_desktop">friendly confines of Fortinet</a>. This wasn't an FTX or Theranos situation — just blitzscaling gone sideways.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/12/header-cybersecuritys-ipo-pipeline-2026-beyond-2.png"/>
        </item>
        <item>
            <title><![CDATA[Cybersecurity's IPO Pipeline: 2025 Candidates]]></title>
            <link>https://strategyofsecurity.com/cybersecuritys-ipo-pipeline-2025-candidates/</link>
            <guid>67367d4c9ea1830001fb115d</guid>
            <pubDate>Thu, 14 Nov 2024 23:21:06 GMT</pubDate>
            <description><![CDATA[2025 could be a big year for cybersecurity-related IPOs. Here's who the most likely candidates are.]]></description>
            <content:encoded><![CDATA[<p>It's been a minute since we've <a href="https://strategyofsecurity.com/p/revisiting-cybersecuritys-2022-ipo-pipeline/">talked about</a> cybersecurity's IPO pipeline. There's a good explanation: our&nbsp;2022 IPO pipeline did not go as planned.</p>
<p>It’s almost 2025 now. Zero companies from the 2022 list have gone public.</p>
<p><em>Zero.</em></p>
<p>Outside of my list, there has been a <em>tiny</em> bit of activity:</p>
<ul>
<li>
<p>One traditional IPO for a cybersecurity-related company (<a href="https://www.linkedin.com/posts/colegrolmus_rubrik-finally-put-an-end-to-the-longest-activity-7189378446102274048-vHLd?utm_source=share&utm_medium=member_desktop">Rubrik in 2024</a>)¹</p>
</li>
<li>
<p>Two nano-cap IPOs on U.S. exchanges (CISO Global and HUB Security in 2023)</p>
</li>
<li>
<p>Two international listings (Hanssak and Yubico in 2023)</p>
</li>
</ul>
<p>Better than nothing...but a pure-play cybersecurity company hasn't gone public <a href="https://strategyofsecurity.com/p/forgerock-ipo/">since ForgeRock</a> over 1,000 days ago. They've since been taken private and merged into Ping Identity.</p>
<p>This has been the story of the past three years: dozens of companies <a href="https://strategyofsecurity.com/p/dry-january-the-sobering-state-of-public-markets-for-cybersecurity-companies/">are stuck</a> in the IPO pipeline, and more companies have been <a href="https://strategyofsecurity.com/p/cybersecurity-is-going-private/">taken private</a> than public.</p>
<p>So, all of this is to say: cybersecurity <em>has</em> an IPO pipeline — it just hasn't been very active.</p>
<p>It sure looks like 2025 (and beyond) is going to be different.</p>
<p>Tech IPOs have slowly resumed. Valuations have reset and stabilized. The incoming administration in the United States is pro-business with a relatively hands-off track record on regulation and antitrust enforcement.</p>
<p>More importantly, great companies are still great companies no matter what the economic circumstances. Cybersecurity has a lot of great companies in the IPO pipeline right now.</p>
<p>We're going to see more IPOs in the next three years than we have in the last three. There's an outside chance we could even break some previous records. But the bar is <a href="https://strategyofsecurity.com/p/bigger-faster-stronger-the-new-standard-for-public-cybersecurity-companies/">still high</a>.</p>
<p>The three year, thousand-plus day IPO drought has put us in an interesting conundrum for analyzing our IPO candidates. There are <em>too many</em> companies in the pipeline to reasonably cover in one article.</p>
<p>This analysis is focused on companies who have a reasonable probability of going public in 2025.² We'll cover the pipeline for 2026 and beyond next time.</p>
<p>Before we get to the companies, you should know about an interesting dynamic in the current IPO pipeline.</p>
<h2 id="private-equity-owns-a-lot-of-large-cybersecurity-companies">Private equity owns a lot of large cybersecurity companies</h2>
<p>The flip side of all the take-private activity by private equity firms in cybersecurity  is...well, they own a lot of large cybersecurity companies now.</p>
<p>Private equity owns five of the 16 companies I have as candidates for the 2025 IPO pipeline. They also own six other companies who could go public in the next 2-3 years. Put differently, private equity owns about a third of the ~30 companies in the near-term IPO pipeline (the next three years).</p>
<p>This is a lot different dynamic than our previous IPO windows. We're used to venture-backed companies bursting onto the scene as the next big thing. All of the <a href="https://strategyofsecurity.com/p/cybersecuritys-class-conundrum/">A-list</a> cybersecurity (+related) companies of today went public this way.³</p>
<p>A handful of companies have taken a detour through private equity ownership on their way to public markets. SailPoint was owned by <a href="https://www.thomabravo.com/behindthedeal/revisiting-how-thoma-bravo-took-sailpoint-public-and-then-private-again?ref=content.strategyofsecurity.com">Thoma Bravo</a>, and Ping Identity was owned by <a href="https://www.businesswire.com/news/home/20221018005764/en/Vista-Equity-Partners-Exits-Ping-Identity?ref=content.strategyofsecurity.com">Vista Equity Partners</a> before each went public (the first time). Jamf was also <a href="https://www.summitpartners.com/news/jamf-to-receive-majority-investment?ref=content.strategyofsecurity.com">majority-owned</a> by Vista Equity Partners before going public in 2020.</p>
<p>These were all private-to-private transactions, though. Private equity firms acquired these later-stage private companies and put on the finishing touches (and provided some liquidity) before taking them public.</p>
<p>Our pipeline still has a few never-before-public companies in private equity holding. What's different is the number of <em>previously public companies</em> who were taken private.</p>
<p>These were large, well known companies with revenue in the hundreds of millions (or higher). They ran into challenges with things like scale, growth, profitability, leadership, and/or other major business transitions that were better to address as private companies.</p>
<p>Several of them are going to be ready to go public again soon. In fact, a few are probably going to be the first companies to list in 2025.</p>
<p>Let's move on to the companies in the IPO pipeline, and I'll tell you why.</p>
<h2 id="the-2025-ipo-candidates">The 2025 IPO candidates</h2>
<p>Of the 100+ cybersecurity-related companies I've analyzed for IPO potential, 16 of them have a realistic shot at going public in 2025:</p>
<p><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/11/cybersecuritys-2025-ipo-pipeline-list.png" alt="cybersecuritys-2025-ipo-pipeline-list.png" loading="lazy"></p>
<p>These are probably names you've heard a lot about. An IPO candidate, at least in the traditional sense, means being among the who's who of an industry. Cybersecurity is no exception, especially as the profile of our industry has gained prominence across tech and capital markets.</p>
<p>For this level of analysis, the relevant distinction is between PE-backed and venture-backed companies.</p>
<h3 id="pe-backed-companies">PE-backed companies</h3>
<p>There are five private equity owned companies in the 2025 pipeline. Four of the five have been public before (Mimecast, Proofpoint, SailPoint, and Sophos). Kaseya is a hybrid cybersecurity company (at best), but they do enough in cybersecurity to be mentioned.</p>
<p>This group has been among the most active strategic M&amp;A buyers, highlighted by Sophos buying Secureworks (a public company) for $859 million in one of the <a href="https://www.linkedin.com/posts/colegrolmus_the-sophos-secureworks-deal-announced-earlier-activity-7255631369475649539-_8f1/?ref=content.strategyofsecurity.com">largest cybersecurity services transactions</a> we've ever seen. Kaseya, Mimecast, Proofpoint, and SailPoint have all made smaller tuck-in acquisitions, too.</p>
<p>Based on <a href="https://www.bankinfosecurity.com/blogs/thoma-bravo-considering-taking-sailpoint-public-again-p-3719?ref=content.strategyofsecurity.com">recent reporting</a>, SailPoint will likely be the first <a href="https://strategyofsecurity.com/p/what-would-it-take-for-sailpoint-to-go-public-again/">company to go out</a> among this group. It may even be the first IPO of any company in the pipeline.</p>
<h3 id="venture-backed-companies">Venture-backed companies</h3>
<p>The 11 venture-backed companies in the 2025 pipeline have all waited patiently for their IPO window to open. Four of them were candidates on my (much shorter) <a href="https://strategyofsecurity.com/p/cybersecuritys-2022-ipo-pipeline-part-1">2022</a> <a href="https://strategyofsecurity.com/p/cybersecuritys-2022-ipo-pipeline-part-2">pipeline</a> <a href="https://strategyofsecurity.com/p/revisiting-cybersecuritys-2022-ipo-pipeline/">list</a>.</p>
<p>Most have been durable companies throughout the post-2021 decline, either raising more capital or debt to extend their runway (and grow, or at least preserve, their valuations). They've made lists like the <a href="https://www.forbes.com/lists/cloud100/?ref=content.strategyofsecurity.com">Forbes Cloud 100</a> Lightspeed's <a href="https://lsvp.com/cyber60-2024-2025/?ref=content.strategyofsecurity.com">Cyber 60</a>, and more.</p>
<p>You're not here to gawk at lists, though. You're here to dig in deeper.</p>
<p>There are reasons <em>why</em> all of these companies are near-term IPO candidates, both qualitative and quantitative. Let's talk about the qualitative side first.</p>
<h2 id="the-qualitative-side-who-has-said-theyre-going-public">The qualitative side: who has said they're going public</h2>
<p>As much as we can try to quantify the probability a company will go public, there's a lot of judgment involved. It's unavoidable. We're dealing with private companies, which means we have limited information about their financials until they file an S-1.</p>
<p>This means qualitative factors carry a lot of weight. The biggest factor here is who straight up <em>said</em> they're going to go public (and when).</p>
<p>Statements like these can sometimes be posturing. A handful are dated. Intent counts for something, though.</p>
<p>When a founder or CEO says their company is going to go public, we should believe them (to some extent, at least). Even more so if the numbers back it up. Every company in this list has the numbers (and/or other factors ) to go with it. We'll get into the numbers side shortly.</p>
<p>For now, here are (relatively) concrete statements about IPO intent and timing for companies in 2025 IPO pipeline. The quotes are either directly from founders/executives, investors, or credible media sources:</p>
<p><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/11/2025-ipo-pipeline-statements.png" alt="2025-ipo-pipeline-statements.png" loading="lazy"></p>
<p>Mileage varies on the degree of commitment each statement carries, but my judgment says none (or very few) of these are a stretch.</p>
<p>It's also worth noting who <em>hasn't</em> said anything. Mimecast and Sophos are the only two companies from the 2025 pipeline without any specific comments about going public again (that I could find, anyway).</p>
<p>Both have been public companies before. We don't need to hear them say the plan is to public again — of course it is. The bigger question is <em>when</em>, and the quantitative side can help us figure that part out.</p>
<p>This is exactly where we're heading next.</p>
<h2 id="the-quantitative-side-revenue-valuation-financing-and-incentives">The quantitative side: revenue, valuation, financing, and incentives</h2>
<p>A company can <em>say</em> they want to go public, but actually doing it is another thing. They need the numbers to back it up if they want to have a successful IPO and stay in public markets. This is where the quantitative part comes in.</p>
<p>Most of the companies in the 2025 IPO pipeline have strong quantitative reasons to help convince us they're a near-term candidates. Again, we're dealing with imperfect information any time we analyze private companies, but we can make the best of what we have.</p>
<p>The three most helpful quantitative factors are revenue estimates (better yet, disclosures), valuation and financing, and (in the case of PE-backed companies) how long their holding period has been.</p>
<h3 id="estimated-revenue">Estimated revenue</h3>
<p>As we've moved past the ZIRP era, a big shocker for pre-IPO companies has been the revenue scale required to go public. Cybersecurity IPOs from 2003-2020 had a relative average of ~$175 million in annual revenue. Dozens of companies in our current IPO pipeline have been well above this mark for years.</p>
<p>Profitable Efficient Growth (PEG), otherwise known as the Low-Burn/High-Growth Era, came along and raised the bar significantly. Software IPOs in 2022 and 2023 (not many, but still) averaged $788 million in revenue.</p>
<p>Closer to home, Rubrik had $627.9 million of total revenue when they went public in Q2'24. Their revenue scale was ~2.3x larger than the next highest traditional IPO in the history of the cybersecurity industry.</p>
<p>We've entered a different era. Scale matters.</p>
<p>The exact revenue scale range is still <a href="https://cloudedjudgement.substack.com/p/clouded-judgement-62124-what-it-takes?ref=content.strategyofsecurity.com">widely debated</a>, partly because we don't have many software IPOs to benchmark. For this discussion, let's say $500 million is pretty safe, and $250 million or above with amazing growth is possible.</p>
<p>Here's where the companies in cybersecurity's 2025 IPO pipeline stand, including both revenue disclosures and estimated revenue ranges projected from publicly available information:</p>
<p><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/11/2025-ipo-pipeline-estimated-revenue-disclosures.png" alt="2025-ipo-pipeline-estimated-revenue-disclosures.png" loading="lazy"></p>
<p>Five companies are at (or very close to) $1 billion or more in revenue already. The scale part is a no-brainer. We'll have to wait for the S-1 filings to see the rest of the operating metrics. Unsurprisingly, this group of companies also had the most specific statements about IPO intent and timing.</p>
<p>The $500-999 million revenue range also has five companies, some of which are likely on the higher end of the range. I expect growth rates for this group are also very high, and not only the <a href="https://techcrunch.com/2024/10/23/wiz-hopes-to-hit-1b-in-arr-in-2025-before-an-ipo-after-turning-down-googles-23b/?ref=content.strategyofsecurity.com">blistering pace</a> Wiz is growing at.</p>
<p>Druva and Snyk are likely between $250-499 million in revenue based on recent disclosures. The success of subscale IPOs is probably case-by-case at this point. Both companies have a story for their path to $1 billion, which is good enough to be considered a candidate for 2025.</p>
<p>Four companies are either between $100-249 million of revenue or haven't provided enough information to make a reasonable estimate. They're on the list because of tangible actions they've taken to go public. Cato Networks <a href="https://www.reuters.com/technology/cybersecurity/cybersecurity-firm-cato-networks-hires-banks-2025-ipo-sources-say-2024-03-19/?ref=content.strategyofsecurity.com">hired bankers</a>. Bitdefender has <a href="https://www.bitdefender.com/en-us/news/bitdefender-announces-confidential-submission-of-draft-registration-statement-to-sec-for-proposed-u-s-listing-4052?ref=content.strategyofsecurity.com">started the process</a> of listing before. Coalition's CEO said their plan is to go public after a couple other IPOs happen. Socure had a <a href="https://www.bloomberg.com/news/articles/2023-09-21/socure-names-aaron-barfoot-cfo-ahead-of-potential-ipo?srnd=deals&ref=content.strategyofsecurity.com">credible report</a> of IPO plans.</p>
<p>Revenue scale is the best quantitative measure we have available, but other metrics matter in the broader context of incentives.</p>
<h3 id="valuation-and-financing">Valuation and financing</h3>
<p>Valuation and financing are by no means direct measures of IPO readiness, but they tell us a lot about the expectations stakeholders have — especially investors.</p>
<p>Late stage companies backed by venture capital, and especially private equity acquisitions, all have pretty clear and reliable valuation metrics. Investors aren't just pulling numbers out of the sky for companies at this stage. Valuations are based on reliable comps, detailed financial models, and years of preparation to shape the them into IPO-ready machines.</p>
<p>The 2025 IPO candidates hold most of the highest valuations among all cybersecurity-related companies:</p>
<p><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/11/2025-ipo-pipeline-valuations.png" alt="2025-ipo-pipeline-valuations.png" loading="lazy"></p>
<p>And remember, the valuations you see here are just the <em>most recently disclosed</em> numbers we have. Current valuations could go up or down when marked to market today.</p>
<p>I didn't go all the way into reconciling estimated revenue with prior valuations based on current multiples. It's safe to say most of these valuations are stable, though.</p>
<p>And then there's Wiz — valued at $12 billion on paper, <a href="https://www.linkedin.com/posts/colegrolmus_wiz-walking-away-from-alphabet-is-cybersecuritys-activity-7221524085506195456-fLOi?utm_source=share&utm_medium=member_desktop">declined</a> a $23 billion acquisition offer from Google, and currently reported to be <a href="https://www.reuters.com/technology/cyber-startup-wiz-explores-shares-sale-up-20-billion-valuation-bloomberg-news-2024-09-24/?ref=content.strategyofsecurity.com">exploring</a> a sale of shares at a $15-20 billion valuation.</p>
<p>For the venture-backed companies, total financing also matters. Companies in the 2025 IPO pipeline have raised more capital than basically any other company in the industry (except a few of the 2026-2027 candidates).</p>
<p>They've also raised the most total capital across the <em>entire history</em> of cybersecurity companies, including all of our current public companies.</p>
<p><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/11/2025-ipo-pipeline-financing.png" alt="2025-ipo-pipeline-financing.png" loading="lazy"></p>
<p>OneTrust, Netskope, and Snyk have all raised over $1 billion. Arctic Wolf, Cohesity, and Wiz are not far behind at $900 million plus each.</p>
<p>Cato Networks, Coalition, and Socure have all raised around $700 million. They're all on the lower end of the revenue scale, all likely under $250 million. Druva has been slightly more efficient, raising $475 million to hit ~$250 million in revenue.</p>
<p>Bitdefender is unique, with most of their $187 million in financing coming from a single secondary round by Vitruvian Partners. They're a Romania-based company with most shares closely held by CEO Florin Talpeș.</p>
<h3 id="private-equity-holding-period">Private equity holding period</h3>
<p>For companies owned by private equity firms, the holding period is a decent predictor for the exit timeline. Private equity firms (very generally) hold companies for 5-7 years.</p>
<p><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/11/2025-ipo-pipeline-pe-holding.png" alt="2025-ipo-pipeline-pe-holding.png" loading="lazy"></p>
<p>Sophos is technically the only company in the 2025 group who has hit the window of a typical PE exit. This specific group of companies is pretty unique, though.</p>
<p>Four of the five companies (everyone except Kaseya) were formerly public companies. They were already large companies when they were taken private (Proofpoint had over $1 billion of revenue in 2021, for example). This means they're likely to exit sooner than the typical PE holding period.</p>
<h2 id="the-gotcha-how-many-cybersecurity-ipos-can-public-markets-handle-in-a-year">The gotcha: how many cybersecurity IPOs can public markets handle in a year?</h2>
<p>The analysis for the 16 companies in the 2025 pipeline <em>seems</em> plausible.⁴ There's just one really, really big gotcha.</p>
<p>We've never had more than 11 cybersecurity-related companies go public in a single year.</p>
<p>If you've been reading Strategy of Security for a while, I don't even need to tell you what year it was.</p>
<p><em>Yeah...</em> 2021.</p>
<p>The second highest year?</p>
<p>Nine in 2020.</p>
<p><em>(I heard that sigh. I feel you.)</em></p>
<p>Here's the distribution since the Dotcom Bubble:</p>
<p><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/11/cybersecurity-ipo-trend.png" alt="cybersecurity-ipo-trend.png" loading="lazy"></p>
<p>Outside of 2020-2021, the annual range for cybersecurity-related listings in IPO windows hovers right around 3-4 companies per year. This includes everything from traditional IPOs to SPACs, both hybrid and pure-play.</p>
<p>And remember, there's an avalanche of 40+ other companies in our IPO pipeline right behind them (more on these another time).</p>
<p>We're going to need five record-breaking IPO years in a row to clear out the backlog.</p>
<p>The next IPO window is going to be a good one. We're talking about an epic, never-before-seen streak here, though. Not going to happen.</p>
<p>It shouldn't be surprising if any one of the companies in the 2025 IPO pipeline goes public next year — but it would be <em>very surprising</em> if all of them do.</p>
<hr>
<h3 id="footnotes">Footnotes</h3>
<p>¹Backups aren't cybersecurity. I hear you. <a href="https://www.linkedin.com/feed/update/urn:li:activity:7189695789458186240/?ref=content.strategyofsecurity.com">Rubrik</a> and <a href="https://strategyofsecurity.com/p/hashicorps-ipo-bottom-up-adoption-and-layering">HashiCorp</a> are not cybersecurity companies by the most strict definition of the term. They are mid-cap technology companies who generate a portion of their revenue from cybersecurity products, to be very specific.</p>
<p>²By "reasonable probability of going public," I mean a decent chance (call it 50/50 or above) based on both qualitative and quantitative data points. All of these companies will not go public in 2025. Some companies will slide into 2026 and beyond. Some companies I have in the pipeline for 2026 and beyond could still go public in 2025. And some companies may never go public. We're playing probabilities here, so this analysis is bound to be wrong some of the time.</p>
<p>³Plus others like SentinelOne, which is still one of the largest pure cybersecurity IPOs in history.</p>
<p>⁴I hope it's plausible, anyway. I want to hear about it if you think I'm off base anywhere.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/header-cybersecuritys-2025-ipo-pipeline-5.png"/>
        </item>
        <item>
            <title><![CDATA[Cybersecurity Is Going Private]]></title>
            <link>https://strategyofsecurity.com/cybersecurity-is-going-private/</link>
            <guid>67103bbdf37d1200019e5a40</guid>
            <pubDate>Wed, 16 Oct 2024 22:29:05 GMT</pubDate>
            <description><![CDATA[Twelve cybersecurity-related companies have disappeared from public markets since 2022. Things might keep getting worse before they get better, but we're going to end up with more public companies soon enough.]]></description>
            <content:encoded><![CDATA[<p>Cybersecurity companies are going private at a shocking rate. We've lost 12 public companies since 2022, including nine pure-play cybersecurity companies.¹</p>
<p>It has also been 1,126 days (as of the day this article was published) and counting since a pure-play cybersecurity company <a href="https://strategyofsecurity.com/p/forgerock-ipo/">went public</a>.²</p>
<p>Our companies are both <em>going</em> private and <em>staying</em> private way, wayyyy more often than the voracious pace we were cranking out public companies at back in 2021 when I (now ominously) proclaimed that <a href="https://strategyofsecurity.com/p/cybersecurity-is-going-public/">cybersecurity is going public</a>.</p>
<p>What's going on here? Is the entire industry going to crumble?!</p>
<p>No, it's not. We're just getting over the sugar high that was 2021 when too many companies (across tech, not just cybersecurity) went public. We're in the no ice cream, hire a personal trainer, get <a href="https://strategyofsecurity.com/p/bigger-faster-stronger-the-new-standard-for-public-cybersecurity-companies/">bigger/faster/stronger period</a> of our industry's journey.</p>
<p>All this change and volatility is unsettling, though. I get it. I literally check my LinkedIn feed first thing every morning to see which big cybersecurity company is getting acquired today. Large acquisitions don't happen every day, of course — but it sure feels like one could happen at any moment.</p>
<p>We need to unpack and thoroughly demystify all of this take-private and strategic acquisition activity. It's hard to make sense of one-off events.</p>
<p>When you look at big picture trends and data logically, I promise you that the future of our industry will start to look a lot more promising than it does today.</p>
<p>We just have to wade through some yucky stuff first. Let's ease into this by talking about something fun...<em>ICE CREAM!</em></p>
<h2 id="ben-jerrys-used-to-be-a-public-company">Ben &amp; Jerry's used to be a public company</h2>
<p>I know, right?! We've all heard of Ben &amp; Jerry's, but I definitely did not know they were a public company for 15 years. It's a super interesting business story.</p>
<p>Ben Cohen and Jerry Greenfield started Ben &amp; Jerry's (I know, who would have thought they would end up being marketing geniuses) with a whopping $12,000 of financing to open an ice cream shop at a renovated gas station in 1978.</p>
<p>Their wacky flavors and quirky brand caught on quickly. Like, rocket ship quickly in the world of consumer brands. They went public in 1985 and expanded rapidly, hitting $58 million of revenue by the end of the decade.</p>
<p>By the 1990s, competition in the premium ice cream market heated up (get it?). Häagen-Dazs and others turned things from an ice cream social into, well, real businesses. Ben &amp; Jerry's struggled with profitability, and (crucially...) the founders realized they didn't really want to manage an actual company.</p>
<p>Unilever acquired Ben &amp; Jerry's in 2000 for $326 million. Instead of letting the company melt, they found a strategic buyer who could give them the scale, distribution, and professional management they needed.</p>
<p>Almost 25 years later, Ben &amp; Jerry's is still recognized as the top premium ice cream brand in the world. They're generating hundreds of millions in revenue (exact figures undisclosed), still making iconic flavors, and still advocating for the social causes they care deeply about.</p>
<p>Does this story feel a little bit familiar? Cybersecurity is a highly competitive industry torn between the societal value of security and the inevitable need for financial stability and growth. We have a lot in common with Ben &amp; Jerry's. Their story might give us a peek into our own future, too.</p>
<p>Let's get back to cybersecurity and talk about what's happening in our own industry today.</p>
<h2 id="whats-happening-a-wicked-decline-in-public-companies">What's happening: a wicked decline in public companies</h2>
<p>Cybersecurity is dropping public companies like it's going out of style. I mean that literally — being a public company feels like it has been out of style for more than two years now:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/net-cybersecurity-listing-activity.png" class="kg-image" alt="" loading="lazy" width="830" height="698" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/10/net-cybersecurity-listing-activity.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/net-cybersecurity-listing-activity.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Before 2022, there was only one year (2010) where our total number of cybersecurity-related public companies went down. <a href="https://investor.hp.com/news-events/news/news-details/2010/HP-Completes-Acquisition-of-ArcSight/default.aspx?ref=content.strategyofsecurity.com">HP acquired ArcSight</a>, and no other companies went public that year. Down one, no big deal.</p>
<p>Something <em>completely different</em> happened in 2021 and 2022. Eight cybersecurity-related companies went public on U.S. exchanges in 2021.³ This included SentinelOne, whose IPO was valued at $8.9 billion — still the most of any pure-play cybersecurity company.⁴</p>
<p>Our IPO momentum violently <a href="https://strategyofsecurity.com/p/revisiting-cybersecuritys-2022-ipo-pipeline/">turned the opposite direction in 2022</a>. ZeroFox (a SPAC who was quickly <a href="https://www.securityweek.com/zerofox-to-be-taken-private-in-350-million-deal/?ref=content.strategyofsecurity.com">taken private</a> in 2024) was the only cybersecurity-related company to go public on a U.S. exchange.</p>
<p>Meanwhile, eight public companies were acquired over roughly the same period. Thoma Bravo's $12.3 billion <a href="https://www.thomabravo.com/press-releases/thoma-bravo-completes-acquisition-of-proofpoint?ref=content.strategyofsecurity.com">acquisition of Proofpoint</a> kicked things off in August 2021. Seven other companies followed throughout 2022.</p>
<p>We're still stuck in the same rut two years later. Seven more cybersecurity-related companies on U.S. exchanges were acquired from 2023 to 2024.</p>
<p>This count doesn't even include IBM's pending <a href="https://www.linkedin.com/posts/colegrolmus_rubrik-finally-put-an-end-to-the-longest-activity-7189378446102274048-vHLd?utm_source=share&utm_medium=member_desktop">acquisition of HashiCorp</a><br>
or Thoma Bravo's completed <a href="https://www.thomabravo.com/press-releases/thoma-bravo-completes-acquisition-of-darktrace?ref=content.strategyofsecurity.com">acquisition of Darktrace</a> (listed on the London Stock Exchange, but a big company) for $5.3 billion.</p>
<p>The total count of cybersecurity-related companies that are publicly traded has gone down by 21% between the 2021 peak and today. Pure-play cybersecurity companies have seen an even steeper decline, down 36% over the same period:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/cumulative-cybersecurity-listing-activity.png" class="kg-image" alt="" loading="lazy" width="830" height="698" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/10/cumulative-cybersecurity-listing-activity.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/cumulative-cybersecurity-listing-activity.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Several more cybersecurity-related companies that are currently public have been rumored to be considering sales:</p>
<ul>
<li>
<p><strong>SolarWinds:</strong> Was reportedly <a href="https://www.crn.com/news/managed-services/solarwinds-may-be-looking-to-go-private-again-report?ref=content.strategyofsecurity.com">exploring a sale</a> in October 2023</p>
</li>
<li>
<p><strong>N-Able:</strong> Reportedly began <a href="https://www.reuters.com/technology/software-company-n-able-explores-sale-sources-say-2024-05-29/?ref=content.strategyofsecurity.com">exploring a sale</a> in May 2024</p>
</li>
<li>
<p><strong>Rapid7:</strong> Started <a href="https://www.reuters.com/markets/us/activist-investor-jana-pushes-rapid7-consider-sale-2024-06-26/?ref=content.strategyofsecurity.com">receiving pressure</a> from an activist investor to sell in June 2024</p>
</li>
<li>
<p><strong>Tenable:</strong> Reportedly began <a href="https://www.bloomberg.com/news/articles/2024-07-30/cybersecurity-firm-tenable-is-said-to-explore-potential-sale?ref=content.strategyofsecurity.com">exploring a sale</a> in July 2024</p>
</li>
<li>
<p><strong>Trend Micro:</strong> Reportedly began <a href="https://www.reuters.com/markets/deals/cybersecurity-firm-trend-micro-explores-sale-sources-say-2024-08-08/?ref=content.strategyofsecurity.com">exploring a sale</a> in August 2024</p>
</li>
<li>
<p><strong>Secureworks:</strong> Dell Technologies, the majority owner, reportedly hired bankers to <a href="https://www.crn.com/news/security/2024/dell-may-seek-to-sell-secureworks-to-private-equity-report?ref=content.strategyofsecurity.com">explore a sale</a> in August 2024</p>
</li>
</ul>
<p>Very speculative rumors have also come and gone about <a href="https://seekingalpha.com/news/3860845-radware-gains-amid-report-of-crowdstrike-targeting-potential-israeli-company?ref=content.strategyofsecurity.com">CrowdStrike acquiring Radware</a> and (get this) <a href="https://www.reuters.com/markets/deals/cybersecurity-startup-wiz-considers-potential-bid-sentinelone-2023-08-25/?ref=content.strategyofsecurity.com">Wiz acquiring SentinelOne</a> — although the latter was <a href="https://www.crn.com/news/security/sentinelone-shuts-down-wiz-acquisition-talk-reports?ref=content.strategyofsecurity.com">summarily dispatched</a> by SentinelOne's leadership team.</p>
<p>On top of the activity with public companies, both strategic buyers and private equity firms are acquiring (or trying to acquire) later stage companies from our IPO pipeline:</p>
<ul>
<li>
<p><strong>Lacework:</strong> <a href="https://www.linkedin.com/posts/colegrolmus_fortinet-needed-to-do-a-transformative-deal-activity-7206341789455134720-QqEN?utm_source=share&utm_medium=member_desktop">Acquired by Fortinet</a> (at a steep valuation decline) in June 2024</p>
</li>
<li>
<p><strong>Wiz:</strong> Attempted <a href="https://www.linkedin.com/posts/colegrolmus_wiz-walking-away-from-alphabet-is-cybersecuritys-activity-7221524085506195456-fLOi?utm_source=share&utm_medium=member_desktop">acquisition by Alphabet</a> (Google) in July 2024</p>
</li>
<li>
<p><strong>Exabeam:</strong> Majority ownership <a href="https://www.linkedin.com/posts/colegrolmus_we-finally-know-the-new-ownership-structure-activity-7221167381602013186-OqcL?utm_source=share&utm_medium=member_desktop">acquired by Thoma Bravo</a> and merged with LogRhythm in July 2024</p>
</li>
<li>
<p><strong>Recorded Future:</strong> <a href="https://strategyofsecurity.com/p/the-strategic-impact-of-mastercards-recorded-future-acquisition/">Acquisition by Mastercard</a> announced in September 2024</p>
</li>
</ul>
<p>We're at 16 pure-play cybersecurity companies listed on public markets right now. It's unlikely (but possible) the number could drop as low as 10 if the reported sales happen and the window of opportunity remains closed for companies in our IPO pipeline.</p>
<p>Okay, so what's happening is very clear: cybersecurity is going private. Next, let's talk about why.</p>
<h2 id="why-its-happening-more-strategic-moves-fewer-investor-complaints">Why it's happening: more strategic moves, fewer investor complaints</h2>
<p>There is a surprising amount of consensus around why so many cybersecurity-related companies have chosen to go private: it's a lot easier to make strategic moves as a private company.⁵</p>
<p>Here's a sampling of quotes to illustrate the point:</p>
<ul>
<li>
<p><strong>Seth Boro (Managing Partner, Thoma Bravo) on Sophos:</strong> "Sophos’ leadership team is empowered to innovate faster and respond to market opportunities more effectively in a private setting."</p>
</li>
<li>
<p><strong>Gary Steele (former Chairman and CEO, Proofpoint):</strong> "We believe that as a private company, we can be even more agile with greater flexibility to continue investing in innovation, building on our leadership position and staying ahead of threat actors."</p>
</li>
<li>
<p><strong>Andre Durand (CEO, Ping Identity):</strong> "This move allows us to focus entirely on our innovation and customer success, without the distractions that can come with being a public company."</p>
</li>
<li>
<p><strong>Seth Boro (again) on SailPoint:</strong> "...taking a step back from the public markets at the time that the company did, we think is a great decision to accelerate this move to cloud and come out the other side as a, both a high growth and high profit business."</p>
</li>
</ul>
<p>Their public statements are intentionally broad, of course. And this is not the only reason.</p>
<p>There's an elephant in the room we don't like to talk about. The thing most of our companies who were acquired (especially by private equity firms) had in common was declining growth and a lack of profitability.</p>
<p>From the standpoint of a CEO, it's better to take the company private or sell to a strategic buyer and work on the business outside the spotlight of public markets, especially with strong acquisition offers on the table.</p>
<p>Most of our public companies who sold are solid companies who do several things well. We've had a <a href="https://siliconangle.com/2023/10/01/network-security-company-ironnet-ceases-operations-two-years-going-public/?ref=content.strategyofsecurity.com">couple</a> <a href="https://www.scworld.com/brief/zerofox-to-be-acquired-for-nearly-350m?ref=content.strategyofsecurity.com">fire sales</a>, but those are rare exceptions.</p>
<p>We're mostly in the position Ben &amp; Jerry's was in — solid companies with a few problems but lots of upside. Our companies have options, which gives them the ability to make choices strategically.</p>
<p>Let's talk more about the strategic options cybersecurity companies have and where they go after exiting the public markets.</p>
<h2 id="where-they-go-private-equity-and-some-very-large-strategic-acquisitions">Where they go: private equity and some very large strategic acquisitions</h2>
<p>Historically, cybersecurity-related companies leave the public markets in one of two ways: an acquisition by a private equity firm, or an acquisition by a strategic acquirer.</p>
<p>Any other scenarios are highly unlikely. Bankruptcies <a href="https://www.bankinfosecurity.com/ironnet-ran-out-cash-filed-for-chapter-11-bankruptcy-a-23318?ref=content.strategyofsecurity.com">have happened</a>, but they've been limited to small micro and nano cap companies. Across the entire history of cybersecurity, one hundred percent of the 27 mid cap and above company delistings are because of private equity or strategic acquisitions.</p>
<p>The breakdown between the two categories is the interesting part. Private equity firms have made 19 take-private acquisitions, or 70% of the total:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/public-cybersecurity-pe-acquisitions.png" class="kg-image" alt="" loading="lazy" width="830" height="1673" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/10/public-cybersecurity-pe-acquisitions.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/public-cybersecurity-pe-acquisitions.png 830w" sizes="(min-width: 720px) 720px"></figure><p><a href="https://strategyofsecurity.com/p/bravo-thoma-bravo">Thoma Bravo alone</a> has been behind eight of the deals, to go along with ~20 other private cybersecurity company acquisitions in their portfolio.</p>
<p>Strategic buyers have acquired eight public companies, or 30% of the total:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/public-cybersecurity-strategic-acquisitions.png" class="kg-image" alt="" loading="lazy" width="830" height="940" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/10/public-cybersecurity-strategic-acquisitions.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/public-cybersecurity-strategic-acquisitions.png 830w" sizes="(min-width: 720px) 720px"></figure><p>All buyers are either large or mega cap tech companies. Cisco is the only repeat strategic buyer (probably <a href="https://strategyofsecurity.com/p/ciscos-cybersecurity-shopping-spree-part-1/">no</a> <a href="https://strategyofsecurity.com/p/ciscos-cybersecurity-shopping-spree-part-2/">surprise</a>).</p>
<p>This PE-to-strategic ratio is probably going to continue and may slant even further towards the private equity side. There aren't many bargain rack discounts left among the cybersecurity-related public companies we have left. Buying a large public company is expensive, so the buyer universe for this type of transaction is small.</p>
<p>Here's the thing about private equity, though: private equity ownership is almost never a final destination for an acquired company.</p>
<p>Private equity is like flipping houses. They buy a company to hold it for a period of time (typically 5-7 years, but it's case-by-case), improve the business, and (ideally) sell it for a profit.</p>
<p>It's pretty rare to see private equity firms hold on to portfolio companies long term. This means our industry has over 20 formerly public companies who are sitting in private equity holding right now and need to find a permanent home soon.</p>
<p>The two best options are taking the company public again or selling it to a strategic buyer in a private transaction. Those scenarios are the <em>real</em> end game here.</p>
<p>They've happened before in cybersecurity...just not as often or at the same scale as what <em>needs</em> to happen with the current set of private equity backed companies.</p>
<p>The absolute best case scenarios are either for a healthy, growing company to go public again and stay there, or to find the right strategic buyer. This doesn't always happen, of course — but I'm hopeful it can a majority of the time.</p>
<p>Imperva and ForgeRock are both good examples of companies who found a good strategic fit. Thales <a href="https://www.thalesgroup.com/en/worldwide/security/press_release/thales-completes-acquisition-imperva-creating-global-leader?ref=content.strategyofsecurity.com">added Imperva</a> to its now pretty massive portfolio of cybersecurity products in December 2023. Thoma Bravo <a href="https://www.darkreading.com/cybersecurity-operations/thoma-bravo-practical-decision-merge-forgerock-into-ping-identity?ref=content.strategyofsecurity.com">merged</a> ForgeRock into Ping Identity in September 2023, a logical strategic choice for two portfolio companies competing against Okta, CyberArk, and Microsoft.</p>
<p>SailPoint looks like it's going to be an example of a <a href="https://strategyofsecurity.com/p/what-would-it-take-for-sailpoint-to-go-public-again/">successful return</a> from private equity to the public markets. In under three years, no less. This was their plan all along, and it appears they've executed perfectly.</p>
<p>These examples are successful blueprints. We need high performing companies going back into the public markets and staying there, and we need companies who aren't going to make it public again to find good homes.</p>
<p>In fact, our future probably looks a lot like Ben &amp; Jerry's.</p>
<h2 id="how-this-ends-ben-jerrys-is-in-our-future">How this ends: Ben &amp; Jerry's is in our future</h2>
<p>The company, I mean. You're not getting ice cream.</p>
<p><em>...okay, you can have ice cream if you want.</em></p>
<p>You're not my toddler, you can do whatever you feel like. You probably deserve it by the end of this article.</p>
<p>Seriously though, my point with the Ben &amp; Jerry's thing is that it's okay for a company to take a step back and regroup if it needs to.</p>
<p>Just because a company gets taken private doesn't mean it is imminently dead. Too often, we see headlines and instinctively assume the worst.</p>
<p>I understand. It's a natural reaction. Let's put our logic hats on for a minute, though.</p>
<p>As I've <a href="https://www.linkedin.com/posts/colegrolmus_big-cybersecurity-companies-dont-really-activity-7207406023198846977-dHOo?utm_source=share&utm_medium=member_desktop">said before</a>, big cybersecurity companies don't really "die." They're just smashed into pieces and split, merged, divested, rebranded, or any other action you can take on a business without actually killing it.</p>
<p>Later stage cybersecurity companies with 8-9 figures of annual revenue don't fully go out of business, no matter how bad they're struggling. They've created enough value for <em>someone</em> to find their problems worth fixing.</p>
<p>Each company's situation is incredibly nuanced, especially <em>how</em> to fix the problems that led to being taken private. It's not going to work out for everyone — they won't all be Ben &amp; Jerry's.</p>
<p>Instead, we're going to see uneven outcomes. Several companies will go public again. Others will find nice homes with strategic buyers. And the ice cream will melt on a few of them.</p>
<p>We just want to save as many ice cream cones as we can. The example of Ben &amp; Jerry's selling to the right strategic buyer is a perfectly good outcome, too. Sometimes it's better <em>not</em> to be a standalone company. We need to be okay with this.</p>
<p>Any way you look at it, we're going to end up with more public companies than we have right now. There are plenty of high quality IPO candidates between the current set of private equity holdings and later stage startups.</p>
<p>Cybersecurity might be going private now, but we'll be back to going public again soon.</p>
<hr><h3 id="footnotes">Footnotes</h3>
<p>¹This count includes cybersecurity and hybrid companies listed on major U.S. stock exchanges. It excludes micro and nano cap companies. They skew the numbers quite a bit. The focus for this article is on our larger companies with higher valuations, although we'll mention some of the micro and nano cap companies.</p>
<p>²A mid-cap or higher company, that is. <a href="https://strategyofsecurity.com/p/hashicorps-ipo-bottom-up-adoption-and-layering">HashiCorp</a> and <a href="https://www.linkedin.com/posts/colegrolmus_rubrik-will-easily-be-the-largest-scale-cybersecurity-activity-7180947148044144640-L57f?utm_source=share&utm_medium=member_desktop">Rubrik</a> both went public more recently than ForgeRock, but they're technically "hybrid" companies.</p>
<p>³The real total was even higher: 17 companies went public in 2021, including micro and nano cap companies and all global stock exchanges. It was a wild year.</p>
<p>⁴As of its opening valuation, anyway. CrowdStrike opened its first day at $6.7 billion in 2019 but <a href="https://warburgpincus.com/2019/06/21/crowdstrike-issues-the-largest-ipo-for-a-cybersecurity-company/?ref=content.strategyofsecurity.com">closed at $14 billion</a>.</p>
<p>⁵<em>Publicly disclosed</em> consensus, that is. I understand why you might want to dismiss this as boilerplate language for press releases. There's still some truth to it though, at least at a high level. It's undeniably difficult to be a subscale public company right now.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/header-cybersecurity-is-going-private-1.png"/>
        </item>
        <item>
            <title><![CDATA[Cybersecurity Business Models: A Dollar of Revenue Doesn't Equal a Dollar of Revenue]]></title>
            <link>https://strategyofsecurity.com/cybersecurity-business-models-a-dollar-of-revenue-doesnt-equal-a-dollar-of-revenue/</link>
            <guid>67084671d8b3e700010e9186</guid>
            <pubDate>Thu, 10 Oct 2024 22:28:54 GMT</pubDate>
            <description><![CDATA[A practical evaluation of product and services businesses in cybersecurity through the thick glasses of Warren Buffett and Charlie Munger.]]></description>
            <content:encoded><![CDATA[<p>A dollar of revenue doesn't equal a dollar of revenue. Not when you're comparing different types of businesses, anyway.</p>
<p>Sounds like some 1984-level propaganda, right?!¹</p>
<p>In George Orwell's <a href="https://www.amazon.com/1984-George-Orwell-ebook/dp/B0CW19ZJFW/?ref=content.strategyofsecurity.com">famous book</a>, the statement "2 + 2 = 5" is a tool used by the Party to demonstrate its ability to bend reality. They wear down people's minds to a point where they are forced to believe something that is obviously false.</p>
<p>The narrative and influence in the cybersecurity industry isn't nearly as insidious, of course — but reality can get distorted sometimes in the frenzy of hype and competition.</p>
<p>I recently <a href="https://www.linkedin.com/posts/colegrolmus_a-cybersecurity-services-business-unit-has-activity-7245459654636392448-rwUK?utm_source=share&utm_medium=member_desktop">made an observation</a> about Accenture's $9 billion cybersecurity services business unit having more revenue than any pure-play cybersecurity company in the public markets today.  I made the comparison knowing it would create some discourse...and that it did.</p>
<p>Several readers rightly pointed out that comparing revenue (or any financial metrics) between product and services companies is a stretch. I agree, but not to a point of avoiding comparisons altogether.</p>
<p>It's still useful to understand the scale and magnitude of product and services businesses. Both business models are essential parts of the cybersecurity industry. More importantly, there are way more interdependencies between the two than many of us realize.</p>
<p>The part that was missing from my comparison was context. There's a lot of nuance behind how and why different business models work the way they do. Comparing revenue alone is only one dimension (among many) that drives the value of a business.</p>
<p>Comparisons like this need context in a way that's just not possible in the world of social media. This article is to explain the context and nuances.² We're going for beginner-to-intermediate level here — just enough to help you navigate the most common business models for cybersecurity companies.³</p>
<p>I'm partial to Warren Buffett and Charlie Munger's (RIP) old school ways of evaluating businesses. They're both principled, independent thinkers who are categorically immune to business world Doublethink. So, I'm going to channel these two kings and do an old school, Berkshire-style analysis.</p>
<p>Let's kick it off with one of their favorite topics: economic moats.</p>
<h2 id="economic-moats">Economic moats</h2>
<p>Buffett and Munger like businesses with predictable revenue and cash flows. Even better when the competitive advantages driving revenue are hard to replicate. Here is Munger's definition of a good business:</p>
<blockquote>
<p>We have to have a business with a durable competitive advantage—because without that, you’re just fated to compete, and competitors will drive your returns down.</p>
</blockquote>
<p>This, friends, is a moat.</p>
<p>In cybersecurity, you'd think the "predictable revenue" part would make product companies with subscription-based revenue more appealing. It's not quite that simple. Here's why.</p>
<h4 id="product-companies">Product companies</h4>
<p>Most of the earlier stage cybersecurity companies that started in the cloud era have subscription-based pricing, which means recurring revenue. Public companies like CrowdStrike and SentinelOne also have nearly all of their revenue coming from recurring subscriptions.</p>
<p>Other companies who started on premise (like CyberArk and Varonis) have been on multi-year transitions from non-recurring licenses to recurring subscriptions. This cohort of companies is in varying stages of transition with <a href="https://www.linkedin.com/posts/colegrolmus_saas-transitions-are-treacherous-for-public-activity-7160741884821127168-sNgF?utm_source=share&utm_medium=member_desktop">varying degrees of success</a>.</p>
<p>Subscriptions and recurring revenue sure sound wonderful. They are! But just because a company sells products or services by subscription doesn't mean it has the economic moat Buffett and Munger covet.</p>
<p>Most <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/">product categories</a> in cybersecurity are brutally competitive. They often have 10+ companies who all offer solid products. In the eyes of a buyer, they're interchangeable.</p>
<p>Switching costs are real (especially in the enterprise customer segment), but rarely insurmountable. CrowdStrike blew up your Windows systems? No problem, you'll have SentinelOne up and running in a few weeks or less.</p>
<p>Most product companies don't have as strong of an economic moat as you'd think.</p>
<h4 id="services-companies">Services companies</h4>
<p>Business models for services companies are more diverse. Managed services like MSSPs, Virtual CISOs, and other operations-focused services have a subscription-based model.</p>
<p>Traditional consulting, professional services, and systems integrators do not. They usually charge by the (very expensive) hour. A small project for firms like Accenture or PwC is $100,000 or more. Large systems integration projects for enterprise clients are seven figures.</p>
<p>Multi-million-dollar engagement fees might sound awesome, but they're non-recurring. Partners and Directors constantly sweat it out to win new projects. I was one of these people once upon a time, and trust me —&nbsp;chasing non-recurring projects over and over again is hard work.</p>
<p>Services companies may not have the cushy recurring revenue of product companies, but the big firms (and some savvy smaller ones) have <em>incredible</em> economic moats. Things like amazing <a href="https://www.pwc.com/jp/en/press-room/brand-finance-index170217.html?ref=content.strategyofsecurity.com">brand recognition</a>, global scale, and deep client relationships get these firms deeply embedded in the world's largest enterprises. Any experienced enterprise CISO will tell you they're very hard to get rid of.</p>
<p>The big services firms with cybersecurity practices are unique creatures, though. Smaller, cybersecurity-only services firms don't have the luxuries of brand or scale to enjoy the same type of moats.</p>
<p>Some have deep client relationships, which is enough to create a mini-moat on its own. The rest, unfortunately, are transactional with no economic moat at all — just another body shop to get the mundane work done.</p>
<h4 id="reinforcing-economic-moats">Reinforcing economic moats</h4>
<p>A small irony here is that the economic moats of cybersecurity product and services companies reinforce each other.</p>
<p>Services companies need products to generate a large portion of their revenue. Product companies need services to help sell, implement, and operate the products. There's a reason why an estimated <a href="https://www.canalys.com/newsroom/cybersecurity-forecast-2023?ref=content.strategyofsecurity.com">90% of cybersecurity product sales go through channel partners</a>.</p>
<p>Interdependencies manifest themselves differently across customer segments, but they're always a factor. Enterprise environments are complex, and so are the products they implement. Mid-market and SMB customers are less complex, but many of them rely on MSPs and MSSPs to partially or fully operate their cybersecurity functions.</p>
<p>Economic moats are the starting point for Buffett and Munger, but there's a lot more to a good business. Next, let's talk about predictability.</p>
<h2 id="business-predictability">Business predictability</h2>
<p>In the old school, long-term world of Buffett and Munger, "predictability" and "recurring" are not the same thing.</p>
<p>Their version of predictability is measured in decades — a demonstrated history of consistent, stable cash flows year in and year out. In Buffett's words:</p>
<blockquote>
<p>The best business is one that, after you buy it, you can leave it alone for ten years, and it’s still going to generate cash flow.</p>
</blockquote>
<p>This hasn't happened yet in cybersecurity. It doesn't even seem within reach.</p>
<p>Ten years feels like ten lifetimes in our industry. Broadcom and some of the private equity buyers might give this strategy a shot, but heavy reinvestment has been the only way to remain competitive so far.</p>
<p>Here's why we're so unpredictable.</p>
<h4 id="product-companies">Product companies</h4>
<p>Revenue for cybersecurity's product companies is relatively predictable on a <em>near-term</em> basis — our market leaders don't just disappear overnight, and they all have above average retention metrics. Even in cases like <a href="https://strategyofsecurity.com/p/oktas-cinderella-story/">Okta's security incidents</a> or <a href="https://www.linkedin.com/posts/colegrolmus_two-contrarian-views-on-todays-crowdstrike-activity-7220079738759884803-0YNc?utm_source=share&utm_medium=member_desktop">CrowdStrike's global outage</a>, market cap gets wiped out but revenue doesn't.</p>
<p>We don't have the kind of long-term predictability Buffett and Munger cherish, though. Not yet, anyway.</p>
<p>Cybersecurity is a relatively young industry on the time horizon of the industrial era. We don't have many businesses of any kind with demonstrated market leadership over decades. Companies who have reached the top haven't sustained it for long, either. Look no further than <a href="https://www.forbes.com/sites/richardstiennon/2020/03/16/the-demise-of-symantec/?ref=content.strategyofsecurity.com">Symantec</a>.</p>
<p>Pure-play cybersecurity companies like Fortinet and Check Point <em>might</em> be starting to reach the territory of long-term predictability. They were founded in 1993 and 2000, respectively. 30-ish years is just scratching the surface of durability.</p>
<p>Sprinkle in the <a href="https://strategyofsecurity.com/p/bigger-faster-stronger-the-new-standard-for-public-cybersecurity-companies/">10+ private equity take-privates</a> of cybersecurity-related companies in public markets since 2020, ~70 billion-dollar acquisitions (and <a href="https://www.linkedin.com/posts/colegrolmus_strategic-buyers-have-made-seven-and-counting-activity-7208510463301615617-TGYX?utm_source=share&utm_medium=member_desktop">approaching 10 just this year</a>), and ~250 total acquisitions per year, and you get the picture about why they consider industries like ours "unpredictable."</p>
<h4 id="services-companies">Services companies</h4>
<p>Services companies are a bit more boring and predictable, especially the larger ones. Deloitte (179 years), PwC (175 years), EY (175 years), and KPMG (140 years) were all founded in the 1800s (!!!).</p>
<p>Accenture is barely younger than me (who is also starting to get old) at 35 years. Their ill-fated parent company, Arthur Anderson, was 89 years old when it suddenly burst into flames in 2002.</p>
<p>Put differently, the total <em>combined</em> age of the public cybersecurity companies with $1B+ revenue (Palo Alto Networks, Fortinet, Gen Digital, CrowdStrike, Check Point, Okta, Zscaler, and Trend Micro) is 197 years. These newfangled product companies are infants compared to the giant ol' services firms.</p>
<p>They haven't had cybersecurity consulting practices since the 1800s, of course — but they're far more predictable than the raucous product side of our cybersecurity industry house. Right or wrong, the top cybersecurity services firms basically are the top firms year in and year out.</p>
<p>With big services firms, we're talking about incredibly resilient and reliably profitable businesses that have steadily grown and produced cash flows for literally generations. Their revenue growth might only be single digits, give or take, but it rarely goes down.</p>
<p>Mileage varies with predictability for smaller cybersecurity services firms. Without the scale and economic moats the larger firms have, revenue and cash flow can be a lot more unpredictable. For a consulting firm, all it takes is the loss of a big client, slowing momentum in a key partnership, or something wild like a global pandemic to put the business in a bad spot.</p>
<p>Outsourcing and managed services firms like MSSPs and MDR companies have more predictability than consulting firms, even on a smaller scale. They operate in long-term contracts for repeatable, non-project based operational services. Once a managed service provider learns a customer's environment, the switching costs become high. Most companies don't burn through MSSPs year after year, even if the level of service is mediocre.</p>
<p>Generally speaking, cybersecurity services companies are more predictable at any scale (by the Buffett/Munger definition) than product companies. Most of them don't grow to the billion-dollar scale of Accenture, Deloitte, or PwC — but it's rare to see a services firm completely strike out on projects and revenue.</p>
<h4 id="product-companines-need-predictability">Product companines need predictability</h4>
<p>The relative predictability of cybersecurity services companies is a good thing for product companies. It's one of the things that makes channel partnerships valuable.</p>
<p>Successful cybersecurity services firms have (predictably) strong customer relationships. They serve fewer clients than product companies, so it's natural to have deeper relationships than product companies — no matter how slick your AE is.</p>
<p>Anecdotally, services companies pull product companies through into new customer opportunities more than the other way around. The ratio isn't completely imbalanced, but deep customer relationships matter. Sequence matters, too: potential buyers often look to services firms for recommendations and evaluations of cybersecurity products.</p>
<p>From a customer's point of view, the predictability of relationships matters. Products come and go. I saw this myself with identity products during a decade at PwC. First it was Sun Microsystems, then Oracle, then SailPoint, then ForgeRock, now Okta. The churn isn't quite that sequential, but the momentum of product companies as partners definitely comes and goes.</p>
<p>Incentives between product and services companies are aligned a decent amount of the time, though. Services companies need products to implement and operate, and they want to partner with product companies customers want to buy. Product companies want to leverage service provider relationships and increase their odds of winning.  This interdependency works — at least for market leaders and up and coming products that service providers want to partner with.</p>
<p>Next, let's discuss another hallmark of the Berkshire investment philosophy: capital efficiency.</p>
<h2 id="capital-efficiency">Capital efficiency</h2>
<p>One of the core investment criteria for Buffett and Munger is capital efficiency and the ability for a company to generate high returns on invested capital. Charlie Munger, as always, is good for an epic quip:</p>
<blockquote>
<p>A great business is like a great athlete — it has low body fat and lots of muscle. It doesn’t need to spend too much capital to stay competitive.</p>
</blockquote>
<p>Most cybersecurity product and services companies are more like couch potatoes — or, more generously, up-and-coming athletes in the low minor leagues. They lack capital effiency, but it happens for different reasons.</p>
<p>Let's talk about why Warren and Charlie are disappointed in us.</p>
<h4 id="product-companies">Product companies</h4>
<p>Cybersecurity's publicly traded product companies all have respectable gross margins, emphasis <em>gross</em>. Their <em>operating</em> margins are low — more like negative (on average) until a recent emphasis on demonstrating profitability. The operating margins part is what makes them struggle with capital efficiency.</p>
<p>We're going to have to get a little accounting-ish here to explain why the nuances between Cost of Goods Sold (COGS), gross margins, and operating margins matter for product businesses, but it's worth getting into.</p>
<p>SaaS and subscription-based products (so, most of our cybersecurity products today) have very low COGS. The accounting definition has some minor variances, but in general, COGS for product companies includes hosting and infrastructure, third-party licenses or APIs, and sometimes things like customer support and capitalized software development costs.</p>
<p>The punch line is that all of these costs are low for product companies, especially at scale. For example, it barely costs CrowdStrike anything to sell another instance of the Falcon platform. They've already built it, and the marginal cost of replication is essentially zero.</p>
<p>Gross margins are where the good news about capital efficiency for most product companies ends. Operating expenses are a wildly different story.</p>
<p>People like Buffett, Munger, and the accountants aren't letting these fancy software companies off the hook so easy.</p>
<p>COGS is only one part of the equation for expenses. There are <em>tons</em> of other operating expenses. We call them Research and Development (R&amp;D), Sales and Marketing (S&amp;M), and General and Administrative (G&amp;A) in financial reporting, but these are only high level classifications.</p>
<p>A few practical examples of each include:</p>
<ul>
<li>
<p><strong>R&amp;D:</strong> Building and and improving software (you know, like <em>the main function</em> of a product company) mostly avoids COGS and goes into R&amp;D, an operating expense.</p>
</li>
<li>
<p><strong>S&amp;M:</strong> Expensive <a href="https://www.linkedin.com/posts/edsim_feeling-like-old-school-enterprise-software-activity-7249773630358745088-SXdZ?utm_source=share&utm_medium=member_desktop">steak dinnahs</a> with salespeople, booths at RSA Conference (or <a href="https://www.linkedin.com/posts/colegrolmus_one-of-the-biggest-cybersecurity-companies-activity-7194341020845699072-yAJB?utm_source=share&utm_medium=member_desktop">drone shows</a> instead) all add up.</p>
</li>
<li>
<p><strong>G&amp;A:</strong> Cool perks like swanky SOMA offices, ping pong tables, and less fun overhead like finance and HR are all expenses in this bucket.</p>
</li>
</ul>
<p>When you look at a more complete picture of the business and factor in operating expenses, you start to see why capital efficiency is a struggle in the ultra-competitive world of cybersecurity products.</p>
<p>High margins and capital efficiency are two core economic promises of software companies, including ours in cybersecurity. Because the marginal costs of replication are low, a product company's economics get better and better as it scales. Operating expenses continuously become a lower percentage of overall revenue, and they become more and more capital efficient (read: rake money).</p>
<p>It's not an empty promise. This does happen, at least in the broader tech world. The "Magnificent Seven" public tech companies are all good examples, especially the ones who sell purely software. Operating margins for these seven companies are ~20%, way above the S&amp;P 500 average of ~13.5% (today).</p>
<p>Cybersecurity doesn't have any companies who have reached this level of scale yet. Most of our companies have high gross margins and negative operating margins. When expenses like R&amp;D, S&amp;M, and G&amp;A enter the picture, the level of investment required to keep up with the Joneses is gnarly. It's no wonder most of our public and private companies are unprofitable, even if it's technically voluntary.</p>
<p>Will trends like consolidation, <a href="https://strategyofsecurity.com/p/how-could-platformization-work-in-cybersecurity/">platformization</a>, <a href="https://strategyofsecurity.com/p/an-intro-to-consolidation-and-aggregation-in-cybersecurity/">aggregation</a>, or plain old <a href="https://strategyofsecurity.com/p/bigger-faster-stronger-the-new-standard-for-public-cybersecurity-companies/">expense management</a> ever get us over the high bar people like Buffett and Munger have for capital efficiency?  Eventually, yes — for some companies. But it's going to take a while.</p>
<h4 id="services-companies">Services companies</h4>
<p>Cost structures have a major influence on a company's capital efficiency. Basically all cybersecurity services firms have this working against them by default. People cost a lot of money to employ, and they're necessary because services are labor-intensive.</p>
<p>Cybersecurity people are also expensive because they're smart and specialized. You won't find seasoned cybersecurity practitioners just walking down the street. They either have to be paid a small fortune or be trained from junior, usually fresh out of college levels.</p>
<p>Firms like Accenture, Deloitte, and others do both. PwC trained me fresh out of college, then paid a small fortune to retain me as I became more senior. It's a vicious and necessary cycle.</p>
<p>All this expensive labor adds up to a bad combination for capital efficiency.</p>
<p>The part our services firms have going for them is the reinvestment of capital side of the equation. It costs a ton to employ dozens (or thousands) of people, but firms don't have to reinvest much capital in service offerings, sales, or marketing. Their gross margins are bad compared to product companies, but their operating margins can be decent.</p>
<p>Big services firms reinvest in the business like any healthy business does, but cash flows are still high and owners (partners, usually) get nice distributions every year. Accenture's operating margins hover around ~14-15%, which is respectable for any company and borderline incredible for a services company.</p>
<p>From an employee's standpoint, the downside of being both salaried and junior is you can get squeezed for extra time to "reinvest" in the firm. You might get a bigger bonus at the end of the year, but you're not getting paid extra for the overtime hours you work.</p>
<p>Sales and marketing are generally handled by senior client service people, too. They have relationships with CISOs and other senior client people, so it's weird to put an extra sales person in the mix. Directors and Partners get paid a lot, but the firm doesn't have to pay double for its sales counterparts.</p>
<p>Marketing happens, but it's rare. They'll sponsor <a href="https://www.nbcsports.com/golf/news/kpmg-says-company-and-phil-mickelson-mutually-agree-end-partnership?ref=content.strategyofsecurity.com">Phil Mickelson</a> or <a href="https://www.espn.com/golf/news/story?id=4739219&ref=content.strategyofsecurity.com">Tiger Woods</a> once in a while, but flashy marketing campaigns are about as rare as a hole-in-one. Marketing dollars get spent on conferences, thought leadership™, and other fancy things consultants do, but it's not a huge drag on overall capital efficiency.</p>
<p>What cybersecurity services businesses lack in gross margins gets made up in operating margins. They don't have the promise or upside a privileged few product companies achieve at scale, but they're rarely unprofitable.</p>
<h4 id="services-partners-keep-the-product-cost-structures-clean">Services partners keep the product cost structures clean</h4>
<p>One of the main interdependencies between cybersecurity's product and services companies is delivery — strategy, implementation, and operations. Building a good product is hard, but so is getting (and keeping) it up and running in a customer's environment.</p>
<p>Most cybersecurity product companies work with channel partners (services firms) to implement, upgrade, and operate their products. This means product companies don't have to operate a massive services business unit in-house — they just farm out the work to partners and let them take care of it.</p>
<p>From a financial standpoint, partnerships with services companies are a nice boost in capital efficiency for product companies. Most public cybersecurity companies offer services, but it's a single-digit percentage of overall revenue. They're not trying to compete with channel partners, and especially not large cybersecurity services practices like Accenture and PwC.</p>
<p>In a hypothetical world where cybersecurity services firms didn't exist, product companies would be forced to have much larger services business units. They're capable, but their capital efficiency would take a hit because of the people-intensive cost structure of services.</p>
<p>Services are also a different core competency than building products. It's a massive strategic distraction most of the time. Their focus is better spent on building, selling, and supporting core products.</p>
<p>Everything we've talked about so far culminates in one area: scalability, growth, and valuation. Welcome to the main event.</p>
<h2 id="scalability-growth-and-valuation">Scalability, growth, and valuation</h2>
<p>If services companies are so essential to the cybersecurity ecosystem, why do people constantly bag on them? And why are their valuations so much lower than product companies?</p>
<p>Two of the biggest reasons are scalability and growth. Warren Buffett nailed the dilemma:</p>
<blockquote>
<p>The problem with a consulting firm is that you can’t scale it in the same way you can scale a product company. You need more people to sell more services, and that’s hard to scale without losing control of quality.</p>
</blockquote>
<p>Let's talk about why this is and how it drives valuations for both types of companies.</p>
<h4 id="product-companies">Product companies</h4>
<p>Like we discussed in the last section on capital efficiency, the appeal of product companies is building a product once and selling it N number of times. This is pure, unadulterated scalability in business.</p>
<p>With a cybersecurity software product, you get high scalability and low incremental costs. This means growth can happen very, very quickly. Every venture capital investor's dream is to invest early in a flashy new cybersecurity company, have it hit product-market fit, and grow quickly into a massive exit.</p>
<p>You can't grow or scale like this with cybersecurity services companies — we'll get into that in a second.</p>
<p>The implication of these differences in scalability and growth rate is one of the main reasons why both public and private market investors value cybersecurity product companies at higher revenue multiples than services companies. You might get a nice return out of a services company, but the big winners in cybersecurity are product companies.</p>
<p>There's the catch: <em>the big winners</em>.</p>
<p>Product companies are significantly more likely to have (relatively) <a href="https://www.linkedin.com/posts/colegrolmus_the-median-deal-size-for-disclosed-cybersecurity-activity-7179171775895744512-h0pe?utm_source=share&utm_medium=member_desktop">modest exits</a>, get acqui-hired, or fail completely.</p>
<p>But when a cybersecurity company gets the formula right, they grow quickly. The average compound growth rate of our public pure-play cybersecurity companies is 19%, well above the software industry average of 14%. CrowdStrike, SentinelOne, and Zscaler are all growing over 30%, which is among the best of all public software companies.</p>
<p>And then there's Wiz, the <a href="https://www.wiz.io/blog/100m-arr-in-18-months-wiz-becomes-the-fastest-growing-software-company-ever?ref=content.strategyofsecurity.com">fastest-growing software company</a> ever.</p>
<p>Investors have noticed how well cybersecurity-related companies perform, and valuations have skyrocketed. As of this week, six of the top ten companies with the highest valuation multiples have a cybersecurity component (Palantir, CrowdStrike, Cloudflare, ServiceNow, Datadog, and CyberArk).</p>
<p>Valuations, both public and private, are a fickle and inexact science, of course — but ambitious investors are going to bet on our product companies over and over again.</p>
<h4 id="services-companies">Services companies</h4>
<p>Buffett's quote about services businesses is spot on, but I would also add: you need more people to <em>deliver</em> more services, not just sell them.</p>
<p>Delivering quality cybersecurity services at scale is incredibly hard. Delivering quality services at all, <em>no matter what the scale</em>, is incredibly hard. The nature of cybersecurity makes delivery exponentially harder, especially when the business driver for a project is regulatory requirements or a security incident.</p>
<p>Every seasoned enterprise CISO has their own horror stories about projects that went sideways with services firm X, Y, or Z. I've seen this movie dozens of times now. The CISO gets mad, kicks out the team, swears off working with them ever again, and brings in another firm. Maybe their luck is better this time, or maybe it isn't. And the process repeats itself to infinity.</p>
<p>Quality is part of the reason why scaling and growing a cybersecurity services firm is so hard. Marginal cost of replication is not a thing when you're talking about people and time.</p>
<p>If a cybersecurity services firm wins a new project, they can't just clone a team they already have and deploy them the next day. They either have to maintain a bench of people (which is bad because unutilized people cost money without bringing in revenue) or hire more of them. Hiring takes time, and who knows about quality. Scaling is a messy process.</p>
<p>There's a reason why there are only <a href="https://www.linkedin.com/posts/colegrolmus_there-are-only-five-pure-play-cybersecurity-activity-7203413208282382336-mzDT?utm_source=share&utm_medium=member_desktop">five pure-play cybersecurity services companies</a> are publicly traded, and only two have valuations over $100 million. Investors have a hard time with limitations in growth and scalability. It feels a lot more appealing to put their money into software businesses.</p>
<h4 id="big-cybersecurity-services-firms-drive-growth">Big cybersecurity services firms drive growth</h4>
<p>Cybersecurity product companies can grow quickly, but they usually don't do it on their own. It's a top-down, procurement-led world where channel partners drive a lot of sales.</p>
<p>Large services firms like Accenture, PwC, and Deloitte are kingmakers. Many of our current or former public companies — ones like SailPoint, CyberArk, and <a href="https://strategyofsecurity.com/p/forgerock-ipo/">ForgeRock</a> — all had their growth heavily driven by global systems integrator partnerships.</p>
<p>The interdependence also works the other way. Building service offerings around emerging cybersecurity products and use cases is a driver of growth for services firms. The strategic rationale for a lot of cybersecurity services M&amp;A is picking up smaller firms who have expertise with emerging products. One example is PwC's <a href="https://www.pwc.com/us/en/about-us/newsroom/press-releases/pwc-acquires-eagledream-technologies.html?ref=content.strategyofsecurity.com">acquisition of EagleDream</a>, which added cloud security services for AWS.</p>
<p>There are multiple ways for both types of companies to grow, but channel partnerships and joint GTM efforts is a big one in cybersecurity.</p>
<p>We've covered a lot of mechanics and practical examples here. Let's finish by talking about what it all means.</p>
<h2 id="not-better-or-worse-just-different">Not better or worse, just different</h2>
<p>If you take one thing away from the article, I hope it's this: cybersecurity's product and services companies aren't better or worse businesses. They're just different.</p>
<p>Sure, they have different financial and operational characteristics you might classify as "better" or "worse" based on your own view of the world. Other people may have a different view.</p>
<p>Some of us care about investing in or working for a company with high growth potential. Others want consistent returns and long-term stability.</p>
<p>Warren Buffett and Charlie Munger have their view, which is investing in "wonderful business at fair prices." (They've never invested in a cybersecurity company.)⁴</p>
<p>When I decided to work at PwC, I cared about a balance of economic growth, stability, and professional development. I wanted access to learn about the largest companies in the world. I also kept my job during the <a href="https://en.wikipedia.org/wiki/2007%E2%80%932008_financial_crisis?ref=content.strategyofsecurity.com">global financial crisis</a> in 2007-2008. I got exactly what I wanted, which is incredibly valuable to me.</p>
<p>That's exactly the point. Value is derived in so many different ways and depends on so many different things.</p>
<p>Economic value is an important way, for sure. It's not the <em>only</em> way. And it's certainly not possible for cybersecurity product or services companies to create on their own.</p>
<hr><h3 id="acknowledgements">Acknowledgements</h3>
<p>Thank you to <a href="https://www.linkedin.com/in/premiyer/?ref=content.strategyofsecurity.com">Prem Iyer</a> at Palo Alto Networks for teaching me the phrase "a dollar of revenue doesn't equal a dollar of revenue," and for the spirited and respectful LinkedIn discussions on this topic.</p>
<h3 id="footnotes">Footnotes</h3>
<p>¹To be explicitly clear, I'm not saying any of the positioning or investor relations companies in our industry do is as evil or serious as totalitarian political regimes or psychological warfare.</p>
<p>²I don't have an accounting degree, but I've taken masters-level accounting classes and spent enough time working on financial audits at a public accounting firm to have a decent grasp of this.</p>
<p>³If you're an equity analyst or investment banker, you can probably skip this one. My goal is to share a practical explanation of the differences in business models for people who want to understand the industry but don't work in capital markets every day.</p>
<p>⁴Unless you count investments in large insurance firms who issue cybersecurity insurance as a small subset of their overall coverage. Buffett <a href="https://www.cnbc.com/2024/05/31/warren-buffett-worried-about-huge-losses-in-booming-insurance-market.html?ref=content.strategyofsecurity.com">doesn't like it</a>, either.</p>
]]></content:encoded>
            <category>Concepts</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/header-a-dollar-isnt-a-dollar-1.png"/>
        </item>
        <item>
            <title><![CDATA[What Would It Take for SailPoint to Go Public Again?]]></title>
            <link>https://strategyofsecurity.com/what-would-it-take-for-sailpoint-to-go-public-again/</link>
            <guid>66fc140636128200012682ec</guid>
            <pubDate>Tue, 01 Oct 2024 17:54:37 GMT</pubDate>
            <description><![CDATA[If it’s true that Thoma Bravo is once again exploring a SailPoint IPO, here’s what needs to happen for the exit to succeed.]]></description>
            <content:encoded><![CDATA[<p>Thoma Bravo <a href="https://strategyofsecurity.com/p/bravo-thoma-bravo">took SailPoint private</a> just over two years ago, and there are already rumors about plans to go public again.</p>
<p><a href="https://finance.yahoo.com/news/thoma-bravo-said-interview-banks-235250071.html??ref=content.strategyofsecurity.com">Bloomberg</a> and Michael Novinson at <a href="https://www.bankinfosecurity.com/blogs/thoma-bravo-considering-taking-sailpoint-public-again-p-3719?ref=content.strategyofsecurity.com">ISMG</a> did some solid reporting to break the news that Thoma Bravo is talking with bankers to underwrite a potential IPO.</p>
<p>On the surface, this move seems like it's defying the odds for a normal four-to-seven year private equity holding period.</p>
<p>It's defying the odds of the current IPO window, too. There hasn't been <a href="https://www.linkedin.com/posts/colegrolmus_cybersecuritys-official-ipo-drought-is-activity-7189695789458186240-FVqz?utm_source=share&utm_medium=member_desktop">a traditional IPO for a pure cybersecurity company</a> for over 1,000 days (and counting). Current market conditions are <a href="https://strategyofsecurity.com/p/dry-january-the-sobering-state-of-public-markets-for-cybersecurity-companies/">anything but favorable</a>, at least for anyone other than the crème de la crème of the IPO pipeline.</p>
<p>SailPoint is anything but typical, though. I'm <a href="https://x.com/colegrolmus/status/1513579635103182854?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1513579635103182854%7Ctwgr%5E969744f7cca7a1f7f6b532bec0a36ba026018ee3%7Ctwcon%5Es1_c10&ref_url=https%3A%2F%2Froamresearch.com%2F%2Fapp%2Fcolegr%2Fpage%2FDrbxnbr2n&ref=content.strategyofsecurity.com">not convinced</a> they even needed to go private in the first place, but here we are.</p>
<p>Taking SailPoint public again quickly was always part of the plan for Thoma Bravo, as partner Andrew Almeida made very clear in an <a href="https://techcrunch.com/2023/09/19/sailpoint-600m-arr/?ref=content.strategyofsecurity.com">interview with TechCrunch</a>:</p>
<blockquote>
<p>Our plan with SailPoint is to take them public as soon as we can, as an independent company, and re-IPO the business as a more SaaS-heavy, equally-to-higher growth business as to when they were public prior but generating a lot more cash flow.</p>
</blockquote>
<p>News of an impending IPO is exciting to anyone who (a) likes SailPoint, and (b) wants this IPO drought for our industry to end.</p>
<p>This is far from a done deal, but it's credible enough to do some educated speculation about what it might take for SailPoint to go public again and stay there this time.</p>
<p>Let's start at the top with financial metrics.</p>
<h2 id="metrics-meeting-the-brutal-expectations-of-the-low-burn-high-growth-era">Metrics: meeting the brutal expectations of the low-burn, high-growth era</h2>
<p>The first thing SailPoint needs is obvious but complicated: financial metrics that meet the bar of today's low-burn, high-growth era of public markets.</p>
<p>Obvious, because strong financial metrics always underpin a successful IPO.¹</p>
<p>Complicated, because the standards required for a company to go public today are <a href="https://strategyofsecurity.com/p/bigger-faster-stronger-the-new-standard-for-public-cybersecurity-companies/">significantly higher</a> than any previous IPO window, including the first time SailPoint went public in 2017.</p>
<p>Here's the crux of the current situation: Thoma Bravo <a href="https://www.thomabravo.com/press-releases/sailpoint-to-be-acquired-by-thoma-bravo-for-6.9-billion?ref=content.strategyofsecurity.com">acquired SailPoint for $6.9 billion</a>. A great return for Thoma Bravo would be 20% or higher. SailPoint needs to be sold or go public at $8.5 billion (give or take, ideally higher) to make this happen.</p>
<p>The eight-point-five-billion-dollar question is: what metrics would SailPoint need to have to be valued at $8.5 billion?</p>
<p>IPO metrics have been a topic of intense debate within the tech industry this year. The analysis closest to SailPoint's situation is by Jamin Ball, where he breaks down what it takes to be <a href="https://cloudedjudgement.substack.com/p/clouded-judgement-62124-what-it-takes?ref=content.strategyofsecurity.com">valued at 10x revenue</a>. Here's the punch line for performance among software companies valued at premium multiples:</p>
<ul>
<li>
<p><strong>Revenue:</strong> They all have LTM revenue over $600m, and 16 have &gt;$1B in LTM revenue (the top 10 all have LTM revenue &gt;$1B).</p>
</li>
<li>
<p><strong>Growth:</strong> LTM growth ranges from 11% to 42% (median of 25%).</p>
</li>
<li>
<p><strong>Free Cash Flow:</strong> All but one company are Free Cash Flow (FCF) positive with a median LTM FCF margin of 27%.</p>
</li>
</ul>
<p>SailPoint may not need a 10x revenue multiple, but their situation is close enough for the analysis above to be a good blueprint. Let's break down SailPoint's revenue, growth, and FCF one by one.</p>
<h4 id="revenue">Revenue</h4>
<p>Can SailPoint hit $1 billion in revenue? It seems like they can, or maybe already have.</p>
<p>They were sitting at $495.4M of revenue (TTM), $429.5M of ARR, and 31% revenue growth as of their last public earnings report in June 2022. They <a href="https://techcrunch.com/2023/09/19/sailpoint-600m-arr/?guccounter=1&ref=content.strategyofsecurity.com">disclosed</a> $600 million of ARR in Q3 2023. SailPoint's ARR has historically been lower than top-line revenue because they're in the middle of a transition to subscription licensing, so actual revenue is likely much higher.</p>
<p>If we project out SailPoint's revenue since going private at 30% top-line revenue growth, they're likely approaching $1 billion in total revenue already:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/sailpoint-revenue-projection.png" class="kg-image" alt="" loading="lazy" width="830" height="603" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/10/sailpoint-revenue-projection.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/sailpoint-revenue-projection.png 830w" sizes="(min-width: 720px) 720px"></figure><p>A growth rate of 30% might be generous in today's "economic headwinds" world of software purchasing, but they are close to billion-dollar scale at anything over 20% growth.</p>
<p>Speaking of growth...</p>
<h4 id="growth">Growth</h4>
<p>Before going private, SailPoint was right around the cutoff line for cybersecurity's "high growth" and "low growth" cohorts. They averaged 21% top line revenue growth from 2019 to 2021, their last full year as a public company:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/sailpoint-revenue-growth-trend.png" class="kg-image" alt="" loading="lazy" width="830" height="603" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/10/sailpoint-revenue-growth-trend.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/sailpoint-revenue-growth-trend.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Based on historical numbers, they're just below the median of 25% LTM growth among software companies with premium revenue multiples.</p>
<p>Did they get back to 25% or higher since they've been a private company? We won't know for sure until they file their S-1. They hit 27% growth in 2020, so it's been done before. Their platform is just as relevant now as it was then.</p>
<p>And remember, they don't necessarily <em>need</em> a 10x multiple to have a good outcome. If growth is at 20% (exactly where it was when they were taken private), they're still comfortably within the range of growth rates for the top 20 software companies.</p>
<p>If their acquisitions (more on this later) and <a href="https://strategyofsecurity.com/p/oktas-cinderella-story/">other developments</a> in the identity security market have helped drive revenue growth, a 10x multiple might not be so bananas after all.</p>
<p>Now, if only they could grow profitably...</p>
<h4 id="free-cash-flow-fcf">Free Cash Flow (FCF)</h4>
<p>One of the reasons (and probably the main financially-related reason) SailPoint was taken private was the sharp FCF decline they took between the end of 2020 and the time they delisted in mid-2022:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/sailpoint-fcf-pct-trend.png" class="kg-image" alt="" loading="lazy" width="830" height="673" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/10/sailpoint-fcf-pct-trend.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/sailpoint-fcf-pct-trend.png 830w" sizes="(min-width: 720px) 720px"></figure><p>A sharp increase in operating expenses took the wind out of their sails², cratering FCF alongside other spending increases across stock-based compensation and capital expenditures.</p>
<p>They were growing, but not efficiently.</p>
<p>Why did this happen? A lifetime ago in 2021, I <a href="https://strategyofsecurity.com/p/q3-2021-cybersecurity-earnings-strategies-for-services-saas-and-platforms/">talked about</a> how expensive product development (R&amp;D) would get with SailPoint's strategy to continue building (and slowly transitioning customers from) its on-premise and SaaS products:</p>
<blockquote>
<p>SailPoint's challenge with this approach is in product strategy. Continuing to make investments in building both an on-premise and SaaS product is expensive.<br>
<br>
IdentityIQ and IdentityNow are essentially two separate products with minimal overlap in the codebase. This differs from competitors like ForgeRock, who run essentially the same product on-premise and in the cloud.<br>
<br>
A multi-year transition process with no end in sight either means continuously high expenses in developing both products or dilution of progress in both.</p>
</blockquote>
<p>Even though product and R&amp;D expenses increased, they were only part of the story. As it turns out, it's prohibitively expensive to build <em>and</em> sell two different identity platforms. Sales and marketing expenses (as a percentage of revenue) increased by 13% from 2018 to 2020.</p>
<p>They were burning cash by fueling two fires at the same time.</p>
<p>SailPoint's expenses got out of hand for a brief period, but they're still in good shape if Thoma Bravo's private equity financial fitness bootcamp puts them back on track with pre-2021 levels.</p>
<p>Thoma Bravo basically confirmed this is happening already. Again from Andrew Almeida:</p>
<blockquote>
<p>Then Q1 and Q2 of this year, it feels like things are maybe not getting back to peak levels, but certainly, we have a path to better times ahead.&nbsp;.&nbsp;.&nbsp;.&nbsp;The pressure of growing but doing it profitably, SailPoint has [flipped to material EBITDA profitability].</p>
</blockquote>
<p>So, based on everything we just talked about, is a premium multiple possible for SailPoint?</p>
<p>I think it is. Difficult, but possible.</p>
<p>An $8.5 billion valuation (or higher) likely means an 8-9x revenue multiple. It's a premium multiple (based on the <a href="https://cloudedjudgement.substack.com/p/clouded-judgement-92724-the-foundation?ref=content.strategyofsecurity.com">current 5.3x median</a> for software companies), but not an impossible one.</p>
<p>With SailPoint, we're not talking about the need for a top ten revenue multiple in the software industry (currently 15.4x). They only need to be better than your average software company, which I'd argue SailPoint already was before going private.</p>
<p>Here's the thing, though. Financial metrics and revenue multiples are only part of the giant puzzle required to have a successful IPO. Again from Jamin Ball:</p>
<blockquote>
<p>Revenue multiples are tricky. On one hand, they’re a great shorthand that allows us to line up 80+ software companies and evaluate them relatively with a single metric.<br>
<br>
...<br>
<br>
BUT, a revenue multiple is just a shorthand valuation framework. Baked into a revenue multiple are assumptions around growth, margins, market opportunity, competitive dynamics, etc. And most importantly, looking at those assumptions 5-10 years out vs today.</p>
</blockquote>
<p>Market opportunity, competitive dynamics, and 5-10 year thinking aren't financial problems — they're strategy problems. We're all about strategy here, so let's talk about that next.</p>
<h2 id="narrative-a-good-story-around-their-ability-to-win-a-hyper-competitive-identity-security-market">Narrative: a good story around their ability to win a hyper-competitive identity security market</h2>
<p>For SailPoint to have a successful exit, they need to make investors confident they can keep up strong financial metrics and win the market opportunity for workforce identity.</p>
<p>Fortunately for them, the narrative right now is about as good as it's ever going to get.</p>
<p>There is a unique window of opportunity in the identity security market with Okta's security incidents and two major competitors (Ping and ForgeRock) being taken private and merged together.³</p>
<p>SailPoint is well positioned to capture the opportunity — at least in the workforce identity portion of the market.</p>
<p>So, what have they done to take advantage?</p>
<p>Under Thoma Bravo's ownership, they've acquired Privileged Access Management (PAM), third party access, and Identity Threat Detection and Response (ITDR) companies:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/sailpoint-acquisitions.png" class="kg-image" alt="" loading="lazy" width="830" height="715" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/10/sailpoint-acquisitions.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/sailpoint-acquisitions.png 830w" sizes="(min-width: 720px) 720px"></figure><p>This matches two of Okta's moves, including their entry into the PAM and ITDR markets. It also puts SailPoint in a position to compete more directly with CyberArk in PAM.</p>
<p>Outside of M&amp;A, SailPoint was also in the middle of their transition from on-premise to SaaS. This was probably the main strategic reason that drove them to go private.</p>
<p>Anecdotally, I've heard good momentum on SaaS adoption for new implementations. This has to be part of the narrative if they're going to go public again. SailPoint isn't going to completely shed its on-premise identity platform, but marking accelerated migration to SaaS as a W is good enough.</p>
<p>I'm somewhat surprised SailPoint (via Thoma Bravo or otherwise) hasn't tried add Single Sign-On (SSO) and complete the narrative of being a comprehensive workforce identity platform and fully competing with Okta.</p>
<p>There was some speculation about SailPoint also merging with Ping and ForgeRock, but a strategic move like this one may have been too financially risky and too jarring for customers to handle.⁴</p>
<p>The decision <em>not</em> to compete directly with Okta, Azure, CyberArk, and others in workforce SSO is a strategic insight in itself. SailPoint doesn't need to be a complete workforce identity platform. Instead, they need to avoid competition as much as they can.</p>
<p>Their strategy is to completely own the Identity Governance and Administration (IGA) space in the enterprise market. No company has been able to durably lead this market — not Sun Microsystems, Oracle, or anyone else who has been a market leader in the past.</p>
<p>SailPoint is easily in the best position to own the enterprise customer segment between the gaping void of Okta's brand new product and a slew of legacy products. There are tons of <a href="https://strategyofsecurity.com/p/an-interview-with-ron-nissim-about-entitle-and-the-cloud-iga-renaissance/">great</a> cloud-focused IGA <a href="https://strategyofsecurity.com/p/balkanid-and-the-evolution-of-access-governance/">startups</a>, of course — but they're still a ways off from competing directly with SailPoint in the enterprise. Savyint is the only company who comes close.</p>
<p>If the financial metrics were close enough to being IPO-ready, a strong strategic narrative shaping up faster than expected is what could drive Thoma Bravo to accelerate the exit timeline for SailPoint.</p>
<p>But does the exit have to be an IPO? I think it does. Let me tell you why.</p>
<h2 id="alternatives-no-strategic-buyers-at-a-better-outcome-than-an-ipo">Alternatives: No strategic buyers at a better outcome than an IPO</h2>
<p>A second IPO for SailPoint isn't the <em>only</em> option, but it's the most probable. A strategic acquisition seems like a long shot.</p>
<p>Billion-dollar acquisitions <a href="https://www.linkedin.com/posts/colegrolmus_strategic-buyers-have-made-seven-and-counting-activity-7208510463301615617-TGYX/?ref=content.strategyofsecurity.com">don't happen very often</a> in cybersecurity. We've only had ~70 total cybersecurity-related transactions of any kind (PE or strategic) over $1 billion in history. Roughly half of those acquisitions were done by strategic buyers.</p>
<p>And we're only talking about a $1 billion floor here. An $8 billion plus acquisition is a much higher bar to clear.</p>
<p>There have only been ~15 cybersecurity-related acquisitions over $5 billion in the history of the industry, and only ~5 over the $8.5 billion price I guessed it would take for SailPoint to exit.</p>
<p>Broadcom (VMware and Symantec), Cisco (Splunk), and Gen Digital (Avast) are the only three strategic buyers who have ever paid over $8 billion to acquire a cybersecurity company.⁵</p>
<p><a href="https://www.linkedin.com/posts/colegrolmus_our-quest-for-finding-billion-dollar-cybersecurity-activity-7216845848125599745-Fh8m/?ref=content.strategyofsecurity.com">Large and mega-cap tech companies</a> are the only strategic buyers who can realistically absorb an acquisition of this scale. Palo Alto Networks, CrowdStrike, and the rest of the pure cybersecurity companies aren't doing this big of an acquisition — especially not in a market they've been reluctant to enter.</p>
<p>The buyer universe among strategics just doesn't look favorable for SailPoint:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/sailpoint-buyer-universe.png" class="kg-image" alt="" loading="lazy" width="830" height="658" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/10/sailpoint-buyer-universe.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/sailpoint-buyer-universe.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Microsoft Entra is a relatively complete workforce identity suite. Broadcom already owns a Frankenstein of an identity suite, too.⁶ The same goes for Oracle, IBM, and Thales.</p>
<p>Amazon (AWS) doesn't buy many cybersecurity companies, and a product like SailPoint isn't a strategic fit for their roadmap. I expect Cisco will buy an IGA product, but likely an earlier stage company.</p>
<p>We're left with Alphabet (Google Cloud) and HPE as the most likely possibilities unless an unexpected buyer steps up.</p>
<p>Any way you look at it, there just aren't many potential buyers.</p>
<p>I don't see SailPoint wanting to move to another private equity firm, either. Thoma Bravo has <a href="https://www.thomabravo.com/press-releases/kkr-to-acquire-barracuda-networks?ref=content.strategyofsecurity.com">sold portfolio companies to other PE firms</a> before. There's <a href="https://www.thomabravo.com/behindthedeal/revisiting-how-thoma-bravo-took-sailpoint-public-and-then-private-again?ref=content.strategyofsecurity.com">too much mutual respect</a> for something like this to happen with SailPoint.</p>
<p>Going public is the best option Thoma Bravo has for SailPoint if they want to control the timing of the exit.</p>
<h2 id="outcome-not-if-but-when">Outcome: not if, but when</h2>
<p>An IPO for SailPoint seems inevitable. As the old trope goes: it's not if, but when.</p>
<p>They're close to the financial metrics public markets currently expect for premium valuations. The strategic narrative is never going to get better than it is now. And nobody else is going to buy them.</p>
<p>Thoma Bravo doesn't have to do anything unnatural here, though.</p>
<p>The advantage of being only two years into the holding period is patience. They can afford to wait if they determine the timing, valuation, or anything else makes this the wrong time to go public.</p>
<p>We're running out of time for an IPO to happen in 2024, but it's still possible. Otherwise, 2025 seems likely.</p>
<p>The exact timing matters less than the outcome. SailPoint has already gone public and been taken private once. The next time is their last chance.</p>
<hr><h3 id="footnotes">Footnotes</h3>
<p>¹Successful <em>traditional</em> IPOs, anyway. Metrics are kind of out the window for SPACs, reverse mergers, and micro-cap companies who go public. They're generally operating on a smaller scale that's outside the scope of this discussion.</p>
<p>²See what I did there?! Let me have this one. Jokes are hard in financial analysis.</p>
<p>³I know, it's ironic that Thoma Bravo (the same private equity sponsor) is also responsible for this, but it's not as manipulative as it might look. They paid dearly for Ping and ForgeRock ($5.1 billion in total). Tanking both companies to help SailPoint is obviously not a good strategy.</p>
<p>⁴And too difficult for antitrust regulators to stomach. Thoma Bravo's acquisition of ForgeRock already <a href="https://www.bloomberg.com/news/articles/2023-08-11/thoma-bravo-extends-forgerock-deal-closing-to-forestall-doj-suit?ref=content.strategyofsecurity.com">got delayed</a> because of antitrust concerns. Trying to smash three large identity portfolio companies together is probably not a good look.</p>
<p>⁵VMware isn't a pure-play cybersecurity company, either. I included them just to make a point, but it's hard to attribute the cybersecurity-related value of this deal.</p>
<p>⁶Don't you dare <a href="https://strategyofsecurity.com/p/how-could-platformization-work-in-cybersecurity/">call this a platform</a>. It's more like a pile of skeletons left over from CA and Symantec that a few poor enterprises still can't exorcise.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/10/header-sailpoint-ipo-1.png"/>
        </item>
        <item>
            <title><![CDATA[The Strategic Impact of Mastercard's Recorded Future Acquisition]]></title>
            <link>https://strategyofsecurity.com/the-strategic-impact-of-mastercards-recorded-future-acquisition/</link>
            <guid>66f47fc0fd727e0001a169ab</guid>
            <pubDate>Wed, 25 Sep 2024 21:40:43 GMT</pubDate>
            <description><![CDATA[How Mastercard's acquisition of Recorded Future connects the past, present, and future (no pun intended) of the cybersecurity industry.]]></description>
            <content:encoded><![CDATA[<p>Mastercard is paying $2.65 billion for a cybersecurity company?!</p>
<p>Their acquisition of Recorded Future might look surprising at first. It makes a lot more sense once you dive into the details.</p>
<p>The financial services and cybersecurity industries have long been <a href="https://strategyofsecurity.com/p/the-convergence-of-cybersecurity-and-everything/">converging</a>. This acquisition is both another milestone and a preview of what's to come.</p>
<p>The second and third-order consequences could be even more important. This deal's unique structure gives us clues about what could happen with other later-stage companies in the industry.</p>
<p>Mastercard-Recorded Future is really just the beginning of the story for both financial services and the rest of cybersecurity.</p>
<p>To understand the future, we need to start by looking at the past. Let's talk about how much convergence has already been happening between financial services and cybersecurity.</p>
<h2 id="past-financial-services-convergence-was-already-happening">Past: Financial services convergence was already happening</h2>
<p>The convergence of financial services and cybersecurity has been happening for over two decades.</p>
<p>I'm not talking about financial services companies just spending money to buy cybersecurity products and services. They <em>do</em> spend tons of money on cybersecurity—but you probably knew that already.¹</p>
<p>The part you (and me) may not have fully realized is how many financial services companies are <em>active strategic acquirers</em> of cybersecurity companies.</p>
<p><a href="https://www.altitudecyber.com/?ref=content.strategyofsecurity.com">Altitude Cyber</a> has tracked 47 cybersecurity-related transactions by 17 unique financial services acquirers at over $10.5 billion of <em>disclosed</em> deal value since 2007. Here's the data (excluding Mastercard for a second):</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/09/financial-services-cybersecurity-acquisitions-2.png" class="kg-image" alt="" loading="lazy" width="830" height="2088" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/09/financial-services-cybersecurity-acquisitions-2.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/09/financial-services-cybersecurity-acquisitions-2.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Six transactions were over $500 million, and two were over a billion. Add a <a href="https://www.bitsight.com/bitsight-and-moodys-partner?ref=content.strategyofsecurity.com#:~:text=Moody's%20is%20investing%20%24250%20million,backed%20by%20Moody's%20and%20Team8.">$250 million strategic investment</a> in BitSight from Moody's into the mix, and you really start to see how strategic cybersecurity, risk, and fraud are to financial services companies.</p>
<p>The trend of cybersecurity-related acquisitions by financial services has been gradually picking up, with 79% of total transactions and 96% of disclosed dollar volume happening within this decade:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/09/financial-services-cybersecurity-acquisitions-trend-2.png" class="kg-image" alt="" loading="lazy" width="830" height="909" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/09/financial-services-cybersecurity-acquisitions-trend-2.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/09/financial-services-cybersecurity-acquisitions-trend-2.png 830w" sizes="(min-width: 720px) 720px"></figure><p>But no financial services company has been a more active buyer than Mastercard.² The company has been building and buying cybersecurity-related products for years. They've formally had a cybersecurity business unit since 2017. Their involvement in the industry was significant well before they made it official.</p>
<p>Mastercard has already added identity verification (Ekata), behavioral analytics (NuData), third-party risk (RiskRecon), external threat intelligence (Recorded Future), and more.</p>
<p>With Recorded Future, Mastercard now has nine total acquisitions at over $3 billion of disclosed value:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/09/mastercard-cybersecurity-acquisitions.png" class="kg-image" alt="" loading="lazy" width="830" height="859" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/09/mastercard-cybersecurity-acquisitions.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/09/mastercard-cybersecurity-acquisitions.png 830w" sizes="(min-width: 720px) 720px"></figure><p><em>Note: emphasis "cybersecurity-related." Transactions include fraud, risk, and other adjacent things you'd expect from one of the largest financial services companies in the world.</em></p>
<p>Recorded Future is Mastercard's largest disclosed acquisition yet, cybersecurity or otherwise. This move signals they're after something bigger. It also shows us what's possible when strategic priorities fully align.</p>
<p>Let's move to the present and dig into the implications of Mastercard's cybersecurity strategy for Recorded Future and beyond.</p>
<h2 id="present-why-cybersecurity-is-strategic-for-mastercard">Present: Why cybersecurity is strategic for Mastercard</h2>
<p>In an incredibly open and direct post-acquisition <a href="https://www.bankinfosecurity.com/how-mastercard-benefits-from-265b-recorded-future-deal-a-26318?ref=content.strategyofsecurity.com">interview</a> with Michael Novinson at Information Security Media Group (ISMG), Mastercard EVP and Head of Security Solutions <a href="https://www.linkedin.com/in/johan-gerber-4269041/?ref=content.strategyofsecurity.com">Johan Gerber</a> clearly laid out the strategic rationale for Recorded Future and the long-term game plan for the rest of Mastercard's cybersecurity portfolio.</p>
<p>Gerber left no doubt about the severity of the problem Mastercard is facing:</p>
<blockquote>
<p>"Being in payments, you're one of the most attacked sectors out there. Anybody who wants money will come after you."</p>
</blockquote>
<p>This may sound unsurprising at first, but it's surprisingly hard to comprehend the scale of the problem.</p>
<p>Verizon's <a href="https://www.verizon.com/business/resources/reports/dbir/?ref=content.strategyofsecurity.com">Data Breach Investigations Report (DBIR)</a> has been chronicling breaches and threat actor activity for 16 years and counting. 95% (!!!) of threat actor motives in breaches are financially-related.</p>
<p>It's been this way for years. Nothing else comes close.</p>
<p>Meanwhile, for Mastercard (and the entire ecosystem of payment processors, banks, ecommerce, etc.), the volume of digital transactions just keeps growing. They're currently estimated at 30-40% of Mastercard's total transaction volume.</p>
<p>If all the companies in the world were mapped to a dart board, Mastercard is at the center of the bullseye.</p>
<p>This brings us to the problem statement. Again, from Johan Gerber:</p>
<blockquote>
<p>"How do we constantly increase the level of security across payments?"</p>
</blockquote>
<p>The word "constantly" is telling here. Attacks are constant. This is never going to change. Instead of being complacent, Mastercard is choosing to keep raising the bar for security...well, <em>constantly</em>.</p>
<p>Here's the part where Mastercard's strategy gets fascinating. Their interests are much broader than securing their own company and customers. Mastercard is in an incredibly unique position to create value for the entire payments ecosystem.³</p>
<p>The bigger opportunity here is <a href="https://youtu.be/wZc5yoYRKuY?feature=shared&ref=content.strategyofsecurity.com">selling sawdust</a>. Sure, it's a bummer that Mastercard is one of the most attacked entities on Earth — but this also means they have a massive amount of both transaction data and first-party fraud data.</p>
<p>A portfolio of cybersecurity, risk, and fraud products makes this a feature, not a bug. <a href="https://ekata.com/?ref=content.strategyofsecurity.com">Ekata</a> and <a href="https://www.riskrecon.com/?ref=content.strategyofsecurity.com">RiskRecon</a> are good examples of how Mastercard is already using the good and bad sides of its scale to vertically integrate and sell its own sawdust.</p>
<p>The first part of the value chain starts with a new account. When someone wants to use an identity and open an account, Ekata verifies the identity and uses fraud data to indicate whether the attempt is real or fraudulent.</p>
<p>With RiskRecon, they score the <em>entire</em> payment ecosystem — banks, processors, and everyone connected to them — every ten days. When a serious risk gets identified, both the directly impacted party and affected third parties get notified.</p>
<p>Recorded Future underpins nearly every step of Mastercard's transaction and fraud prevention processes from account origination through settlement. Adding external threat intelligence on top of Mastercard's proprietary data potentially has massive upside, both internally and for customers.</p>
<p>The less obvious advantage is the strategic value Mastercard's fraud and transaction data gives Recorded Future. Owning the company outright allows Mastercard to share proprietary data in a way that's hard to do with a partnership alone. This creates a unique moat for both Recorded Future and Mastercard, especially with financially-related threat intelligence.</p>
<p>The real significance of Mastercard-Recorded Future is far beyond a single acquisition. Let me explain why.</p>
<h2 id="future-what-this-means-for-other-companies-the-cybersecurity-industry">Future: What this means for other companies the cybersecurity industry</h2>
<p>Mastercard-Recorded Future is just one example, but good deals like this one can influence the rest of the industry in a big way. I see this as a beacon for strategic buyers, investors, and later-stage companies throughout the ecosystem.</p>
<h4 id="cybersecurity-companies-in-the-ipo-pipeline">Cybersecurity companies in the IPO pipeline</h4>
<p>Recorded Future was a viable IPO candidate, especially by <a href="https://strategyofsecurity.com/p/bigger-faster-stronger-the-new-standard-for-public-cybersecurity-companies/">historical public market standards</a> for cybersecurity-related companies. Maybe not the top of the heap, but definitely viable.</p>
<p>At ~$300-400M in revenue, they are well above the ~$175M revenue scale it took for 30 other cybersecurity-related companies to go public between 2012 and 2022.</p>
<p>Cybersecurity has (roughly) 20-30 <em>other</em> private companies sitting in the $250-500M revenue range today (including both VC and PE-backed). It's a <a href="https://strategyofsecurity.com/p/dry-january-the-sobering-state-of-public-markets-for-cybersecurity-companies/">big backlog</a> — and we still haven't had a traditional IPO for a pure cybersecurity company since <a href="https://strategyofsecurity.com/p/forgerock-ipo/">ForgeRock went public</a> almost exactly three years ago.</p>
<p>Some companies in the pipeline will successfully go public, but not all 20-30 of them. This means the rest will either (a) raise capital/debt to extend their runway and scale bigger, (b) sell directly to strategic buyers, or (c) sell majority or full stakes to growth equity or private equity buyers (what Recorded Future did).</p>
<p>If high quality, scaled cybersecurity companies like Recorded Future are willing to be sold at a reasonable revenue multiple, we're going to see more strategic acquisitions and fewer IPOs.</p>
<h4 id="strategic-buyers-in-cybersecurity">Strategic buyers in cybersecurity</h4>
<p>We could see more "non-traditional" strategic buyers like Mastercard if (a) the convergence of <a href="https://strategyofsecurity.com/p/the-convergence-of-cybersecurity-and-everything/">cybersecurity and everything</a> keeps happening, and (b) more companies outside of cybersecurity view security as strategic.</p>
<p>Mastercard and Visa are two of the ~20 most valuable public companies in the world, valued at $448.9 billion and $524 billion respectively as of today.⁴ Mastercard had $7 billion in cash and cash equivalents sitting on their balance sheet as of their latest earnings report. Companies this big can make huge acquisitions look like bargain shopping at Nordstrom Rack.</p>
<p>As security becomes more strategically important for companies outside of cybersecurity and big tech, the pool of potential buyers capable of $1B+ acquisitions gets bigger. With over 100 VC and PE-backed companies valued at $1 billion or more (on paper), we need as many strategic buyers as we can get.</p>
<p>The revenue multiple for this deal looks like a reasonable ~8-9x, exactly the average of today's public market comps for cybersecurity companies (and higher than <a href="https://www.linkedin.com/posts/colegrolmus_rubrik-will-easily-be-the-largest-scale-cybersecurity-activity-7180947148044144640-L57f/?ref=content.strategyofsecurity.com">Rubrik's ~6x IPO</a> earlier this year).</p>
<p>Everyone wants the 40-50x multiple <a href="https://www.linkedin.com/posts/colegrolmus_wiz-walking-away-from-alphabet-is-cybersecuritys-activity-7221524085506195456-fLOi?utm_source=share&utm_medium=member_desktop">Wiz almost got</a>, but it's exceptionally rare to find a strategic buyer willing to <a href="https://www.linkedin.com/posts/colegrolmus_the-alphabet-wiz-deal-would-have-the-highest-activity-7219731629857013760-V5cK?ref=content.strategyofsecurity.com">pay that much</a> for a scaled company. An exit at 8-9x revenue is a pretty good outcome right now, and it's a reasonable number for more strategic buyers.</p>
<h4 id="growth-equity">Growth equity</h4>
<p>An easy-to-overlook detail in this transaction is that Recorded Future <a href="https://www.prnewswire.com/news-releases/insight-partners-acquires-recorded-future-for-780-million-300858805.html?ref=content.strategyofsecurity.com">sold a majority stake</a> to Insight Partners for $780 million in 2019. Rather than waiting and eventually raising a <a href="https://strategyofsecurity.com/p/themes-from-momentum-cybers-2022-cybersecurity-almanac/">gigantic early 2020's venture era round</a> and trying to go public, they sold most of the company — a very good exit, but atypical for the times.</p>
<p>The blueprint for Insight Partners and Recorded Future might become a lot more common after this deal. Selling to Insight Partners was a highly strategic move, not a desperate hail mary to save the company. Christopher Ahlberg, co-founder and CEO of Recorded Future, <a href="https://www.insightpartners.com/ideas/how-christopher-ahlberg-is-making-the-world-safer-and-more-secure-with-recorded-future/?ref=content.strategyofsecurity.com">explained at the time</a>:</p>
<blockquote>
<p>"With a single shareholder, where there is alignment, you can execute more effectively."</p>
</blockquote>
<p>Recorded Future wanted a strategic partner for their next phase of growth, and they clearly got one with Insight Partners.</p>
<p>Comparable situations have happened in the past with similarly good results. A few examples (though not exactly the same) are Thoma Bravo with SailPoint (the first transaction), and Vista Equity Partners with both Ping Identity and JAMF.</p>
<p>This model works especially well in market conditions like today. It provides near-term liquidity and eventually facilitates IPOs or strategic acquisitions. Growth equity or private equity backing is going to be an appealing option for a lot of later-stage companies while <a href="https://www.meritechcapital.com/blog/2024-when-to-ipo-in-the-age-of-uncertainty?ref=content.strategyofsecurity.com">subscale IPOs</a> aren't an option.</p>
<h2 id="convergence-vertical-integration-and-exits">Convergence, vertical integration, and exits</h2>
<p>There's a lot going on here — a lot more than what meets the eye from a single transaction.</p>
<p>The history and accelerating trend of financial services converging with cybersecurity, risk, and fraud is worth paying attention to. As Johan Gerber says, <em>"The lines are graying out between cyber and fraud."</em></p>
<p>Mastercard is going to keep vertically integrating components across the entire ecosystem of cybersecurity, risk, privacy, and trust as their strategic priorities become more clear.</p>
<p>Their cybersecurity and customer experience solutions business is well into the hundreds-of-millions in revenue once Recorded Future and its ~$300M-400M of ARR closes.⁵ Expect a constant drumbeat of strategic build, buy, and partner activity for years to come.</p>
<p>For the rest of the cybersecurity industry, this deal is both a victory and a poignant reminder about how hard it is to achieve a successful outcome. Sometimes, the best possible strategy is acquisition that makes perfect sense on both sides.</p>
<hr><h3 id="acknowledgements">Acknowledgements</h3>
<p>Thank you to Dino Boukouris, John Gould, and the team at Altitude Cyber for collaborating with me on the financial services M&amp;A data in this article.</p>
<h3 id="footnotes">Footnotes</h3>
<p>¹Remember the whole 'J.P. Morgan spends half a billion on cybersecurity' <a href="https://www.forbes.com/sites/stevemorgan/2016/01/30/why-j-p-morgan-chase-co-is-spending-a-half-billion-dollars-on-cybersecurity/?ref=content.strategyofsecurity.com">thing</a> a few years ago?! Accurate or not, financial services as an industry spends a lot on cybersecurity.</p>
<p>²Although LexisNexis is close, with eight acquisitions and $1.6 billion of disclosed value.</p>
<p>³And monetize some of the value they create, of course. Some capabilities they build and acquire are solely for the benefit of their cardholders and/or merchants. The ideal situations are when Mastercard can both protect itself and provide value back to the rest of the ecosystem.</p>
<p>⁴And we thought Palo Alto Networks being valued at $100 billion+ was impressive. Okay, it's still impressive...but companies like Mastercard and Visa give us some context about how massive the financial services industry is.</p>
<p>⁵It seems unlikely Mastercard's cybersecurity business unit is over $1 billion in cybersecurity-related revenue yet. I could be wrong. In any case, it's a nine-figure business and well on its way to a billion.</p>
]]></content:encoded>
            <category>M&amp;A</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/header-mastercard-recorded-future-article-2.png"/>
        </item>
        <item>
            <title><![CDATA[Cyberse and the Marketplace Era of Cybersecurity Purchasing]]></title>
            <link>https://strategyofsecurity.com/cyberse-and-the-marketplace-era-of-cybersecurity-purchasing/</link>
            <guid>66a94b05eea7bc0001e3ac59</guid>
            <pubDate>Wed, 31 Jul 2024 13:15:40 GMT</pubDate>
            <description><![CDATA[The marketplace era of cybersecurity purchasing is arriving before our eyes. Cyberse is a new startup leading the way.]]></description>
            <content:encoded><![CDATA[<p>One of the biggest breakthroughs in cybersecurity has nothing to do with products or services.</p><p>It's happening in purchasing.</p><p>Yep, <em>purchasing.</em></p><p>Cloud security and name-your-favorite-category are cool and all, but purchasing is cybersecurity's hundred billion dollar problem.¹</p><p>I lived the pain of buying and selling cybersecurity products and services for over a decade. Nobody likes buying or selling things the way we do today...yet here we are.</p><p>If you've had similar experiences in your career, you understand exactly what I'm talking about. If you haven't, let me tell you: it’s <em>brutal.</em></p><p>We're at a crucible moment in time, caught between the past of top-down sales and steak dinners, reeling from the illusion of Product-Led Growth (PLG), and more discontent about buying and selling cybersecurity products and services than ever.</p><p>A shift is underway. The early signals are visible, but only to savvy observers.</p><p>That's why I'm joining Ken Yao and the team at <a href="https://www.cyberse.com/?ref=content.strategyofsecurity.com">Cyberse</a> as an advisor. They're uniquely capable of understanding the nuances of cybersecurity purchasing and the needs of the buyers and sellers of tomorrow.</p><p>To say I'm amped to help bring a company like this into existence is an understatement.</p><p>Let me tell you the reasons why I think cybersecurity purchasing is going to change dramatically and why marketplaces are the best way to do it.</p><p>...okay, okay — I <em>need</em> to tell you. It's cathartic. I have a lot to say after living this pain daily for more than a decade.</p><p>Let me start by telling you a quick story about my favorite thing I've ever bought.</p><h2 id="my-gold-standard-for-major-purchases">My gold standard for major purchases</h2><p>I just bought my first Tesla a couple weeks ago. You know what else I want to be like buying a Tesla?²</p><p><em>Everything.</em></p><p>Seriously. The process of buying a Tesla is how every major purchase should work.</p><p>Every step in the process is meticulously thought out.</p><p>Test drive? Book the exact time you want online. No schmoozing with salespeople. There isn't even a key. Just get the app, head to the store, hop in, and drive.</p><p>Shopping the inventory? It's all there on their website. No clunky dealer or third party aggregators needed.</p><p>Buying the car? The purchase is basically complete before you ever set foot in the store. No need to block off three hours of your day to haggle with salespeople or sign a five foot stack of paperwork. The car costs what it costs, and you can buy it right in the app.</p><p>Anything in the process that went sideways was my fault (expired driver's license...<em>whoops</em>). But even when something did go wrong, their process handled it gracefully and kept on moving.</p><p>I'm not saying I <em>never</em> wanted to talk with a human during the purchasing process. I had questions about which home charger to choose, and it really helped to talk with someone.</p><p>But talking with someone wasn't the <em>default</em>. I had all the information and process available to me if I wanted to make all the decisions myself. The inventory was clear. The price was clear. The steps were clear.</p><p>What a huge difference that makes.</p><p>I have seen the future, and there's no going back. Any lesser experience than this one isn't good enough.</p><p>This is exactly the problem. Other major purchasing experiences <strong>(<em>ahem</em> cybersecurity products and services)</strong> <em>aren't like Tesla.</em></p><p>You can barely see a product without booking a live demo. Pricing? Ha – “Talk to Sales.” Need help deciding what to buy? You’ll need a consultant for that.</p><p>Tesla isn't a marketplace, of course. The important idea here isn't explicitly a marketplace — it's a flawless purchasing process.</p><p>Cybersecurity does not have a flawless purchasing process. Far, <em>far</em> from it.</p><p>This critique is so widely accepted that I don't even need to say anything about it. I'm only going to because it's entertaining.</p><h2 id="tales-of-cybersecurity-purchasing-inside-the-worlds-largest-enterprises">Tales of cybersecurity purchasing inside the world's largest enterprises</h2><p>Let me give you a few quick examples from my own career about just how wacky cybersecurity purchasing is.</p><p>A company spent three months evaluating a secondary technology for a major strategic program in their security organization. They flew in no less than ten vendors for in-person demos, got wined and dined weekly, and basically stopped everything else they were doing. <em>They didn't buy any of the products.</em></p><p>Another company repeatedly bid out phases of a multi-year project with no intent of choosing any of the other participants. They leaked our full proposal to a competitor to help make their response better. The procurement processes ran for weeks, delayed the program, got someone fired, and saved no money in the end.</p><p>Cybersecurity companies can be pretty wasteful too. One of them flew in entire sales teams multiple times to meet with us — usually for "relationship building" (nice dinners and drinks) or potential deals even the most junior team members could call out as unqualified. No deals were closed, and most of the sales team was let go.</p><p>We don't have time for these shenanigans anymore. Not during the expense management era we live in today.</p><p>I'm not saying all sales meetings (or salespeople) are bad. Face-to-face is always valuable when it's high impact.</p><p>But doing <em>'things that look like work'</em> isn't going to cut it. You can have sales meetings, procurement processes, whatever — but they'd better be a good use of time.</p><p>I know this sounds cranky. That's the point. My generation of buyers is divinely discontent. Let's talk more about why.</p><h2 id="the-next-generation-of-cybersecurity-buyers-is-divinely-discontent"><strong>The next generation of cybersecurity buyers is divinely discontent</strong></h2><p>My Tesla buying story is off-topic, but it's a critical insight into where cybersecurity purchasing is headed.</p><p>People like me (30 and 40-something-year-olds, now at Sr. Manager/Director/VP/CISO level) are the next generation of security leaders and buyers. Tesla is the way we <em>want</em> cybersecurity purchasing to work.</p><p>There's a great Jeff Bezos quote about this hard-to-nail-down sentiment. It's from <a href="https://www.aboutamazon.com/news/company-news/2017-letter-to-shareholders?ref=content.strategyofsecurity.com">Amazon's 2017 Letter to Shareholders</a>. Bezos describes customers as "divinely discontent":</p><blockquote>One thing I love about customers is that they are divinely discontent.<br><br>Their expectations are never static – they go up. It’s human nature. We didn’t ascend from our hunter-gatherer days by being satisfied.<br><br>People have a voracious appetite for a better way, and yesterday’s ‘wow’ quickly becomes today’s ‘ordinary’.</blockquote><p><em>Divinely discontent.</em></p><p>Guess what? Thousands of cybersecurity buyers already have a voracious appetite for a better way. Thousands more are going to be in senior leadership positions during the next decade and beyond.³</p><p>Like it or not, we're going to get our 'better way' sooner or later. In the world of cybersecurity purchasing, marketplaces are one of the ways.</p><p>VARs are the legacy model. My generation of practitioners would rather not work with them.⁴</p><p>We don't want to deal with vendor sales or bake-offs either. A good marketplace is the right balance — just buy what you want and get started.</p><p>Millennials don't want to waste time buying things. We don't like dog-and-pony shows.</p><p>We want information, decision support, and low friction.</p><p>We want people to be available when we need them, but technology-driven workflows need to be the default option.</p><p>We want sales-assisted purchasing, not sales-led. You can buy my steak dinner after the purchase has been made.</p><p>This shift in cybersecurity purchasing behavior is playing out in plain sight. Cloud marketplaces are a big clue.</p><h2 id="marketplaces-are-already-here-theyre-just-not-evenly-distributed">Marketplaces are already here, they're just not evenly distributed</h2><p>You've probably seen a few marketplace-related announcements in passing from large cybersecurity companies:</p><ul><li>CrowdStrike went over <a href="https://www.crowdstrike.com/press-releases/crowdstrike-first-cybersecurity-isv-to-exceed-1-billion-in-aws-marketplace-sales/?ref=content.strategyofsecurity.com">$1 billion in total sales</a> on the AWS Marketplace in October 2023.</li><li>Okta said it's generating <a href="https://www.fool.com/earnings/call-transcripts/2024/02/28/okta-okta-q4-2024-earnings-call-transcript/?ref=content.strategyofsecurity.com">$175 million of annual contract value (ACV)</a> from the AWS Marketplace during the company's Q4'24 earnings call.</li><li>Zscaler has been <a href="https://ir.zscaler.com/static-files/f8c7f7de-806d-45b0-9c5b-5141f8872546?ref=content.strategyofsecurity.com">winning seven-figure deals</a> on the AWS marketplace for years.<br></li></ul><p></p><p>Palo Alto Networks hasn't disclosed specific numbers about their cloud marketplace partnerships, but they may have <a href="https://siliconangle.com/2022/11/27/cloud-marketplaces-transform-business-software-bought-sold/?ref=content.strategyofsecurity.com">given</a> the most definitive endorsement of all:</p><blockquote>"It’s not just where the puck is headed. It’s where the puck is now." —Prem Iyer, SVP, Global Ecosystems at Palo Alto Networks</blockquote><p>It's easy to write announcements like these off as run-of-the-mill PR, though. I can't blame you. I did for years.</p><p>My wake-up call came when I found out PwC had quietly started <a href="https://aws.amazon.com/marketplace/seller-profile?id=b88e3d2c-6b46-4b43-b16c-96b99ab626f6&ref=content.strategyofsecurity.com">selling cybersecurity services</a> on the AWS Marketplace. I never thought this would happen when I left the firm five years ago. Like, bet my entire retirement savings, never. Good thing it wasn't a real bet.</p><p>Once I started paying attention to this marketplace trend, subtle hints started popping up everywhere. Here's another shocking example you probably haven't heard about yet.</p><p><a href="https://www.vendr.com/?ref=content.strategyofsecurity.com">Vendr</a>, a YC-backed marketplace upstart, just shared <a href="https://www.linkedin.com/feed/update/urn:li:activity:7221514987633082368/?ref=content.strategyofsecurity.com">this data</a> about Wiz:</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/07/vendr-wiz-stats.png" class="kg-image" alt="" loading="lazy" width="516" height="477"></figure><p>All of these numbers are surprising, but one stands out to me: mid-market buyers have an average Annual Contract Value (ACV) of $138k with Wiz.</p><p>Transacting 1% of Wiz's total revenue is pretty significant, too — that's $3.5 million annually at Wiz's most recent $350 million ARR disclosure.</p><p>The most staggering clue of all was buried deep in a random <a href="https://tackle.io/resources/webinar/how-wiz-tackles-cloud-gtm/?ref=content.strategyofsecurity.com">vendor webinar</a> about Wiz: <em>"As of today, roughly 50-60% of our revenue goes through the marketplaces."</em></p><p>Wiz, the fastest growing company in the history of software, is generating <em>more than half of its revenue</em> through marketplaces. They found a cheat code most cybersecurity companies haven't caught on to yet.</p><p>Now that our eyes are wide open, let's adjust the aperture. If we zoom out and look across the entire software industry, the marketplace numbers start to get wild.&nbsp;</p><p>In a recent <a href="https://www.canalys.com/insights/hyperscale-cloud-marketplaces-saas-channels?ref=content.strategyofsecurity.com">Canalys study</a>, 80% of surveyed channel partners (read: product or services companies) have already seen customers buying from cloud marketplaces. <em>Eighty percent. Today.</em></p><p>By 2025, they estimate cloud marketplace transaction volume will hit $45 billion with an 84% compound annual growth rate (CAGR).</p><p>It's hard to find a market in cybersecurity or all of tech with a higher growth rate. Yet we barely pay attention to this one because marketplaces aren't a typical product or service.</p><p>Forecasts aside, these anecdotes and data points can be taken as signals about willingness (if not straight-up preference) to <em>buy and sell </em>software and services through marketplaces.&nbsp;</p><p>I think the trend is going to continue as the divinely discontented millennials inevitably assume leadership positions. We don't buy like previous generations of buyers. We’ll put up with the old way of doing things, but we’ll jump at the first chance we get for a better way.&nbsp;</p><p>PLG, enterprise sales, and VARs will never go away, of course — but the better way is right in front of us: marketplaces.</p><p>There's just one problem. Cybersecurity is an <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/">infinite abyss</a>. It's confusing to buy cybersecurity products and services on cloud marketplaces because cybersecurity itself is confusing.</p><p>Here's the part where Cyberse and cybersecurity-focused marketplaces come in.</p><h2 id="why-we-need-a-cybersecurity-focused-marketplace">Why we need a cybersecurity-focused marketplace</h2><p>Why do we need a marketplace just for cybersecurity? Aren't cloud marketplaces good enough?</p><p>Head over to the <a href="https://aws.amazon.com/marketplace/b/0625e4fd-88dd-4dd9-9e57-4a0461f97fb4?category=0625e4fd-88dd-4dd9-9e57-4a0461f97fb4&ref=content.strategyofsecurity.com">AWS Marketplace</a> and tell me which of the 4,621 (and counting) security products and services to buy. Go ahead. I'll wait.</p><p>Relying on a cloud marketplace for most or all of your cybersecurity purchasing is more theory than practice right now. You can buy products and services, and they'll give some information and guidance to help you — but you're mostly on your own.</p><p>Today's cloud marketplaces are the last mile of procurement. They're a centralized place you can go to execute transactions. This is a breakthrough in and of itself, but it's only a fraction of the end-to-end process for buying products and services.</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/07/cybersecurity-purchasing-process-2.png" class="kg-image" alt="A typical purchasing process for cybersecurity software or services." loading="lazy" width="830" height="986" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/07/cybersecurity-purchasing-process-2.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/07/cybersecurity-purchasing-process-2.png 830w" sizes="(min-width: 720px) 720px"></figure><p>There's a reason why consultants, VARs, and industry analysts are some of the most powerful players in the cybersecurity industry. Planning, buying, and implementing a full security stack is <em>hard.</em></p><p>Buyers need advice and guidance to make the right decisions. They rely on third parties a lot of the time, who sometimes have misaligned incentives. Or, they just buy the "safe" product everyone else is buying. <a href="https://www.linkedin.com/pulse/nobody-ever-gets-fired-buying-ibm-brian-welsh/?ref=content.strategyofsecurity.com">Nobody gets fired for buying IBM</a>.</p><p>Capturing the transactional part of the value chain is important, but it's incomplete. The opportunity hiding in plain sight is to vertically integrate large parts of the value chain for a specific industry — cybersecurity, in the case of Cyberse.</p><p>Done well, a vertically integrated marketplace for a niche domain will always be more relevant and valuable than a cloud marketplace could ever be. It will also be more objective than consultants, VARs, and the smattering of decision support resources companies rely on today.</p><p>Cybersecurity is still too specialized for cloud marketplaces and technology resellers to have the domain expertise buyers truly need to make good purchasing decisions. Because of this, the marketplace needs to be semi-opinionated to help buyers architect solutions, narrow down their options, and help make sure the products and services they buy meet their objectives.</p><p>We need a single place to do market research, assess and gather requirements, discover and evaluate recommended products, and make purchases. No expensive consultants, VARs, or analyst subscriptions — just exactly what you need to buy the right cybersecurity products and services for your company.</p><p>This is exactly what Cyberse is building, and why I'm so excited about it.&nbsp;</p><p>Cyberse cuts through the exceptionally loud cybersecurity marketing noise and gets straight to the point: giving you the industry knowledge and data you need to make the best decision for your needs.</p><p>Reimagining the cybersecurity purchasing process for the divinely discontent, Tesla-buying, millennial leaders-in-waiting has huge consequences. Let's finish by talking about what's at stake once this behavioral shift actually happens.</p><h2 id="whats-at-stake-growing-the-tam-of-cybersecurity">What's at stake: growing the TAM of cybersecurity</h2><p>McKinsey wrote a <a href="https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/cybersecurity/new-survey-reveals-2-trillion-dollar-market-opportunity-for-cybersecurity-technology-and-service-providers?ref=content.strategyofsecurity.com">research report</a> that bent my brain in a way that hasn't happened in a while. The punch line: the cybersecurity industry has only reached 10% of its overall TAM yet because large portions of the market are under-served.</p><p><em>...wait, what?</em></p><p>Yeah, that caught my attention too. The article goes on to explain:</p><blockquote>Currently available commercial solutions do not fully meet customer demands in terms of automation, pricing, services, and other capabilities.<br><br>... <br><br>This does not imply the market will reach such a size anytime soon (current growth rate is 12.4 percent annually off a base of approximately $150 billion in 2021), but rather that such a massive delta requires providers and investors to “unlock” more impact with customers by better meeting the needs of underserved segments, continuously improving technology, and reducing complexity.</blockquote><p>Here's a visual to go along with it:</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/07/mckinsey-cybersecurity-tam.png" class="kg-image" alt="McKinsey cybersecurity TAM gap analysis." loading="lazy" width="816" height="821" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/07/mckinsey-cybersecurity-tam.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/07/mckinsey-cybersecurity-tam.png 816w" sizes="(min-width: 720px) 720px"></figure><p>Even if you don't buy into the exact numbers (I don't, but they're only estimates), anything remotely close to this situation is astonishing.</p><p><em>How did this happen?!</em></p><p>A partial explanation: our products, services, and purchasing processes are all very enterprise-focused.</p><p>The traditional top-down sales model doesn't work for Small Business (SMB) and Mid-Market (MM) customer segments. Most cybersecurity companies can <a href="https://www.linkedin.com/posts/colegrolmus_i-think-about-this-quote-from-nikesh-arora-activity-7199031348915752962-r3I7?utm_source=share&utm_medium=member_desktop">barely afford</a> to support this model for enterprises. There's effectively zero chance of doing it profitably for smaller customer segments — and even if we most could, buyers in this segment don't have time to run enterprise-grade procurement cycles anyway.</p><p>Serving the SMB and MM customer segments is a problem we can tackle right now. As the McKinsey report shows, this alone is a big opportunity. But it's not the full story here.</p><p>What happens when the divinely discontent millennial cybersecurity leaders are the majority of buyers in cybersecurity?&nbsp;</p><p>Marketplaces will become the de-facto model for how cybersecurity products and services are bought and sold.</p><p>That's why we need a cybersecurity-focused marketplace: to address both under-served market segments and the new generation of buyers in our industry.</p><p>It's a gradual, compounding transition — but it's going to be so, so impactful when the rapidly approaching inflection point hits.</p><hr><h3 id="acknowledgements">Acknowledgements</h3><p><em>Thank you to Ken Yao and the team at Cyberse for patiently hashing out multiple iterations of this thought process with me.</em></p><p><em>Also, thanks to </em><a href="https://www.linkedin.com/in/jcran/?ref=content.strategyofsecurity.com" rel="noreferrer"><em>Jonathan Cran</em></a><em> for sharing the stat about Wiz's marketplace revenue percentage. No way I would have found this on my own.</em></p><h3 id="footnotes">Footnotes</h3><p>¹Relatively speaking as an order of magnitude statement, not a precise estimate. I say this based on Gartner's latest <a href="https://www.gartner.com/en/newsroom/press-releases/2023-09-28-gartner-forecasts-global-security-and-risk-management-spending-to-grow-14-percent-in-2024?ref=content.strategyofsecurity.com">Global Security and Risk Management Spending forecast</a> and a McKinsey report we'll get to later in the article.</p><p>²I mean this literally — as in the process of buying, configuring, and operating the car, not the drama and nonsense created by Elon Musk himself. I don't condone or agree with a lot of his behavior, but I also think credit needs to be given for his inventions (and many other more decent people at Tesla).</p><p>³Statistics about millennials in the workforce and leadership positions are fuzzy, so I'm not going to cite specific data. Roughly speaking, we've been the largest generation in the workforce by percentage for several years now, but it's still a minority percentage. We'll be a majority percentage by ~2025. Leadership positions (VP+) will follow shortly after. Some of us are already in them today.</p><p>⁴Nobody really does today either, but they tolerate VARs because they make the traditional procurement process just a shade less miserable.</p><p></p>]]></content:encoded>
            <category>Startups</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/07/cyberse-launch-article-1.png"/>
        </item>
        <item>
            <title><![CDATA[Billions: The New Significance of Billion-Dollar Scale in Cybersecurity]]></title>
            <link>https://strategyofsecurity.com/billions-the-new-significance-of-billion-dollar-scale-in-cybersecurity/</link>
            <guid>6669ba0bd0be6600013a0a5c</guid>
            <pubDate>Wed, 12 Jun 2024 15:20:04 GMT</pubDate>
            <description><![CDATA[Billion-dollar scale is the new normal for late-stage companies in cybersecurity.]]></description>
            <content:encoded><![CDATA[<p>It seems like everywhere you look in (and around) the cybersecurity industry right now, there's a billion-dollar-something event happening.</p>
<p>We've had seven cybersecurity-related M&amp;A transactions over a billion dollars already this year.¹</p>
<p>Wiz raised a <a href="https://www.linkedin.com/posts/colegrolmus_wiz-has-now-raised-more-venture-capital-than-activity-7193997712835387392-ol04?ref=content.strategyofsecurity.com">billion-dollar financing round</a>.</p>
<p>Cyera became our <a href="https://www.linkedin.com/posts/colegrolmus_cyera-is-cybersecuritys-first-new-unicorn-activity-7183497971152355328-bEhY?ref=content.strategyofsecurity.com">first new unicorn</a> since 2022.</p>
<p>We finally had a cybersecurity-related IPO with Rubrik going public at a <a href="https://techcrunch.com/2024/04/25/rubriks-shares-climb-20-in-its-public-debut/?ref=content.strategyofsecurity.com">$6.6 billion valuation</a>.</p>
<p>There are more companies with a <a href="https://www.linkedin.com/posts/colegrolmus_there-are-about-40-companies-with-billion-dollar-activity-7196172901740331009-ymIq?utm_source=share&utm_medium=member_desktop">billion dollars of cybersecurity revenue</a> and <a href="https://strategyofsecurity.com/p/dry-january-the-sobering-state-of-public-markets-for-cybersecurity-companies/">billion-dollar valuations</a> than ever.</p>
<p>And the year isn't even half over yet.</p>
<p>Each of these billion-dollar events and milestones are significant by themselves, but I think they're a sign of something more for the rest of cybersecurity industry.</p>
<p>We're functioning in "billions" now. Billion-dollar financing rounds. Billion-dollar acquisitions. Billion-dollar revenue.²</p>
<p>That's a stark departure from where we've historically been. Cybersecurity didn't used to be a billion-dollar type of industry. We're more of the <em>"cheeseburger and a beer at the neighborhood restaurant"</em> crowd than a five-star Michelin restaurant type.</p>
<p>There's room for the entire spectrum of companies, of course. Plenty of smaller private companies have and will keep doing just fine at the thousands-to-millions scale. For mid-sized companies, the $130-ish million M&amp;A exit median should remain consistent.</p>
<p>Cybersecurity is too big of an industry for its dynamics to change overnight.</p>
<p>But for cybersecurity companies who either are big or aspire to be, the new scale is going to be billions, <em>capital B.</em></p>
<p>There's a lot to unpack here. Let me show you what I mean...right after we talk about beer.</p>
<h2 id="balance-sheets-and-capitalization-strategies-have-a-shelf-life">Balance sheets and capitalization strategies have a shelf life</h2>
<p>New Belgium Brewing started off as un-scaled as it gets. The company started as a home brewing project by Jeff Lebesch and Kim Jordan in 1991 after biking through Belgium and enjoying the beer a little too much.</p>
<p>Their beer was popular (and tasty), but the contrarian business model and operations changed the game in craft brewing. Breakthroughs included sustainable brewing at scale and, more famously, becoming 100% employee-owned in 2012.</p>
<p>They continued to expand independently, including a second east coast brewery in 2016. New Belgium was one of the most popular craft breweries and a role model for independent companies everywhere.</p>
<p>...until they shocked the world and sold the company to Lion Little World Beverages (Kirin Holdings) in 2019. The sale ended New Belgium's status as an independent craft brewery — and its employee stock ownership program (ESOP).</p>
<p>The decision came down to multiple factors, one being a tension between the cost of maintaining the ESOP and the executive team's ambitions to continue growing and scaling the brand and operations.</p>
<p>"Balance sheets and capitalization strategies have a shelf life," said Steve Fechheimer, the CEO of New Belgium Brewing since 2017.</p>
<p>Lion Little World Beverages has since merged New Belgium with Bell's Brewery, another iconic craft brewing operation. You've heard versions of this strategy before: expanding the product portfolio, operational efficiencies, and entering new markets.</p>
<p>Only now, their goal is to do something that's never been done before in the industry. The combined company is trying to become the leader of the U.S. craft beer market while becoming a certified B Corporation and carbon neutral by 2030.</p>
<p>They wouldn't have been able to do this without financial backing, stability, and other strategic moves that just weren't accessible as an employee-owned company.</p>
<p>This feels so, so similar to the place many cybersecurity companies are at right now.</p>
<p>Let's continue by talking about billion-dollar revenue scale (that's the real end game, not billion-dollar valuations), then work backwards through financing and M&amp;A as two of the primary levers for getting there.</p>
<h2 id="billion-dollar-revenue">Billion-dollar revenue</h2>
<p>A billion dollars of revenue has been surprisingly evasive in the tale of cybersecurity so far.</p>
<p>There are only eight pure-play public cybersecurity companies with $1 billion or more in annual revenue today. Even if we stretch the scope a little to include the extended cybersecurity ecosystem (hybrid companies with a material part of revenue coming from cybersecurity), the total only goes up to ~14, depending on how you classify the hybrid companies:³</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/06/all-cybersecurity-1b-revenue.png" class="kg-image" alt="" loading="lazy" width="830" height="1431" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/06/all-cybersecurity-1b-revenue.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/06/all-cybersecurity-1b-revenue.png 830w" sizes="(min-width: 720px) 720px"></figure><p>It gets a little higher if you include large and mega-cap tech companies (like Microsoft or Cisco) and private companies (like PwC and Deloitte), but the number is still only around 40 companies.</p>
<p>No matter how you count it, there aren't very many companies who have ever hit $1 billion in cybersecurity revenue. Roughly speaking, it's something like 0.2% of companies that have ever existed.</p>
<p>Enough context, though — what does this mean for the industry?</p>
<p>As I wrote in <a href="https://strategyofsecurity.com/p/bigger-faster-stronger-the-new-standard-for-public-cybersecurity-companies/">Bigger, Faster, Stronger: The New Standard for Public Cybersecurity Companies</a>, a billion dollars in revenue is probably the new standard for durable public companies, cybersecurity or otherwise. It's not just me — you can find people talking this all over recent earnings calls and behind closed doors at later stage companies.</p>
<p>There are ~100 (give or take) other <em>public</em> companies out there in the cybersecurity ecosystem with less than $1 billion in revenue, and <a href="https://strategyofsecurity.com/p/no-way-out-the-changing-world-of-cybersecurity-exits/">nearly the same amount</a> of VC and PE-backed unicorns who have expectations of scaling.</p>
<p>Put another way, there are five times more companies with <em>expectations</em> of billion-dollar revenue scale (~200 late-stage companies alone) than those who have ever <em>achieved</em> it (~40 at best).</p>
<p>I want to mention two anecdotes about the impact of revenue scale on public cybersecurity companies to help make the point.</p>
<p>So far, only three of the 28 formerly public cybersecurity companies who have been taken private or acquired had over $1 billion in revenue: Splunk ($4.2B), McAfee ($1.8B), and Proofpoint ($1.05B).</p>
<p>A common theme across companies who have been taken private by private equity firms is...<em>you guessed it:</em> scaling revenue to $1 billion as a private company.</p>
<p>On the other side of the spectrum, all seven of the "A-List" (highest performing) companies in the cybersecurity ecosystem I mentioned in <a href="https://strategyofsecurity.com/p/cybersecuritys-class-conundrum/">Cybersecurity's Class Conundrum</a> have over $1 billion of revenue. The average was $3.2 billion (TTM) at the end of calendar year 2023.</p>
<p>There is an undeniable connection between revenue scale and valuation for our public companies (SentinelOne and CyberArk⁴ are the notable exceptions). We have some great public and private companies under $1 billion in revenue, but they're all under pressure to get there.</p>
<p>Both of these stats are anecdotal, but they give you a rough idea about the current vibe of billion-dollar revenue scale in public markets.</p>
<p>So, what did these companies do to reach to $1 billion in revenue? A lot of things, including raising a bunch of capital. Let's talk about that next.</p>
<h2 id="billion-dollar-financing">Billion-dollar financing</h2>
<p>Cyberstarts partner (and investor) Gili Raanan <a href="https://www.linkedin.com/feed/update/urn:li:activity:7193683555808411649/?ref=content.strategyofsecurity.com">put it bluntly</a> when talking about Wiz's recent $1 billion round:</p>
<blockquote>
<p>"It is expensive to build important cybersecurity companies."</p>
</blockquote>
<p>Yes it is, Gili. <em>Yes. It. Is.</em></p>
<p>$1 billion is the second largest single round raised by a cybersecurity startup after Lacework's (now both ominous and ironic) $1.3 billion Series D round in 2021. These are the only two individual venture rounds over $1 billion in cybersecurity history.</p>
<p>The $1.9 billion of total financing Wiz has raised is easily the highest amount of any cybersecurity startup other than Lacework:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/06/pure-cybersecurity-1b-financing.png" class="kg-image" alt="" loading="lazy" width="830" height="773" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/06/pure-cybersecurity-1b-financing.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/06/pure-cybersecurity-1b-financing.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Netskope is a distant ~$500 million behind those two. We're definitely going to see more large rounds being raised by companies in cybersecurity's IPO pipeline, but it's hard to imagine anyone surpassing Wiz.</p>
<p>Why? Their most recent round alone was more money than any other public cybersecurity company raised <em>in total</em> before IPO. And it's not even close.</p>
<p>SentinelOne raised a total of $696.5 million before it went public in 2021. CrowdStrike raised $481.2 million. Okta raised $230 million. Palo Alto Networks raised $65 million.</p>
<p>We don't have enough financial data to definitively say it <em>costs</em> more to build a public cybersecurity company these days (for private companies, we don't know how much capital they're spending and what's still in the bank). It's definitely accurate to say companies are <em>raising</em> more, though.</p>
<p>For Wiz and others, raising over a billion dollars of capital from financing or IPOs <em>still isn't enough</em>. It's tough to hit a billion dollars of annual revenue organically — especially at the growth rates both private and public market investors expect.</p>
<p>This is the part where M&amp;A enters the picture. Let's talk about that next, billion-dollar style.</p>
<h2 id="billion-dollar-acquisitions">Billion-dollar acquisitions</h2>
<p>The TL;DR of the entire history of cybersecurity M&amp;A by strategic buyers (companies, not PE firms) is basically this: a relatively limited group of companies have made a handful of acquisitions at $250-400 million per deal, and usually far less.</p>
<p>Billion-dollar acquisitions have been incredibly rare. Rare, as in ~70 total transactions of any kind (PE or strategic) over $1 billion in the history of the cybersecurity industry.</p>
<p>Roughly half of the acquisitions were done by strategic buyers. With few exceptions (Okta buying Auth0 is one, and CyberArk buying Venafi is another very recent example), most of the buyers who have spent over $1 billion on an acquisition are large or mega-cap tech companies (<a href="https://strategyofsecurity.com/p/ciscos-cybersecurity-shopping-spree-part-1/">like Cisco</a>).</p>
<p>Most companies under $1 billion in revenue aren't going to be doing billion-dollar acquisitions — unless you're Wiz, who <a href="https://www.reuters.com/markets/deals/cybersecurity-startup-wiz-considers-potential-bid-sentinelone-2023-08-25/?ref=content.strategyofsecurity.com">reportedly tried buying</a> SentinelOne (valued at $4.9 billion at the time). Seriously though, $350 million and (very much) under is the typical range for subscale cybersecurity companies.</p>
<p>All of this is going to change, though. The frequency of billion-dollar acquisitions from strategic buyers is going to keep increasing. This is already a trend — 19 cybersecurity-related companies have been acquired by strategics for over a billion since 2020:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/06/all-cybersecurity-1b-acquisitions-since-2020.png" class="kg-image" alt="" loading="lazy" width="830" height="1600" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/06/all-cybersecurity-1b-acquisitions-since-2020.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/06/all-cybersecurity-1b-acquisitions-since-2020.png 830w" sizes="(min-width: 720px) 720px"></figure><p>There were 23 cybersecurity-related transactions over $1 billion from 2010-2020. We're 4.5 years into this decade, and we're already close to even with the previous one.</p>
<p>Here's my less obvious prediction: we're going to see more merger-like transactions among (relative) peers to <em>create</em> companies with billion-dollar revenue scale.</p>
<p>The clues are already out there (a few are in the table above). Cohesity agreed to <a href="https://www.channelnewsasia.com/business/exclusive-softbank-backed-cohesity-buy-veritas-data-security-unit-create-7-billion-firm-4109291?ref=content.strategyofsecurity.com">acquire</a> Veritas's data protection business for $7 billion in Q1 2024.⁵ Exabeam and LogRhythm just <a href="https://www.linkedin.com/posts/colegrolmus_this-exabeam-logrhythm-merger-has-the-look-activity-7196892636253745152-CBB5?utm_source=share&utm_medium=member_desktop">merged</a> in an undisclosed-but-definitely-over-a-billion sized deal. Most recently, CyberArk acquired Venafi for $1.5 billion.</p>
<p>The strategic drivers behind each deal were different, but the common theme is billion-dollar transactions creating billion-dollar revenue scale.</p>
<h2 id="the-shelf-life-of-subscale-cybersecurity-companies-is-ending">The shelf life of subscale cybersecurity companies is ending</h2>
<p>Gokul Rajaram broke a small corner of the internet a couple months ago by <a href="https://www.linkedin.com/posts/gokulrajaram1_subscale-ipos-the-meritech-team-meritech-activity-7183462675996184576-JkaS?utm_source=share&utm_medium=member_desktop">highlighting</a> some research on subscale IPOs. The punch line: companies with under $700 million ARR underperform (have negative absolute returns, on average) after going public.</p>
<p>The ensuing uproar led to some <a href="https://www.linkedin.com/posts/gokulrajaram1_more-on-subscale-ipos-new-tldr-dont-go-activity-7184211715910254595-yFw-?utm_source=share&utm_medium=member_desktop">follow-on analysis</a> that's a slightly different but harder conclusion: companies <em>can</em> go public at subscale revenue numbers (&lt;$500 million), but they need a compound growth rate of 50% for a clear path to $1 billion in revenue within five years.</p>
<p>So, either way you look at it, the current expectation for public company revenue scale is around a billion. The variable is whether you IPO or not before getting there.</p>
<p>Subscale IPOs without astronomical growth are basically out of the question and will be for a while. And subscale public companies without better-than-respectable growth are going to keep getting taken private until they're all gone.⁶</p>
<p>Wiz is an exceptionally unique case. They're executing (rewriting?) a strategy that's like smashing together the playbooks for a hypergrowth unicorn, post-IPO company, and private equity firm all at once. Wiz is our industry's grand experiment in building a billion-dollar company with intent and speed. Grab your popcorn.</p>
<p>For the rest of the later-stage companies in the cybersecurity industry, it's all about the strategy they take to hit $1B revenue scale. We're not going to see billion-dollar financing rounds that often, but I do think we're going to see companies in the IPO pipeline raising a <em>total</em> of $1 billion or more before going public. And we're going to see <a href="https://www.linkedin.com/posts/colegrolmus_three-major-mergers-have-happened-in-the-activity-7197279607962640384-1NLF?utm_source=share&utm_medium=member_desktop">more mergers</a> among relative peers to get there faster.</p>
<p>I'm not a hypergrowth zealot. There's a point where growth at all costs becomes too reckless, and bad things happen.</p>
<p>Good strategy is about being a realist, though. Kim Jordan at New Belgium Brewing is a dreamer and idealist. But she was also savvy enough to know when and why a major change in strategy was needed to hit their next level of scale.</p>
<p>Billion-dollar scale is different, uncomfortable, and unnatural than what we're used to in cybersecurity. It's also the only way forward for our biggest companies.</p>
<hr><h3 id="footnotes">Footnotes</h3>
<p>¹Disclosed and estimated acquisitions over $1 billion in 2024 include Juniper Networks (HPE, $14B), HashiCorp (IBM, $6.4B), Darktrace (Thoma Bravo, $5B), AuditBoard (Hg, $3B+), Veritas (Cohesity, $3B), Venafi (CyberArk, $1.5B), and Exabeam-LogRhythm (undisclosed, estimated over $1B based on previous valuations).</p>
<p>²I intentionally avoided mentioning billion-dollar valuations here. Valuations don't mean much in the end game of becoming a company with a billion dollars in revenue.</p>
<p>³This count excludes large (e.g. OpenText) and mega-cap companies (e.g. Microsoft) with cybersecurity revenue as a small percentage of overall revenue. There are also privately held (likely PE-backed) companies with $1B revenue, but not many.</p>
<p>⁴CyberArk should be a $1B+ revenue company soon after their <a href="https://www.linkedin.com/posts/colegrolmus_cyberark-might-have-just-put-itself-over-activity-7198345514554130433-HfbC?ref=content.strategyofsecurity.com">acquisition of Venafi</a> officially closes.</p>
<p>⁵What's that, you say? Backups aren't security? I respectfully <a href="https://www.linkedin.com/posts/colegrolmus_why-does-the-backup-and-recovery-market-suddenly-activity-7181689899534667776-Ez_f?ref=content.strategyofsecurity.com">disagree</a>. It doesn't really matter for the purpose of this discussion — the backup and data protection market is close enough to make this a reasonable comp.</p>
<p>⁶Or until private equity firms run out of money buying them, which is unlikely — they have <a href="https://strategyofsecurity.com/p/themes-from-and-beyond-altitude-cybers-2023-cybersecurity-year-in-review/">more available capital</a> than ever.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <category>#featured</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/06/header-billions-2.png"/>
        </item>
        <item>
            <title><![CDATA[Y Combinator's Winter 2024 Cybersecurity, Privacy, and Trust Startups]]></title>
            <link>https://strategyofsecurity.com/y-combinators-winter-2024-cybersecurity-privacy-and-trust-startups/</link>
            <guid>6626d69158c4c1000100d256</guid>
            <pubDate>Mon, 22 Apr 2024 21:36:39 GMT</pubDate>
            <description><![CDATA[Analyzing opportunities and challenges for the six cybersecurity, privacy, and trust startups in Y Combinator's Winter 2024 batch.]]></description>
            <content:encoded><![CDATA[<p>Y Combinator's investments in cybersecurity, privacy, and trust startups came back to earth a bit in their latest Winter 2024 (W24) batch. At Demo Day earlier this month, six companies from the ecosystem were showcased — well below the peak of 19 companies in the W22 batch.</p>
<p>I pay close attention to Y Combinator and its cybersecurity-related companies because they're a tastemaker for the entire tech industry. Sure, we can debate industry-specific things like their level of specialization or track record of success, but you can't downplay or ignore their dominance as early stage investors across tech.</p>
<p>I've covered every YC batch since I started writing. This is now the sixth article in the series. Our list of companies to look at it is shorter this time, but there's still plenty to talk about.</p>
<p>Let's start by revisiting some longer-term investment trends across batches.</p>
<h2 id="ycs-cybersecurity-privacy-and-trust-investment-trends">YC's cybersecurity, privacy, and trust investment trends</h2>
<p>Y Combinator's number of investments per batch in the cybersecurity, privacy, and trust ecosystem had more than doubled since 2020...until now.¹</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/yc-batch-counts-w24.png" class="kg-image" alt="" loading="lazy" width="830" height="624" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/04/yc-batch-counts-w24.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/yc-batch-counts-w24.png 830w" sizes="(min-width: 720px) 720px"></figure><p>In YC's current era of smaller batch sizes (247, down from 402 in W22), six companies is still a healthy representation.</p>
<p>Garry Tan, YC's President and CEO, was also the group partner for two companies (PromptArmor and Tracecat) — a pretty disproportionate ratio for their leader.</p>
<p>I don't read too much into the reduction in investment this batch. They've invested in nearly 100 companies in the ecosystem over the past six years, and they have the resources to keep funding the best ones that come their way.</p>
<p>YC invests in a mind-bending amount of companies, though. Even though I'm saying their level of investment in cybersecurity companies is healthy, it's a low percentage of the overall batch size.</p>
<p>Here's what I mean:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/yc-batch-percentage-w24.png" class="kg-image" alt="" loading="lazy" width="830" height="712" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/04/yc-batch-percentage-w24.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/yc-batch-percentage-w24.png 830w" sizes="(min-width: 720px) 720px"></figure><p>If we (hypothetically) took away all of YC's other investments, their ~15-20 investments per year (across two batches) in cybersecurity, privacy, and trust companies still makes them one of the most active early-stage investors in our industry.</p>
<p>Next, let's meet the companies in the W24 batch and think through their potential opportunities and challenges.</p>
<h2 id="opportunities-and-challenges-for-the-winter-2024-batch">Opportunities and challenges for the Winter 2024 batch</h2>
<h3 id="alacrity">Alacrity</h3>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="http://www.joinalacrity.com/?ref=content.strategyofsecurity.com">Alacrity</a> is building an account takeover prevention platform. It's a combination of identity and fraud products and techniques specifically crafted for stopping account takeovers.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>They're somewhere between <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#authentication">Authentication</a> and <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#fraud-and-transaction-security">Fraud and Transaction Security</a>. The product isn't a full-on identity or fraud platform — it's an intentional blend of the two focused on a specific (and massive) problem within both domains.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Alacrity's launch article covered the current state of the problem perfectly:</p>
<blockquote>
<p>Large tech companies invest in advanced fraud solutions such as passkeys and intelligent device/session management, etc. However, most companies do not have the bandwidth or expertise to do the same.</p>
</blockquote>
<p>What most companies rely on today for ATOs is SMS 2FA. Yet, we are seeing ATOs grow despite the wide adoption of SMS 2FA because codes can be socially engineered, phished, or subject to SS7 attacks.</p>
<p>A skeptic could argue the solutions to ATO attacks are already out there, and it's just an implementation or adoption problem. Maybe true, but could an easier-to-adopt platform increase the adoption rate and win? There were payment processors before Stripe, too — but their early advantage was being ridiculously easier to adopt.</p>
<p>Another adjacent challenge is the difficulty of separating ATO prevention from a company's overall customer identity infrastructure. Companies with enough traction and maturity to have large-scale ATO problems have already invested  loads of time, money, or both into their customer identity stack. They're unlikely to change the entire stack just to stop ATO attacks.</p>
<p>This means Alacrity may eventually need to integrate with existing customer identity platforms. Competing with the likes of Okta (Auth0), Ping Identity, FusionAuth, Descope, Passage, and dozens of other well-funded customer identity platforms is an exhausting road. Making friends with them could turn potential competitors into huge advocates.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Stolen credentials are the reigning champion of methods criminals use to cause breaches — and has been for <a href="https://strategyofsecurity.com/p/the-strategic-impact-of-verizons-2022-data-breach-investigations-report/">many years running</a> in Verizon's DBIR reports. Solutions aren't getting implemented quickly enough, and attacks are becoming more sophisticated and persistent.</p>
<p>Now, companies are starting to <a href="https://ag.ny.gov/press-release/2024/attorney-general-james-sues-citibank-failing-protect-and-reimburse-victims?ref=content.strategyofsecurity.com">get sued</a> for not doing enough (in the eyes of regulators, anyway) to stop these types of attacks on consumers. Historically, companies start to take action when legal or regulatory implications get bad enough.</p>
<p>Alacrity can be a big company if they make ATO prevention incredibly easy and effective to implement, alongside a boost in urgency from state and federal regulators to reduce the impact of this problem.</p>
<h3 id="delve">Delve</h3>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.getdelve.com/?ref=content.strategyofsecurity.com">Delve</a> automates the process of becoming HIPAA compliant and monitoring compliance on an ongoing basis. It's not just a compliance product — they literally set up compliant infrastructure for HealthTech companies to build products on.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>I'd classify Delve as a "hybrid" company across infrastructure and <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#governance-risk-and-compliance">Governance, Risk, and Compliance (GRC)</a>. They're solving security and compliance problems (HIPAA, at least to start) with infrastructure and compliance automation features.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>I could be off base here, but Delve seems easier to implement for brand new companies (or products) than existing products already built on infrastructure  created long before Delve was a company. This could make switching costs hard. Re-platforming an existing app is a big ask.</p>
<p>HIPAA compliance is a big-but-not-massive market at ~$3 billion annually.² It's a U.S. only regulation, and the existing market includes a lot of services spend. Delve (eventually) might need to repeat their model for other types of regulations as they scale, but that's a problem for later.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Trends for HealthTech industry investments look just about like cybersecurity — down from 2021 and early 2022 numbers, but <a href="https://www.linkedin.com/pulse/health-funding-investment-trends-last-12-months-potential-lloyd-price/?ref=content.strategyofsecurity.com">still strong</a>. This means there are still plenty of potential early-stage customers (including <a href="https://www.ycombinator.com/companies?batch=W24&industry=Healthcare&ref=content.strategyofsecurity.com">24 in this YC batch</a> alone) for Delve to grow with.</p>
<p>The idea of building and monitoring regulation-specific infrastructure is pretty novel. If Delve becomes the go-to approach for launching companies in regulated industries, they can be a big company.</p>
<h3 id="nuanced">Nuanced</h3>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.nuanced.dev/?ref=content.strategyofsecurity.com">Nuanced</a> is an API and web app for detecting AI-generated fraud, deepfakes, and misinformation. Their current specialty is detecting AI-generated images, which is useful for all kinds of services with high volumes of user generated content.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>They're a combination of <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#aiml-security">AI/ML Security</a> and <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#fraud-and-transaction-security">Fraud and Transaction Security</a>. The problem is fraud, and the reason is AI.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>AI-generated fraud, deepfakes, and misinformation is still an emergent problem. Most people you know (definitely not your mom) have heard of this. It's still going to take a while for the long tail of companies to realize this problem exists, let alone adopt a solution for it.</p>
<p>This may sound defeatist, but I also wonder if some companies are even going to try stopping AI-generated content. X (<a href="https://www.urbandictionary.com/define.php?term=Xitter&ref=content.strategyofsecurity.com">Xitter</a>?!) is the wild west right now. Other out-of-band sites like forums, Discord channels, and Reddit just let a lot of this stuff go.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Some companies have to care about AI-generated content because trust and safety are important parts of their business. The scope of "have to care" is a lot wider than you'd think — everyone from dating sites to regulated industries like FinTech needs to avoid this type of behavior from malicious users.</p>
<p>If the problem itself multiplies exponentially (and it definitely could), companies will have to find a solution fast. What better way than a straightforward API like Nuanced? That's how they become a big company.</p>
<h3 id="promptarmor">PromptArmor</h3>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://promptarmor.com/?ref=content.strategyofsecurity.com">PromptArmor</a> protects LLM applications from attacks. It's a full offering, including a product, services, and threat intelligence.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>They're an <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#aiml-security">AI/ML Security</a> company focused on securing LLMs.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Awareness of this problem space is going to take a minute. Most companies barely understand how or why to build LLM applications, let alone defend them from attacks.</p>
<p>Companies who are thinking about LLM security are often focused on the data loss/exfiltration part of the equation right now — things like preventing their own employees from sharing information they shouldn't. They haven't put much thought into how or why an attacker might exploit an LLM application.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>This is an "all ships rise with the tide" situation. Generative AI sure looks like the next major technology platform, and those only come around a few times in your life.</p>
<p>Business and enterprise adoption of LLMs is moving faster than it has with some previous technology platforms. A majority of use cases, or at least a material share, are going to be business-focused.</p>
<p>A major security incident (and definitely a handful of incidents) involving LLM applications is going to get this problem on the radar of security leaders quickly. If PromptArmor can position itself as the go-to solution for securing an organization's LLM applications, it's going to be a big company.</p>
<h3 id="titan">Titan</h3>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://applytitan.com/?ref=content.strategyofsecurity.com">Titan</a> helps companies manage access to data, starting with Snowflake. This includes authorization for any resource type in the data warehouse (users, roles, schemas, databases, etc.).</p>
<p>You could conceptually think of Titan like an Identity Governance and Administration (IGA) product but specifically for managing access to data, and implemented with infrastructure as code instead of an interface.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>It's an <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#authorization">Authorization</a> product built for <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#data-security">Data Security</a>.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>It's easy to pick on access control for Snowflake as a niche market with a small TAM, but Snowflake has over 8,500 customers. Titan may (eventually) have to broaden support and add other data platforms in the future, but there's plenty of room to grow on Snowflake alone.</p>
<p>Managing access to data infrastructure is a complex problem, and implementing it with infrastructure as code requires sophisticated users. I'm sure the Titan team knows that and is building a product that works for them, at least for now. Someday, they might need to add an interface or other abstraction layers to make things easier for less sophisticated customers.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Snowflake has a $57 billion market cap and $2.8 billion of revenue growing 36% year-over-year. They're one of the ten best companies in all of tech. Building on top of them is a nice place to start.</p>
<p>And guess what? Managing security in Snowflake is a nightmare!</p>
<p>We're quickly moving past the days where access in data warehouses is a free-for-all. This is partly driven by plugging LLMs into them. Companies figured out how quickly LLMs give employees access to sensitive data if their underlying access to the data isn't tight.</p>
<p>Titan can be a big company if this problem rapidly increases the importance of access control in data infrastructure and they're the standard for solving it.</p>
<h3 id="tracecat">Tracecat</h3>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://tracecat.com/?ref=content.strategyofsecurity.com">Tracecat</a> is an open source security automation platform. It's a nice one with modern features like no code, AI-assisted workflows, and local or cloud deployment options.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>They're a Security Orchestration, Automation, and Response (SOAR) product, which falls under <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#security-operations">Security Operations</a>.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>SOAR (or hyperautomation, if you want to use the fancy new term) is a busy market with lots of competition. The big security operations companies like Palo Alto Networks, CrowdStrike, Cisco (Splunk), and others all offer established SOAR products.</p>
<p>We've also seen a lot of M&amp;A and financing activity lately, including Arctic Wolf's <a href="https://arcticwolf.com/resources/press-releases/arctic-wolf-announces-intent-to-acquire-revelstoke/?ref=content.strategyofsecurity.com">acquisition of Revelstoke</a>, SentinelOne's  <a href="https://www.linkedin.com/posts/colegrolmus_my-top-five-takeaways-from-sentinelones-activity-7174440379063169025-H-Lm?utm_source=share&utm_medium=member_desktop">acquisition of Stride</a>, Torq's <a href="https://techcrunch.com/2024/01/23/cybersecurity-automation-firm-torq-lands-42m-in-expanded-series-b/?ref=content.strategyofsecurity.com#:~:text=Torq%2C%20a%20self%2Ddescribed%20%E2%80%9C,Partners%20and%20Evolution%20Equity%20Partners.">oversubscribed Series B</a>, and so on.</p>
<p>Competing in this market is going to take an awesome product and then some — but the recent acquisitions and investments have made it clear the market is far from won.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>We're entering a new era of SOAR/hyperautomation products, partly because the need for automation in security is still so acute. Who knows if or when AI is going to fully <a href="https://strategyofsecurity.com/p/the-audacious-future-of-palo-alto-networks/">automate the SOC</a> — probably not anytime soon. Until then, the combination of some AI and some automation is going to be what companies use to get by.</p>
<p>Tracecat can be a big company if they keep building an awesome product and their open source model (with a pretty reasonable entry price point) helps them find customers and grow with them.</p>
<hr><h3 id="footnotes">Footnotes</h3>
<p>¹Batch counts include companies as of Demo Day. Numbers may be off by a few because companies pivot in and out of the industry after launching.</p>
<p>²According to the mildly shady market research companies, anyway.</p>
]]></content:encoded>
            <category>Startups</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/header-yc-w24-cybersecurity-startups-1.png"/>
        </item>
        <item>
            <title><![CDATA[Themes From (And Beyond) Altitude Cyber's 2023 Cybersecurity Year In Review]]></title>
            <link>https://strategyofsecurity.com/themes-from-and-beyond-altitude-cybers-2023-cybersecurity-year-in-review/</link>
            <guid>660fe66f783dba0001b86ed9</guid>
            <pubDate>Fri, 05 Apr 2024 12:14:46 GMT</pubDate>
            <description><![CDATA[Exploring five easy-to-overlook themes from 13 years of cybersecurity industry data and research.]]></description>
            <content:encoded><![CDATA[<p>One of the most elite reports on the business of cybersecurity is back — just wearing a different jersey this time.</p>
<p><a href="https://www.altitudecyber.com/?ref=content.strategyofsecurity.com">Altitude Cyber</a> dropped its inaugural 2023 Cybersecurity Year In Review report last month. It's a data-driven deep dive into the year that was in 2023.</p>
<p>The last time I covered <a href="https://momentumcyber.com/?ref=content.strategyofsecurity.com">Momentum Cyber</a>'s annual industry report was <a href="https://strategyofsecurity.com/p/themes-from-momentum-cybers-2022-cybersecurity-almanac/">back in 2022</a>. I helped the team produce the next two as a Senior Advisor to the firm. Covering my own work seemed redundant!</p>
<p>Now that I'm back on the consumer side, it's time for me to show you around the next iteration of this industry research.</p>
<p>This time, I have a lot more experience navigating the reports and data shared in them. I also get to bend the rules, so that's exactly what I'm going to do!</p>
<p>I want to tell you about five themes from the report — an outlier, two growing trends, and two things that haven't changed — using a wide-angle lens across the horizon of time.</p>
<p>Let's start by erasing our memories about the most abnormal year our industry has ever had.</p>
<h2 id="the-outlier-2021">The outlier: 2021</h2>
<h5 id="strategic-activity-is-still-pretty-good-if-you-forget-2021-ever-happened">Strategic activity is still pretty good if you forget 2021 ever happened.</h5>
<p>In 2022, there was still a perception that everything in the cybersecurity industry (and all of tech, really) was fine. Strategic activity was going to get back to 2021 levels...<em>any day now.</em></p>
<p>In hindsight, we were still a little euphoric from the boom loop that was 2021.</p>
<p>The doom loop had fully set in by 2023. All the industry <a href="https://www.cybersecuritydive.com/news/cyber-funding-declines/704341/?ref=content.strategyofsecurity.com#:~:text=The%20flow%20of%20funding%20to,volume%20from%20the%20previous%20year.">chatter</a> was about financing and M&amp;A activity being down.</p>
<p>It was, but mainly compared to 2021. That's a tough benchmark. It's like comparing any other cricket player to <a href="https://en.wikipedia.org/wiki/Don_Bradman?ref=content.strategyofsecurity.com">Don Bradman</a>, the undisputed greatest of all time.</p>
<p>Let's quickly step into a tangential world where 2021 never happened and see what cybersecurity's trend of strategic activity looks like.</p>
<p>Here are the "updated" charts for M&amp;A:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/ma-dollar-volume-trend-excl-2021.png" class="kg-image" alt="" loading="lazy" width="830" height="624" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/04/ma-dollar-volume-trend-excl-2021.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/ma-dollar-volume-trend-excl-2021.png 830w" sizes="(min-width: 720px) 720px"></figure><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/ma-deal-count-trend-excl-2021.png" class="kg-image" alt="" loading="lazy" width="830" height="624" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/04/ma-deal-count-trend-excl-2021.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/ma-deal-count-trend-excl-2021.png 830w" sizes="(min-width: 720px) 720px"></figure><p>And for financing:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/financing-dollar-volume-trend-excl-2021.png" class="kg-image" alt="" loading="lazy" width="830" height="624" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/04/financing-dollar-volume-trend-excl-2021.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/financing-dollar-volume-trend-excl-2021.png 830w" sizes="(min-width: 720px) 720px"></figure><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/financing-deal-count-trend-excl-2021.png" class="kg-image" alt="" loading="lazy" width="830" height="624" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/04/financing-deal-count-trend-excl-2021.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/financing-deal-count-trend-excl-2021.png 830w" sizes="(min-width: 720px) 720px"></figure><p><em>...Wait, what?! The trends for both are pretty good!</em></p>
<p>Exactly.</p>
<p>Obviously, we can't delete 2021 in the real world, so don't stick these charts in any serious industry publication.</p>
<p>This "world without 2021" thought experiment helps add some perspective, though. Things don't seem as raucous as they did in 2021, but they're not as bad as they seem, either.</p>
<p>Next, let's talk about a couple growing trends — both related to M&amp;A.</p>
<h2 id="growing-trends-private-equity-and-gigantic-ma-transactions">Growing trends: private equity and gigantic M&amp;A transactions</h2>
<h5 id="private-equity-buyers-have-been-really-active-and-they-have-more-money-to-spend-than-ever">Private equity buyers have been really active, and they have more money to spend than ever.</h5>
<p>Back in 2010, private equity buyers cared more about the color of their ties than the cybersecurity industry. They did five total deals for just over a billion. That's lower than the net worth of some Managing Partners.</p>
<p>Boy, how times have changed. The next decade-plus was a rush of money into the industry from private equity. They're literally spending more money on acquisitions than strategic buyers now:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/pe-dollar-volume-trend.png" class="kg-image" alt="" loading="lazy" width="830" height="678" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/04/pe-dollar-volume-trend.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/pe-dollar-volume-trend.png 830w" sizes="(min-width: 720px) 720px"></figure><p>This wasn't from a handful of large deals, either. Private equity firms do close to half the acquisitions in cybersecurity:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/pe-deal-count-trend.png" class="kg-image" alt="" loading="lazy" width="830" height="678" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/04/pe-deal-count-trend.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/pe-deal-count-trend.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Remember when I said we're going to see a record number of large acquisitions the rest of this decade (and you probably laughed at me)? Well, check this out:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/pe-available-dry-powder-trend.png" class="kg-image" alt="" loading="lazy" width="830" height="678" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/04/pe-available-dry-powder-trend.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/pe-available-dry-powder-trend.png 830w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Note: This is Altitude Cyber's graphic, not mine.</span></figcaption></figure><p>Private equity firms have three times more capital available to deploy today than they did for most of the last decade.¹ And cybersecurity seems to be burning a hole in their pockets.</p>
<h5 id="our-ma-transactions-just-keep-getting-bigger">Our M&amp;A transactions just keep getting bigger.</h5>
<p>Even though cybersecurity's total M&amp;A dollar volume and activity are down from all-time-highs, our big acquisitions are bigger than ever.</p>
<p>Cybersecurity is a small enough industry for M&amp;A activity trends to get spiky from large deals. That's exactly what is happening...but the trend for deal size is clearly going up:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/large-acquisition-trend.png" class="kg-image" alt="" loading="lazy" width="830" height="624" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/04/large-acquisition-trend.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/large-acquisition-trend.png 830w" sizes="(min-width: 720px) 720px"></figure><p>We didn't have a transaction over $10 billion until 2019. Now, we've had four (or five if you count Broadcom's <a href="https://www.reuters.com/markets/deals/broadcom-closes-69-bln-vmware-deal-after-china-approval-2023-11-22/?ref=content.strategyofsecurity.com">$69 billion acquisition of VMware</a>).</p>
<p>The $5-billion-plus deals that would have easily been the largest for most years of the past decade are now routine. We've had eight (and counting) since 2020.</p>
<p>We're probably going to see more large acquisitions in the remainder of this decade than we've seen in the entire history of cybersecurity. Why?</p>
<p>Two words: private equity.</p>
<p>Next, let's talk about a couple things that haven't changed — even after a few choppy years of activity in the industry.</p>
<h2 id="what-hasnt-changed-strategic-buyers-and-specialist-investors">What hasn't changed: strategic buyers and specialist investors</h2>
<h5 id="cybersecuritys-most-active-strategic-buyers-arent-slowing-down-much">Cybersecurity's most active strategic buyers aren't slowing down (much).</h5>
<p>The strategy for several large cybersecurity companies (and professional services firms) is to grow through acquisitions. Don't think for a minute that some little economic downturn is going to slow them down.</p>
<p>Our most active strategic buyers for the past three years are...well, pretty similar:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/strategic-buyer-trend.png" class="kg-image" alt="" loading="lazy" width="830" height="756" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/04/strategic-buyer-trend.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/strategic-buyer-trend.png 830w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Note: This is Altitude Cyber's graphic. I just marked it up.</em></i></figcaption></figure><p>This is a pretty short list, too. I'm sure if we had access to all of the underlying data, the companies who dropped off in one or more years would still be pretty active.</p>
<p>The part that didn't happen was a rush of new strategic buyers (e.g. the IPO pipeline and unicorns of 2021) into the M&amp;A market. Some people thought there were going to be fire sales. There weren't, and definitely not for our best companies.</p>
<p>The trend is starting to normalize a little bit now. We've seen new buyers making acquisitions and another set of companies who have raised capital and specifically said they're using it for M&amp;A. But our most active buyers will keep being our most active buyers.</p>
<p>Let's finish by talking about what's happening with cybersecurity's top investors.</p>
<h5 id="cybersecuritys-most-active-investors-are-still-cybersecuritys-most-active-investors">Cybersecurity's most active investors are still cybersecurity's most active investors.</h5>
<p>Overall financing activity is down, but cybersecurity's most active and long-term investors are holding (<a href="https://www.urbandictionary.com/define.php?term=hodl&ref=content.strategyofsecurity.com">HODL-ing?</a>)² their ground. The list of active investors hasn't changed much in the past three years:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/most-active-investors-trend.png" class="kg-image" alt="" loading="lazy" width="830" height="517" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/04/most-active-investors-trend.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/most-active-investors-trend.png 830w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Note: This is also Altitude Cyber's graphic. I'm the one who ruined it.</em></i></figcaption></figure><p>Eight of the ten most active investors are still the same.³ I wouldn't read much into Accel or Tiger Global, either — both of them are still investing in plenty of cybersecurity companies.</p>
<p>The investors who have pulled back either weren't investing exclusively in cybersecurity, were speculating because this was a "hot" industry, or both.</p>
<p>Our most active investors are as committed (and <a href="https://www.linkedin.com/posts/jayleek_cybersecurity-secops-vc-activity-7178885556414627840-CjIB?utm_source=share&utm_medium=member_desktop">well-funded</a>) as ever.</p>
<h2 id="more-than-2023">More than 2023</h2>
<p>This year's Altitude Cyber report is about 2023, sure. But it's also about more than that. It's the middle of a story about an industry whose time has come.</p>
<p>When you're living in the moment, like all of us do most of the time, it's easy to get pulled into the highs or lows of the present.</p>
<p>If you've done this long enough, you know every year (or quarter, or sometimes day!) might just be an outlier.</p>
<p>Growing trends can be unnerving because they change the order of what we've always known. They can also be empowering if you get ahead of them and know how to act.</p>
<p>A few things rarely change. The people and companies who are in cybersecurity for the long run are still here. They're ready for what's next, good or bad.</p>
<p>And if you let yourself zoom out far enough, you'll see why there's a lot to be excited and optimistic about.</p>
<hr><h3 id="acknowledgements">Acknowledgements</h3>
<p>Thank you to both the Altitude Cyber and Momentum Cyber teams for years of hard work on this industry research.</p>
<h3 id="footnotes">Footnotes</h3>
<p>¹This capital isn't just for cybersecurity acquisitions, but some of it is definitely heading our way.</p>
<p>²Not really – a bunch of data points (and intuition) still say cybersecurity is a good place to invest. Especially if you know what you're doing, and these firms do.</p>
<p>³This analysis just covers deal volume, not the next layer of details about round sizes or whether these were new or follow-on investments. It's still a pretty good indicator of commitment to the industry, though.</p>
]]></content:encoded>
            <category>M&amp;A</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/04/header-themes-from-ac-2023-review.png"/>
        </item>
        <item>
            <title><![CDATA[Cybersecurity's Class Conundrum: Winner-Take-All Market Dynamics]]></title>
            <link>https://strategyofsecurity.com/cybersecuritys-class-conundrum-winner-take-all-market-dynamics/</link>
            <guid>65f9ac5f18f5eb0001e3a0fe</guid>
            <pubDate>Tue, 19 Mar 2024 15:34:59 GMT</pubDate>
            <description><![CDATA[What technology's winner-take-all market dynamics mean for the cybersecurity industry.]]></description>
            <content:encoded><![CDATA[<p>The cybersecurity industry isn’t winner-take-all, but its markets are.</p>
<p>That's the part I was missing when I wrote <a href="https://strategyofsecurity.com/p/cybersecuritys-class-conundrum/">Cybersecurity's Class Conundrum</a> three weeks ago.</p>
<p>The core observation from the original piece was clear: the cybersecurity industry has a growing class divide between its companies, and the gap is only getting wider.</p>
<p><em>Okay, great. But what now?</em></p>
<p>I was still missing the punch line about why this matters and what it means.</p>
<p>Class divides are one of the most common outcomes in capitalism. The winner-take-all market dynamics that cause them are really common, too.</p>
<p>Cybersecurity just hasn't experienced many of these dynamics yet, even though our industry has been around for a little while.</p>
<p>When industries are at this point, one of two things usually happens.</p>
<p>People are totally unaware the dynamics are happening and keep doing what they're doing — which is easy to do because their effects aren't very obvious yet.</p>
<p>Or, people are aware of the dynamics and deny they're happening. I've seen enough renditions of the "cybersecurity is special" argument to know this belief is common.</p>
<p>Either scenario leads to bad outcomes, or at best sub-optimal ones. Consciously or unconsciously, they've missed a powerful force and how it's going to impact them. It's the business version of not seeing the weather forecast for a hurricane or catching the forecast but deciding to stay put.</p>
<p>The good outcomes come from people recognizing the dynamics early, making high-probability predictions about what will happen, and taking action. It's really hard, but doing all of this right means you, your company, or anything else you care about comes out ahead.</p>
<p>I think this is the point we're at right now in cybersecurity — the <em>"not too early, not too late, but better hurry"</em> inflection before serious market dynamics take over. We need to have a practical discussion about the effects winner-take-all market dynamics are going to have on our industry.</p>
<p>Let me start with a quick story about how I learned market dynamics dynamics the hard way.</p>
<h2 id="why-youre-reading-this-instead-of-shopping-at-my-grocery-store">Why you're reading this instead of shopping at my grocery store</h2>
<p>In a parallel universe without strategic forces and market dynamics, I would probably be helping my extended family run a small chain of grocery stores in Iowa.</p>
<p>My grandpa opened our family's first independent grocery store in 1973, just one year and 70 miles apart from the first Wal-Mart in the state. The family business thrived in the 1970s and 1980s, growing to four stores across eastern Iowa and employing hundreds of people.</p>
<p>That's where the winner-take-all markets part comes in and bends the arc of my life dramatically.</p>
<p>Walmart went public in 1970. They had 38 stores at the time — ten times more than my family's modest chain of four stores, but not orders of magnitude larger in size or scale.</p>
<p>You know where the Walmart part of the story goes from here. They had 1,400 stores and $26 billion in revenue by the end of the 1980s. They also spent these two decades developing and refining their business model, including the most sophisticated logistics system in retail. This period was the foundation that eventually made Walmart the largest retailer in the world.</p>
<p>By the end of the 1980s, my family's business had...<em>four stores.</em> This was the same local-first, long-tail strategy that worked wonders for all kinds of retail businesses before Walmart came along.¹</p>
<p><em>Before Walmart came along.</em> That's how stories like this happen. Everyone thinks an industry works a certain way — until it doesn't. By then, it's too late.</p>
<p>Market dynamics are powerful and brutal forces. Walmart was playing a winner-take-all game while everyone else was following the playbook of decades past.</p>
<p>I never worked in my family's grocery stores. It's fortunate I didn't. The last store was <a href="https://progressivegrocer.com/hy-vee-acquiring-iowa-indie-north-scott-foods?ref=content.strategyofsecurity.com">sold in 2023</a>, ending a 50-year era of the family business at the 2nd generation. Being a 3rd generation independent grocer on the wrong end of winner-take-all dynamics is not a strategic position I'd want to be in.</p>
<p>Next, let's talk about how tech made the forces behind winner-take-all markets even faster and more severe than old school businesses like my family's grocery stores.</p>
<h2 id="winner-take-all-markets-in-tech-like-grocery-stores-but-bigger-and-faster">Winner-take-all markets in tech: like grocery stores, but bigger and faster</h2>
<p>Marc Andreessen originated the current version of thinking around winner-take-all markets in the tech industry during an <a href="https://techcrunch.com/2013/01/27/marc-andreessen-on-the-future-of-the-enterprise/?ref=content.strategyofsecurity.com">interview</a> back in 2013:</p>
<blockquote>
<p>In normal markets, you can have Pepsi and Coke. In technology markets, in the long run, you tend to only have one…The big companies, though, in technology tend to have 90 percent market share. So we think that generally, these are winner-take-all markets.<br>
<br>
Generally, number one is going to get like 90 percent of the profits. Number two is going to get like 10 percent of the profits, and numbers three through 10 are going to get nothing.</p>
</blockquote>
<p>You know this intuitively if you've been around tech long enough. Winner-take-all markets happen all the time in tech: search engines, social media, e-commerce, music streaming, ride sharing — on and on. The effects are pretty easy to see in retrospect.</p>
<p>What's harder is acknowledging the effects <em>before</em> they happen, especially the markets you work or invest in. This means us, cybersecurity people.</p>
<p>Harder still is doing something about it: things like putting your company in a position to be number one, investing in companies who are likely to be number one, and knowing when and how to change course, salvage, or bail if you're number three through 10.</p>
<p>Before we get into effects, let's make a quick distinction about the differences between markets and industries.</p>
<h2 id="cybersecurity-isn%E2%80%99t-winner-take-all-but-its-markets-are">Cybersecurity isn’t winner-take-all, but its markets are</h2>
<p>Andreessen's 90/10 profit split might be a little extreme for an entire industry, but it's been proven accurate repeatedly at the market level. Let's translate this to cybersecurity.</p>
<p>As I said when <a href="https://strategyofsecurity.com/p/how-could-platformization-work-in-cybersecurity/">making my case</a> for platformization, <em>"There will never be a one-ring-to-rule-them-all cybersecurity platform all companies buy from a single vendor."</em></p>
<p>The concept of winner-take-all markets is the economics side of the cybersecurity platformization debate.</p>
<p>The same fundamental platformization idea applies for the cybersecurity <em>industry:</em> there will never be a winner-take-all cybersecurity company.</p>
<p>But at a <em>market</em> level, there are definitely going to be winners. <em>Eventually.</em> We're talking about a decades-long process here.</p>
<p>Let me show you what I mean:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/ecosystem-winner-take-all-markup.png" class="kg-image" alt="" loading="lazy" width="830" height="701" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/03/ecosystem-winner-take-all-markup.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/ecosystem-winner-take-all-markup.png 830w" sizes="(min-width: 720px) 720px"></figure><p>In ecosystem terms, the entire domain of Cybersecurity, Privacy, and Trust is too large to win. It's an entire industry, not a market.</p>
<p>Really big markets like Security Operations might have multiple leaders because they're quasi-industries. Leaders will win the smaller markets that roll up into the large one.</p>
<p>Smaller markets like cloud security will have winners.² Those winners may eventually end up being acquired by mega-cap companies in larger markets — but they're still winners and still have great financial outcomes.</p>
<p>Now, let's talk about how a few powerful market forces are shaping the cybersecurity industry.</p>
<h2 id="revenue-concentration">Revenue concentration</h2>
<h5 id="cybersecuritys-current-market-leaders-are-growing-at-a-disproportionate-rate">Cybersecurity's current market leaders are growing at a disproportionate rate.</h5>
<p>In winner-take-all markets, the winners (and companies who are on their way to winning) grow at a much faster rate than everyone else.</p>
<p>In my grocery business example, it's Walmart jumping from 38 to 1,400 stores in a decade while my family's business stayed at four. "Disproportionate" barely begins to describe the difference.</p>
<p>Disproportionate growth happens in technology markets, too. You know, like cybersecurity:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/avg-revenue-growth-trend-by-company-class.png" class="kg-image" alt="" loading="lazy" width="830" height="665" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/03/avg-revenue-growth-trend-by-company-class.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/avg-revenue-growth-trend-by-company-class.png 830w" sizes="(min-width: 720px) 720px"></figure><p>The reason cybersecurity's top seven public companies (the "A-List" in the chart) are now worth more than the rest of the industry combined comes down to one thing: massive revenue growth. Their average growth rates have <em>nearly doubled</em> the rest of the industry's growth for over a decade.</p>
<p>"A-list" company revenue growth topped out at 46.7% in 2021 and has never been below 20%. Everyone else topped out at 27.6% back in 2011 and has only averaged over 20% growth three times in 13 years.</p>
<p>The same thing happens in earlier stage markets — it's just harder to spot because private companies aren't required to report financial metrics.</p>
<h5 id="revenue-is-concentrating-among-cybersecuritys-market-leaders">Revenue is concentrating among cybersecurity's market leaders.</h5>
<p>Revenue concentration among market leaders is an immediate consequence of disproportionate growth over a long enough period of time.</p>
<p>Andreessen's 90-10 theory of profit concentration is faster and more pronounced in consumer technology markets. Concentration still happens in enterprise tech — it just takes longer and has a less lopsided ratio.</p>
<p>Revenue concentration among cybersecurity's public companies has been happening for a while:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/revenue-concentration-trend-by-company-class.png" class="kg-image" alt="" loading="lazy" width="830" height="665" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/03/revenue-concentration-trend-by-company-class.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/revenue-concentration-trend-by-company-class.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Fortinet, our only current A-List company who was public in 2011, had only 1.6% of the total cybersecurity industry revenue reported at the time. Fast forward to 2023, and our seven A-list companies have already concentrated 23.1% of revenue.</p>
<p><em>But wait, other companies still have over 75% of the revenue?!</em></p>
<p>Remember, there are only seven A-list companies. 51 other companies are controlling the remaining 76.9% of revenue. And this is still excluding tech companies with massive cybersecurity businesses — Microsoft, Cisco, Alphabet, HPE, and others.</p>
<p>Ed Sim recently <a href="https://x.com/edsim/status/1724803840363610186?s=20&ref=content.strategyofsecurity.com">shared</a> a variation of the same concept about cybersecurity revenue concentration that included Microsoft:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/ed-sim-revenue-concentration.png" class="kg-image" alt="" loading="lazy" width="598" height="720"></figure><p>I'd bet the concentration would be a lot higher than 51% if we had enough data to include Cisco, Alphabet, and other large cybersecurity business units.³</p>
<p>Regardless of the exact percentage we're at today, cybersecurity's revenue concentration is compounding quickly (by the long, bending arc of market time horizons, anyway). Just look at what already happened in a decade and imagine how much more concentrated it's going to be in another decade or two.</p>
<p>Revenue concentration leads to all kinds of other effects. Let's talk about those next.</p>
<h2 id="leverage">Leverage</h2>
<h5 id="larger-profits-and-higher-valuations-give-the-largest-cybersecurity-companies-more-leverage">Larger profits and higher valuations give the largest cybersecurity companies more leverage.</h5>
<p>"Leverage" means all kinds of things — pricing, partnerships, acquisitions, and more. Once a market leader has leverage, their advantages compound even faster.</p>
<p>Acquisitions are an interesting example to show the effects of leverage. Cybersecurity market leaders have multiple advantages over companies who aren't market leaders — cash, equity, and post-acquisition growth.</p>
<p>Here's how much cash each public cybersecurity company has on hand right now:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/total-cash-by-company.png" class="kg-image" alt="" loading="lazy" width="830" height="665" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/03/total-cash-by-company.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/total-cash-by-company.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Cybersecurity's seven A-list companies have $17.6 billion of total cash, an average of $2.9 billion per company. All but one company (Cloudflare) makes up the top six companies with the highest amount of cash on hand. Splunk is the only other company with over $2 billion of cash, which now <a href="https://strategyofsecurity.com/p/ciscos-cybersecurity-shopping-spree-part-2/">belongs to Cisco</a> after their acquisition closed.</p>
<p>Cash is just one kind of leverage. Higher valuations for A-list companies mean the value of any equity they use for acquisitions is higher than other cybersecurity companies with lower valuations. This <em>saves</em> cash and gives them more leverage for other acquisitions or investments. It's a self-reinforcing feedback loop.</p>
<p>Speaking of feedback loops...</p>
<h2 id="feedback-loops">Feedback loops</h2>
<h5 id="positive-feedback-loops-make-cybersecuritys-most-powerful-companies-even-more-powerful">Positive feedback loops make cybersecurity's most powerful companies even more powerful.</h5>
<p>So far, we've been talking about effects related to money. Things really get out of hand with social effects.</p>
<p>The <a href="https://en.wikipedia.org/wiki/Matthew_effect?ref=content.strategyofsecurity.com">Matthew effect</a> causes success and resources to gravitate towards people and companies who already have them. Colloquially, it's "the rich get richer and the poor get poorer" adage.</p>
<p>Companies like CrowdStrike and Wiz are famous for being famous. People want to buy their products, buy their stock, work there, and partner with them because they're already famous.</p>
<p>Another example is Okta's leadership in the Gartner Magic Quadrant for Access Management. They've been in the "leaders" quadrant for <em>seven straight years</em>.  Positive feedback loops kept them on top, even after <a href="https://strategyofsecurity.com/p/oktas-cinderella-story/">breach after breach</a> ripped through the news headlines.⁴</p>
<p>It's called a feedback loop because outputs like these become inputs, and the cycle repeats itself. This is exactly why it's hard to overtake a market leader by competing with them directly — positive feedback loops are really strong, and they get stronger with compounding.</p>
<h5 id="talent-concentrates-to-winners-and-the-rest-do-layoffs">Talent concentrates to winners, and the rest do layoffs.</h5>
<p>Another interesting example of positive and negative feedback loops in winner-take-all markets is talent. Talent concentrates among market leaders. Talent defects (or gets laid off) from companies who aren't market leaders.</p>
<p>Here's a wild stat from Cloudflare to illustrate the point. In <a href="https://www.fool.com/earnings/call-transcripts/2023/02/09/cloudflare-net-q4-2022-earnings-call-transcript/?ref=content.strategyofsecurity.com">2022</a>, they had approximately 400,000 people apply for 1,300 positions. That's an acceptance rate of 0.3%. Admission rates for Harvard and Stanford are both around 4%. In other words, it's over 13 times harder to get a job at Cloudflare than it is to get into two of the top universities in the United States.</p>
<p>The same thing goes for executives. CrowdStrike <a href="https://www.crn.com/news/security/crowdstrike-poaches-two-execs-from-rival-sentinelone?ref=content.strategyofsecurity.com">famously poached</a> SentinelOne's Chief Marketing Officer and Chief Product Officer at the same time, using their leverage to stick it to a competitor while they were (briefly) down. Then, they literally put the executives in charge of building more advantages in channel growth and new product development, two of the biggest drivers fueling CrowdStrike's <a href="https://www.linkedin.com/posts/colegrolmus_crowdstrike-the-pioneer-of-cybersecurity-activity-7171218235256737793-C-P7?ref=content.strategyofsecurity.com">massive 2024 earnings</a>.</p>
<p>The relationship between negative feedback loops and layoffs works in a similar way, but in reverse. According to <a href="https://airtable.com/app1PaujS9zxVGUZ4/shrqYt5kSqMzHV9R5/tbl8c8kanuNB6bPYr?backgroundColor=green&viewControls=on&ref=content.strategyofsecurity.com">Layoffs.fyi data</a> (and my own company classifications), A-List companies have laid off 881 employees since tracking began in 2020. Other public companies have laid off 3,019 employees.⁵ Private markets are even uglier, with 5,922 employees let go by 71 different companies.</p>
<p>Negative network effects repel talent away from companies who aren't viewed as market leaders (or potential ones).</p>
<p>Let's finish by talking a bit about competition.</p>
<h2 id="competition">Competition</h2>
<h5 id="its-harder-to-ipo-in-an-established-cybersecurity-market">It's harder to IPO in an established cybersecurity market.</h5>
<p>Late-stage cybersecurity companies are having an increasingly difficult time going public in established markets with clear leaders. This trend is still nascent, but you can start to see the signals based on cybersecurity's large-cap IPOs in the last five years.</p>
<p>Aside from endpoint security (the market that keeps on giving, apparently), companies who have gone public in established markets haven't lasted very long:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/large-cap-cybersecurity-ipos-established.png" class="kg-image" alt="" loading="lazy" width="830" height="842" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/03/large-cap-cybersecurity-ipos-established.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/large-cap-cybersecurity-ipos-established.png 830w" sizes="(min-width: 720px) 720px"></figure><p>SentinelOne's 2021 IPO is the most recent clear example of a company who went public in a well-established cybersecurity market and succeeded. There will be others in the future, but this path is becoming more rare. Look no further than <a href="https://www.bankinfosecurity.com/blogs/cybereason-has-gone-from-ipo-candidate-to-seeking-sale-p-3304?ref=content.strategyofsecurity.com">Cybereason</a>.</p>
<p>Companies who have gone public in "new" markets (either markets they've defined or ones without another public company) don't have an unblemished record, but they're doing better:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/large-cap-cybersecurity-ipos-new.png" class="kg-image" alt="" loading="lazy" width="830" height="766" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/03/large-cap-cybersecurity-ipos-new.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/large-cap-cybersecurity-ipos-new.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Leading a market is hard no matter what, but it's a shade easier when you're viewed as one-of-one.</p>
<p>It's also a mixed bag if we play out this trend across the <a href="https://strategyofsecurity.com/p/dry-january-the-sobering-state-of-public-markets-for-cybersecurity-companies/">late-stage companies</a> in cybersecurity's IPO pipeline.</p>
<p>For example, Wiz falls into the "new markets" group as the first standalone public company in the cloud security market. Other unicorns are competing directly in markets with established public companies, which is extra difficulty on top of the already challenging conditions for IPOs.</p>
<p>The path to going public in cybersecurity is heading through market leadership in new markets more than it ever has before.</p>
<h5 id="cybersecurity-companies-who-arent-viewed-as-market-winners-get-taken-private">Cybersecurity companies who aren't viewed as market winners get taken private.</h5>
<p>Companies outside of cybersecurity's seven <a href="https://strategyofsecurity.com/p/cybersecuritys-class-conundrum/">A-list performers</a> are being taken private at a staggering rate.</p>
<p>In <a href="https://strategyofsecurity.com/p/bigger-faster-stronger-the-new-standard-for-public-cybersecurity-companies/">Bigger, Faster, Stronger: The New Standard for Public Cybersecurity Companies</a>, I analyzed the cybersecurity companies from various IPO eras who have since been taken private:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/delisted-cybersecurity-companies-1.png" class="kg-image" alt="" loading="lazy" width="830" height="886" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/03/delisted-cybersecurity-companies-1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/delisted-cybersecurity-companies-1.png 830w" sizes="(min-width: 720px) 720px"></figure><p>In the complete history of cybersecurity, we've had 117 companies of all sizes go public. As of today, 34 companies (29%) have been delisted due to acquisition or bankruptcy. The general trend among delistings is companies who haven't established themselves as a clear market leader.</p>
<p>The insatiable take-private trend is showing few signs of slowing down.</p>
<p>In the past year, we've heard rumors of <a href="https://www.crn.com/news/security/rapid7-considering-acquisition-by-private-equity-report?ref=content.strategyofsecurity.com">Rapid7</a>, <a href="https://www.crn.com/news/security/sentinelone-mulling-sale-to-private-equity-report?ref=content.strategyofsecurity.com">SentinelOne</a>, <a href="https://finance.yahoo.com/news/software-company-hashicorp-weighing-potential-213613480.html?ref=content.strategyofsecurity.com">HashiCorp</a>, and others being taken private. Rapid7 and SentinelOne both compete in established markets with strong competitors.⁶</p>
<p>You're either leading the market or regrouping until you can try again.</p>
<h5 id="survivorship-bias-causes-more-people-to-enter-cybersecurity-markets-and-lose">Survivorship bias causes more people to enter cybersecurity markets and lose.</h5>
<p>This one hit me the hardest. It's the most tragic market effect by far. From <a href="https://fs.blog/mental-model-winner-take-all/?ref=content.strategyofsecurity.com">Farnam Street</a>:</p>
<blockquote>
<p>Ironically, winner-take-all markets tend to perpetuate themselves by attracting more losers. When we look at founders in Silicon Valley or actors in LA, we don’t see the failures. Survivorship bias means we only see those who succeed. Attracted by the thought of winning, growing numbers of people flock to try their luck in the market. Most fail, overconfident and misled. The rewards become even more concentrated. More people are attracted and the cycle continues.</p>
</blockquote>
<p>In winner-take-all markets, the success of winners causes more people to chase success and lose.</p>
<p>This is how we get the 8th, 9th, and 10th new company in hot cybersecurity markets. Founders and investors see success, and they can't help themselves from trying to replicate it. By the time a market is getting a ton of industry hype, it's probably too late.</p>
<p>You don't need to be the first mover, but cybersecurity's markets are efficient to a point where it's difficult for a multi-year, multi-million dollar head start to be overcome.</p>
<h2 id="there-can-be-only-one">There can be only one</h2>
<p>I'm not sure how long cybersecurity's winner-take-all market dynamics and their effects are going to take to play out. We're probably talking about a decades-long progression here, but it's inevitable.</p>
<p>Market dynamics like these can't be avoided. They're better to understand and accept than ignore or deny.</p>
<p>Cybersecurity has unique characteristics, but so does every interesting industry. Taking a contrarian stance against widely proven market forces happening in cybersecurity is an option, but probabilities are working against you.</p>
<p>If you're daring, you can take the bet — but do it with a clear understanding so you know which rules to bend and why.</p>
<p>In the end, <a href="https://youtu.be/ooN9xdAgi5w?feature=shared&ref=content.strategyofsecurity.com">there can be only one</a> <em>(NSFW)</em>.</p>
<hr><h3 id="acknowledgements">Acknowledgements</h3>
<p>Thank you to <a href="https://www.linkedin.com/in/loganbartlett/?ref=content.strategyofsecurity.com">Logan Bartlett</a> at Redpoint Ventures for casually dropping the timely 'there can be only one' comment in my Data Security Posture Management (DSPM) <a href="https://www.linkedin.com/posts/colegrolmus_data-security-posture-management-dspm-might-activity-7174062657514164226-iH5s?utm_source=share&utm_medium=member_desktop">post</a> on LinkedIn last week. It's a fitting way to end this piece.</p>
<h3 id="footnotes">Footnotes</h3>
<p>¹This story isn't intended to imply the family business could or should have been Walmart, nor that anything Walmart or other large retailers did was unfair. It's just the best way I can think of to illustrate a visceral lesson in my life.</p>
<p>²An estimated ~$30 billion market size for cloud security isn't even small, but the point is it's much smaller than the overall infrastructure security market.</p>
<p>³Unfortunately, we don't. Large public tech companies aren't required to break out revenue by business units, so we have to rely on metrics they voluntary report at random time intervals. Some never volunteer to share security business unit revenue, or share it with serious questions about the math behind the calculation.</p>
<p>⁴Okta has been on the receiving end of negative feedback loops, too. It's definitely <a href="https://www.linkedin.com/posts/colegrolmus_oktas-up-and-down-growth-saga-activity-7169097596878196736-sCgo?ref=content.strategyofsecurity.com">one of the causes</a> behind their new customer growth stalling over the past two years.</p>
<p>⁵This data excludes layoffs at Cisco. They're a large, diversified technology company, so attributing layoffs to their security business unit isn't possible. The data does include Splunk since their layoffs were done before the acquisition by Cisco closed.</p>
<p>⁶HashiCorp is the "new market" exception here, although you could argue they compete directly enough with CyberArk to be viewed as an established market player.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <category>#popular</category>
            <category>#trending</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/header-cybersecuritys-class-conundrum-part-2-2.png"/>
        </item>
        <item>
            <title><![CDATA[How Could Platformization Work in Cybersecurity?]]></title>
            <link>https://strategyofsecurity.com/how-could-platformization-work-in-cybersecurity/</link>
            <guid>65e737a641329f00017045b8</guid>
            <pubDate>Tue, 05 Mar 2024 15:41:17 GMT</pubDate>
            <description><![CDATA[There is no such thing as a cybersecurity platform...yet. What would it take for platformization to happen?]]></description>
            <content:encoded><![CDATA[<p>The idea of a cybersecurity platform seems unreasonable because...well, it <em>is</em> unreasonable. <em>That's the whole point.</em></p>
<p>In his new book <a href="https://www.amazon.com/Same-Ever-Guide-Never-Changes-ebook/dp/B0C1685PDK?ref=content.strategyofsecurity.com">Same as Ever</a>, Morgan Housel said this about people's behavior towards limits:</p>
<blockquote>
<p>Optimism and pessimism always have to overshoot what seems reasonable, because the only way to discover the limits of what’s possible is to venture a little way past those limits.</p>
</blockquote>
<p>That's it. Being optimistic about platformization in cybersecurity is about testing the limits of what's possible in our industry.</p>
<p>Being pessimistic about a single, end-to-end cybersecurity platform is easy to do. There are all kinds of reasons platformization hasn't worked in cybersecurity. But it's a straw-man argument.</p>
<p>Why? There will never be a one-ring-to-rule-them-all cybersecurity platform all customers buy from a single company. The real discourse here is about something different.</p>
<p>Platformization is about the <em>process</em> of cybersecurity products moving towards platforms. It's not about the extreme ends of the spectrum. It's about the market moving towards one side of the spectrum or the other.</p>
<p>The question isn't, "why won't platformization work in cybersecurity?"</p>
<p>A better question is, "what would it take for platformization to work in cybersecurity?"</p>
<p>Being optimistic and unpacking the conditions required for platformization to happen in cybersecurity is harder. It's where we need to put our energy and brainpower. We need to venture a little way past our limits.</p>
<p>Let's start by talking about platformization in other areas of tech.</p>
<h2 id="platforms-are-techs-ultimate-prize">Platforms are tech's ultimate prize</h2>
<p>If you zoom out and look at the broader tech industry, you see the same pattern play out over and over: platformization wasn't possible...<em>until it was.</em></p>
<p>A common goal among tech's most ambitious companies has been their desire to build platforms in areas where they didn't exist before.</p>
<p>Apple and Microsoft built personal computing platforms.</p>
<p>SAP built an enterprise resource planning platform.</p>
<p>Epic built a healthcare platform.</p>
<p>Salesforce built a customer relationship management platform.</p>
<p>Facebook built a social networking platform.</p>
<p>Amazon built an infrastructure platform.</p>
<p>ServiceNow built an IT operations platform.</p>
<p>If people's lives, work, health, money, and relationships can be platformized, cybersecurity can too. We're important, but it's tough to argue we're more important than most of the domains where platforms already exist today.</p>
<p>Speaking of platforms in cybersecurity...</p>
<h2 id="we-already-have-platforms-in-cybersecurity">We already have platforms in cybersecurity</h2>
<p>An important detail got lost in the fray of bantering about platformization: <em>we already have platforms in cybersecurity.</em></p>
<p>Okta is an identity platform.</p>
<p>CrowdStrike is an endpoint security platform.</p>
<p>Zscaler is a network security platform.</p>
<p>Splunk is a security operations platform.</p>
<p>Wiz is a cloud security platform.</p>
<p>They're all pretty good ones, too. Not perfect, but enough to drive the buying behavior of security leaders from dozens of point products to platform companies in each of these domains.</p>
<p>What we don't have yet is a <a href="https://strategyofsecurity.com/p/the-cybersecurity-revolutions/">multi-estate</a> platform — something that spans major domains like security operations, networks, identity, and so on. Single domains are the current limit of what's possible in cybersecurity.</p>
<p>Moving beyond our current limits requires thinking in relative terms, not absolute terms. Let me show you what I mean.</p>
<h2 id="the-spectrum-of-cybersecurity-platformization">The spectrum of cybersecurity platformization</h2>
<p>Thinking about platformization as an all-or-nothing thing is a trap.</p>
<p>Security leaders are never going to buy all of their products and services from one company. They're never going to buy from all different companies, either.</p>
<p>These scenarios are the extremes. Reality lies on the spectrum between them:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/spectrum-of-platformization-and-distribution.png" class="kg-image" alt="The spectrum of platformization and distribution." loading="lazy" width="830" height="399" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/03/spectrum-of-platformization-and-distribution.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/spectrum-of-platformization-and-distribution.png 830w" sizes="(min-width: 720px) 720px"></figure><p>The way to think about this is in relative terms — where do we sit on this spectrum? More importantly, where <em>will</em> we sit if certain things happen?</p>
<p>Distributed products are the default state. Most companies can't just wake up in the morning and decide to be a platform. It takes a lot of capital, and there are stages of progression involved to get there. Platformization itself is a competitive moat.</p>
<p>Movement along the spectrum is where the real magic happens.</p>
<p>If things like cybersecurity mesh architectures gain traction, or cybersecurity companies get really good at partnering and integrating, the market gets further entrenched on the distributed end of the spectrum.</p>
<p>If the benefits of using cybersecurity platforms built by a single company clearly exceed their distributed alternatives, they'll push the market towards the platform end of the spectrum.</p>
<p>How far cybersecurity companies can bend the median is a multi-billion-dollar proposition:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/platformization-distribution-budget-curve.png" class="kg-image" alt="Platformization-distribution budget curve." loading="lazy" width="830" height="649" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/03/platformization-distribution-budget-curve.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/03/platformization-distribution-budget-curve.png 830w" sizes="(min-width: 720px) 720px"></figure><p>The economic tilt of even a small movement towards platformization is huge.</p>
<p>With platforms, fewer companies control a greater percentage of overall cybersecurity spend. You don't even need to be the end-all be-all cybersecurity platform. Just nudge the needle, and you’ve won.</p>
<p>This dynamic and its forces are a very fluid situation, but we're never going to end up at either one of the extremes.</p>
<p>Lots of factors can drive movement in either direction along the spectrum. Let's look at what it would take for a meaningful movement towards cybersecurity platformization to happen.</p>
<h2 id="what-could-work-nudging-cybersecurity-towards-platformization">What could work: nudging cybersecurity towards platformization</h2>
<p>Successful platformization is so rare that it's silly to say a playbook exists. Cybersecurity has its own set of nuances and idiosyncrasies, just like every relatively large industry.</p>
<p>However, there are some themes we can draw from platformization in other areas of tech and what's worked (and hasn't worked) so far in cybersecurity.</p>
<h4 id="real-platforms-by-the-technical-definition-not-the-marketing-definition">Real platforms: by the technical definition, not the marketing definition.</h4>
<p>Building <em>actual technology platforms</em> is the biggest factor by far that will influence the success of platformization in cybersecurity.</p>
<p>Yep, this means everything real platforms have, soup-to-nuts — integrated UIs, data layers, ecosystems, you name it. There aren't any non-technical shortcuts, even if you buy parts of the platform. Everything has to work.</p>
<p>It's disingenuous to call a bundle a platform. This strategy might work for a little while, but technology doesn't lie. Once you're exposed, it's all over. Just ask Symantec, McAfee, and CA.¹</p>
<p>The only way the cycle of product innovation, sales and marketing, financial incentives, and other factors we're discussing here will work is if customers <em>actually want</em> the product.</p>
<p>Product innovation has to be able to keep up with every other idea we're discussing in this section. If the product falters, nothing else works.</p>
<h4 id="obsession-cybersecurity-focus-expertise-and-commitment">Obsession: cybersecurity focus, expertise, and commitment.</h4>
<p>Building a multi-estate cybersecurity platform is going to take focus. It needs to be a singular effort. "Obsession," in a word.</p>
<p>I have a hard time seeing a company who isn't fully focused on cybersecurity pulling this off. Large technology companies theoretically have the resources to build a cybersecurity platform. What they lack is the focus, expertise, and commitment to make this a reality.</p>
<p>Expertise has been a major factor in the cybersecurity platforms we've seen so far. George Kurtz knew exactly what needed to be done differently to build an endpoint security platform when he started CrowdStrike. Todd McKinnon had a similar insight for Okta from his time at Salesforce. It's possible an industry outsider could overcome this, but platformization is hard enough as it is.</p>
<p>And then comes the commitment part. A shift towards platformization is probably a decade-long effort or more. It's either going to take founder-led companies or some really committed senior execs to get this done.</p>
<p>Right now, we're in the middle of a multi-billion-dollar experiment to find out if it's possible for large tech companies to build cybersecurity platforms. Broadcom, Cisco, Alphabet, and Microsoft are all investing heavily in their cybersecurity business units. I'd expect some level of success, but it's improbable any of these companies will end up with a cybersecurity platform that has everything it takes to work.</p>
<h4 id="technological-shifts-big-and-small-technology-changes-both-inside-and-outside-of-cybersecurity">Technological shifts: big and small technology changes, both inside and outside of cybersecurity.</h4>
<p>Some factors driving platformization in cybersecurity are outside the control of our industry. Technological shifts are one of them. They've been a factor for platforms in every other sector of technology. We're no exception.</p>
<p>I'm not sure if AI is going to be the technological shift that makes cybersecurity platformization possible or not. AI is being thrown around as the hand-wavey solution to every problem right now. It will probably be part of the reason behind platformization in cybersecurity, but don't count on it being the <em>only</em> reason.</p>
<p>The breakthroughs driving platformization in cybersecurity might be more pedantic. It's easier than ever to build integrated technology platforms in any domain because our tools and frameworks are better than ever. As this leverage compounds, it gets easier to build and scale larger pieces of software.</p>
<p>Things really get interesting when technological shifts combine. Wiz became the fastest-growing cybersecurity company ever because of this. Building great products quickly got easier, and they used this to relentlessly seize the opportunity to redefine how infrastructure security is done for cloud computing.</p>
<h4 id="curation-creating-a-cybersecurity-platform-through-building-buying-and-partnering">Curation: creating a cybersecurity platform through building, buying, and partnering.</h4>
<p>The phrase "building a cybersecurity platform" is oversimplified. When we're talking about platform scale, building alone isn't enough.</p>
<p>Mark Zuckerberg has talked about how finding and developing engineering talent is the number one constraint holding back growth of Meta. If Mark Zuckerberg can't find enough people to build at Meta, we have no chance.</p>
<p>Platformization in cybersecurity will need to happen through a combination of building, buying, and partnering. There can't be <em>no</em> building, of course — but solving the riddle of platformization is going to take some good old fashioned dealmaking.</p>
<p>We all know about M&amp;A, but acquisitions have to be executed differently this time. For platformization to work, companies need to buy the best products at the right time and... <em>Actually. Integrate. Them.</em></p>
<p>This means having enough capital available for acquisitions, identifying companies in emerging categories early, then successfully executing the transactions before a competitor acquires them. None of this is easy to do.</p>
<p>I also expect we'll see white or gray labeling of components in a platform become more of a thing going forward. The incentives for moving the needle towards platformization are too high. Companies will do whatever it takes to source and integrate the best products, even if it means OEM'ing them from someone else.</p>
<h4 id="brand-status-the-first-luxury-cybersecurity-brand">Brand status: the first "luxury" cybersecurity brand.</h4>
<p>Platforms seem to have an allure of luxury and exclusivity, at least in the early days. This isn't necessary in cybersecurity, but the broader trend is worth acknowledging.</p>
<p>Apple is the gold standard (no pun intended) of case studies for technology platforms. It's a luxury brand — they've literally <a href="https://www.npr.org/sections/thetwo-way/2013/10/15/234681470/apple-hires-burberry-ceo-ahrendts-to-head-retail-division?ref=content.strategyofsecurity.com">hired luxury brand executives</a> to run their business.</p>
<p>People pay more for Apple than they would for similar products if Apple didn't exist. Why? It's partly because they make amazing products. It's also because people want the <em>status</em> of owning an Apple product.</p>
<p>We're already starting to see this model replicated by a handful of leading cybersecurity platforms. If cybersecurity platforms truly can become better than distributed alternatives, owning one is going to be viewed as a luxury among big company executives.</p>
<h4 id="customer-segmentation-big-companies-buy-big-cybersecurity-platforms">Customer segmentation: big companies buy big cybersecurity platforms.</h4>
<p>Building a multi-domain cybersecurity platform will likely require disciplined customer segmentation. This may seem counterintuitive at first — <em>shouldn't platforms try to reach as many customers as possible?</em></p>
<p>Broad cybersecurity platforms for businesses of all sizes and consumers haven't worked yet. Symantec and McAfee tried this strategy with endpoint security and ended up unceremoniously separating their B2B and consumer businesses.</p>
<p>The enterprise customer segment is the obvious target for platformization, but it's not a straightforward answer. Enterprises have more complex problems and need more tools than consumers. This is tempting, but it also makes the challenges of platformization harder.</p>
<p>A cybersecurity platform for consumers or SMBs would likely have a smaller scope. A narrower focus on the product side could be an advantage in platformization, but time will tell.</p>
<h4 id="incentives-inertia-is-powerful-but-so-are-the-right-incentives">Incentives: inertia is powerful, but so are the right incentives.</h4>
<p>Lastly, platformization in cybersecurity needs the right blend of incentives.² In our industry, this means financial, social, and regulatory incentives.</p>
<p>The power of incentives becomes a lot more realistic if a cybersecurity company builds a platform customers <em>really</em> want. A great platform makes people want to buy something that they can't afford — or at least spend more money than they would before because they <em>need to have it right now.</em></p>
<p>Customers won't stop buying point products unless (a) platforms are legitimately better, (b) they're forced to by their CFO or procurement, or (c) both.</p>
<p>Savvy security leaders aren't going to buy bad security products to save their company money. But they're also not going to buy commoditized products from multiple vendors. They're smart enough to recognize when a platform is advantageous and when it's not.</p>
<p>The bar for incentives is really high. For platformization to work, it needs to be clear that platforms provide the best possible defenses and advantages far beyond anything distributed products can offer.</p>
<h2 id="beyond-our-numbers-and-stories">Beyond our numbers and stories</h2>
<p>Does executing all of this sound impossible? It should — that's part of the lesson here.</p>
<p>Platformization might be the single most difficult outcome to accomplish in technology. Just because it's difficult doesn't mean it's impossible. The only way to find out is to keep testing the limits.</p>
<p>Morgan Housel describes it like this:</p>
<blockquote>
<p>The only way to know we’ve exhausted all potential opportunity from markets—the only way to identify the top—is to push them not only past the point where the numbers stop making sense, but beyond the stories people believe about those numbers.</p>
</blockquote>
<p>Are we past the point in our industry where numbers and stories about platformization stop making sense? Maybe. We'll find out where the top is.</p>
<p>I don’t know which cybersecurity company is going to be the one who figures out platformization. Both numbers and stories tell us the journey has a ton of risk. Many a promising company has been destroyed in the pursuit.</p>
<p>Any company that figures out cybersecurity platformization is going to be worth $500-billion-plus. Anyone who doesn't is going to the private equity graveyard to be dismantled alongside the companies who tried before them.</p>
<p>And then the next audacious cybersecurity companies are going to keep on trying.</p>
<hr><h3 id="acknowledgements">Acknowledgements</h3>
<p>This article was influenced by thoughts from a broad set of people on the topic of platformization. A few specific influences are <a href="https://www.linkedin.com/in/adrian-sanabria/?ref=content.strategyofsecurity.com">Adrian Sanabria</a>, <a href="https://www.linkedin.com/in/ericparizo/?ref=content.strategyofsecurity.com">Eric Parizo</a>, <a href="https://www.linkedin.com/in/francis-odum-0a8673100/?ref=content.strategyofsecurity.com">Francis Odum</a>, <a href="https://www.linkedin.com/in/stiennon/?ref=content.strategyofsecurity.com">Richard Stiennon</a>, <a href="https://www.linkedin.com/in/tylershields/?ref=content.strategyofsecurity.com">Tyler Shields</a>, and our <a href="https://lu.ma/bqz1ktd4?ref=content.strategyofsecurity.com">Palo Alto Networks Q2 2024 earnings webinar</a> attendees.</p>
<h3 id="footnotes">Footnotes</h3>
<p>¹Okay, "it's all over" might be dramatic. The point is companies who make this argument and get exposed lose their swagger and become <a href="https://strategyofsecurity.com/p/cybersecuritys-class-conundrum/">B-list or C-list companies</a> struggling to remain relevant.</p>
<p>²Charlie Munger would have wanted me to put incentives first, but here we are. RIP, GOAT.</p>
]]></content:encoded>
            <category>Concepts</category>
            <category>#trending</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/header-how-could-platformization-work-5.png"/>
        </item>
        <item>
            <title><![CDATA[Cybersecurity's Class Conundrum]]></title>
            <link>https://strategyofsecurity.com/cybersecuritys-class-conundrum/</link>
            <guid>65d7c7d7a52b9700015bb677</guid>
            <pubDate>Thu, 22 Feb 2024 22:34:25 GMT</pubDate>
            <description><![CDATA[Cybersecurity has a class conundrum, and the gap is only getting wider.]]></description>
            <content:encoded><![CDATA[<p>Cybersecurity has an unspoken narrative of mixed fortunes — a storyline we all feel but rarely can articulate.</p>
<p>Part of me says this is normal. Public markets fluctuate, often between different extremes.</p>
<p>But cybersecurity's current situation feels...<em>different</em>, or at least more nuanced.</p>
<p>Companies like Palo Alto Networks <s>are</s> were doing better than ever. They became cybersecurity's first $100 billion company (by valuation) in December 2023. <em>(Nevermind the irrational panic-selling in the 24 hours after their Q2 2024 earnings announcement.¹)</em></p>
<p>Other companies are doing worse than ever. <a href="https://www.reuters.com/legal/litigation/cybersecurity-company-founded-by-ex-nsa-director-files-bankruptcy-2023-10-13/?ref=content.strategyofsecurity.com">IronNet</a> and <a href="https://www.bankinfosecurity.com/cyren-ceases-operations-after-financing-sale-efforts-fail-a-21284?ref=content.strategyofsecurity.com#:~:text=The%20company%20was%20founded%20in,Samuelson%20took%20over%20as%20CEO.">Cyren</a> both filed for bankruptcy in the last six months. Auditors for several other small-cap cybersecurity companies have raised doubts about their ability to continue operations.</p>
<p>And then there's everyone else. A group of ~60 public cybersecurity companies is stuck in the malaise of economic uncertainty that's been going on for two-plus years. It's a group of respectable companies that can't quite seem to break through.</p>
<p>This divide has bothered me for a long time. A lot of us feel this way. We recognize the circumstances but haven't quite been able to explain what's happening or how.</p>
<p>Mike Privette was on to something when he wrote about <a href="https://www.returnonsecurity.com/p/kshaped-recovery-cybersecurity-industry?ref=content.strategyofsecurity.com">the K-shaped recovery</a> of the cybersecurity industry almost a year ago: the recovery of the tech industry has been unevenly distributed, and it's the same story for cybersecurity, too.</p>
<p>In <a href="https://strategyofsecurity.com/p/bigger-faster-stronger-the-new-standard-for-public-cybersecurity-companies/">Bigger, Faster, Stronger: The New Standard for Public Cybersecurity Companies</a>, I talked about cybersecurity IPOs by era and the metrics behind them. I didn't quite have a handle on this whole divide at the time, though.</p>
<p>So...<em>what's going on here?!</em></p>
<p>Two weeks and 5,000+ data points later, I'm confident about one thing: <strong>Cybersecurity has a class conundrum, and the gap is only getting wider.</strong></p>
<p>Let me tell you about this situation using a comparison you might not expect — celebrities.</p>
<h2 id="celebrities-and-cybersecurity-companies-have-a-lot-in-common">Celebrities and cybersecurity companies have a lot in common</h2>
<p>Even if you don't follow the latest Hollywood gossip (I sure don't), everyone can name and recognize a few A-list celebrities: Tom Hanks. Julia Roberts. Rihanna. Serena Williams. LeBron James.</p>
<p>You probably know more B-list and C-list celebrities than you might expect, too: T.J. Miller (I loved Silicon Valley!). Mindy Kaling. Allyson Felix. MGMT (listening to them on Spotify right now). They're all accomplished artists and athletes, but you might not recognize them walking down the street.</p>
<p>Reducing people and companies to status lists is shallow, but it's also human nature. We are a status-oriented species. Things like celebrity status lists can be a useful model if they're not taken too literally.</p>
<p>For this metaphor, I'd define classes of celebrities and cybersecurity companies something like this:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/celebrity-and-company-lists.png" class="kg-image" alt="" loading="lazy" width="830" height="586" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/02/celebrity-and-company-lists.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/celebrity-and-company-lists.png 830w" sizes="(min-width: 720px) 720px"></figure><p>It's cleaner to use a single, objective metric like year-over-year revenue growth or market cap, but this misses nuances that are better captured with some judgment involved.</p>
<p>A comparison to celebrity status lists probably isn't the best way to do it either, but...<em>whatever, this isn't Gartner.</em></p>
<p>So, let's go with it. Enough suspense already — let's reveal cybersecurity's A-list companies.</p>
<h2 id="cybersecuritys-a-list-companies">Cybersecurity's A-list companies</h2>
<p>Cybersecurity has seven "A-list" companies, including both pure and hybrid: Cloudflare, CrowdStrike, Fortinet, Okta, Palantir, Palo Alto Networks, and Zscaler.²</p>
<p>A-list companies have performed spectacularly well across revenue, growth, market cap, and underlying financial metrics for a long time:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/cybersecuritys-a-list-companies.png" class="kg-image" alt="" loading="lazy" width="830" height="595" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/02/cybersecuritys-a-list-companies.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/cybersecuritys-a-list-companies.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Again, this isn't to say the other public companies in cybersecurity are bad — it's not that black and white. Some of my favorite companies aren't on this list.</p>
<p>When you look at the data, there is a clear set of companies who have financially outperformed the rest of the cybersecurity market. Let me show you what I mean, and then we'll unpack it.</p>
<p>There are currently 55 pure and hybrid cybersecurity companies listed on major U.S. exchanges. I added two more (Darktrace and Trend Micro) from international exchanges because of their market cap to make 57 companies in total.³</p>
<p>Cybersecurity's seven A-list companies currently have a higher market cap than the remaining 50 companies combined:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/a-list-company-total-market-cap-growth.png" class="kg-image" alt="" loading="lazy" width="830" height="702" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/02/a-list-company-total-market-cap-growth.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/a-list-company-total-market-cap-growth.png 830w" sizes="(min-width: 720px) 720px"></figure><p>This inflection point just happened in 2023. No wonder it's not being talked about very much.</p>
<p>Today's A-list companies were almost non-existent a decade ago. Only Fortinet and Palo Alto Networks were public in 2014. Now, the seven A-list companies are worth more than every other public company in the industry.</p>
<p><em>...uhhh, what happened?!?!</em></p>
<p>Let's rewind to 2011 and quickly step through the progression that got us to the class conundrum we're seeing today.</p>
<h2 id="remember-the-world-in-2011">Remember the world in 2011?</h2>
<p>Yeah, I needed a reminder. Here are a few highlights: Bridesmaids was a popular movie, the first season of Game of Thrones aired, and Aaron Rodgers won the Super Bowl with the Green Bay Packers. The Social Network won an Oscar, which is a funny coincidence. All of this feels like forever ago.</p>
<p>The cybersecurity industry of 2011 feels pretty unfamiliar, too.⁴ Breaches of Epsilon, RSA, and the Sony PlayStation Network were the major events of the year. Back then, we had 26 public companies with a total market cap of $68.2 billion:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/cybersecurity-circa-2011.png" class="kg-image" alt="" loading="lazy" width="830" height="1697" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/02/cybersecurity-circa-2011.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/cybersecurity-circa-2011.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Symantec (now Gen Digital) was on top of the world at the time, clocking an $11.5 billion market cap on $6.7 billion of annual revenue.⁵ Fortinet was just getting started as a public company.</p>
<p>Palo Alto Networks and several of the other A-list companies were founded, but they weren't child stars destined for greatness. They were promising private companies, but far from the superstars they are today.</p>
<p>Cybersecurity's rise to stardom from 2012 through 2018 set us up for the divide we're seeing today. Let me show you why.</p>
<h2 id="2012-through-2019-cybersecuritys-a-list-walks-down-the-red-carpet">2012 through 2019: Cybersecurity's A-list walks down the red carpet</h2>
<p>This era is the Oscars, otherwise known as the "High Burn/High Growth" era in software industry terms.</p>
<p>A total of 31 pure and hybrid cybersecurity companies walked down the red carpet and went public from 2012 through 2019. The guest list included A-list companies like Palo Alto Networks (2012), Okta (2017), Zscaler (2018), CrowdStrike (2019), and Cloudflare (2019).</p>
<p>The industry's total market cap more than quadrupled, going from $68.2 billion to $308.6 billion in under a decade:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/cybersecurity-market-cap-2011-through-2019.png" class="kg-image" alt="" loading="lazy" width="830" height="665" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/02/cybersecurity-market-cap-2011-through-2019.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/cybersecurity-market-cap-2011-through-2019.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Everything was going right. Take-privates were hard to find. Blue Coat (2012), Infoblox (2016), Gigamon (2017), and KeyW (2019) were the only subtractions from our overflowing club of public companies.</p>
<p>You thought that was wild? Think again. Let's crank the volume up to 11.</p>
<h2 id="2020-through-2021-the-after-party">2020 through 2021: The after-party</h2>
<p>If the High Burn/High Growth era was the Oscars, 2020-2021 was the after-party. We were all having the time of our lives.</p>
<p>Twenty <em>more</em> pure and hybrid cybersecurity companies went public on top of the companies we already had.</p>
<p>The industry's market cap <em>doubled</em> over a two-year period, going from $308.6 billion at the end of 2019 to $698.2 billion by the end of 2021:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/cybersecurity-market-cap-2020-through-2021.png" class="kg-image" alt="" loading="lazy" width="830" height="665" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/02/cybersecurity-market-cap-2020-through-2021.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/cybersecurity-market-cap-2020-through-2021.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Unfortunately, this was the "High Burn/Slowing Growth" era. The whole software industry got upside down from overspending on growth. And then the D-list companies (SPACs and reverse mergers) started showing up.</p>
<p><em>It's getting late — time to go home.</em></p>
<h2 id="2022-onward-our-growing-class-conundrum">2022 onward: Our growing class conundrum</h2>
<p>The free-for-all is over. Investors are taking sides now, and it's fueling the growing divide between cybersecurity's A-list companies and everyone else.</p>
<p>After a market-wide blip in 2022, cybersecurity's total market cap is back to levels higher than ever in 2024:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/cybersecurity-market-cap-2022-through-today.png" class="kg-image" alt="" loading="lazy" width="830" height="665" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/02/cybersecurity-market-cap-2022-through-today.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/cybersecurity-market-cap-2022-through-today.png 830w" sizes="(min-width: 720px) 720px"></figure><p>...but remember our chart from the beginning of the article where we hit an inflection point in 2023? That's the conundrum — our seven (<em>S-E-V-E-N</em>!) A-list companies are driving over 80% of the industry's valuation growth this time:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/a-list-proportion-of-cybersecurity-market-cap-growth-2016-today.png" class="kg-image" alt="" loading="lazy" width="830" height="737" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/02/a-list-proportion-of-cybersecurity-market-cap-growth-2016-today.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/a-list-proportion-of-cybersecurity-market-cap-growth-2016-today.png 830w" sizes="(min-width: 720px) 720px"></figure><p>You could argue the divide is because 13 cybersecurity companies have been taken private since 2022. It's definitely a factor. But look at this trend of average valuations broken down by class:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/avg-market-cap-by-company-class.png" class="kg-image" alt="" loading="lazy" width="830" height="665" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/02/avg-market-cap-by-company-class.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/avg-market-cap-by-company-class.png 830w" sizes="(min-width: 720px) 720px"></figure><p>The rising stardom of cybersecurity's A-list companies started in 2019 and shows no signs of coming back to earth, even with a decline in 2022.</p>
<p>The A-list companies took off and soared above $10 billion average valuations. Everyone else remained flat, stuck at the sub-$10 billion valuations they've known for years.</p>
<p>Using market cap to measure the success of a company is like using fame to measure the success of a celebrity. Valuations and fame are fickle, but revenue doesn’t lie:⁶</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/avg-revenue-growth-trend-by-company-class.png" class="kg-image" alt="" loading="lazy" width="830" height="665" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/02/avg-revenue-growth-trend-by-company-class.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/avg-revenue-growth-trend-by-company-class.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Revenue growth for our A-list companies has been a hit machine, outperforming the rest of the industry for more than a decade.</p>
<p>Enough with the numbers — you get the idea. Cybersecurity in 2024 is fundamentally different and more polarized than ever.</p>
<p>I still don't know if this is just a phase or a new long-term reality we all need to operate in.</p>
<p>One thing I do know: the implications of our growing class conundrum are more impactful than anything we've experienced yet as an industry.</p>
<hr><h3 id="footnotes">Footnotes</h3>
<p>¹I spent an <a href="https://lu.ma/bqz1ktd4?ref=content.strategyofsecurity.com">hour and a half</a> live with <a href="https://softwareanalyst.substack.com/?ref=content.strategyofsecurity.com">Francis Odum</a> talking about this recently.</p>
<p>²I'm including Okta as an A-list company based on their way-above-average performance since IPO. I get the argument they're not an A-list company right now — that's fair. The time horizon for this analysis is intentionally longer. I also <a href="https://strategyofsecurity.com/p/oktas-cinderella-story/">have doubts</a> Okta is going to remain down forever.</p>
<p>³The data also includes Splunk and ZeroFox. Both companies have pending acquisitions that have not yet closed, so they're technically still listed for now.</p>
<p>⁴This probably depends how experienced you are. I was barely out of college and working with Oracle identity products (rough, I know – amazing I'm still in security). I still had a lot to learn about the industry at the time.</p>
<p>⁵How's that for a valuation multiple?!</p>
<p>⁶Okay, okay — sometimes revenue does lie. Or people lie about revenue. I get it, I worked at PwC. I remember Enron. Those are edge cases, especially post-SOX.</p>
]]></content:encoded>
            <category>Concepts</category>
            <category>#trending</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/header-cybersecuritys-class-conondrum-part-1-3.png"/>
        </item>
        <item>
            <title><![CDATA[Bigger, Faster, Stronger: The New Standard for Public Cybersecurity Companies]]></title>
            <link>https://strategyofsecurity.com/bigger-faster-stronger-the-new-standard-for-public-cybersecurity-companies/</link>
            <guid>65b974b1082269000147d570</guid>
            <pubDate>Tue, 30 Jan 2024 22:38:40 GMT</pubDate>
            <description><![CDATA[Cybersecurity companies who want to go public in 2024 and beyond need to be bigger, faster, and stronger than the companies that came before them.]]></description>
            <content:encoded><![CDATA[<p>Babe Ruth couldn't be a professional baseball player today.</p>
<p><em>Wait, how is that possible?!</em> How could a person who hit 714 home runs and won seven World Series championships — widely regarded as one of the greatest baseball players of all time — not cut it in the big leagues?</p>
<p>Babe Ruth played professional baseball from 1914 to 1935. His prime was 100 years ago. A guy like him could eat dozens of hot dogs in one sitting, chain smoke cigars, get plastered every night, and still be a superstar athlete because fortune granted him enough natural ability.</p>
<p>Fast forward a century, and Mike Trout is the gold standard of the modern baseball era. His <a href="https://www.mlb.com/news/mike-trout-workout-c161491480?ref=content.strategyofsecurity.com">training regimen</a> is social-media-famous: 54-inch box jumps, weighted tire rolls, medicine ball sprints — you get the idea. Babe Ruth would have needed a ladder to get on top of a 54-inch box.</p>
<p>Athletes get bigger, faster, and stronger with every successive era. It's the same story for companies in the cybersecurity IPO pipeline, too.</p>
<p>General Motors, the Babe Ruth of companies in the 1920s, had an inflation-adjusted market cap of about $9.1 billion in today's dollars.¹ Two <a href="https://strategyofsecurity.com/p/dry-january-the-sobering-state-of-public-markets-for-cybersecurity-companies/">private cybersecurity companies</a> (and seven public ones) have a higher valuation today. Palo Alto Networks alone is worth over 10x more.²</p>
<p><em>How did this happen?</em> Part of it is evolution, and part of it is because we know how to make better athletes and companies.</p>
<p>Time passes. Expectations change. Methods improve. Competitors get better. The standard of performance gets higher. The game gets harder. It's a never-ending cycle of progress.</p>
<p>Let's talk about why benchmarking performance matters and what the current standard is for cybersecurity IPOs today.</p>
<h2 id="benchmarks-are-an-input-to-better-decisions">Benchmarks are an input to better decisions</h2>
<p>Why does it matter to know what the standard of performance is in the first place? Anyone involved with a cybersecurity company in the IPO pipeline (and public companies, too) needs to know the standard they're being measured against. Life-changing decisions get made based on these benchmarks.</p>
<p>It's the equivalent of knowing your draft status in sports: you need good advice and statistics to make the right decisions. A high school pitcher with a 71 mph fastball, a 5.34 ERA, and an overinflated ego shouldn't to skip college and enter the draft if their performance isn't good enough to get drafted yet.</p>
<p>It's personal for thousands of people in the industry. Readers of this article (maybe even you) lead, work for, or invest in later-stage cybersecurity companies. I have consulting clients who are navigating this exact situation. It's very real.</p>
<p>Making the right decisions can be transformative. Making the wrong ones can be catastrophic.</p>
<p>So, what exactly are the expectations for cybersecurity companies in the IPO pipeline? That's the billion-dollar question we're going to answer.</p>
<p>The first part of the equation requires zooming out to look at the entire software industry. Cybersecurity is just one part of a larger tech ecosystem. Only looking at companies in our industry is equivalent to only looking at the stats for players on your favorite baseball team. They might be the worst team in the league.³ The performance of everyone else in the league matters. Same situation here.</p>
<p>One source source we'll reference is the Battery Ventures State of the OpenCloud 2023 <a href="https://www.battery.com/blog/opencloud-2023/?ref=content.strategyofsecurity.com">report</a>, which shows benchmarks from three recent cohorts of software IPOs:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/battery-software-ipo-benchmarks.png" class="kg-image" alt="" loading="lazy" width="2000" height="1124" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/battery-software-ipo-benchmarks.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2024/01/battery-software-ipo-benchmarks.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2024/01/battery-software-ipo-benchmarks.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/battery-software-ipo-benchmarks.png 2000w" sizes="(min-width: 720px) 720px"></figure><p>The other source is Jamin Ball's Clouded Judgement publication. <a href="https://cloudedjudgement.substack.com/p/what-it-takes-to-become-a-public?ref=content.strategyofsecurity.com">Two</a> <a href="https://cloudedjudgement.substack.com/p/clouded-judgement-11924-the-bar-for?ref=content.strategyofsecurity.com">articles</a> go into immense detail about benchmarks for public SaaS companies. This table summarizes the benchmarks for all SaaS IPOs from 2018 to mid-2020:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/clouded-judgement-saas-ipo-benchmarks.png" class="kg-image" alt="" loading="lazy" width="1222" height="766" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/clouded-judgement-saas-ipo-benchmarks.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2024/01/clouded-judgement-saas-ipo-benchmarks.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/clouded-judgement-saas-ipo-benchmarks.png 1222w" sizes="(min-width: 720px) 720px"></figure><p>The second part of the cybersecurity benchmarking equation is looking back at the performance of previous cybersecurity IPOs. The combination of software industry and cybersecurity-specific benchmarks gives us a pretty good idea about the market's expectations for performance.</p>
<p>Next, we'll take a tour of cybersecurity's IPOs through the eras and compare them to today's software industry benchmarks. And Taylor Swift. Seriously.</p>
<h2 id="eras-tour-cybersecuritys-version">Eras Tour: Cybersecurity's Version</h2>
<p>I know, I know...the Taylor Swift reference was right in front of me here. I had to do it.</p>
<p>Just like the stylistic evolution of Taylor's music⁴, the cybersecurity industry has had distinct economic eras — all with different expectations, metrics, and vibes.</p>
<p>The Battery Ventures report has a perfect definition of the recent eras in software:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/battery-ventures-software-eras-1.png" class="kg-image" alt="" loading="lazy" width="1995" height="1120" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/battery-ventures-software-eras-1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2024/01/battery-ventures-software-eras-1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2024/01/battery-ventures-software-eras-1.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/battery-ventures-software-eras-1.png 1995w" sizes="(min-width: 720px) 720px"></figure><p>Cybersecurity is a lot smaller sample size than the overall software market, so I added the Dotcom Bubble (1995-2002) and Post-Dotcom to Great Recession (2003-2009) eras to the analysis. Here's our setlist, eras and all:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/cybersecurity-ipos-by-era.png" class="kg-image" alt="" loading="lazy" width="830" height="1579" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/cybersecurity-ipos-by-era.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/cybersecurity-ipos-by-era.png 830w" sizes="(min-width: 720px) 720px"></figure><p>So here we go — you've got your ticket to the Eras Tour (Cybersecurity's Version). Let's take the stage and jam through the eras. You can wear sparkles if you want.</p>
<h5 id="dotcom-bubble-1995-2002">Dotcom Bubble (1995-2002)</h5>
<p>The dotcom bubble was a wild and frenetic era for tech company IPOs. Webvan (RIP) peaked at a $1.2 billion valuation, burned through a billion in capital, and went bankrupt two years later. And that's just one story.</p>
<p>Cybersecurity companies had much more modest debuts on public markets during this era. Check Point and Radware were our only two IPOs. Here's how they were doing at the time of IPO:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/cybersecurity-dotcom-era-benchmarks.png" class="kg-image" alt="" loading="lazy" width="830" height="904" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/cybersecurity-dotcom-era-benchmarks.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/cybersecurity-dotcom-era-benchmarks.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Check Point went public with $31.8 million in annual revenue. That's over $600 million under the IPO standard of today (and a shade under the revenue Palo Alto Networks earns in <em>a single business day!</em>).</p>
<p>Both companies had good margins. EBIT margin was 25%, which easily puts them among the top IPOs in today's era.</p>
<p>Ironically, both Check Point and Radware survived the dotcom collapse and remain on public markets today. Check Point is still one of the largest cybersecurity companies in the world. There's always room in public markets for solid companies.</p>
<h5 id="post-dotcom-to-great-recession-2003-2009">Post-Dotcom to Great Recession (2003-2009)</h5>
<p>The time between the dotcom collapse and the Great Recession is our sad, emo era. Fortinet and Commvault were the only pure cybersecurity companies that went public:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/cybersecurity-post-dotcom-era-benchmarks.png" class="kg-image" alt="" loading="lazy" width="830" height="904" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/cybersecurity-post-dotcom-era-benchmarks.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/cybersecurity-post-dotcom-era-benchmarks.png 830w" sizes="(min-width: 720px) 720px"></figure><p>A lull in cybersecurity and tech IPOs is a bummer, but Fortinet is an excellent consolation prize. It's turned into one of the best and highest-valued cybersecurity companies today, transcending eras to become a generational company.</p>
<h5 id="high-burn-high-growth-2012-2020">High-Burn / High-Growth (2012-2020)</h5>
<p>The High-Burn / High-Growth era is better known as the <a href="https://en.wikipedia.org/wiki/Zero_interest-rate_policy?ref=content.strategyofsecurity.com">ZIRP</a> era. Nearly a decade of low interest rates caused a spike in hyperscaling and IPOs.</p>
<p>This was like the <a href="https://en.wikipedia.org/wiki/History_of_baseball_in_the_United_States?ref=content.strategyofsecurity.com#The_steroid_era">steroid era</a> of baseball. Performance was inflated by ZIRP. We had a bull market. Growth companies had high valuations. High-profile breaches started reaching mainstream media. And so on.</p>
<p>The IPO numbers speak for themselves — 27 pure cybersecurity companies went public during this era⁵:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/cybersecurity-high-burn-high-growth-era-benchmarks.png" class="kg-image" alt="" loading="lazy" width="830" height="904" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/cybersecurity-high-burn-high-growth-era-benchmarks.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/cybersecurity-high-burn-high-growth-era-benchmarks.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Metrics for this cohort were a sign of the times. Cybersecurity's ZIRP companies went public when investors valued growth more than profitability. The metrics show.</p>
<p>Average LTM revenue at IPO was $173 million, which is far higher than cybersecurity companies in the dotcom and post-dotcom eras. It was relatively in line with median revenue benchmarks ($193) from Clouded Judgment. However, revenue was less than half of the late ZIRP era (2018 onward) standards from Battery Ventures.</p>
<p>Profitability (EBIT Margin) was in line with Clouded Judgment metrics, and way below current expectations of break-even or low single digits. Blame it on sales and marketing — spend in this category was 22% higher than today's standard. Yep, steak dinners drove overall EBIT margins 29% lower.</p>
<p>"Faster" was the emphasis in the "Bigger, Faster, Stronger" trifecta. <em>Grow fast and you'll get bigger and stronger later</em>, they said. The next two eras taught us why this was an empty promise.</p>
<h5 id="high-burn-slowing-growth-2021-2022-and-expense-management-2023">High-Burn / Slowing-Growth (2021-2022) and Expense Management (2023)</h5>
<p>KnowBe4 and ForgeRock were the two large-cap cybersecurity companies that <a href="https://strategyofsecurity.com/p/forgerock-ipo/">went public</a> during the High-Burn / Slowing-Growth era of 2021-2022. Here are their metrics at IPO:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/09/cybersecurity-high-burn-slowing-growth-era-benchmarks.png" class="kg-image" alt="" loading="lazy" width="830" height="904" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/09/cybersecurity-high-burn-slowing-growth-era-benchmarks.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/09/cybersecurity-high-burn-slowing-growth-era-benchmarks.png 830w" sizes="(min-width: 720px) 720px"></figure><p>The two eras from 2021-2023 are interesting because of acquisitions and take-privates, not IPOs:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/delisted-cybersecurity-companies.png" class="kg-image" alt="" loading="lazy" width="830" height="886" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/delisted-cybersecurity-companies.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/delisted-cybersecurity-companies.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Nine (!!!) public cybersecurity companies from the High Burn / High Growth era of 2012-2020 were taken private or acquired.</p>
<p>Stated differently, nearly 50% of the cybersecurity companies who went public during the previous High-Burn / High-Growth era were either acquired or taken private during this High-Burn / Slowing-Growth era.</p>
<p>Both KnowBe4 and ForgeRock also ended up being taken private quickly. They each survived public markets for less than two years. In baseball terms, they were the <a href="https://www.si.com/the-cauldron/2016/08/04/mark-prior-chicago-cubs-no-regrets?ref=content.strategyofsecurity.com">Mark Prior</a> of cybersecurity public companies — full of early promise, then gone in a flash.</p>
<p>There was nothing notably wrong about either company's metrics <em>compared to IPOs from the High-Burn / High-Growth era</em> — emphasis on the "compared to" part. They were doing fine compared to past eras, but nowhere near the new expectations the market set for burn and growth.</p>
<p>The game evolved. KnowBe4, ForgeRock, and nine other companies found themselves watching the game from the bench.</p>
<p>The Expense Management era of 2023 brought nothing but pain: just more take-privates, layoffs, and valuation hits. It's like when the Florida Marlins won the 1997 World Series with a huge payroll, then cut it to $16 million in 1998. Nobody likes expense management, but sometimes it's the best strategy.</p>
<h2 id="encore-the-low-burn-high-growth-era">Encore: the Low-Burn / High-Growth era</h2>
<p><em>We're not ending this show with expense management, right?! BOOOOOOOOOO!!!</em></p>
<p>No way. That would be like ending a baseball game on a walk-off balk call.</p>
<p>It's time for the encore. Welcome to the Low-Burn / High-Growth era. It's going to have our biggest hits yet.</p>
<p>Here's the description of this era from the Battery Ventures graphic we saw earlier:</p>
<blockquote>
<p>Once companies manage expenses, we will soon see a convergence to the long-term target of 30% operating margins. As growth returns, highly-profitable, high-growth companies will return. The era of $1B B2B software companies is here, and with &gt;30% operating margins and efficiency built in, we will see higher quality franchises.</p>
</blockquote>
<p>A practical way to translate this is: you can't control growth, but you can control expenses.⁶ This means free lunches, massage tables, and unlimited expense budgets are probably gone, or at least limited. Complain to your CFO — I'm just the messenger here.</p>
<p>But seriously, I've spent a lot of time working in $1B+ B2B companies with &gt;30% operating margins. Trust me, it's great when your company is making a lot of money, profitable, and manages it well.</p>
<p>We don't have visibility into IPO pipeline company metrics, but our currently public cybersecurity companies are a decent stand-in:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/cybersecurity-current-public-benchmarks.png" class="kg-image" alt="" loading="lazy" width="830" height="1043" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/cybersecurity-current-public-benchmarks.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/cybersecurity-current-public-benchmarks.png 830w" sizes="(min-width: 720px) 720px"></figure><p>The 13 pure cybersecurity companies on public markets today are a mixed bag.⁷ On average, we're comfortably above IPO-level expectations for total revenue, margins, and operating expenses. We're lagging on growth and net dollar retention. Valuation metrics reflect both — our 8.1x multiple is above the SaaS IPO median and below the 2023 IPO metrics.</p>
<p>Getting to today's standard of software industry performance means being bigger, faster, and stronger. It's about balance and temperance, not overdoing one of the three. Higher standards are painful at first, but they're better in the long-term.</p>
<p>Don't believe me? Let's go back to our baseball anecdote. There are <a href="https://theanalyst.com/na/2023/07/highest-scoring-games-in-mlb-history/?ref=content.strategyofsecurity.com">more total home runs</a> in Major League Baseball (MLB) today than there were during the steroid era.</p>
<p>We don't have two players (Mark McGwire and Sammy Sosa) crushing Roger Maris's 61-homer record in the same season, nor do we have Barry Bonds hitting 73.⁸ We do have remarkable league-wide production, though.</p>
<p>Six of the seven highest home run rates per game occurred between 2016 and 2021. During the same period, the Minnesota Twins (2019) and Atlanta Braves (2023) both set the record for home runs by a team during a single season at 307.</p>
<p>Baseball players in today's era have better fundamentals. They're a balance of big, fast, <em>and</em> strong. The right balance is why we're seeing consistently high levels of performance at a team and league level.</p>
<p>This baseball anecdote is exactly what the Low-Burn / High-Growth era in the cybersecurity industry is all about. We're going to see fewer hypergrowth companies getting all juiced up for big IPOs, then withering two years later.</p>
<p>Instead, our IPO pipeline and public markets are going to have highly scaled, profitable, and resilient companies. They're going to endure and thrive in public markets. And our entire industry is going to reach new levels of performance.</p>
<p>The blitzscaling and hypergrowth of the High-Burn / High-Growth era wasn't a revolution or transformation of business models — it was just an era. Durable cybersecurity companies have been built across each of the eras. The important part is to understand how to use the best of the era we're in to build the biggest, fastest, and strongest companies we can.</p>
<hr><h3 id="acknowledgements">Acknowledgements</h3>
<p>Thank you to the team at <a href="https://www.battery.com/?ref=content.strategyofsecurity.com">Battery Ventures</a> and <a href="https://www.linkedin.com/in/jamin-ball-49366137/?ref=content.strategyofsecurity.com">Jamin Ball</a> at <a href="https://cloudedjudgement.substack.com/?ref=content.strategyofsecurity.com">Clouded Judgment</a> (<a href="https://www.altimeter.com/home?ref=content.strategyofsecurity.com">Altimeter Capital</a>) for the heavy lifting on software IPO benchmarks. This cybersecurity iteration wouldn't have been possible without building on top of their work.</p>
<h3 id="footnotes">Footnotes</h3>
<p>¹Cybersecurity companies obviously didn't exist in the 1920s, so I went with one of the top companies from the industrial era instead.</p>
<p>²And then there are mega-caps like Apple, Microsoft, and others who have multi-trillion-dollar valuations. Palo Alto Networks just achieved its <a href="https://www.calcalistech.com/ctechnews/article/hyekhe00i6?ref=content.strategyofsecurity.com">first $100 billion valuation</a> earlier this month, so it's a little early to start talking about trillion-dollar valuations in cybersecurity. But we can dream.</p>
<p>³I'm a Chicago Cubs fan, so I know what it's like to cheer for the worst team in the league. (Historically speaking, but not anymore! Go Cubs Go!).</p>
<p>⁴Okay, <em>"just like"</em> Taylor Swift is a stretch. Cybersecurity's business eras also have far less appeal in pop culture. The Venn diagram of Swifties and readers of this article is probably close to zero.</p>
<p>⁵Including companies which are now delisted and small cap/non-traditional listings.</p>
<p>⁶It's fine to control expenses. Just don't overdo it. There's a great <a href="https://en.wikipedia.org/wiki/Ruth_Porat?ref=content.strategyofsecurity.com">Ruth Porat</a> (now the Chief Investment Officer at Alphabet) quote about this: <em>"You can't cost-cut your way to greatness."</em></p>
<p>⁷Our current situation even more nuanced than the chart shows. Palo Alto Networks, Fortinet, CrowdStrike, Check Point, and Okta skew the average metrics by a lot...but that's another article.</p>
<p>⁸Yes, Yankees fan — I know Aaron Judge hit 61 home runs in 2022. We still get high individual numbers once in a while. The point is the entire league is more balanced, which leads to a higher total across the board.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/bigger-faster-stronger-header.png"/>
        </item>
        <item>
            <title><![CDATA[Demystifying Cybersecurity’s Public Companies]]></title>
            <link>https://strategyofsecurity.com/demystifying-cybersecuritys-public-companies/</link>
            <guid>65aae66f5d63170001550efd</guid>
            <pubDate>Fri, 19 Jan 2024 22:55:21 GMT</pubDate>
            <description><![CDATA[It's a lot harder to come up with a list of public cybersecurity companies than you'd think. Here are the reasons why, plus an honest attempt to get the list right.]]></description>
            <content:encoded><![CDATA[<p>Quick, how many publicly traded cybersecurity companies are there? Take a guess. I’ll wait.</p>
<p>...</p>
<p>Struggling to come up with an answer? If you took a shot, how confident are you that you're right?</p>
<p>If you're feeling a little bit rattled right now, don't worry. The answer is <em>wayyyyyy</em> trickier than it seems. I struggled to answer this question myself, and I've been covering publicly traded cybersecurity companies for <a href="https://strategyofsecurity.com/p/cybersecurity-is-going-public/">a while</a>. I literally found 20 more companies while writing this paragraph.</p>
<p>I was planning to write a different article about public cybersecuity companies until I realized how difficult it is to come up with a list of companies in the first place. <em>Why is it so damn hard?!</em></p>
<p>It's partly because different answers get reported all the time. Richard Stiennon's <a href="https://docs.google.com/spreadsheets/d/1VmBnIOQ5wFqwHIv9VJee_9H5cDOHo7WFaX7wEGjbiOk/edit?ref=content.strategyofsecurity.com#gid=0">public cybersecurity stocks spreadsheet</a> has 13 companies. Momentum Cyber tracked 38 companies as of its <a href="https://momentumcyber.com/docs/Yearly/2022_Cybersecurity_Almanac_Public_Edition.pdf?ref=content.strategyofsecurity.com">2022 Cybersecurity Almanac report</a>. Mike Privette tracks 59 companies on his <a href="https://www.returnonsecurity.com/p/public-cyber-companies?ref=content.strategyofsecurity.com">Return on Security market tracker</a>. Cybersecurity Ventures <a href="https://cybersecurityventures.com/list-of-publicly-held-cybersecurity-companies/?ref=content.strategyofsecurity.com">tracks</a> 60+ companies. And <em>all of them</em> are right!</p>
<p>Back to the original question — how many publicly traded cybersecurity companies are there? The short answer: 71. I know... <em>finally, number we can rely on!</em> Not really...</p>
<p><em>...How do you classify pure cybersecurity companies versus hybrid ones? Do you have a minimum threshold for small-cap companies? What about companies on global stock exchanges? And weren't there just a bunch of cybersecurity companies that were taken private?</em></p>
<p>Are you starting to see what I mean about this being tricker than it seems?</p>
<p>The real answer to this question is: <em>it depends</em>. I know — how unsatisfying. Everyone wants a number we can all agree on. I regret to inform you this isn't going to happen. But trust me, the nuances are why this is a super interesting question.</p>
<p>Let me start by telling you a quick story about a deranged billionaire and one of the wildest estate sales of all time.</p>
<h2 id="what-do-casinos-hotels-tv-stations-ice-cream-and-airplanes-have-in-common">What do casinos, hotels, TV stations, ice cream, and airplanes have in common?</h2>
<p><em>"I'm not a paranoid deranged millionaire. Goddamit, I'm a billionaire,"</em> the eccentric Howard Hughes once quipped about himself.</p>
<p>We've all heard stories about Hughes' quirks, antics, trials, and tribulations as a businessperson and celebrity. You probably haven't heard how bad of an accountant he was.</p>
<p>What casinos, hotels, TV stations, ice cream, and airplanes have in common is that Howard Hughes owned one or more of <em>all of them</em>. The stories about <em>why</em> he owned this large and eclectic set of assets are even more wild.</p>
<p>He bought several casinos in Las Vegas, including one because the rotating slipper on its sign annoyed him. He bought a hotel because management tried to kick him out after staying past his reservation. He bought a TV station so his late-night movie watching wouldn't get interrupted by commercials. He stockpiled Baskin-Robbins banana nut ice cream because he was obsessed with it. He owned a massive plane (the "Spruce Goose") that he flew one time at only 70 feet of altitude.</p>
<p>We haven't even talked about the companies, real estate, mining claims, art, and bank accounts Hughes also owned. He had a <em>%&amp;@^load</em> of stuff, and nobody knew where all of it was. He probably didn't either.</p>
<p>Howard Hughes died without a will in 1976. Nobody could figure out what he owned or how to liquidate it. It took almost 15 years and millions of dollars for teams of lawyers, judges, advisors, and heirs to sort out his vast and disorganized estate.</p>
<p>The story of Howard Hughes and his sprawling estate is a metaphor for our industry. I would lovingly call cybersecurity a <a href="https://strategyofsecurity.com/p/the-endless-pursuit-of-the-ecosystem/">vast and disorganized estate</a>, too.¹</p>
<p>We're like an industry version of Howard Hughes right now. We don't really know how many public companies we have, let alone the 3,000+ private ones.²</p>
<p>Cybersecurity isn't some cottage industry anymore. Our public companies have a combined valuation of over $350 billion.³ We're not paranoid, deranged millionaires. We're billionaires...<em>oh, wait a minute.</em></p>
<p>Let's get our own estate in order with some solid numbers about cybersecurity's public companies.</p>
<h2 id="the-total-number-of-public-cybersecurity-companies-depends-on-how-you-look-at-it">The total number of public cybersecurity companies depends on how you look at it</h2>
<p>Remember when I said there are currently 71 public cybersecurity companies at the beginning of this article? You're about to see why I'm not 100% confident about this answer.</p>
<p>The big question is: <em>how do you define the cybersecurity industry?</em> This exact question is why the reported number of public cybersecurity companies varies widely between different sources.</p>
<p>It all depends on how you cut the data. Here are the most logical ways to slice it.</p>
<h5 id="pure-and-hybrid-cybersecurity-companies">Pure and hybrid cybersecurity companies</h5>
<p>A never-ending industry debate is the classification of "pure" versus "hybrid" cybersecurity companies. The uncertainty is whether companies whose products and revenue are a mix of cybersecurity and other tech should be considered cybersecurity companies.⁴</p>
<p>I'm <a href="https://strategyofsecurity.com/p/the-convergence-of-cybersecurity-and-everything/">firmly anchored</a> in the <em>"yes, they are cybersecurity companies"</em> camp. I understand how including hybrid companies can skew the numbers on the cybersecurity industry, though. Including larger companies like Cloudflare makes metrics like the overall count of companies and valuations go way up.⁵</p>
<p>I'm happy to make the case for why that's a good thing all day long, but the diplomatic answer is to show you the data both ways:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/Public-Cybersecurity-Companies-by-Type-2.png" class="kg-image" alt="" loading="lazy" width="720" height="483" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/Public-Cybersecurity-Companies-by-Type-2.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/Public-Cybersecurity-Companies-by-Type-2.png 720w" sizes="(min-width: 720px) 720px"></figure><p>See what I mean about hybrid cybersecurity companies making the overall count go way up? There are 31 of them, or 43.7% of the total company count:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/Hybrid-Cybersecurity-Companies.png" class="kg-image" alt="" loading="lazy" width="720" height="1700" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/Hybrid-Cybersecurity-Companies.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/Hybrid-Cybersecurity-Companies.png 720w" sizes="(min-width: 720px) 720px"></figure><p>Even if you exclude hybrid companies, having 40 pure cybersecurity companies traded globally is still super respectable. Here's the full list of companies:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/Pure-Cybersecurity-Companies.png" class="kg-image" alt="" loading="lazy" width="720" height="2092" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/Pure-Cybersecurity-Companies.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/Pure-Cybersecurity-Companies.png 720w" sizes="(min-width: 720px) 720px"></figure><p>Would you have guessed the number was this high? I sure wouldn't have. And remember, the totals are down from all-time highs after 21 delistings from M&amp;A and take-private activity since 2020.</p>
<h5 id="global-stock-exchanges">Global stock exchanges</h5>
<p>Right or wrong, the business side of the cybersecurity industry has a very U.S.-centric slant to it. For our purposes, this means public company counts get skewed towards major U.S. stock exchanges like Nasdaq and the New York Stock Exchange (NYSE).⁶</p>
<p>Here's the breakdown of companies by U.S. and non-U.S. stock exchange listings, which also includes our previous filter of pure and hybrid company types:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/Cybersecurity-Companies-by-Global-Stock-Exchange.png" class="kg-image" alt="" loading="lazy" width="720" height="758" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/Cybersecurity-Companies-by-Global-Stock-Exchange.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/Cybersecurity-Companies-by-Global-Stock-Exchange.png 720w" sizes="(min-width: 720px) 720px"></figure><p>The count of companies is skewed towards the U.S., but much less than you might think. There are 24 companies listed on non-U.S. stock exchanges, and 17 of them are of the "pure" variety.⁷</p>
<p>Discovering and tracking global cybersecurity companies is sort of like excavating for dinosaur fossils — they're really hard to find. I'm certain this part of the list is still incomplete.⁸</p>
<h5 id="valuation-and-listing-path">Valuation and listing path</h5>
<p>Two other widely debated criteria for classifying public companies are the path a company took towards listing and their valuation (or stock price).</p>
<p>How a company listed is contentious to the point of throwing punches, especially in the investment banking community. An era of SPACs (and their cousin, the reverse merger) in the early 2020s high-nosed the traditional IPO process and brought some questionable companies into public markets. Capital markets people don't like that, so companies on this path often get ignored.</p>
<p>SPACs and reverse mergers have been popular in tech but rare in cybersecurity — 79.4% of our current public companies have gone public through traditional IPOs or direct listings. We've only seen six non-traditional listings so far:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/Cybersecurity-SPACS-and-Reverse-Mergers.png" class="kg-image" alt="" loading="lazy" width="720" height="470" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/Cybersecurity-SPACS-and-Reverse-Mergers.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/Cybersecurity-SPACS-and-Reverse-Mergers.png 720w" sizes="(min-width: 720px) 720px"></figure><p><a href="https://thehustle.co/the-spectacular-failure-of-spacs/?ref=content.strategyofsecurity.com">Chamath Palihapitiya</a> hasn't played a hand in any cybersecurity SPACs yet, but the results have been similar.  IronNet <a href="https://www.reuters.com/legal/litigation/cybersecurity-company-founded-by-ex-nsa-director-files-bankruptcy-2023-10-13/?ref=content.strategyofsecurity.com">filed for bankruptcy</a> in 2023 (and delisted shortly after). HUB Security's stock has <a href="https://www.calcalistech.com/ctechnews/article/3szoy2zis?ref=content.strategyofsecurity.com">lost 95% of its value</a>.  You can see why people get fired up about this topic.</p>
<p>Small-cap stocks are like the cousins of SPACs and reverse mergers. Professional investors generally consider companies with a stock price of $5 or lower (and/or sub-$100 million valuations) speculative. So, they're also excluded from a lot of industry counts.</p>
<p>In cybersecurity, there are currently 12 companies globally which are valued under $100 million:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/Small-Cap-Cybersecurity-Companies.png" class="kg-image" alt="" loading="lazy" width="720" height="868" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/Small-Cap-Cybersecurity-Companies.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/Small-Cap-Cybersecurity-Companies.png 720w" sizes="(min-width: 720px) 720px"></figure><p>The number is likely a bit higher because market data isn't readily available for some global exchanges.</p>
<h2 id="from-paranoid-and-deranged-to-calm-and-confident">From paranoid and deranged to calm and confident</h2>
<p>We've done it! Our burgeoning, multi-billion-dollar cybersecurity estate is much more buttoned-up and put together now. We might not have the slicked-back hair and pressed suits of Wall Street stalwarts, but we're definitely not an enigmatic recluse like Howard Hughes anymore.</p>
<p>This is no time to get complacent, though. Keeping up with our public companies is an ongoing quest. Companies come and go from public markets all the time.</p>
<p>And remember, cybersecurity is still an up-and-coming industry! Like I said <a href="https://strategyofsecurity.com/p/dry-january-the-sobering-state-of-public-markets-for-cybersecurity-companies/">last week</a>, it's not hard to imagine 20 or 30 more public cybersecurity companies a decade from now. This list is going to get bigger quickly whenever the tech IPO pipeline opens up again.</p>
<p>The next time you're asked how many public cybersecurity companies there are, you can calmly answer (with a bit of a smile): <em>"it depends..."</em> before confidently putting on a clinic on the nuances of the biggest companies in our industry.</p>
<hr><h3 id="footnotes">Footnotes</h3>
<p>¹Several smart people put lots of time and money into tracking industry data. It's not widely available or understood yet, though.</p>
<p>²In fairness, this problem isn't limited to cybersecurity. I'm more encouraged about our situation. Our industry is big enough to lose track of, but small enough to figure out.</p>
<p>³Based on data from Google Finance as of January 18, 2024.</p>
<p>⁴Classifying companies as pure or hybrid is also a judgment call without companies consistently disclosing business unit level revenue breakdowns.</p>
<p>⁵This definition (and data) is still excluding large, diversified technology companies like Microsoft, Cisco, Accenture, and others. These companies all have multi-billion-dollar cybersecurity business units. It's a stretch to include them in the count of companies and other metrics like valuation.</p>
<p>⁶Being listed on a U.S. stock exchange doesn't mean the company is also headquartered in the United States. This data analysis counts companies by stock exchange, not the location of their headquarters.</p>
<p>⁷It's starting to feel like we are breeding dogs or horses here — something where the purity of genetics matters.</p>
<p>⁸I'm still taking suggestions if you know of global public cybersecurity companies you didn't see listed in this article.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <category>#featured</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/header-demystifying-cybersecuritys-public-companies.png"/>
        </item>
        <item>
            <title><![CDATA[Dry January: The Sobering State of Public Markets for Cybersecurity Companies]]></title>
            <link>https://strategyofsecurity.com/dry-january-the-sobering-state-of-public-markets-for-cybersecurity-companies/</link>
            <guid>65a06f125d6317000155041e</guid>
            <pubDate>Thu, 11 Jan 2024 23:08:31 GMT</pubDate>
            <description><![CDATA[Being a cybersecurity unicorn feels like a never-ending Dry January right now. It's not as bad as it sounds, I promise.]]></description>
            <content:encoded><![CDATA[<p>2023 was the year people in the cybersecurity industry thought everything was going to get better, and it didn't.</p>
<p>Things like...</p>
<p><em>"Valuations will get straightened out, and everyone can start raising capital again."</em></p>
<p><em>"Klaviyo going public will get IPOs going again."</em></p>
<p><em>"Our last valuation was a little high, but we can grow into our valuation over time."</em></p>
<p>...and so on. The stories we tell ourselves are how we cope with the uncomfortable reality of "economic uncertainty" that's been going on for, well, <em>too damn long.</em></p>
<p>We're staring 2024 in the face, and the outlook is sobering. It's <a href="https://en.wikipedia.org/wiki/Dry_January?ref=content.strategyofsecurity.com">Dry January</a>¹ for over 100 cybersecurity companies who are sitting on billion-dollar-plus valuations. It's %#@&amp;ing cold and dark outside, the holidays are over, and there's nothing to do.</p>
<p>Okay, in business terms...here's the conundrum: IPOs are the best, if not the only, exit option for 30+ cybersecurity companies. Eighty more unicorns are right behind them wondering what their future looks like. And the market's standards for being a public company just got <em>wayyyyyy</em> higher.</p>
<p>What does all of this mean? It means it's time for us to sober up, straighten our lives out, and give 2024 everything we've got.</p>
<p>The never-ending party of 2021 is long gone now. It's time to get honest about where our top companies are really at heading into the new year.</p>
<p>Let me take you on an up-and-down ride through the financial plight of our industry. I'd normally tell you to fix a drink to calm the nerves first, but it's Dry January, so we're on our own.</p>
<h2 id="welcome-to-no-mans-land">Welcome to no man's land</h2>
<p>To understand the state of cybersecurity companies, you need to understand the state of software markets in general. Enter Battery Ventures and their incredible (but brutal, at least this year) <a href="https://www.battery.com/blog/opencloud-2023/?ref=content.strategyofsecurity.com">State of the OpenCloud</a> report.</p>
<p>Here's the chart I haven't been able to stop thinking about for two months:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/battery-opencloud-software-funnels.png" class="kg-image" alt="" loading="lazy" width="2000" height="1123" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/battery-opencloud-software-funnels.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2024/01/battery-opencloud-software-funnels.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2024/01/battery-opencloud-software-funnels.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/battery-opencloud-software-funnels.png 2163w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Battery Ventures - State of the OpenCloud report</span></figcaption></figure><p><em>Note: This is a funnel, so the numbers are aggregated. For example, the total number of private unicorns is 1,000, not 1,000+115+50+17. Each range in the funnel shows how many companies graduated from the previous one. It's confusing at first, but useful once you figure it out.</em></p>
<p>It's a chamber of horrors for anyone who works at, invests in, buys from, or cares about software companies. There have been 95 software IPOs in the past decade. 1,000 more companies are sitting in the pipeline wondering when it's going to be their turn. <em>That's not good.</em></p>
<p>The line <em>"$1B is the new $100M when it comes to ARR"</em> is the one that causes me the most panic. Why?</p>
<p>There are only 14 companies with over $1 billion of ARR in the entire cybersecurity industry. Private companies don't report revenue, but it's safe to say that very few of cybersecurity's private companies have $1 billion in ARR.</p>
<p>As if reading the report wasn't panic-inducing enough, I saw <a href="https://x.com/DanelDayan/status/1724892895109673133?s=20&ref=content.strategyofsecurity.com">this response</a> to some discussion about the report on X:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/dayan-public-co-criteria-1-1.png" class="kg-image" alt="" loading="lazy" width="1045" height="442" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/dayan-public-co-criteria-1-1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2024/01/dayan-public-co-criteria-1-1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/dayan-public-co-criteria-1-1.png 1045w" sizes="(min-width: 720px) 720px"></figure><p>A stat that stuck with me after writing <a href="https://strategyofsecurity.com/p/no-way-out-the-changing-world-of-cybersecurity-exits/">No Way Out: The Changing World of Cybersecurity Exits</a> is how many companies with $1 billion-ish valuations we have in cybersecurity. If the $1-2 billion valuation range really is <em>"no man's land in the public markets,"</em> we're entering a world of pain.</p>
<p>Trying to see the cybersecurity companies in this chart starts looking a lot like the blurry haze you were in during that bender back in college. Let me give you a clearer view, but without the hangover this time.</p>
<h2 id="cybersecuritys-valuation-funnel-billion-dollar-problems">Cybersecurity's valuation funnel: billion dollar problems</h2>
<p>Here's a cybersecurity version of the Battery Ventures chart (without the logos):</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/Cybersecurity-s-Valuation-Funnel.png" class="kg-image" alt="" loading="lazy" width="1350" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/02/Cybersecurity-s-Valuation-Funnel.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2024/02/Cybersecurity-s-Valuation-Funnel.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/Cybersecurity-s-Valuation-Funnel.png 1350w" sizes="(min-width: 720px) 720px"></figure><p>Right now, we have 113 private companies with disclosed valuations of $1 billion or higher, including both VC-backed startups and companies owned by private equity firms. Here's the bad news: 79 of them (70%) are in the "no man's land" of a $1-2 billion valuation.</p>
<p>The 79 companies are a mix of up-and-comers like Dragos, Expel, Island, Stytch, and Vanta, plus later-stage companies like Forcepoint, RSA Security, Veracode, and more.</p>
<p>Each company's individual timeline depends a lot on the timing and structure of investments. But their expectations are all the same: exit with a multi-billion-dollar outcome.</p>
<p>This is where things get complicated. We've had 26 companies go public at a valuation of $1 billion or more. However, our current situation is a <em>lot</em> different than the cybersecurity IPOs of the past three decades.</p>
<p>Since 2000, two cybersecurity companies went public in what's now the no man's land of $1-2 billion valuations. Five companies (CyberArk, Fortinet, Qualys, Rapid7, and Varonis) went public at valuations <em>under</em> $1 billion and grew into valuations of $3 billion or more as public companies.</p>
<p>None of this seems possible right now. We're in a more austere place in time. Only the Most Upstanding Companies™ are worthy of public markets. The rest are left to toil in private until the end of eternity — or what feels like it, anyway.</p>
<p>Several of the 79 companies will make it out and have good exits. And a lot of them will get sold for under half of their billion-dollar valuations. Which ones? I don't know — not beyond an informed guess, anyway. You probably don't either. This <em>no man's land</em> is a very uncertain place.</p>
<p>Next, let me walk you through the funnel and pour you a shot of good, ol' fashioned hope.</p>
<h2 id="through-the-funnel-from-no-mans-land-to-the-promised-land">Through the funnel: from no man's land to the promised land</h2>
<p>When we move down the funnel and past the companies in the $1 billion+ no man's land, we reach a <em>much</em> rosier outlook.</p>
<p>There are 34 cybersecurity companies that have made it beyond the $3 billion valuation threshold. This doesn't mean they have the scale, predictability, and story to make it to an IPO, but their path and probability of making it to the public markets is a lot more clear.</p>
<p>Let's dive into the data for each valuation range. You'll see what I mean.</p>
<h5 id="3b-range">$3B+ range</h5>
<p>Nineteen cybersecurity companies are currently valued between $3-5 billion:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/3B--Cybersecurity-Companies.png" class="kg-image" alt="" loading="lazy" width="1350" height="1580" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/02/3B--Cybersecurity-Companies.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2024/02/3B--Cybersecurity-Companies.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/3B--Cybersecurity-Companies.png 1350w" sizes="(min-width: 720px) 720px"></figure><p>Other than IDEMIA, the entire set of companies owned by private equity firms used to be public companies. They ended up being taken private for a reason. Each of them needed to take a minute and work on some things outside the public eye.</p>
<p>Most of them will get back to public markets eventually — especially with the magic of Thoma Bravo (Sophos), Vista Equity Partners (KnowBe4), and KKR (Barracuda Networks), all firms with a long history of success in cybersecurity. All six PE-backed companies are early in their holding period, so there's no rush to sell before they have their scale, predictability, and story figured out.</p>
<p>The 12 VC-backed companies in this valuation range are on the fringe of cybersecurity's IPO pipeline. Acronis, Arctic Wolf, Cato Networks, Forter, Rubrik, and Socure have all shared plans to go public. The other six have raised significant capital and likely have the time and runway to grow into IPO candidates.</p>
<p>Companies in this range might be three or more years out from going public, but timing doesn't matter if they use it to become sustainable companies long-term.</p>
<h5 id="5b-range">$5B+ range</h5>
<p>Twelve cybersecurity companies are currently valued between $5-10 billion:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/5b-cybersecurity-companies.png" class="kg-image" alt="" loading="lazy" width="1350" height="1190" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/5b-cybersecurity-companies.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2024/01/5b-cybersecurity-companies.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/5b-cybersecurity-companies.png 1350w" sizes="(min-width: 720px) 720px"></figure><p>Just like the $3B+ range, all three PE-backed companies were public once upon a time. Each had over $500 million in annual revenue (as of their last earnings reports) before being taken private.² Their return to public markets seems like destiny.</p>
<p>Seven of the nine VC-backed companies in this valuation range are basically a who's who of the cybersecurity IPO pipeline. Netskope (12), Tanium (13), Snyk (19), OneTrust (21), and 1Password (50) are all members of the <a href="https://www.forbes.com/lists/cloud100/?ref=content.strategyofsecurity.com">Forbes Cloud 100</a> class of 2023. Lacework and Coalition raised three of the top 50 largest financing rounds in cybersecurity history.</p>
<p>As blockchain companies, the future of Fireblocks and StarkWare is up in the air — but if you know anything about cryptocurrency, you know valuations swing wildly. <a href="https://www.urbandictionary.com/define.php?term=hodl&ref=content.strategyofsecurity.com">Hodl</a>, I guess.</p>
<p>If I could make a billboard to show the world who the best private companies in cybersecurity are, most of these are on it. $5B+ is the range of rising stars.</p>
<h5 id="10b-range">$10B+ range</h5>
<p>Three cybersecurity companies (or two and change, depending on how you classify Kaseya) stand alone in the bougie $10 billion+ valuation club:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/10b-cybersecurity-companies.png" class="kg-image" alt="" loading="lazy" width="1350" height="669" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2024/01/10b-cybersecurity-companies.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2024/01/10b-cybersecurity-companies.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/01/10b-cybersecurity-companies.png 1350w" sizes="(min-width: 720px) 720px"></figure><p>Only 16 cybersecurity companies, public or private, are valued at over $10 billion. That's a higher valuation than 28 other public cybersecurity companies listed on major exchanges. With over 3,000 known cybersecurity companies, this group of 16 is in the top 0.5 percent.</p>
<p>Kaseya (Insight Partners, majority ownership) and Proofpoint (Thoma Bravo) are backed by private equity firms. Proofpoint was public until 2021, when it was <a href="https://www.thomabravo.com/press-releases/thoma-bravo-completes-acquisition-of-proofpoint?ref=content.strategyofsecurity.com">taken private for $12.3 billion</a>, the fourth largest acquisition ever in cybersecurity. Kaseya's future has a <a href="https://www.channelfutures.com/channel-business/can-kaseya-ever-go-public-?ref=content.strategyofsecurity.com">few more questions</a>, but, well...they have a basketball arena <a href="https://www.kaseya.com/kaseya-center/?ref=content.strategyofsecurity.com">named after them</a> now.</p>
<p>Wiz stands alone as the only private cybersecurity company in history to be valued at over $10 billion. They're #19 on the Forbes Cloud 100, the fastest software company to ever reach $100 million in revenue, and <em>...you've heard the rest.</em> One of the best articles of the past year sums it up nicely: <a href="https://www.forbes.com/sites/alexkonrad/2023/08/08/nobody-beats-wiz-meet-the-aggressive-10-billion-startup-shaking-up-cloud-security/?ref=content.strategyofsecurity.com">Nobody Beats Wiz</a>.</p>
<p>If you had to bet everything you own on picking which cybersecurity company is going to have a successful IPO, Wiz is it.</p>
<h2 id="sober-but-good">Sober, but good</h2>
<p>Sobering was totally the right word for this tour through our industry. I feel surprisingly good about it, though. It's a lot like Dry January.</p>
<p>The first week is a downer. That's exactly how it feels for the 79 companies in the <em>no man's land</em> of $1 billion valuations.</p>
<p>The second week is when you start feeling better. The companies in the $3 billion range <em>should</em> be feeling a lot better than a lot of the unicorns.</p>
<p>The third week is when you feel like you've got this. <em>"You've got this"</em> is exactly what I'd say to our $5 billion companies. Most of them are going to have good exits.</p>
<p>The last week is when you feel superhuman. Our $10 billion companies are unstoppable.</p>
<p>Cybersecurity has around 30 public companies today. You don't have to squint much to see 20 or 30 more public companies a decade from now.</p>
<p>Whatever the number ends up being, it will feel a lot more meaningful when we can look back and say 2024 was the year that made companies in our industry great.</p>
<p>Now, let's pop a bottle of NA Moscato, raise a toast to everyone who's still in the game, and get back to building.</p>
<hr><h3 id="footnotes">Footnotes</h3>
<p>¹Yes, I'm doing Dry January too.</p>
<p>²Ping Identity and ForgeRock have over $500 million revenue combined (now under Ping Identity). Both companies were under $500 million individually before the merger.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/header-dry-january.png"/>
        </item>
        <item>
            <title><![CDATA[Okta's Cinderella Story]]></title>
            <link>https://strategyofsecurity.com/oktas-cinderella-story/</link>
            <guid>657c881e5d6317000154fa62</guid>
            <pubDate>Fri, 15 Dec 2023 18:00:03 GMT</pubDate>
            <description><![CDATA[Okta can still be a Cinderella story. If they can get their own security right, history will look back on this as the low point before a happy ending. ]]></description>
            <content:encoded><![CDATA[<p><em>"What the hell is wrong with Okta?"</em> or some similarly colorful variation is the question I've been asked most often in the past year.</p>
<p>I'm not surprised anymore. Okta has had a rough time since their first breach was announced back in March 2022. Tack on several more incidents since then, and it's easy to join the bloodthirsty mob of people counting the days until Okta's imminent demise.</p>
<p>I'm not an Okta apologist, but their situation isn't as dire as some people think. They're going to be fine. Maybe even better than before...<em>eventually</em>.</p>
<p><em>WHAT?!? How could that be possible after this many problems??!!</em></p>
<p>Let's start with a freakish comparison between Okta and the most popular tale in human history.</p>
<h2 id="a-cinderella-story">A Cinderella story</h2>
<p>All great stories have an arc. We understand this implicitly because of how we <em>feel</em> when watching a show, reading a book, or seeing a movie. Most of us don't think about the mechanics of a story — it's just something we experience emotionally.</p>
<p>Kurt Vonnegut, one of the greatest storytellers of all time, turned the fuzzy, hard-to-quantify concept of story arcs into a science. In his short (and hilarious) <a href="https://youtu.be/oP3c1h8v2ZQ?ref=content.strategyofsecurity.com">lecture</a> on the Shapes of Stories¹, he defined several of the most common patterns great stories follow.</p>
<p>One specific type of arc keeps churning out hit after hit. It's called the "Cinderella story." Here's what it looks like:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/Cinderella-Story-Arc.png" class="kg-image" alt="" loading="lazy" width="830" height="528" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/03/Cinderella-Story-Arc.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/Cinderella-Story-Arc.png 830w" sizes="(min-width: 720px) 720px"></figure><p>Want to see something wild?</p>
<p>The chart of Okta's stock price from its IPO in 2017 through today follows almost exactly the same arc:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/Okta-s-Cinderella-Story-Arc.png" class="kg-image" alt="" loading="lazy" width="830" height="528" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/03/Okta-s-Cinderella-Story-Arc.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/Okta-s-Cinderella-Story-Arc.png 830w" sizes="(min-width: 720px) 720px"></figure><p>I kid you not. It's uncanny.</p>
<p>The comparison is a metaphor, of course — but Okta's narrative fits the story arc in a remarkable way.</p>
<h2 id="from-ill-fortune-to-cybersecuritys-debutante-ball">From ill-fortune to cybersecurity's debutante ball</h2>
<p>Okta couldn't have been started under worse circumstances.</p>
<p>In 2008, Todd McKinnon was a mid-30s, up-and-coming exec at Salesforce with a baby daughter and recent Type 1 diabetes diagnoses.  The economy was in a free fall.</p>
<p>Financial stability, family, and health were all working against him. He was barely able to convince his wife it was a good idea to start a company.</p>
<p>The company started out as Saasure, a network monitoring product. It didn't get traction. The founders quickly pivoted to cloud identity management and changed the name to Okta.</p>
<p>Okta's cloud access management product steadily grew beyond everyone's wildest expectations. The fairy godmothers at Andreessen Horowitz and Sequoia bestowed a total of $228 million in venture capital upon the company. Okta went public in 2017 at a $1.5 billion valuation.</p>
<p>As a public company, Okta continually produced steady increases in growth and valuation, peaking at an enterprise value of $41.29 billion in September 2021. It was one of the most valuable cybersecurity companies in the world.</p>
<p>That's the quick version of how Okta went from an ill-fated beginning to become one of the darlings of the cybersecurity debutante ball.</p>
<p>The story <em>really</em> starts to get interesting when the clock strikes midnight.</p>
<h2 id="when-the-clock-strikes-midnight">When the clock strikes midnight</h2>
<p>Everything changed on March 22, 2022, when LAPSUS$ publicly disclosed it breached Okta through a third-party service provider.</p>
<p>The magic spell wore off. Their Teslas turned into pumpkins, Cotopaxi into rags. A glass Allbirds slipper was the only trace left behind.</p>
<p>The protagonist in Okta's real-life story is Todd McKinnon. He's not exactly in rags, but you'll never find a picture of a more exhausted CEO than this one — taken from an <a href="https://investor.okta.com/events/event-details/wolfe-research-march-madness-software-conference?ref=content.strategyofsecurity.com">interview</a> at a software industry conference the day after a breach:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/12/todd-mckinnon-march-23-2022.png" class="kg-image" alt="A tired-looking picture of Todd McKinnon" loading="lazy" width="2000" height="1250" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/12/todd-mckinnon-march-23-2022.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/12/todd-mckinnon-march-23-2022.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/12/todd-mckinnon-march-23-2022.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/12/todd-mckinnon-march-23-2022.png 2065w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Wolfe Research - March Madness Software Conference (2022)</span></figcaption></figure><p>We've all heard about the direct and indirect <a href="https://www.beyondidentity.com/blog/okta-breach-timeline-breaking-down-hacks?ref=content.strategyofsecurity.com">security incidents</a> and PR debacles since then: source code breaches, Rightway Healthcare, Oktapus, MGM, support case management...<em>okay, make it stop.</em></p>
<p>Right now, it feels like anything Okta does right gets overshadowed by something that's gone wrong.</p>
<p>Why? We're watching Okta's <em>"clock strikes midnight"</em> moment play out in real time.</p>
<p>They were just on top of the cybersecurity world, and now they're not. It's jarring. We're all on the edge of our seats, unsure of how the story is going to end.</p>
<p>What we're thinking and experiencing now is exactly how the arc of a Cinderella story goes. Something horrific happens. Things look dire. Nobody knows if the hero can recover this time.</p>
<p>Here's what happens after the princess vanishes from the ball and her glass slipper gets left behind.</p>
<h2 id="the-next-cinderella">The next Cinderella?</h2>
<p>In the movie Cinderella, the prince launches a massive quest to find her after she disappears. Everyone in town tries on the glass slipper to see if it fits. People like the stepsisters pull all kinds of nefarious stunts to jam their foot into the slipper.</p>
<p>This iconic scene is...<em>actually not so different</em> from the time since Okta's clock struck midnight.</p>
<p>There's an important lesson about competition here: when given the chance, a lot of people want to make the glass slipper fit and steal the throne.</p>
<p>Some competitors piled on with <em>"this wouldn't have happened if..."</em> and all kinds of questionable tactics to make Okta look bad and get customers to switch. It's unfortunate, but they probably deserved it.</p>
<p>Could Okta have done a better job with security? Of course.</p>
<p>Did their mistakes put thousands of customers at risk? Absolutely.</p>
<p>Was their initial PR and incident management lacking? #%@&amp; yes it was.</p>
<p>But not all security incidents are the same. Incidents happen all the time. They can also happen to anyone — even security companies. The "why" and "how" matter. Savvy security leaders know that.</p>
<p>Here's the reality: <em>the glass slipper isn't going to fit for most other identity companies.</em></p>
<p>A founder-led decacorn in its prime is not going to disappear overnight. Okta has used up a lot of karma points, but the collective damage from these incidents is far from the worst we've seen as an industry.</p>
<p>On a practical basis, it's not easy or fiscally responsible for most customers to rip out an identity platform like Okta once it's implemented. Identity platforms are incredibly sticky, especially when they're integrated with most of an organization's apps.</p>
<p>For a large enterprise, <em>"not easy"</em> means years spent migrating the integrations for hundreds or thousands of applications to the new identity platform. <em>"Not fiscally responsible"</em> means millions or tens of millions in capital expenses, including a big chunk for professional services.</p>
<p>Security leaders are disappointed and annoyed about this repeated string of incidents involving Okta. But frustration is not enough for most of them to cut ties and move on — especially when security budgets are getting tight and dollars are better spent other ways.</p>
<p>Sure, they'll throw a fit and ask for discounts. They'll renew their contracts for shorter periods of time. All kinds of political stunts can happen, but very little of the noise is translating to actual customer churn.</p>
<p>Let's talk about why a few insightful financial metrics mean the glass slipper still fits.</p>
<h2 id="the-glass-slipper-still-fits">The glass slipper still fits</h2>
<p>The evidence doesn't support mass defection of customers or the major implosion some people still believe is imminent.</p>
<p>How do we know customers aren't churning? Okta reports customer data in their quarterly earnings reports.</p>
<p>Their literal count of customers² isn't dropping:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/12/okta-total-customers-fy24-q3.png" class="kg-image" alt="Increasing trend of Okta's total customer growth" loading="lazy" width="2000" height="1127" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/12/okta-total-customers-fy24-q3.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/12/okta-total-customers-fy24-q3.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/12/okta-total-customers-fy24-q3.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/12/okta-total-customers-fy24-q3.png 2300w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Okta Q3 FY24 Investor Presentation</span></figcaption></figure><p>Nor are the big, $100k+ accounts people were saying would leave:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/12/okta-100k-customers-fy24-q3.png" class="kg-image" alt="Increasing trend of Okta's $100k+ customer growth" loading="lazy" width="2000" height="1123" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/12/okta-100k-customers-fy24-q3.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/12/okta-100k-customers-fy24-q3.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/12/okta-100k-customers-fy24-q3.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/12/okta-100k-customers-fy24-q3.png 2304w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Okta Q3 FY24 Investor Presentation</span></figcaption></figure><p>Okta's customers are not running for the hills. In fact, they have 435 <em>more</em> $100k+ customers since the first breach.</p>
<p>Revenue isn't crashing, either. Their revenue has grown 25.26% year-over-year.³ The CAGR from FY21 (before the first breach) through the end of FY24 is 39%:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/12/okta-5yr-cagr-fy24-q3.png" class="kg-image" alt="Increasing trend of Okta's revenue growth and growth rate" loading="lazy" width="2000" height="1376" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/12/okta-5yr-cagr-fy24-q3.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/12/okta-5yr-cagr-fy24-q3.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/12/okta-5yr-cagr-fy24-q3.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/12/okta-5yr-cagr-fy24-q3.png 2040w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Okta Q3 FY24 Investor Presentation</span></figcaption></figure><p>By the way, they're more profitable than ever now — scheduled to clock in at a 12% (non-GAAP) operating margin at the end of this fiscal year.</p>
<p>They're also still a leader in the <a href="https://www.okta.com/resources/gartner-magic-quadrant-access-management/?ref=content.strategyofsecurity.com">2023 Gartner Magic Quadrant for Access Management</a> for, oh...just the <em>seventh straight time</em>. They're not the <em>clear</em> leader this time around — mainly because of Microsoft's investments in identity and Thoma Bravo's rejuvenation of Ping and ForgeRock, not Okta's series of unfortunate events.</p>
<p>Growing this fast as a ~$2 billion company under <em>any</em> circumstances is incredibly difficult. Okta has done it in the face of a bad macroeconomic environment and a level of noise and scrutiny no cybersecurity company other than SolarWinds has ever faced.</p>
<p>Analyst ratings and financial metrics aren't an adequate measure for the pain and frustration Okta's customers and security practitioners feel because of the security incidents. But, they're correlated.</p>
<p>If customers were dumping Okta to buy other identity products, rankings, revenue, and retention metrics would be tanking by now. None of them have.</p>
<p>I know things still seem dire right now, but Okta's story can have a happy ending. It won't be easy, but it's possible — just like all good Cinderella stories.</p>
<h2 id="oktas-story-can-still-have-a-happy-ending">Okta's story can still have a happy ending</h2>
<p>At this point, a happy ending for Okta is definitely not destiny. It's still possible <em>if</em> they do all the right things.</p>
<p>The biggest concern CISOs and investors both have is: <em>Are there going to be more security incidents?</em></p>
<p>Maybe. The "O" in Okta might as well be a giant bullseye for attackers right now. The fairy godmother isn't going to rescue them. It's going to take massive effort to change the narrative.</p>
<p>There's an <a href="https://thewritepractice.com/story-arcs/?ref=content.strategyofsecurity.com">Icarus story arc</a>, too. It's a moral lesson about the dangers of hubris and overambition.</p>
<p>A kid escapes capture by building wings made of wax, gets overconfident and flies too close to the sun, then drowns after the wings melt.</p>
<p>What Is Okta doing to make sure their story has a happy ending? A few things.</p>
<p>They need to handle any incidents they do have perfectly. They're out of karma. CISOs are going to move from mild frustration to mutiny if Okta can't figure this out fast, so they've been <a href="https://trust.okta.com/?ref=content.strategyofsecurity.com">working on it</a>.</p>
<p>Then, go on offense: make security a clear priority and address the high-impact issues. This is exactly what Project Bedrock (the internal project name) is about. 90 days of focus isn't going to fix everything, but it's a nice start.</p>
<p>Right now, Okta doesn't need more products. It needs more security.</p>
<p>If Okta can fix its security, both in reality and perception, they're going to be fine.</p>
<p><em>Fixing security is fixing growth.</em></p>
<p>The noise will fade. The spotlight will turn elsewhere. Customers will notice the progress.</p>
<p>Keeping the madness at bay is the best growth strategy for Okta right now.</p>
<p>Why? Okta has <em>plentyyyyyyy</em> of products with growth potential in the pipeline. Its Identity Governance and Privileged Access Management (PAM) products have both hit General Availability (GA). Early momentum is promising — especially in a world where three of their biggest competitors were taken private and other legacy products fade into the oblivion of data centers gone by.</p>
<p>The stakes couldn't be higher. If Okta lives up to its Cinderella story, they're cemented on the Mount Rushmore of winners in the identity market.</p>
<p>Ironically, it's security that will dictate Okta's future: will it be a tale of Icarus's fall or Cinderella's fortune?</p>
<hr><h3 id="footnotes">Footnotes</h3>
<p>¹Seriously, you should watch Vonnegut's lecture. It's <em>pithy</em>. Totally hilarious. I promise it will be the best four minutes of your day.</p>
<p>²The count of total customers can get a bit muddled because of how Auth0's product-led growth (PLG) model works. Without knowing the breakdown, you could speculate Okta's core workforce platform is churning, but Auth0 nets it out by adding super tiny customers to the total count. It's possible, but this scenario seems unlikely because of Okta's strong $100k+ account growth and Net Revenue Retention (NRR) metrics post-breach.</p>
<p>³On a TTM basis as of Okta's Q3 FY24 earnings report. Put differently, they're still growing a lot — long after the first breach was disclosed.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/header-oktas-cinderella-story-2-1.png"/>
        </item>
        <item>
            <title><![CDATA[The Endless Pursuit of the Ecosystem]]></title>
            <link>https://strategyofsecurity.com/the-endless-pursuit-of-the-ecosystem/</link>
            <guid>65735bceca597f00019ea6cf</guid>
            <pubDate>Fri, 08 Dec 2023 18:23:32 GMT</pubDate>
            <description><![CDATA[It isn't possible to fully understand the cybersecurity ecosystem, but that's the only motivation you need to keep trying.]]></description>
            <content:encoded><![CDATA[<p><em>"I'll just make a few quick changes to the ecosystem this week. Seems like a nice way to come back from my time off over Thanksgiving."</em></p>
<p>—Me, a more naive person two weeks ago than I am today.</p>
<hr><p>What started as "a few quick changes" turned into a long and intellectually grueling two-week project.</p>
<p>The result was the biggest update I've made to Strategy of Security's <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/">cybersecurity ecosystem</a> mapping since I first published it over two years ago. A <em>lot</em> has changed since then, including both the industry and my own understanding of it.</p>
<p>This isn't your normal Strategy of Security article. It's a few things: an announcement about the updates, some observations and insights I had along the way, and an audible sigh of relief for finally being done (for now...).</p>
<p>One thing I want to be clear about: this is not an attempt to simplify anything about the industry — it's the opposite. My goal is to define the most comprehensive and accurate taxonomy for the business of cybersecurity as I can. The topic is complex, nuanced, and ...well, <em>so is this mapping.</em></p>
<p>I think about the famous line from George Box a lot: <em>"all models are wrong, some are useful."</em> It's definitely true of this project. Only now, it's a little less wrong and a little more useful.</p>
<p>Let's talk about a few things I realized from obsessing about the cybersecurity ecosystem every waking hour for two straight weeks.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/12/ecosystem-review.png" class="kg-image" alt="Marked up pen and paper review of the cybersecurity ecosystem mapping." loading="lazy" width="1164" height="848" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/12/ecosystem-review.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/12/ecosystem-review.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/12/ecosystem-review.png 1164w" sizes="(min-width: 720px) 720px"></figure><hr><h2 id="the-big-estates-are-clear-and-more-are-on-the-way">The big estates are clear, and more are on the way</h2>
<p>I've been on a kick about cybersecurity estates for most of the past year. My irrational enthusiasm about this idea has now fully made its way into this cybersecurity ecosystem mapping.</p>
<p>The graphic is now reorganized around the four largest estates — Application Security, Identity Security, Infrastructure Security, and Security Operations. I felt good about this idea when I wrote my <a href="https://strategyofsecurity.com/p/the-cybersecurity-revolutions/">thoughts on cybersecurity estates</a> a few weeks ago. I feel even better about it now.</p>
<p>Cybersecurity's four largest estates are clear. They're supported by both intuition and data. Most of cybersecurity's public companies and invested capital live there. Estates are also the epicenter of strategic activity in cybersecurity, and sometimes all of tech.</p>
<p>My mind really got bent when I realized how many other sectors are so obviously on their way to becoming massive estates. They may not have clear winners or public companies yet, but you can feel the momentum and see multiple companies on a sky high trajectory.</p>
<p>Let's take Governance, Risk, and Compliance as an example. It's easy to sleep on this sector because it <a href="https://www.npr.org/2023/12/04/1216950808/rizz-oxford-word-of-the-year-swiftie?ref=content.strategyofsecurity.com#:~:text=via%20Getty%20Images-,Rizz%20is%20the%20word%20of%20year%20for%202023%2C%20according%20to,in%20the%201978%20film%20Grease.&text=Sorry%2C%20Swifties.">has no rizz</a>. But a savvy observer sees the appeal: new <a href="https://www.sec.gov/rules/final/2023/33-11216.pdf?ref=content.strategyofsecurity.com">SEC cybersecurity disclosure</a> rules, emerging cybersecurity and privacy regulations in the U.S. and Europe, <a href="https://www.sec.gov/news/press-release/2023-227?ref=content.strategyofsecurity.com">CISO fraud charges</a>, and more are making this market...<em>surprisingly popular</em>.</p>
<p>You could also make a case that Consumer Security and Privacy, Fraud and Transaction Security, Data Security, and Services are already estates. Each has one or more public companies, plus multiple startups valued at $1 billion or more. More importantly, these companies <em>need</em> to exist — they're solving some of the gnarliest problems in our industry.</p>
<p>The cybersecurity ecosystem is crowded, but it's still big enough for more estates. A rare few companies are even starting to transcend estates. Let's talk about that next.</p>
<h2 id="a-few-companies-are-transcending-estates">A few companies are transcending estates</h2>
<p>Here's a question I didn't consider until this year: <em>"What happens when a company has billions of dollars in revenue and operates across multiple estates?"</em></p>
<p>We're at a point now where this question isn't just a thought experiment — it's a reality. Several companies have industry-leading products in multiple estates.</p>
<p>Big tech <a href="https://strategyofsecurity.com/p/an-intro-to-consolidation-and-aggregation-in-cybersecurity/">aggregators</a> like Microsoft, Cisco, and Alphabet (Google Cloud) all have multi-billion-dollar cybersecurity businesses. They make high-stakes strategic maneuvers, like <a href="https://strategyofsecurity.com/p/ciscos-cybersecurity-shopping-spree-part-2/">buying companies for $28 billion</a>. They're so big that even the biggest pure cybersecurity companies are doing <a href="https://www.crowdstrike.com/press-releases/crowdstrike-first-cybersecurity-isv-to-exceed-1-billion-in-aws-marketplace-sales/?ref=content.strategyofsecurity.com">$1 billion in revenue</a> through them.</p>
<p>Pure cybersecurity companies like <a href="https://strategyofsecurity.com/p/crowdstrike-and-the-bundling-of-cybersecurity">CrowdStrike</a> and <a href="https://strategyofsecurity.com/p/the-audacious-future-of-palo-alto-networks/">Palo Alto Networks</a> are combining multiple categories into platforms. They're generating billions in revenue and growing revenue at 20% or more. And investors have big expectations for the future — the two companies are currently valued at a combined total of $151 billion.</p>
<p>We're in an era of cybersecurity juggernauts. Once you understand how today's juggernauts are shaping the ecosystem, you start to notice the juggernauts of tomorrow.</p>
<h2 id="the-juggernauts-of-tomorrow-are-converging-smaller-markets">The juggernauts of tomorrow are converging smaller markets</h2>
<p>After the concepts of aggregation and platformization click in your mind, you can see little pockets of convergence happening everywhere. The juggernauts of tomorrow are building mini-platforms, combining old and new markets to own a valuable slice of the industry.</p>
<p>Application Security Posture Management (ASPM) is a good example. Companies are converging several types of application security testing tools (and adding a real-time component) to create end-to-end Application Security Testing platforms.</p>
<p>We're at a point where convergence is happening on top of convergence. Cloud-Native Application Protection Platforms (CNAPP) are really going for it — they're combining the core parts of the Cloud Security market (CSPM, CIEM, CWP, etc.) and taking over AppSec, too.</p>
<p>Companies who succeed at converging smaller markets to create bigger ones are going to enter the juggernaut territory of CrowdStrike and Palo Alto Networks.</p>
<p>This brings us to the most important lesson of all...</p>
<h2 id="you-never-have-the-cybersecurity-ecosystem-totally-figured-out">You never have the cybersecurity ecosystem totally figured out</h2>
<p>I'll admit it: I was feeling <em>prettyyyyyy good</em> about my understanding of the ecosystem when I started these updates two weeks ago.</p>
<p>Now, in the last few words of a long and humbling process, I'm viscerally aware that none of us have the cybersecurity ecosystem totally figured out.</p>
<p>I say this with complete gratitude and excitement about the future. It's energizing to be part of an industry so dynamic. I <em>like</em> not having it all figured out.</p>
<p>Fully understanding cybersecurity is an ideal, not a realistic achievement. But it's the only motivation you need to keep trying.</p>
<hr><p><em>Thank you to <a href="https://www.linkedin.com/in/guptanipun/?ref=content.strategyofsecurity.com">Nipun Gupta</a> for helping me sort out the current application security landscape.</em></p>
]]></content:encoded>
            <category>Ecosystem</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/header-endless-pursuit.png"/>
        </item>
        <item>
            <title><![CDATA[Cisco's Cybersecurity Shopping Spree (Part 2)]]></title>
            <link>https://strategyofsecurity.com/ciscos-cybersecurity-shopping-spree-part-2/</link>
            <guid>65566ffdbc851b000142d0a5</guid>
            <pubDate>Thu, 16 Nov 2023 19:56:11 GMT</pubDate>
            <description><![CDATA[What the Alaska Purchase and Seward's Folly can teach us about the strategy and upside for Cisco's acquisition of Splunk.]]></description>
            <content:encoded><![CDATA[<p><em>Note: This article is Part 2 of a brief series on Cisco's cybersecurity strategy. You can read Part 1 <a href="https://strategyofsecurity.com/p/ciscos-cybersecurity-shopping-spree-part-1/">here</a>. It's not required reading for this article.</em></p>
<hr>
<p>People thought the best land purchase of all time was the worst land purchase of all time for more than 20 years.</p>
<p>The United States, led by Secretary of State William Seward, bought Alaska from Russia for $7.2 million in 1867. Adjusted for inflation, the acquisition price was about $725 million in today's dollars. That's a steal. Nobody cared in 1867.</p>
<p>Both the media and the public mocked the acquisition. The New York Herald called Alaska a "sucked orange," meaning Russia had sucked the value from the land and sold the U.S. a frozen wasteland. The deal was nicknamed "Seward's Folly," a personal criticism against William Seward for leading what everyone thought was a foolish purchase.</p>
<p>William Seward passed away in 1872. Seward's Folly followed him to the grave. He never knew about the gold discovered at Juneau in 1880. He never knew about the oil discovered at Prudhoe Bay in 1968. He certainly didn't know his now legendary foresight was vindicated by economic benefits of <em>a trillion dollars</em> and counting.</p>
<p>What can the Alaska Purchase teach us about the strategy and upside for Cisco's acquisition of Splunk? A lot more than you'd think.</p>
<p>Let me tell you how Russia sold <em>a literal gold mine</em>.¹</p>
<h2 id="motives-for-selling-fur-trading-and-siem-are-unprofitable-businesses">Motives for selling: fur trading and SIEM are unprofitable businesses</h2>
<p>Russia wanted to get rid of Alaska because the land was a pain to maintain and defend from the expanding British Empire. They were also broke and needed the money.</p>
<p>The fur trade was paying the bills. It was an okay business, but it cost them tons of money and military resources to operate. Alaska seemed like a giant, frozen, bottomless drain of cash.</p>
<p>The near-term pain of making their Alaska problem go away motivated Russia to sell. The deal with the United States checked too many strategic boxes to refuse. Decent cash infusion? Check. Stop fending off the British Empire? Check. Sell off a marginally profitable fur business? Check.</p>
<p>Is this story starting to sound familiar? It should.</p>
<p>Back in 2016, SIEM looked like a good market for Splunk. Here's the Gartner Magic Quadrant for SIEM from 2016:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/11/gartner-mq-siem-2016.jpeg" class="kg-image" alt="Gartner Magic Quadrant for SIEM (2016)" loading="lazy" width="2000" height="2087" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/11/gartner-mq-siem-2016.jpeg 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/11/gartner-mq-siem-2016.jpeg 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/11/gartner-mq-siem-2016.jpeg 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/11/gartner-mq-siem-2016.jpeg 2000w" sizes="(min-width: 720px) 720px"></figure><p>Splunk's position in the "Leaders" quadrant was a cozy spot on the couch in front of the fireplace at a mansion in Vail. Splunk and LogRhythm were the up-and-comers, just out there chilling in the house enterprise tech players built. IBM, HPE, and Intel owned the mansion, but there was plenty of room for everyone.</p>
<p>Then, things got crowded. Microsoft entered the picture. Seven other startups raised $2.4 billion in capital.² Splunk and LogRhythm weren't the only up-and-comers anymore.</p>
<p>The three most recent Gartner Magic Quadrants for SIEM look a whole lot different than 2016:</p>
<figure class="kg-card kg-image-card kg-width-wide"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/11/gartner-mq-siem-3-yr-trend.png" class="kg-image" alt="Gartner Magic Quadrants for SIEM (2020-2022)" loading="lazy" width="1813" height="572" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/11/gartner-mq-siem-3-yr-trend.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/11/gartner-mq-siem-3-yr-trend.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/11/gartner-mq-siem-3-yr-trend.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/11/gartner-mq-siem-3-yr-trend.png 1813w" sizes="(min-width: 1200px) 1200px"></figure><p>Competition arrived, and the SIEM market became a pain to maintain and defend. Financially, the Splunk of the 2020s was a wildly unprofitable business. This chart compares Splunk's revenue and profitability (net income) over its entire time as a public company:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/11/splunk-revenue-netincome-chart-comparison.png" class="kg-image" alt="Splunk revenue and net income comparison." loading="lazy" width="1300" height="450" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/11/splunk-revenue-netincome-chart-comparison.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/11/splunk-revenue-netincome-chart-comparison.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/11/splunk-revenue-netincome-chart-comparison.png 1300w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Seeking Alpha</span></figcaption></figure><p>It tells you everything you need to know. Splunk has never (yep, <em>never</em>) had a profitable quarter. In January 2022, they spent $4 billion to earn $2.67 billion. Put differently, they had to spend $1.50 to earn $1. You don't need an MBA to know that spells trouble, capital T.</p>
<p>Cisco kicked off the beginning of the end with a failed <a href="https://www.wsj.com/articles/cisco-made-20-billion-plus-takeover-offer-for-splunk-11644622277?ref=content.strategyofsecurity.com">$20 billion plus acquisition offer</a> in February 2022.</p>
<p>Private equity entered the room shortly after. Silver Lake <a href="https://www.crn.com/slide-shows/applications-os/5-things-to-know-about-silver-lake-s-1b-investment-in-splunk/1?ref=content.strategyofsecurity.com">invested $1 billion</a> in June 2022, "...eager to work with [Splunk CEO Doug Merritt] and his team to support Splunk’s next phase of growth."</p>
<p>Doug Merritt <a href="https://www.crn.com/news/security/splunk-ceo-doug-merritt-exits-after-1b-silver-lake-investment?itc=refresh&ref=content.strategyofsecurity.com">resigned</a> five months later.</p>
<p>Pile on even more competition and the makings of a paradigm shift from SIEM towards <a href="https://ventureinsecurity.net/p/security-is-about-data-how-different?ref=content.strategyofsecurity.com">security data lakes</a>, and Splunk's situation starts looking a lot like the frozen wasteland of Alaska in 1867.</p>
<p>Could Splunk have waited things out and kept competing? Sure. This wasn't a fire sale. But, like Russia³ and Alaska, the deal with Cisco checked too many strategic boxes to refuse. Decent return for shareholders? Check. Stop fending off well-capitalized competitors? Check. Sell off a marginally profitable SIEM business? Check.</p>
<p>Alleviating near-term pain often motivates action more than the drudgery of waiting things out for long-term benefits that may never come. This is true in territorial expansion, in cybersecurity, and in your own life.</p>
<p>Russia was happy to sell 665,384 frozen square miles of land and an unprofitable fur trading business for $7.2 million. Splunk was happy to sell $4.1 billion of ARR and an unprofitable SIEM business for $28 billion. They both just needed to make the pain go away.</p>
<p>Next, let me tell you how a directionally correct strategy and an insatiable hunger for expansion led the United States to make the purchase.</p>
<h2 id="motives-for-buying-american-expansionism-and-predictable-revenue-growth">Motives for buying: American expansionism and predictable revenue growth</h2>
<p>The United States didn't know it was buying a literal gold mine, either. William Seward had a directionally correct hunch about resources (<em>hand-wavey gesture... somewhere</em>). More importantly, he had an obsession with the idea of American expansionism.</p>
<p>By 1867, the United States was already a prolific dealmaker. The Alaska Purchase was the country's seventh major territorial expansion. Back then, America valued expansionism like many of today's investors value growth — more is always better.</p>
<p>If you look at expansionism as the main strategic driver, the Alaska Purchase had very little downside risk for the United States. More land, same continent, decent price, and maybe some resources other than fur. A true "All Weather" strategy. Ray Dalio sure would be proud.</p>
<p>The acquisition of Splunk by Cisco and CEO Chuck Robbins is a similar story. The news was initially met with shock about the price tag, questions about Cisco's ability to execute, and mixed reviews about its potential.</p>
<p>Cisco has been <a href="https://www.futuriom.com/articles/news/a-deep-dive-into-ciscos-growth-challenges/2017/08?ref=content.strategyofsecurity.com">widely</a> <a href="https://www.ineteconomics.org/perspectives/blog/losing-out-in-critical-technologies-cisco-systems-and-financialization?ref=content.strategyofsecurity.com">criticized</a> for years about low growth and declining innovation. The accusation of <em>"The destructive and illogical ideology that...a company should be run to 'maximize shareholder value' continues to cripple the United States..."</em> is an uppercut to the jaw of Cisco's leadership team.</p>
<p>Splunk was a solid acquisition for Cisco based on financial metrics alone. The $28 billion acquisition price was a relatively pedestrian 7x multiple on Splunk's projected revenue. Buy-side investment bankers everywhere smiled with joy.</p>
<p>Leaders from both companies <a href="https://www.securitysystemsnews.com/article/cisco-to-acquire-splunk?ref=content.strategyofsecurity.com#:~:text=%E2%80%9CUniting%20with%20Cisco%20represents%20the,our%20shareholders%2C%E2%80%9D%20said%20Steele.">projected</a> the deal to be cash-flow positive in the first year. They wasted no time making good on that promise. Splunk <a href="https://www.inforisktoday.com/splunk-lays-off-another-7-workers-amid-purchase-by-cisco-a-23462?ref=content.strategyofsecurity.com">laid off 7% of its workforce</a> a month after the acquisition was announced.</p>
<p>Most importantly for Cisco, Splunk adds $4 billion of smooth, buttery, and predictable ARR to its security business. When you're a 38-year-old company with $57 billion of revenue, boring ol' predictable growth is a central part of your strategy. Nobody is calling this "Robbins' Folly."</p>
<p><em>But wait. Predictable revenue growth surely isn't what the life of a big company is all about, right?</em></p>
<p>Here's how new technology can turn an average investment into an iconic one.</p>
<h2 id="sometimes-you-get-lucky-gold-oil-and-artificial-intelligence">Sometimes, you get lucky: gold, oil, and artificial intelligence</h2>
<p>The potential upside of a deal isn't always obvious right away. This story has repeated itself throughout the history of tech.</p>
<p>Microsoft and Forethought had no clue its Project Odyssey would turn into Excel, the app that <a href="https://www.notboring.co/p/excel-never-dies?ref=content.strategyofsecurity.com">never dies</a>.</p>
<p>Google and YouTube had no clue that traditional media was on the brink of <a href="https://stratechery.com/2017/the-great-unbundling/?ref=content.strategyofsecurity.com">The Great Unbundling</a>.</p>
<p>Sequoia and WhatsApp had no clue the app was going to become the de facto SMS protocol for billions of international users.</p>
<p>Likewise, Russia and the United States had no clue about the gold and oil buried beneath the frozen tundra in Alaska.</p>
<p>So the important question is: <em>what changed?</em></p>
<p>Technology.</p>
<p>Technologies for finding and extracting gold and oil were basically non-existent when the Alaska Purchase happened. Russia didn't know they were selling a gold mine because they couldn't find it. Simple as that.</p>
<p>The discovery of oil at Prudhoe Bay happened because of major advancements in tech. It took 100 years and a slew of breakthroughs in geological surveying, seismic testing, exploratory drilling to <em>finally</em> discover one of the largest oil fields in North America. On top of all that, it took an 800-mile pipeline to actually use it.</p>
<p>You can rag on Russia all you want for selling a gold mine. The reality is there's no way they could have found it in 1867. The technology just wasn't there yet.</p>
<p>Splunk could be the Alaska Purchase of tech acquisitions. Why?</p>
<p>Artificial intelligence. Specifically, <em>how</em> artificial intelligence gets applied to the security problems we've been struggling with for a long time.</p>
<p>Security Operations makes up a giant subset of the problems. It's one of cybersecurity's <a href="https://strategyofsecurity.com/p/the-cybersecurity-revolutions/">largest estates</a>. The company that develops the best AI and ends problems like alert fatigue, SOC analyst burnout, long MTTD/MTTR cycles, and (<em>just maybe</em>) the holy grail of reducing breaches is going to get paid.</p>
<p><a href="https://strategyofsecurity.com/p/the-audacious-future-of-palo-alto-networks/">Palo Alto Networks</a> and others are working towards this audacious future. But Cisco's acquisition of Splunk might be the savviest strategic move yet.</p>
<p>When you’re building AI models, one of the only factors that matters is how much high-quality data you can run through the algorithm to train it. Training AI to solve security problems for you is a whole different ballgame than building products and storing security logs for customers to analyze themselves.</p>
<p>In the context of AI, Splunk is uniquely valuable. They have access to more operational security data than just about anybody, with 790 enterprise customers paying over $1 million in annual subscription fees.⁴ Customers add petabytes of data to Splunk every year. The total amount of data stored on their platform is probably into the exabytes. Let's just bluntly summarize by saying Splunk has a <em>$%&amp;#-load</em> of data.</p>
<p>AI completely reframes Splunk’s unprofitable business model because its upside is so high. Charging a pile of money to store SIEM data was <a href="https://x.com/FrankMcG/status/1651387295700746242?s=20&ref=content.strategyofsecurity.com">expensive</a> for customers and unprofitable for Splunk. Taking a loss on the cost of storage and using the data to train AI models looks like a bargain for Cisco.</p>
<p>Buying access to exabytes of security data is like discovering oil at Prudhoe Bay. If Cisco's hunch about Splunk’s value to AI is right, it completely validates the purchase and changes the trajectory of the company forever.</p>
<p>Like William Seward and the Alaska Purchase, we may not know the real outcome of Cisco and Splunk for many years. Part of Cisco’s strategy is being able to wait long enough to find out. Sometimes, you get lucky.</p>
<hr><h3 id="footnotes">Footnotes</h3>
<p>¹Technically, Russia sold a gold mine <em>and</em> an oil field, but this is a metaphor!</p>
<p>²According to Crunchbase data. This stat only includes startups listed on Gartner's Magic Quadrant. Total investments in SIEM companies who <em>didn't</em> make the quadrant raises the amount even higher.</p>
<p>³Saying this out loud so there is no ambiguity: I categorically condemn the current Russian administration's attacks on Ukraine and its behavior towards the rest of the world. Using the Alaska Purchase and the Russia of 1867 as a metaphor for this story is not meant to make or imply a connection or parallel between Splunk and Russia today.</p>
<p>⁴As of its <a href="https://investors.splunk.com/static-files/50a54b68-0228-4d6e-bf01-b1f3bc624b45?ref=content.strategyofsecurity.com">Q4 2023 earnings report</a>.</p>
]]></content:encoded>
            <category>M&amp;A</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/header-cisco-shopping-spree-part-2.png"/>
        </item>
        <item>
            <title><![CDATA[The Cybersecurity Revolutions]]></title>
            <link>https://strategyofsecurity.com/the-cybersecurity-revolutions/</link>
            <guid>654d070ff407be0001904fbb</guid>
            <pubDate>Thu, 09 Nov 2023 16:38:18 GMT</pubDate>
            <description><![CDATA[Rak Garg is the Oracle who gave us cybersecurity estates. Take the red pill, bend the spoon, and break free from the simulation.]]></description>
            <content:encoded><![CDATA[<p>Rak Garg wrote <a href="https://rakgarg.substack.com/p/securitys-fifth-estate-predictions?ref=content.strategyofsecurity.com">Security's Fifth Estate: Predictions for 2023</a> nine months ago, and I can't stop thinking about it. I'm not kidding — it probably crosses my mind every day.</p>
<p>Here's the concept that changes everything:</p>
<blockquote>
<p>Historically, there have been four big categories in security: cloud (evolving from networks prior), identity, email, and endpoint. In every generation, each of these categories has supported at least one really big winner.</p>
</blockquote>
<p>I <em>looooooooooove</em> the idea of "estates." I've spent <a href="https://strategyofsecurity.com/p/mapping-the-cybersecurity-ecosystem/">lots</a> and <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem-mapping-updates-april-2022/">lots</a> of time studying the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/">cybersecurity ecosystem</a> and all the (often contorted) ways people try to classify it. Thinking about major industry sectors as estates has revolutionized the way I think about the entire ecosystem.</p>
<p>Why? Every time I think about this wacky yet magnificent industry we've created, my head spins. Cybersecurity is <em>@#$%'ing complicated</em>. Rak's cybersecurity estates are the perfect metaphor to make it feel manageable again.</p>
<p>Why am I so wound up about this? Understanding cybersecurity's estates is a superpower in your thinking about the industry. Remember the <a href="https://youtu.be/ODmhPsgqGgQ?feature=shared&ref=content.strategyofsecurity.com">fight scene</a> from The Matrix where Neo dances around the bullets in slow motion? It's like that... <em>well, except we're doing spreadsheets and Zoom calls here.</em></p>
<p>Don't get me wrong — I love the allure of a deep dive. But strategy is an art form that requires a broader view. It's like navigating between the clarity and precision of Neo's bullet-dodging and the vast reality of The Matrix itself. You see the industry in a completely different way by knowing when to plunge into the rabbit hole of specifics and when to rise above and see the world for the simulated construct it is.</p>
<p>Rak's piece was written from his well-refined intuition as an investor. He gave us insights about cybersecurity estates and which ones might be coming next. He is <a href="https://w.wiki/86ag?ref=content.strategyofsecurity.com">the Oracle.</a></p>
<p>With this article, I'm channeling my inner Morpheus — offering a red pill to anyone ready to translate the enigmatic code of the cybersecurity industry into a clear vision of how it works.</p>
<p>After spending too much plugged into The Matrix, watching the stream of green characters fly by my screen (okay, I was just analyzing data in a spreadsheet), I realized something I'd never thought about before: <em>cybersecurity industry leaders are converging around estates, and a few are transcending them.</em></p>
<p>Take the red pill, and I'll show you how deep the rabbit hole goes.</p>
<h2 id="how-to-think-about-cybersecuritys-estates">How to think about cybersecurity's estates</h2>
<p>The concept of cybersecurity estates is valuable because it stops your head from spinning. I feel like Neo when he <a href="https://movies.stackexchange.com/questions/97436/what-does-cypher-mean-when-he-says-neo-is-gonna-pop?ref=content.strategyofsecurity.com">throws up</a> from the mental shock of learning about The Matrix. It's like I'm <a href="https://movies.stackexchange.com/questions/97436/what-does-cypher-mean-when-he-says-neo-is-gonna-pop?ref=content.strategyofsecurity.com">gonna pop</a>. The acronyms are nauseating.</p>
<p>Estates give you a mental model for simplifying all the complex jargon you hear every day. <em>ZTNA, IGA, EPM, GRC, SIEM, yada yada yada</em> — doesn't matter. Once you understand estates, you're in control of the simulation.</p>
<p>Don't get fixated on the exact definition of "estate." It's a metaphor. All it means is a bunch of similar companies in a sector of the industry... with one <em>super</em> important attribute: <em>"...supported at least one really big winner."</em></p>
<p>To me, <em>"one really big winner"</em> means an estate is large enough to support one or more public companies and some later-stage startups. A really big winner is The One — an anomaly in the system and a symbol of hope.</p>
<p>Ready to learn the truth about our cybersecurity estates? Let's go see the Oracle.</p>
<h2 id="our-current-estates-the-epicenter-of-strategic-activity">Our current estates: the epicenter of strategic activity</h2>
<p>Today, the cybersecurity industry has four estates: Infrastructure Security, Security Operations, Identity Security, and Application Security.</p>
<p><em>...Wait, what? So this means you don't agree with Rak's estates?!</em></p>
<p>I completely agree with him. I deviated by grouping network, endpoint, and email security into a broad "infrastructure" estate — but I definitely agree they're estates.</p>
<p>I also made the case for Security Operations as an estate, which is mainly a terminology difference from his Cloud Security estate. Sematics aside, the thinking here conceptually aligns with everything Rak said in his original piece.</p>
<p>Ready to plug in? In the iconic words of Cypher, <em>"Buckle your seatbelt, Dorothy, because Kansas is going bye-bye."</em></p>
<h3 id="infrastructure-security">Infrastructure Security</h3>
<p>Infrastructure Security has 34 companies valued at $1 billion or higher.¹ Eleven companies are public, including the likes of Cloudflare, CrowdStrike, Fortinet, Zscaler, and SentinelOne. It's the <a href="https://en.wikipedia.org/wiki/Skywalker_Ranch?ref=content.strategyofsecurity.com">Skywalker Ranch</a> of cybersecurity estates. Let's take a tour.</p>
<h6 id="endpoint-security">Endpoint Security</h6>
<p>If you asked most people to name the first cybersecurity estate that comes to mind, endpoint security is probably it. You could easily make the case for endpoint security being its own estate, as Rak did.</p>
<p>This sub-sector has five public companies — the highest concentration in any cybersecurity estate. That's not even counting tech giants like Microsoft, which sits atop Gartner's latest <a href="https://www.microsoft.com/en-us/security/blog/2023/03/02/microsoft-is-named-a-leader-in-the-2022-gartner-magic-quadrant-for-endpoint-protection-platforms/?ref=content.strategyofsecurity.com">Magic Quadrant</a> and holds the <a href="https://idcdocserv.com/US49349323?ref=content.strategyofsecurity.com">largest market share</a> in this sub-sector.</p>
<p>Endpoint security has also been around for an eternity. In aviation terms, it's like a bomber. Early endpoint security companies like McAfee, Symantec, and Trend Micro are the <a href="https://en.wikipedia.org/wiki/Boeing_B-52_Stratofortress?ref=content.strategyofsecurity.com">B-52 Stratofortress</a> bomber — they've been around for decades and are still widely used today.</p>
<p>Meanwhile, a new generation emerged and revolutionized the industry. CrowdStrike, SentinelOne, and Darktrace headline the modern endpoint security wave. They're the modern day <a href="https://en.wikipedia.org/wiki/Northrop_Grumman_B-2_Spirit?ref=content.strategyofsecurity.com">Stealth Bomber</a>.</p>
<p>With the emergence of XDR, these companies are leading the path to convergence between endpoint security and security operations.</p>
<h6 id="network-security">Network Security</h6>
<p>Network Security is going through a similar renaissance. Back in my old-school Cisco days, "network security" meant firewalls and access control lists. In 2023, Network Security and SASE are basically interchangeable.² And Network Security is back in vogue again.</p>
<p>This now-fashionable domain includes the likes of Palo Alto Networks, Fortinet, Zscaler, Cloudflare and Check Point. Their combined Enterprise Value (EV) exceeds $175 billion. And let's not forget about Cisco, a tech giant who <a href="https://strategyofsecurity.com/p/ciscos-cybersecurity-shopping-spree-part-1/">just got serious</a> about cybersecurity.</p>
<p>Private companies are also coming in hot. Network security also includes IPO pipeline candidates like Netskope, Illumio, and Cato Networks (fresh off its latest $238 million <a href="https://techcrunch.com/2023/09/19/cato-networks-valued-at-3b-lands-238m-ahead-of-its-anticipated-ipo/?ref=content.strategyofsecurity.com">financing round</a> at valuation over $3 billion).</p>
<p>Even more large companies are lurking in the shadows of private equity firms. Barracuda Networks, Forcepoint, Forescout, and others are all being retooled from their network security roots and expanded into massive infrastructure security platforms.</p>
<h6 id="email-security">Email Security</h6>
<p>Email Security is the estate that got away, at least for now. It used to feature two public companies until Proofpoint and Mimecast were taken private for $18 billion in total — two of the ten largest pure cybersecurity acquisitions in history.</p>
<p>Add two more venture-backed unicorns (Abnormal Security and Material Security) into the mix, and you've got a case for Email Security being its own estate.</p>
<p>Email isn't going away, so there's a good chance Email Security will rise from the ashes and reach estate status again soon.</p>
<h3 id="security-operations">Security Operations</h3>
<p>Security Operations is my (slightly Luddite) take on what Rak defined as Cloud Security. From a numbers standpoint, it's easily an estate with 24 companies valued at over $1 billion. That's second only to the mega-estate of Infrastructure Security.</p>
<p>Palo Alto Networks and its Cortex platform is the shining star of the Security Operations estate, with $1 billion in annual bookings and an astonishing $90 billion TAM estimate. Cisco also means business after spending $28 billion on Splunk (<em>just pocket change, right?!</em>). I'd put the mystical Palantir in the Security Operations estate as well.</p>
<p>Vulnerability Management also falls into the Security Operations estate, with three public companies (Rapid7, Tenable, and Qualys) all building towards becoming broad Security Operations platforms.</p>
<p>Security Operations is such a large estate that it's large enough to support public companies in smaller sub-sectors. Threat Intelligence is one example, with ZeroFox <a href="https://www.zerofox.com/press-release/zerofox-announces-plan-to-become-publicly-traded/?ref=content.strategyofsecurity.com">going public</a> via reverse merger in August 2022.</p>
<p>Kaseya, Axonius, Exabeam, and JupiterOne highlight a group of ten VC-backed companies valued at over $1 billion in this estate. It also includes a large set of PE-backed companies, including Sophos, Sumo Logic, Trellix, and others.</p>
<h3 id="identity-security">Identity Security</h3>
<p>Identity Security³ has been undergoing the biggest makeover of any estate in the past two years. At this point, it's like <a href="https://en.wikipedia.org/wiki/Agent_Smith?ref=content.strategyofsecurity.com">Agent Smith</a> in The Matrix — companies can take any form they need and magically transform from one person to another.</p>
<p>This sector was an obvious estate before <a href="https://strategyofsecurity.com/p/bravo-thoma-bravo">Thoma Bravo stepped in</a> and took three companies private. Okta and CyberArk (HashiCorp too, depending on how you classify them) remain, so Identity Security is undoubtedly still an estate.</p>
<p>Venture capital money has been pouring into this estate for the past five years. 1Password raised nearly $1 billion of total capital at a valuation of $6.8 billion. Transmit Security raised a $543 million Series A, the largest early-stage round in cybersecurity history.</p>
<p>Identity verification and password management are emerging markets within the estate. Similar to Security Operations, this estate might be large enough to support a handful of public companies in those sub-sectors.</p>
<h3 id="application-security">Application Security</h3>
<p>I agree with Rak on Application Security being the next big estate in cybersecurity. It might already be one.</p>
<p>Practitioners have long considered application security to be one of the most important parts of a security program. Web application attacks account for 25% of breaches analyzed in Verizon's <a href="https://www.verizon.com/business/resources/reports/dbir/?ref=content.strategyofsecurity.com">Data Breach Investigations Report (DBIR)</a>. In day-to-day cybersecurity, Application Security is an important domain.</p>
<p>In the business world, the only reason Application Security <em>wouldn't</em> be considered an estate is not having a pure-play Application Security company in public markets. <a href="https://www.synopsys.com/?ref=content.strategyofsecurity.com">Synopsys</a> does a lot of things, and Application Security is just one of them. But it still counts!</p>
<p>Snyk is still one of the top companies in <a href="https://strategyofsecurity.com/p/revisiting-cybersecuritys-2022-ipo-pipeline/">cybersecurity's IPO pipeline</a> (despite all the <a href="https://techcrunch.com/2022/12/12/snyk-scores-another-196m-as-valuation-drops-12-to-7-4b-valuation/?ref=content.strategyofsecurity.com">valuation drama</a>). They will almost definitely IPO when the timing is right. Veracode is on its way, too, and going public is a likely exit strategy for Thoma Bravo.</p>
<p>Application Security could be headed for convergence with Cloud Security if the CNAPP concept works out. However, it's still too early to say if two large, emerging sectors can combine their products in a coherent way.</p>
<h2 id="transcending-estates-platformization-and-the-rise-of-end-to-end-cybersecurity">Transcending estates: platformization and the rise of end-to-end cybersecurity</h2>
<p>A select group of companies is reaching a point of transcending estates. If this is The Matrix, they've realized the truth: <em>there is no spoon.</em></p>
<p>The limitations of the cybersecurty industry — taxonomy, scale, growth, and ambition — are only mental constructs. By understanding the rules are bendable, these companies are going to do the impossible.</p>
<p>We're entering an era of cybersecurity platforms that span across multiple cybersecurity estates, just like Neo flying from building to building. Large cybersecurity and tech companies are augmenting their core estates with products in smaller sub-sectors, and even <em>entire estates</em>. This strategy has so much momentum that Nikesh Arora, CEO of Palo Alto Networks, coined a verb: platformization.</p>
<p>It's now possible for companies to win at <em>multiple</em> estates. Three examples:</p>
<ul>
<li>
<p>Palo Alto Networks has a collection of multi-million and billion-dollar businesses across Network Security, Security Operations, Application Security, and Cloud Security — with really big <a href="https://strategyofsecurity.com/p/the-audacious-future-of-palo-alto-networks/">plans for the future</a>.</p>
</li>
<li>
<p>CrowdStrike turned its original next-generation antivirus into 20+ modules across Endpoint Security, Security Operations, and <a href="https://www.crowdstrike.com/press-releases/crowdstrike-to-acquire-bionic-to-extend-cloud-security-leadership/?ref=content.strategyofsecurity.com">now Application Security</a>.</p>
</li>
<li>
<p>Cloudflare took a tiny wedge of Application Security (originally DDoS protection and a WAF) and <a href="https://softwareanalyst.substack.com/p/acts-of-cloudflare-an-evolution-toward?ref=content.strategyofsecurity.com">grew it</a> into Network Security, Email Security, Data Security, and likely more.</p>
</li>
</ul>
<p>...Which brings us to <a href="https://strategyofsecurity.com/p/an-intro-to-consolidation-and-aggregation-in-cybersecurity/">the aggregators</a>: the estabilshment of massive tech companies, both old and new. Aggregators are companies like Amazon, Google, Microsoft, Cisco, HPE, IBM, and Oracle.</p>
<p>In our metaphor, aggregators are the Agents. Their mission is to prevent any form of disruption in the simulated reality of The Matrix — that is, both the old and new worlds of data centers and cloud computing.</p>
<p>Aggregators have enough capital to buy <a href="https://strategyofsecurity.com/p/the-mirage-of-mandiant/">an entire cybersecurity estate</a> if it gets too close to breaking free. They'll do whatever it takes to neutralize threats and uphold the masquerade. Their strategy is effective because assimilation is a tempting option for rebel cybersecurity companies who <a href="https://strategyofsecurity.com/p/no-way-out-the-changing-world-of-cybersecurity-exits/">decide acquisitions</a> are better than continued resistance.</p>
<p>You made it to the end — you're unplugged from The Matrix. Now go break all the rules.</p>
<hr><p><em>Thank you to <a href="https://www.linkedin.com/in/rakgarg/?ref=content.strategyofsecurity.com">Rak Garg</a> and <a href="https://www.linkedin.com/in/enriquesalem/?ref=content.strategyofsecurity.com">Enrique Salem</a> at <a href="https://baincapitalventures.com/?ref=content.strategyofsecurity.com">Bain Capital Ventures</a> for sharing the idea that inspired this article.</em></p>
<h3 id="footnotes">Footnotes</h3>
<p>¹All data used for this article is from Crunchbase with a lot of my own refinements, especially around mapping companies to estates.</p>
<p>²I like to keep things timeless, so Network Security it is.</p>
<p>³Noting for the record that this is my first time using the term "Identity Security" for describing identity. I didn't like it when Okta, SailPoint, and CyberArk started using the phrase. It's grown on me.</p>
]]></content:encoded>
            <category>Ecosystem</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/11/v1_-Cybersecurity-Revolutions.png"/>
        </item>
        <item>
            <title><![CDATA[No Way Out: The Changing World of Cybersecurity Exits]]></title>
            <link>https://strategyofsecurity.com/no-way-out-the-changing-world-of-cybersecurity-exits/</link>
            <guid>6543ae1f473dad00017fa4ac</guid>
            <pubDate>Thu, 02 Nov 2023 14:35:12 GMT</pubDate>
            <description><![CDATA[Cybersecurity has too many companies with high valuations for all of them to have successful exits. Good strategic choices can ease the pain and set us on a trajectory higher than ever before.]]></description>
            <content:encoded><![CDATA[<p>Do you remember playing musical chairs as a kid? I do. It's one of the most vivid memories I have of my childhood.</p>
<p>Close your eyes and think about the music playing. You're circling the chairs with your friends, full of anticipation about when the music is going to stop.</p>
<p><em>STOP!</em></p>
<p>You're the only one without a chair.</p>
<p>Do you remember the sinking feeling in your stomach? I haven't played musical chairs for over 30 years, and I still feel exactly how I felt when I was five.</p>
<p>We're playing a big, complex game of musical chairs right now in the cybersecurity industry. There are 82 unicorns and 36 other billion-dollar acquisitions¹ by private equity firms who are all just trying to find a chair when the music stops.</p>
<p>The chairs are exits. Except in this game, we don't know how many chairs there are. I know there aren't enough for all 118 companies.</p>
<p>The implications of this are going to create major changes in the industry. We're moving from fun and games towards a more balanced, fundamentally sound way of building companies.</p>
<p>Some of the changes will feel bad, just like the sinking feeling you had in your stomach when you were a kid. But a few careful, strategic changes can set us on a trajectory higher than ever before.</p>
<h2 id="what-happened-optimism-gone-wild">What happened: optimism gone wild</h2>
<p>I <a href="https://strategyofsecurity.com/p/welcome-to-strategy-of-security/">started</a> Strategy of Security in August 2021. Everything in the cybersecurity was looking good at the time — especially venture capital investing:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/11/cybersecurity-financing-2h-2021.png" class="kg-image" alt="" loading="lazy" width="1892" height="886" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/11/cybersecurity-financing-2h-2021.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/11/cybersecurity-financing-2h-2021.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/11/cybersecurity-financing-2h-2021.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/11/cybersecurity-financing-2h-2021.png 1892w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Market Review (1H 2023)</em></i></figcaption></figure><p>It's easy to be optimistic when we're sitting on top of an unprecedented bull run across the board: record venture capital financing, M&amp;A, and public company valuations. <em>Ahh, the good ol' days...</em></p>
<p>I used a chart with current data for a reason. August 2021 was peak optimism for people in the cybersecurity industry. We were raging. The party was turnt. Our childhood game of musical chairs turned into Lollapalooza (or a DEF CON after party — whatever you're in to). Everyone was having a blast. Nobody was worried about finding a chair when the music stopped.</p>
<p>Until things started looking worse as every quarter ticked by. Was the party ending?</p>
<p><em>No way! Things will go back to normal, right? Right?! Oh...</em></p>
<p>Slowly and quietly, people started to wake up. Andrew Morris <a href="https://x.com/Andrew___Morris/status/1637874118727983105?s=20&ref=content.strategyofsecurity.com">broke the spell</a> for me. He's a positive, playful, and entertaining person. A thought like this was out of character for him, so I took it seriously:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/11/CleanShot-2023-11-02-at-09.25.46.png" class="kg-image" alt="" loading="lazy" width="596" height="1033"></figure><p>The timing and severity might vary, but his point stands. The music is going to stop soon. It's time to start looking for our chairs.</p>
<h2 id="back-to-reality-our-situation-by-the-numbers">Back to reality: our situation by the numbers</h2>
<p>Cybersecurity has 82 unicorns — companies valued by investors at $1 billion or higher. There are more unicorns in cybersecurity today than the industry's entire history of IPOs and billion-dollar strategic acquisitions combined.</p>
<p>The unicorns include nine companies valued at $5 billion or higher. Two of them (Wiz and Kaseya) are decacorns with valuations over $10 billion.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/11/cybersecurity-unicorns-by-valuation-range-1.png" class="kg-image" alt="" loading="lazy" width="1005" height="626" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/11/cybersecurity-unicorns-by-valuation-range-1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/11/cybersecurity-unicorns-by-valuation-range-1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/11/cybersecurity-unicorns-by-valuation-range-1.png 1005w" sizes="(min-width: 720px) 720px"></figure><p>If a company is above a $5 billion valuation, there aren't very many ways to exit. And boy does it help to know that. There have been 10 total cybersecurity acquisitions above $5 billion by strategic buyers. <em>Ten. Ever.</em></p>
<p>Our two decacorns ($10B+ valuation) are in completely uncharted territory. The only two strategic acquisitions in cybersecurity over $10 billion were public companies. In all of tech, there have only been 33 strategic acquisitions over $10 billion.</p>
<p>The only chair available for these nine companies is the exquisite luxury of a royal throne. It's basically IPO or bust for them.</p>
<p>If the situation with our unicorns wasn't overwhelming enough, there are also 36 more cybersecurity companies owned by private equity firms that were acquired for $1 billion or more.</p>
<p>Private equity acquisitions are often viewed as exits. They're not. All of these companies need to exit eventually, too. They're in a similar situation as the unicorns.</p>
<p>When we put everything together, the exit math doesn't add up:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/11/cybersecurity-billion-dollar-val-exit-1.png" class="kg-image" alt="" loading="lazy" width="1005" height="864" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/11/cybersecurity-billion-dollar-val-exit-1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/11/cybersecurity-billion-dollar-val-exit-1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/11/cybersecurity-billion-dollar-val-exit-1.png 1005w" sizes="(min-width: 720px) 720px"></figure><p>We've had 64 companies achieve billion-dollar exits. We're expecting <em>118 more companies</em> to do the same. And we're expecting those exits to happen soon.</p>
<p>It sure seems like there aren't going to be enough chairs when the music stops.</p>
<h2 id="what-changed-fewer-ipos-more-value-acquisitions-and-a-total-reset-of-expectations">What changed: fewer IPOs, more value acquisitions, and a total reset of expectations</h2>
<p>We’re past the point of <em>"the market will come back"</em> or <em>"this will all blow over."</em> There are too many cybersecurity companies with high valuations to exit under current (and near-term) market conditions. I know, what a party foul.</p>
<p>IPOs and acquisitions by strategic buyers (larger tech companies, not private equity firms) are the two "good" ways for a company to exit. We've seen major changes in both during the past year.</p>
<p>IPOs are like the buffet of exits — an all-you-can-eat feast for everyone involved. The buffet at our party ran out...<em>bummer.</em></p>
<p><a href="https://strategyofsecurity.com/p/forgerock-ipo/">ForgeRock's IPO</a> on September 16, 2021 was the last major pure-play cybersecurity company to go public. <a href="https://strategyofsecurity.com/p/hashicorps-ipo-bottom-up-adoption-and-layering/">HashiCorp followed</a> shortly after in December 2021.</p>
<p>Since then, only two smaller companies (ZeroFox and Yubico) have joined the ranks of public cybersecurity companies. Meanwhile, eight public cybersecurity companies have been taken private. IronNet <a href="https://techcrunch.com/2023/10/02/ironnet-founded-by-former-nsa-director-shuts-down-and-lays-off-staff/?ref=content.strategyofsecurity.com">went out of business</a>. The party is starting to clear out.</p>
<p>The other important change is the focus on value acquisitions instead of mega-acquisitions by strategic buyers. Rather than pigging out at the buffet, they started bringing Sweetgreen salads to the party instead. Less fun, but probably a better decision.</p>
<p>There have been five total acquisitions over $1 billion by strategic buyers since the beginning of 2022. We've had a couple headliners: Google <a href="https://strategyofsecurity.com/p/the-mirage-of-mandiant/">acquired Mandiant</a>. Cisco <a href="https://strategyofsecurity.com/p/ciscos-cybersecurity-shopping-spree-part-1/">acquired Splunk</a>. Otherwise, strategic buyers are mostly consuming a healthy diet of value acquisitions far below the billion-dollar threshold our 118 companies need for a good exit.</p>
<p>The decline of both IPOs and large strategic acquisitions brings along an inevitable reset of expectations about valuations and exit paths. There's no way out for a lot of later-stage cybersecurity companies. It's a serious downer for an industry that couldn't lose just a couple years ago.</p>
<p>A reset is necessary for the long-term success of the industry. We're going to be better off because of this. But right now, it hurts in the pit of your stomach — the adult version of missing out on a chair and feeling humiliated in front of everyone.</p>
<h2 id="where-were-heading-boring-is-the-new-fun">Where we're heading: boring is the new fun</h2>
<p>Will we get back to our 2021 level of fun? Yes…<em>eventually.</em> The problem is none of us know when "eventually" will come.</p>
<p>"Eventually" isn’t a good strategy. Dealing with reality is a good strategy. Right now, the reality is we’re in a tough spot.</p>
<p>Unlike the luck of our childhood game of musical chairs, there is strategy involved in winning the adult game. We can determine whether we get a seat or not, both as individual companies and collectively as an industry.</p>
<p>The music isn't actually going to stop. The idea there will be one major event where all the unicorns sell for peanuts or go out of business is an irrational fear. 118 companies aren't going to spontaneously combust and burst into flames.</p>
<p>The music isn't going to keep playing forever, either. Everything will play out in a parallel set of smaller events. Every company has their own timeline, circumstances, and decisions to make. Real strategy — the kind where we have to deal with pesky constraints, incentives, and trade-offs — will be more important than ever.</p>
<p>Some bad outcomes are inevitable. Valuations will decrease. M&amp;A activity will go up. Investors will lose money. Layoffs will keep happening. Options won't pan out. Companies will go out of business. You've heard all of this.</p>
<p>What you haven't heard is how the right moves will make both companies and our industry better off. We're already starting to see some examples:</p>
<ul>
<li>
<p><strong>Strategic acquisitions:</strong> Perimeter 81 is probably better off <a href="https://www.checkpoint.com/press-releases/check-point-software-completes-acquisition-of-perimeter-81/?ref=content.strategyofsecurity.com">with Check Point</a>. SASE is a <a href="https://softwareanalyst.substack.com/p/sase-breakdown-a-deep-dive-and-the?ref=content.strategyofsecurity.com">brutally competitive market</a>. It cost them a billion-dollar exit, but <a href="https://www.calcalistech.com/ctechnews/article/sji8uvr3h?ref=content.strategyofsecurity.com">$490 million</a> and an important strategic role in Check Point's future is better than getting flattened by some of the biggest and best companies in cybersecurity.</p>
</li>
<li>
<p><strong>Mergers:</strong> ForgeRock and Ping Identity are probably better off <a href="https://www.thomabravo.com/press-releases/thoma-bravo-completes-acquisition-of-forgerock-combines-forgerock-into-ping-identity?ref=content.strategyofsecurity.com">together</a>. Combining their respectable customer identity market shares makes them a much scarier competitor for Okta.</p>
</li>
<li>
<p><strong>Metrics:</strong> Growth is always going to matter, but it's not going to be the only metric anymore. Company performance and valuations are being evaluated against a <a href="https://www.linkedin.com/pulse/decoding-success-cybersecurity-saas-your-guide-dino-boukouris/?ref=content.strategyofsecurity.com">balanced set of metrics</a>. Gravity didn't used to apply to tech. Now, it does. We're probably better off with companies who are durable businesses, not just growth machines.</p>
</li>
</ul>
<p>Boring? Maybe. But it's a lot more fun than playing make-believe and pretending everyone can get a gold medal.</p>
<p>Good strategic choices like these are like redefining the rules of musical chairs. People are sharing chairs, using benches, playing their own music, and finding all kinds of other ways to bend the rules in their favor.</p>
<p>If we're smart — even intentional — about the long-term changes we make at an industry level, we're all going to be better off in the future.</p>
<hr><p><em>Thank you to <a href="https://www.linkedin.com/in/andrew-smyth-3a1078b4/?ref=content.strategyofsecurity.com">Andrew Smyth</a> for discussing and sharing thoughts on this article.</em></p>
<h3 id="footnotes">Footnotes</h3>
<p>¹Publicly disclosed investments and acquisitions, that is. Larger deals typically get disclosed, so this count is probably accurate. The overall point still stands if the count is off by a few.</p>
]]></content:encoded>
            <category>M&amp;A</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/header-no-way-out-3.png"/>
        </item>
        <item>
            <title><![CDATA[Why We're Stuck With Passwords]]></title>
            <link>https://strategyofsecurity.com/why-were-stuck-with-passwords/</link>
            <guid>653926a212eae40001d2afc2</guid>
            <pubDate>Wed, 25 Oct 2023 14:45:38 GMT</pubDate>
            <description><![CDATA[Passkeys are the future, but the future is definitely not evenly distributed yet. We're all stuck with passwords until a lot more companies offer passkeys. ]]></description>
            <content:encoded><![CDATA[<p>I woke up one day and decided to go all in on <a href="https://fusionauth.io/guides/what-is-a-passkey?ref=content.strategyofsecurity.com">passkeys</a>.¹</p>
<p>I knew it wasn't possible. I had to try. I wanted to see how far I could get. My dreams were swiftly crushed.</p>
<p>It's not possible to go all in on passkeys. Not in 2023, anyway. The reason surprised me.</p>
<p>I got blinded by my own optimism from <a href="https://techcrunch.com/2022/05/05/apple-google-microsoft-passwordless-logins/?ref=content.strategyofsecurity.com">announcement</a> after <a href="https://1password.com/product/passkeys?ref=content.strategyofsecurity.com">awesome</a> <a href="https://blog.google/technology/safety-security/passkeys-default-google-accounts/?ref=content.strategyofsecurity.com">announcement</a> about passkeys in the past two years. The hype is real — we've made a ton of progress after a decade or more of hard work by the FIDO Alliance and others. We're still an eternity away from the finish line, though. Why?</p>
<p>The problem isn't technical — most customer identity platforms already support passkeys. It's not platform support — Apple, Google, Microsoft, their browsers, and the major password managers are all on board. It's not consumer demand, either.</p>
<p>The challenge is surprisingly acute: we're all stuck with passwords until a lot more companies make passkeys available for their users.</p>
<p>My experiment with pushing the limits of passkey adoption made it clear to me why availability is the limiting factor. Here's the story.</p>
<h2 id="my-terrible-horrible-no-good-very-bad-day-of-implementing-passkeys">My terrible, horrible, no good, very bad day of implementing passkeys</h2>
<p>I wanted to experience everything good and bad about passkeys — just like a regular person would if they tried adopting them today. Bright-eyed, ambitious, and slightly naïve Cole started with a pragmatic plan: inventory my accounts, classify them by risk level, and implement passkeys for high risk apps.</p>
<p>This seemed achievable. I've put in my 10,000 hours planning, designing, and executing identity implementation projects. I decided to do the same thing for myself as I would for Fortune 500 clients.</p>
<p>Inventorying my accounts was easy because I <a href="https://strategyofsecurity.com/p/1passwords-blue-ocean-strategy/">emphatically use a password manager</a>. A quick export of my accounts to a spreadsheet was a perfect starting point.²</p>
<p>Once I had my list of accounts, I did what any former Big 4 security consultant would do —gave them a simple risk classification:</p>
<ul>
<li><strong>High:</strong> The app directly holds financial information or PII.</li>
<li><strong>Medium:</strong> The app doesn't hold money or PII, but can cause significant financial, intellectual property, or reputational damage if compromised.</li>
<li><strong>Low:</strong> The app has limited impact if compromised.</li>
</ul>
<p><br>
My former bosses would have been so proud. Fancy Consulting Analysis™ in hand, I set off on my journey to implement passkeys.</p>
<p><em>"Great, let's enable passkeys for the high risk apps!"</em></p>
<p>[...starts working through the list...]</p>
<p><em>"Oh, <em>$&amp;^%</em>."</em></p>
<p>Thinking like an enterprise cybersecurity practitioner was a mistake. I assumed high-risk apps would be more likely to support passkeys. Wrong!</p>
<p>The correlation between risk and passkey support is low.³ The apps I could use passkeys for were scattered across my high, medium, and low risk categories. I haven't noticed any rhyme or reason why this was the case. Adoption is random.</p>
<h2 id="success-sort-of">Success! Sort of...</h2>
<p>After a quick regroup, I decided to work backwards from 1Password's <a href="https://passkeys.directory/?ref=content.strategyofsecurity.com">Passkeys.directory</a> index. This approach is easier because any app I use that's listed in the directory should have full or partial support for passkeys.</p>
<p>This plan worked...<em>sort of.</em> I found apps I use in the directory and started enabling passkeys for them. Success!</p>
<p>Until...<em>I ran out of apps.</em> Quickly.</p>
<p>I use 374 apps (I know, it's a lot). Seventeen support passkeys. <em>Seventeen.</em> This means 95% of the apps I use today don't support passkeys yet:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/10/v1_-Passkey-Support-Timeline.png" class="kg-image" alt="Graph of approximately 5% support for passkeys today." loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/10/v1_-Passkey-Support-Timeline.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/10/v1_-Passkey-Support-Timeline.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/10/v1_-Passkey-Support-Timeline.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/10/v1_-Passkey-Support-Timeline.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>Here's where disappointment sets in. We talk a lot about whether consumers will adopt passkeys. That wasn't the problem here. I <em>wanted</em> to adopt passkeys. I would have adopted them across 100% of my apps if I could.</p>
<p>As a consumer, the situation is completely out of my control. There's no end in sight. That's a helpless feeling.</p>
<h2 id="wheres-the-path-forward">Where's the path forward?</h2>
<p>If my experiment with passkeys was a marathon, I ran a mile and had to stop because the course for the remaining 25.2 miles wasn't even built yet. I didn't <em>choose</em> to stop because I lacked the skills or desire to finish. I <em>had</em> to stop because there was literally no way for me to continue.</p>
<p>I'm still having a hard time understanding why companies aren't racing to adopt a solution that solves so many of our problems in security. It's like we found a cure for cancer and they said, <em>"no thanks, I'll take my chances with cancer."</em> Security is a smaller scale than cancer, of course, but the potential impact of passkeys is profound.</p>
<p>For an industry that <a href="https://www.linkedin.com/feed/update/urn:li:activity:7105649523103862784/?ref=content.strategyofsecurity.com">loves to argue and debate</a>, there is very little disagreement about the need to get rid of passwords and the solution for getting rid of them. Passwords <a href="https://www.linkedin.com/posts/calebsima_i-just-want-to-rant-about-passwords-someone-activity-7116095310073929728-NVwd?utm_source=share&utm_medium=member_desktop">are bad</a>. Passkeys are <a href="https://fidoalliance.org/an-inflection-point-in-the-journey-to-passwordless/?ref=content.strategyofsecurity.com">the solution</a>. Why aren't we giving everyone a chance to use them?!</p>
<p>You know when they say <em>"the future is here, it's just not evenly distributed"</em>? That's exactly where we are at with passkeys. We're still a long, <em>long</em> way from getting rid of passwords.</p>
<p>The path forward is slow and tedious. More companies have to make passkeys available for their customers. There's no other solution. There is a glimmer of hope, though.</p>
<h2 id="a-glimmer-of-hope-shopify-and-1password">A glimmer of hope: Shopify and 1Password</h2>
<p>If you squint your eyes and take a few small, tangible steps like I did, you can see the future of security. I promise you, it's marvelous.</p>
<p>When an app implements passkeys as a first-class citizen, the experience is amazing. In the epic words of Steve Jobs, <a href="https://youtu.be/qmPq00jelpc?feature=shared&ref=content.strategyofsecurity.com">"it just works."</a></p>
<p>Look no further than Shopify's Shop Pay app (the consumer version, not the e-commerce store). Seriously, <a href="https://passkeys.directory/details/shop-pay/?ref=content.strategyofsecurity.com">try it</a>. Go to your account page, add a passkey, and you're done.</p>
<p>This experience is exactly what I mean by <em>"passkeys as a first-class citizen."</em> You literally don't have a password. No clunky amalgamation of passwords and passkeys (...<em>which one do I use?!</em>) or passkeys as a second factor. The steps to enable passkeys are so clear you don't even need instructions. <em>It. Just. Works.</em></p>
<p>Using 1Password to <a href="https://youtu.be/DN3M5hx7_iA?ref=content.strategyofsecurity.com">manage your passkeys</a> makes the experience even more exquisite. You don't want to lose your passkeys. You don't want to create a new one for every device. And you don't want to get locked into a platform like Apple, Google, or Microsoft with no way out. Storing and syncing your passkeys in 1Password is a cheat code.</p>
<p>I wish Shopify and 1Password were more than a glimmer. The reality is we're still at ground zero. Let these two examples serve as a beacon of what's possible for security if other companies can get on board with passkeys. Until then, we're all stuck with passwords.</p>
<hr><h3 id="footnotes">Footnotes</h3>
<p>¹I'm using the term passkeys here instead of the FIDO2 standard name. Apple always picks the best names for stuff.</p>
<p>²If you don't use a password manager (or kinda-sorta use one), there's no need to worry. You can probably think of your riskiest accounts. Start there. Don't worry about the long tail of low-risk accounts.</p>
<p>³I didn't actually run the statistical correlation. Intuition is good enough to make the point.</p>
]]></content:encoded>
            <category>Concepts</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/header-why-were-stuck-with-passwords.png"/>
        </item>
        <item>
            <title><![CDATA[Cisco’s Cybersecurity Shopping Spree (Part 1)]]></title>
            <link>https://strategyofsecurity.com/ciscos-cybersecurity-shopping-spree-part-1/</link>
            <guid>6526c0ebcbe01f00010b5944</guid>
            <pubDate>Wed, 11 Oct 2023 18:03:45 GMT</pubDate>
            <description><![CDATA[The first of a two-part series about the past, present, and future of Cisco's cybersecurity business after its game-changing acquisition of Splunk.]]></description>
            <content:encoded><![CDATA[<p><em>"Cisco bought seven cybersecurity companies? In this economy?!"</em> Yep, they sure did.&nbsp;</p><p>One of cybersecurity's most active strategic buyers is at it again. Cisco has been buying a company every other month this year.</p><p>Their $28 billion <a href="https://investor.cisco.com/news/news-details/2023/Cisco-to-Acquire-Splunk-to-Help-Make-Organizations-More-Secure-and-Resilient-in-an-AI-Powered-World/default.aspx?ref=content.strategyofsecurity.com#:%7E:text=SAN%20JOSE%2C%20Calif.%20and%20SAN,approximately%20%2428%20billion%20in%20equity">acquisition of Splunk</a> in September is the largest acquisition in cybersecurity history.¹ This acquisition alone is three times larger than all cybersecurity M&amp;A activity in the first half of 2023 ($8.8 billion). It's also larger than quarterly M&amp;A totals for the past 22 quarters (all the way back to 2018, and likely earlier).²</p><p>Cisco's cybersecurity shopping spree should come as no surprise (okay, maybe the Splunk thing was a surprise). They've had a formidable security business for years, lurking in the shadows of their dominant networking business. In the <a href="https://strategyofsecurity.com/p/the-convergence-of-cybersecurity-and-everything/">convergence of cybersecurity and everything</a>, Cisco is the headliner.</p><p>Diving deeper into the history and strategy for Cisco and its security business is the best way to understand why these acquisitions were made and what their next moves could be.&nbsp;</p><p>In Part 1 of the series, we'll take a data-driven look at Cisco's heyday through today. In Part 2, we'll evaluate where Cisco stands today (post-Splunk) and where their security business is heading.</p><h3 id="cisco-and-its-security-business">Cisco and its security business</h3><p>Understanding Cisco's security business starts with understanding Cisco's business‌ over its 38 (!!!) years as a company.</p><p>I have always felt a special connection to Cisco. The company is almost exactly as old as I am. It's a staple (alongside Apple and Microsoft) of my earliest tech memories — the work equivalent of grandma’s oatmeal cookies.</p><p>On a practical level, Cisco started my career in technology. I had the opportunity to take their Cisco Certified Networking Associate (CCNA) classes (through a junior college) while I was in high school. This gave me both a solid understanding of networking and a running start into a better life.</p><p>The Cisco of my youth was a giant and a pioneer in the technology industry. It <a href="https://www.marketwatch.com/story/cisco-pushes-past-microsoft-in-market-value?ref=content.strategyofsecurity.com">once reigned</a> as the most valuable company in the world back in 2000.</p><p>We're in a different era today. <a href="https://medium.com/@datapath_io/the-history-of-border-gateway-protocol-a212b7ee6208?ref=content.strategyofsecurity.com#:%7E:text=1989,in%20Cisco's%20modern%20day%20offices.">BGP</a> is still around (<a href="https://www.pageittothelimit.com/network-errors-with-stuart-clark/?ref=content.strategyofsecurity.com">it's always BGP...</a>), but this isn't my high school Cisco anymore. We're witnessing a retooling of an iconic tech brand. Cybersecurity is the driving force.</p><p>Today, Cisco is the 19th largest technology company <a href="https://companiesmarketcap.com/tech/largest-tech-companies-by-revenue/?ref=content.strategyofsecurity.com">by revenue</a> ($56.99 billion LTM) and 16th largest <a href="https://companiesmarketcap.com/tech/largest-tech-companies-by-market-cap/?ref=content.strategyofsecurity.com">by valuation</a> ($216.59 billion). Based on revenue, Cisco is much smaller than Amazon, Google, and Microsoft, and roughly the size of IBM and Oracle.&nbsp;</p><p>The reporting of revenue and metrics from Cisco's security business has been fuzzy in recent years. A <a href="https://blogs.cisco.com/security/better-cisco-security-drives-innovation-growth-and-empowers-customers?ref=content.strategyofsecurity.com">slide published in 2019</a> by a previous security leadership regime is a time capsule of metrics we haven't seen in public since:</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/10/imgs-2Fapp-2Fcolegr-2Fr3EcrOP20Q.45.33-402x.png" class="kg-image" alt="" loading="lazy" width="2000" height="1096" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/10/imgs-2Fapp-2Fcolegr-2Fr3EcrOP20Q.45.33-402x.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/10/imgs-2Fapp-2Fcolegr-2Fr3EcrOP20Q.45.33-402x.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/10/imgs-2Fapp-2Fcolegr-2Fr3EcrOP20Q.45.33-402x.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/10/imgs-2Fapp-2Fcolegr-2Fr3EcrOP20Q.45.33-402x.png 2088w" sizes="(min-width: 720px) 720px"></figure><p>Cisco's FY22 annual report states 7% of revenue ($3.6 billion) is driven by its End-to-End Security product category. On its Q4 FY22 earnings call, Cisco also shared the segment grew 20% during the quarter. Some cybersecurity startups don’t even grow 20% per quarter (let alone a ~$4 billion business unit).</p><p>The scale of Cisco's security business is easy to lose track of with the recent talk around Microsoft <a href="https://www.microsoft.com/en-us/security/blog/2023/01/25/microsoft-security-reaches-another-milestone-comprehensive-customer-centric-solutions-drive-results/?ref=content.strategyofsecurity.com">exceeding $20 billion</a> in security revenue. Revenue for Cisco's security business unit is larger than every public cybersecurity company except Palo Alto Networks ($6.5 billion) and Fortinet ($4.7B).</p><h2 id="the-og-of-strategic-buyers">The OG of strategic buyers</h2><p>Cisco's voracious cybersecurity acquisition spree in 2023 might feel bizarre: <em>"Why is a networking company buying all of these cybersecurity companies?!"</em></p><p>Cisco is one of the <a href="https://www.cisco.com/c/en/us/about/corporate-strategy-office/acquisitions/acquisitions-list-years.html?ref=content.strategyofsecurity.com">OG strategic buyers</a> in tech. They bought their first company way back in 1991. Some people reading this weren’t even born yet!</p><p>They’re like an A-list celebrity with all the money in the world — they can buy whatever their heart desires.³ Right now, the object of their affection is cybersecurity companies.</p><p>Cisco is also one of the most prolific strategic buyers in all of tech, with 253 total acquisitions (and counting).⁴ They average nearly eight acquisitions per year. I don’t even go shopping at the mall eight times per year.</p><p>To the surprise of nobody, 206 of Cisco's 253 total acquisitions (81% of M&amp;A activity) have been companies related to its core networking business. Over 90% of Cisco's revenue comes from networking. Acquisitions keep their bread and butter growing.</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/10/cisco-acquisition-count-time-series.png" class="kg-image" alt="" loading="lazy" width="1148" height="1100" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/10/cisco-acquisition-count-time-series.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/10/cisco-acquisition-count-time-series.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/10/cisco-acquisition-count-time-series.png 1148w" sizes="(min-width: 720px) 720px"></figure><p>Cisco’s cybersecurity acquisitions get lost in their flurry of M&amp;A activity. One of our industry’s best secrets is hiding in plain sight: Cisco buys more cybersecurity companies than anyone.</p><p>Nobody — not Google, IBM, Microsoft, Palo Alto Networks, Symantec, or any other company — does as many cybersecurity deals as Cisco.</p><p>Cisco has acquired 35 pure-play cybersecurity companies at a clip of 1.5 deals per year. They’ve also acquired 12 hybrid companies (ones with a cybersecurity component but not solely focused on cybersecurity). This means 19% of Cisco's acquisitions are cybersecurity-related.</p><p>Cybersecurity has been Cisco’s side hustle. It’s quickly becoming the main thing.</p><h3 id="starting-the-cybersecurity-party-wave">Starting the cybersecurity party wave</h3><p>In surfing, a <a href="https://www.surfertoday.com/surfing/why-are-party-waves-fun?ref=content.strategyofsecurity.com">party wave</a> is a massive wave big enough for everyone to ride.⁶ In cybersecurity, Cisco is usually the ringer: better than everyone expects, but never the center of attention.</p><p>Cisco's cybersecurity-related acquisitions have happened in waves (no pun intended):</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/10/cisco-pre-splunk-cybersecurity-dollar-volume-time-series-annotated.png" class="kg-image" alt="" loading="lazy" width="597" height="553"></figure><p>The four big waves on the chart are Cisco's four largest cybersecurity acquisitions (before Splunk):</p><ul><li><a href="https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2007/m01/cisco-announces-agreement-to-acquire-ironport.html?ref=content.strategyofsecurity.com#:%7E:text=%22Integrating%20IronPort's%20messaging%20security%20technology,million%20in%20cash%20and%20stock.">IronPort</a>, a manufacturer of messaging security appliances.</li><li><a href="https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2013/m10/cisco-completes-acquisition-of-sourcefire-1.html?ref=content.strategyofsecurity.com">Sourcefire</a>, a network security and intrusion prevention and detection system.</li><li><a href="https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2015/m08/cisco-completes-acquisition-of-opendns.html?ref=content.strategyofsecurity.com">OpenDNS</a>, a DNS-based content filtering solution.</li><li><a href="https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2018/m10/cisco-announces-placeholder.html?ref=content.strategyofsecurity.com">Duo Security</a>, a multi-factor authentication (MFA) platform.</li></ul><p></p><p>They've spent $1 billion on cybersecurity acquisitions (give or take) in four different years.⁵ That’s a lot. Microsoft has acquired a <em>total</em> of four cybersecurity companies, and none over $1 billion.</p><p>In 2023, Cisco <em>is</em> the cybersecurity party wave. A roaring, high-flying, attention-grabbing spectacle. Hop on board and have the ride of your life.</p><p>Cisco's $28 billion acquisition of Splunk is the mother of all waves. It’s over twice as large as their other cybersecurity-related acquisitions combined ($13.1 billion).&nbsp;</p><p>All of their previous acquisitions were just a warmup. Splunk is the main event:</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/10/cisco-post-splunk-cybersecurity-dollar-volume-time-series-annotated.png" class="kg-image" alt="" loading="lazy" width="595" height="553"></figure><p>Cisco is investing more in cybersecurity than ever before. They’ve hit their stride in the past decade.</p><p>Including Splunk, cybersecurity makes up 72% ($39 billion) of the money Cisco has spent on acquisitions since 2013. They’re not riding the baby waves anymore. Cisco is out at <a href="https://www.visithalfmoonbay.org/articles/mavericks-biggest-surf-west-coast?ref=content.strategyofsecurity.com">Mavericks</a>⁷ with the pros riding the biggest and most dangerous waves in the world.</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/10/cisco-cybersecurity-share-of-total-deal-value-time-series.png" class="kg-image" alt="" loading="lazy" width="1144" height="1198" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/10/cisco-cybersecurity-share-of-total-deal-value-time-series.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/10/cisco-cybersecurity-share-of-total-deal-value-time-series.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/10/cisco-cybersecurity-share-of-total-deal-value-time-series.png 1144w" sizes="(min-width: 720px) 720px"></figure><p>The <a href="https://www.networkworld.com/article/3684772/former-vmware-exec-gillis-resurfaces-to-run-cisco-security-business-again.html?ref=content.strategyofsecurity.com">return</a> of longtime Cisco security executive <a href="https://www.linkedin.com/in/tomgillis1/?ref=content.strategyofsecurity.com">Tom Gillis</a> in January 2023 lit a fire under the company's cybersecurity M&amp;A efforts. The fire is now roaring with no signs of slowing down.</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/10/cisco-cybersecurity-related-deals-2023-table.png" class="kg-image" alt="" loading="lazy" width="1084" height="690" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/10/cisco-cybersecurity-related-deals-2023-table.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/10/cisco-cybersecurity-related-deals-2023-table.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/10/cisco-cybersecurity-related-deals-2023-table.png 1084w" sizes="(min-width: 720px) 720px"></figure><p>Buying nearly $30 billion worth of companies in a single year is a clear signal of strategic importance — <em>"put your money where your mouth is,"</em> so to speak.</p><p>Will Cisco keep the party wave going and bring more companies on board? Or, will it flinch and get sucked into the deep, blue ocean?</p><p>Stay tuned for Part 2, where we’ll look at the treasures Cisco has collected and explore what’s possible in the future.</p><hr><h3 id="footnotes">Footnotes</h3><p>¹Depending on how you classify Broadcom's acquisition of VMWare, and whether you consider Splunk to be a pure cybersecurity company or a hybrid of security and observability. Either way, the primary strategic driver of the acquisition was Splunk's cybersecurity products and customers.</p><p>²According to Momentum Cyber data from the <a href="https://momentumcyber.com/docs/Quarterly/Cybersecurity_Market_Review_1H_2023.pdf?ref=content.strategyofsecurity.com">1H 2023 Cybersecurity Market Review</a> and the <a href="https://momentumcyber.com/docs/Yearly/2023_Cybersecurity_Almanac.pdf?ref=content.strategyofsecurity.com">2023 Cybersecurity Almanac</a> reports.</p><p>³With a very important difference: the things Cisco buys have ROI, unlike jewelry, cars, and Prada.</p><p>⁴Cisco has made so many acquisitions that the best M&amp;A data platforms in the world (PitchBook and CapitalIQ) both had missing data. Cisco itself didn’t even have a full list of its own acquisitions. For this analysis, I stitched together and analyzed data from all three sources. You might literally be reading the most accurate version in existence.</p><p>⁵Disclosed acquisition dollar volume in 2007 was technically $930 million, not $1 billion. I said "give or take" to give them credit. When we’re talking billions, what’s another $30 million?!</p><p>⁶I’m from the Midwest. I don’t surf. Riding a party wave sounds terrifying.</p><p>⁷Remember Apple’s Mac OS X Mavericks? They <a href="https://www.theguardian.com/technology/2013/oct/21/apple-mac-os-x-mavericks-whats-in-a-name?ref=content.strategyofsecurity.com">named it after</a> one of the most dangerous places in the world to surf — Mavericks at Half Moon Bay.</p>]]></content:encoded>
            <category>M&amp;A</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/10/Logo_-Cisco.png"/>
        </item>
        <item>
            <title><![CDATA[Y Combinator's Summer 2023 Cybersecurity, Privacy, and Trust Startups]]></title>
            <link>https://strategyofsecurity.com/y-combinators-summer-2023-cybersecurity-privacy-and-trust-startups/</link>
            <guid>6514dcea5a7ef80001f2ad73</guid>
            <pubDate>Thu, 28 Sep 2023 12:05:30 GMT</pubDate>
            <description><![CDATA[Analyzing opportunities and challenges for the 10 cybersecurity, privacy, and trust startups in Y Combinator's Summer 2023 batch.]]></description>
            <content:encoded><![CDATA[<p>The spectacle that is Y Combinator's Demo Day took place for the Summer 2023 batch from September 6-7, 2023. Ten cybersecurity, privacy, and trust startups were among the <a href="https://www.ycombinator.com/blog/meet-the-yc-summer-2023-batch?ref=content.strategyofsecurity.com">218 companies</a> unveiled at the two-day event.</p>
<p>I have a soft spot for early stage startups, so here I am covering YC's cybersecurity startups for the fifth time. Like the previous four, this article is a quick analysis of every company from the industry in the Summer 2023 batch:</p>
<ul>
<li><strong>Accend:</strong> A co-pilot for fintechs and banks to use when performing manual Know Your Customer (KYC) reviews.</li>
<li><strong>Affinity:</strong> A compliance training platform for companies in regulated industries.</li>
<li><strong>Corgea:</strong> Third party data security for sensitive workflows.</li>
<li><strong>Greenlite:</strong> AI agents for financial crime investigations.</li>
<li><strong>Kobalt Labs:</strong> Data privacy for generative AI.</li>
<li><strong>Remy Security:</strong> AI-automated product security reviews.</li>
<li><strong>SafetyKit:</strong> Replacing human trust and safety reviewers with AI language models.</li>
<li><strong>Sero AI:</strong> AI-powered content moderation for trust and safety teams.</li>
<li><strong>Trench:</strong> An open source fraud prevention platform for marketplaces.</li>
<li><strong>Xeol:</strong> A software supply chain security platform.</li>
</ul>
<p><br>
This time, I'm also including a look at Y Combinator's investment trends in the industry for the past five years. I haven't been covering YC companies for quite that long (since the Summer 2021 batch), but I've been doing it long enough to identify some trends. Let's start there.</p>
<h2 id="investment-trends-across-batches">Investment trends across batches</h2>
<p>Our (current) no good, very bad economic conditions make things difficult for early stage companies. YC companies are no exception, despite the disproportionate advantage they get from being part of the <a href="https://www.generalist.com/briefing/yc?ref=content.strategyofsecurity.com">best startup accelerator</a> the world has ever known.</p>
<p>We're not here to rain on the parade, though. There are positive trends for cybersecurity, privacy, and trust companies that need to be talked about. I'll cover a few here, but this really could be an entire article (someday...).</p>
<h5 id="y-combinator-is-investing-in-cybersecurity-companies-at-double-its-historical-rate">Y Combinator is investing in cybersecurity companies at double its historical rate.</h5>
<p>In YC's <a href="https://techcrunch.com/2022/08/02/y-combinator-narrows-current-cohort-size-by-40-citing-downturn-and-funding-environment/?ref=content.strategyofsecurity.com">current era</a> of smaller batch sizes, ten companies from the industry is still a healthy representation. Batches across the past three years have averaged 11 cybersecurity companies — a rate more than double the 4.5 company per batch average from 2019 and 2020.</p>
<p><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/09/yc-cybersecurity-investment-trend-5-yr.png" alt="yc-cybersecurity-investment-trend-5-yr" loading="lazy"></p>
<p>YC's consistently high investment rate is a good sign for cybersecurity companies, considering the ~40% reduction in overall batch size starting in Summer 2022. The reduction halved the number of startups from a 19 company spike in Winter 2022, but the average is still well above their historical trends.</p>
<h5 id="cybersecurity-is-still-under-5-of-ycs-overall-batch-size">Cybersecurity is still under 5% of YC's overall batch size.</h5>
<p>Not to get greedy here, but an average of 11 companies per batch for the cybersecurity industry is still under 5% of the total batch size over the past five years.</p>
<p><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/09/yc-cybersecurity-pct-of-batch-5-yr.png" alt="yc-cybersecurity-pct-of-batch-5-yr" loading="lazy"></p>
<p>A 218 company batch at Y Combinator's <a href="https://www.ycombinator.com/deal?ref=content.strategyofsecurity.com">standard deal</a> (TL;DR, it's $500,000 per company) means they invested just over $100 million for the entire batch. Ten cybersecurity companies is $5.5 million of the total. That's a healthy amount, but our industry has also seen over 50 seed rounds of $5 million or more in 2023 alone (according to Crunchbase data).</p>
<p>YC generally funds companies at the earliest possible stage, so the companies they attract are naturally seeking lower investment amounts. When capital was easier to come by, it was easier for cybersecurity companies to bypass YC and raise higher amounts of capital from early stage venture investors. Times have changed, which could mean more (or higher quality) cybersecurity companies wanting to do YC.</p>
<p>Funding 10 cybersecurity companies at once (and ~20ish per year across both batches) is still <em>a lot</em>. The most active venture capital firms in cybersecurity average 10-ish investments per year (40-50 investments in a five year period, according to the <a href="https://momentumcyber.com/cybersecurity-almanac-2023/?ref=content.strategyofsecurity.com">Momentum Cyber Cybersecurity Almanac for 2023</a>). This batch is further proof that YC continues to be one of the most prolific investors in cybersecurity, at least based on quantity.</p>
<h5 id="80-of-companies-havent-raised-additional-financing-yet">80% of companies haven't raised additional financing yet.</h5>
<p>You'd think being part of both Y Combinator and a seemingly recession-proof and well capitalized industry like cybersecurity would help companies raise funding. The current data says otherwise.</p>
<p>Similar to the Winter 2023 batch, only two of the 10 companies in this batch have raised additional funding outside Y Combinator's initial investment. According to PitchBook data, Corgea raised a small, early stage round in June 2023. SafetyKit raised a <a href="https://firstround.com/companies/?selected=safetykit&ref=content.strategyofsecurity.com">seed round</a> led by First Round Capital in August 2023. That's it so far.</p>
<p>Other companies in this batch will raise funding, of course. However, we're clearly in a correction period from the days where YC companies had investments from top-tier firms at premium valuations weeks before Demo Day.</p>
<h2 id="accend">Accend</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.withaccend.com/?ref=content.strategyofsecurity.com">Accend</a> is building an automated workflow for fintech ops and compliance teams to make regulatory reviews more efficient and accurate.</p>
<p>Their current product is somewhere between augmentation and automation. Parts of the compliance process are automated, like generating standard regulatory reports for Customer Due Diligence (CDD) and Enhanced Due Diligence (EDD). Pre-defined workflows augment human reviewers to improve consistency and quality in the overall review process.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>It's a <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#fraud-and-risk">Fraud and Risk</a> product. This category is somewhat adjacent to pure cybersecurity, but core security principles like identity and authenticity are fundamental to what the company is building.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>The biggest challenge with automating high scrutiny (and high risk) processes is quality. For the product to deliver on its promises of saving time and reducing risk exposure, it needs to consistently produce better results than the humans it's (eventually) replacing.</p>
<p>At the company's current stage, quality is relative. Humans are still expected to review and sign off on the results. This is a totally reasonable ask. If the quality of the system-generated output is high enough most of the time, it still saves ops and compliance teams a lot of time (relative to starting from zero with no automation).</p>
<p>Over time, quality will get higher and results will get better. Manual reviews will get shorter and shorter, eventually reaching a point where humans are only reviewing a narrow set of exceptions and edge cases.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>The big company version Accend is something like "the leader in compliance automation for financial services companies." Their current product is focusing on a relatively narrow set of use cases (as it should). Financial services companies have a lot of regulatory-driven paper pushing to automate. The surface area of opportunity for Accend is large.</p>
<p>From a growth standpoint, scaling alongside earlier stage fintech startups and (eventually) reaching enterprise financial services companies can help Accend become a big company. The model of selling to startups and scaling as they grow (as made famous by YC alums like Stripe and Brex) definitely applies here.</p>
<p>On the enterprise side, larger, more traditional banks will continue to do manual reviews until they need to cut costs or get hit with a large fine. Unfortunately, in banking, a lot of behavioral change is driven by regulators. One way or another, they'll eventually reach a point where they need to automate more of their compliance processes — a huge opportunity for Accend if the company can establish itself as a leader in the space.</p>
<h2 id="affinity">Affinity</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://itsaffinity.com/?ref=content.strategyofsecurity.com">Affinity</a> is a training platform built for companies in regulated industries.</p>
<p>The product is unique because it's focused specifically on companies in regulated industries, not general security awareness training. It also manages training across multiple external parties (e.g. B2B customers), not just an internal workforce.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Affinity is a <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#security-awareness">Security Awareness</a> company. Compliance is also a secondary driver.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Differentiation could be difficult in a relatively crowded security and awareness training market. The threat of substitutes for training content is high. In this market, it's hard to build a moat on content alone. The founders are clearly aware of this and know where to focus based on their previous experience building a buy now, pay later (BNPL) company.</p>
<p>Additionally, education and training isn't valued as highly by customers as flashier areas of cybersecurity. Many buyers view training as a commodity and shop for the lowest price. Affinity is trying to mitigate this by focusing on specialized training in the immediate proximity of revenue-generating business activities.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Positioning training close to revenue generation (on the external side) and risk reduction (on the internal side) is a unique insight. If Affinity can flip the narrative and turn compliance-driven training into a revenue driver, it can be a big company.</p>
<p>The market for Affinity's product is bigger than you might expect. PitchBook's analyst-curated fintech vertical currently tracks 9,455 companies. The broader market for regulated industries is even larger.</p>
<p>Also, don't sleep on the security awareness market. It has already yielded a (formerly) public company in KnowBe4, which was <a href="https://www.reuters.com/markets/europe/vista-equity-partners-take-cybersecurity-firm-knowbe4-private-46-bln-deal-2022-10-12/?ref=content.strategyofsecurity.com">taken private</a> by Vista Equity Partners for $4.6 billion in October 2022.</p>
<h2 id="corgea">Corgea</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.corgea.com/?ref=content.strategyofsecurity.com">Corgea</a> helps companies map and monitor the flow of sensitive data, including third parties. This visual is a perfect description:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/09/corgea-workflow-1.png" class="kg-image" alt="" loading="lazy" width="2000" height="847" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/09/corgea-workflow-1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/09/corgea-workflow-1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/09/corgea-workflow-1.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/09/corgea-workflow-1.png 2000w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Corgea</span></figcaption></figure><p>Corgea isn't your DLP product of a decade ago. It's a modern approach built for cloud-first companies.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Corgea is primarily a <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#data-lossleakage-prevention">Data Loss/Leakage Prevention</a> product with a (slight) slant towards third party risk. It fits into the wider data security category — one of the most interesting spaces in cybersecurity right now.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Mapping data workflows is a hard problem to solve, especially when third parties are involved. Completeness and accuracy of coverage matter. Corgrea already has over 300 out-of-the-box connectors to SaaS apps and other data sources, which is a lot for an early stage company. Keeping up with integrations can feel like a never-ending treadmill, though.</p>
<p>Working with larger companies (mid-market and enterprise) is challenging for data security products. Larger companies with legacy apps may not be covered yet by out-of-the-box connectors. In the data security market, enterprise is the space of large, well-funded startups like <a href="https://bigid.com/?ref=content.strategyofsecurity.com">BigID</a> and <a href="https://www.onetrust.com/solutions/privacy-and-data-governance-cloud/?ref=content.strategyofsecurity.com">OneTrust</a>. Corgea doesn't need to compete for enterprises right now, but it's a challenge they'll face with growth.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Data security is one of the most active markets in cybersecurity right now across financing, M&amp;A, and innovation in general. This quote from my <a href="https://momentumcyber.com/docs/Quarterly/Cybersecurity_Market_Review_1H_2023.pdf?ref=content.strategyofsecurity.com">discussion</a> with Amer Deeba, CEO and co-founder of Normalyze is the punch line:</p>
<blockquote>
<p>Data security is going to be a huge category on its own with a big focus on the cloud.<br>
<br>
DSPM is the future of data security — how to manage data from a security perspective, how to classify it, and how to secure it on an ongoing basis. It's a huge category that's going to consolidate many other cloud security tools around it.</p>
</blockquote>
<p>Evidence of financial and strategic interest in data security is clear. Recent acquisitions from strategic buyers include <a href="https://techcrunch.com/2023/05/16/ibm-polar-security/?ref=content.strategyofsecurity.com">Polar (by IBM)</a>, <a href="https://www.crn.com/news/security/rubrik-to-acquire-cloud-data-security-startup-laminar?ref=content.strategyofsecurity.com">Laminar (by Rubrik)</a>, and recent speculation about Palo Alto Networks <a href="https://www.calcalistech.com/ctechnews/article/rkhjxiega?ref=content.strategyofsecurity.com">acquiring Dig Security</a>. Early stage data security companies have also raised over $500 million from investors (according to Momentum Cyber research).</p>
<h2 id="greenlite">Greenlite</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.greenlite.ai/?ref=content.strategyofsecurity.com">Greenlite</a> builds AI agents for fintech compliance teams. The product directly takes aim at outsourced analysts: <em>"Greenlite can help you scale your compliance operations with AI instead of outsourced teams."</em></p>
<p>If this sounds similar to Accend, you're on the right track. Both companies are solving a similar problem — routine AML and KYC compliance tasks. The difference is in their approach. Greenlite is more agent-based, leaning on AI to execute tasks. Accend is more workflow-based, relying on defined processes to execute tasks.</p>
<p>It's common for Y Combinator to invest in competing companies, both within the same batch and across previous batches.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Similar to Accend, Greenlite is a <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#fraud-and-risk">Fraud and Risk</a> product.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Greenlite faces the same challenges as Accend, plus an additional one because of their heavy reliance on AI. The product's results are heavily dependent on the abilities and limitations of LLMs and their ecosystems of tooling. Any internally developed, domain-specific AI/ML models will also require a lot of training data to reach a high level of accuracy.</p>
<p>Using AI is also a huge opportunity, of course. LLMs and AI tools are improving exponentially by the day. Internal models are getting easier and easier to build. Greenlite has an opportunity to turn these challenges into insurmountable strengths with enough time and training data.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Greenlite's <a href="https://www.ycombinator.com/launches/ItP-greenlite-ai-compliance-teams-for-fintechs?ref=content.strategyofsecurity.com">YC launch</a> shared a damning stat from McKinsey:</p>
<blockquote>
<p><strong>Critically, the productivity of these AML teams are low</strong>.&nbsp;<a href="https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/the-investigator-centered-approach-to-financial-crime-doing-what-matters?ref=content.strategyofsecurity.com">McKinsey estimated</a>&nbsp;that as little as 15% of an AML investigator’s time is spent actually investigating. Manual processes, administrative tasks and limited working hours leave backlogs to grow, increasing risks of a major fine.</p>
</blockquote>
<p>Compliance reviews are a necessary evil for fintech companies. They're never going away. Doing reviews well is expensive and slow. Doing them poorly is an existential business risk — no company wants to be fined or shut down by a regulator.</p>
<p>Making compliance reviews both fast and accurate directly unlocks customer growth (by improving customer experience) and reduces risk exposure (by catching and preventing fraud). It's the fintech equivalent of augmenting and automating the SOC, which is central to the <a href="https://strategyofsecurity.com/p/the-audacious-future-of-palo-alto-networks/">success story</a> of Palo Alto Networks.</p>
<p>Solving the problem of compliance automation is a huge opportunity. The winner will be a big company, or at worst have a nice exit.</p>
<h2 id="kobalt-labs">Kobalt Labs</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.kobaltlabs.com/?ref=content.strategyofsecurity.com">Kobalt Labs</a> is an API for securing sensitive data, both as an input to and output from LLMs.</p>
<p>Their approach is roughly similar to JumpWire and Sarus from the <a href="https://strategyofsecurity.com/p/y-combinators-winter-2022-cybersecurity-privacy-and-trust-startups/">Winter 2022 batch</a>, but designed specifically for LLMs and the dynamic nature of their inputs and outputs.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Kobalt Labs is a <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#data-protection">privacy and data protection</a> product built specifically for LLMs. You could also argue it's in the AI Security market if you view this as a standalone domain in cybersecurity.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>The (still very nascent) <a href="https://ventureinsecurity.net/p/ai-security-market-map?ref=content.strategyofsecurity.com">AI security landscape</a> is becoming more crowded by the day. The popularity of LLMs have brought lots of brainpower, capital, and new products to the security side of the space. As with every <a href="https://strategyofsecurity.com/p/an-intro-to-consolidation-and-aggregation-in-cybersecurity/">embryonic stage market</a>, there's a lot of uncertainty, risk, and competition.</p>
<p>There are also the practical challenges of usage and adoption. An API-focused approach requires everyone in the company to actually use the API. Most LLMs make it easy for employees to go rogue and start using them without company (or security) approval. Even if people are using company-sanctioned LLM accounts, there are still political barriers to overcome before a security solution is universally adopted.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>The <a href="https://danielmiessler.com/p/the-ai-attack-surface-map-v1-0/?ref=content.strategyofsecurity.com">AI attack surface</a> is already large, rapidly evolving, and remains relatively exposed. AI companies are aware of security and privacy challenges. Both are higher priority than usual, partly in favor of <a href="https://openai.com/blog/introducing-chatgpt-enterprise?ref=content.strategyofsecurity.com">gaining enterprise customers</a>.</p>
<p>AI companies are well funded and have other difficult problems to solve. We're likely to see them using part of their cash reserves on acquiring AI security products that can unlock customer growth and give their platforms an advantage over competitors.</p>
<p>If Kobalt Labs can become the go-to solution for LLM security and data privacy, they can be a massive company.</p>
<h2 id="remy-security">Remy Security</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.remysec.com/?ref=content.strategyofsecurity.com">Remy Security</a> uses LLMs to help security teams do product design reviews. <a href="https://forwardsecurity.com/security-design-review-threat-modelling/?ref=content.strategyofsecurity.com">Security design reviews</a> are (should be?!) an early step of the overall development process — well before later stage application security testing and pentesting.</p>
<p>Remy Security's product augments a reviewer and helps get some basic analysis out of the way before human expertise is needed.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Remy Security generally fits into the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#security-architecture">Security Architecture</a> category. They're also directly related to the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#application-security">Application Security</a> market, but in a different way than traditional products that deal directly with code.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Reviewing software product designs is a lot less straightforward and repetitive than the compliance reviews Accend and Greenlite are doing. The nature of product security reviews is different, and the nuances matter.</p>
<p>Compliance reviews under AML and KYC are required by external regulators. Product security reviews are not. They're completely optional, even though any decent security practitioner would tell you it's a good idea. The bad part about being optional is companies can skip product reviews entirely, or rubber stamp them and move on.</p>
<p>Similar to Greenlite, the product's heavy reliance on LLMs is subject to the limitations of LLM performance and accuracy. The Remy team makes it clear a human is expected to be involved in the review process at some point. This is exactly the right approach for an early stage product and helps keep customer expectations in check.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>We hear "shift left" all the time (okay, too much). This is one of the first attempts at applying a security product to the design/architecture phase. Historically, design is a process-oriented phase. Building a product to help with this is a pretty revolutionary idea.</p>
<p>The upside is Remy's product can help increase the number of security design reviews that get done. They're using new technology to expand the market for security design reviews. And, if we're being brutally honest, that market should be a lot bigger than it is today.</p>
<p>If Remy can materially expand the quantity and quality of security design reviews, they can be a big company. This could also be a nice acquisition for larger, well-funded application security companies looking to broaden their platforms into new areas.</p>
<h2 id="safetykit">SafetyKit</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.safetykit.com/?ref=content.strategyofsecurity.com">SafetyKit</a> is using LLMs to augment and replace trust and safety reviewers. The product executes customer-specific workflows to identify and make decisions about content moderation.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>SafetyKit is a <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#trust-and-safety">Trust and Safety</a> product.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>SafetyKit shares many of the same challenges as other trust and safety startups from previous batches. Content moderation is a somewhat unique challenge faced by companies with lots of user generated content once they reach scale. I summarized the challenge when writing about <a href="https://cinder.co/?ref=content.strategyofsecurity.com">Cinder</a>, a company from the <a href="https://strategyofsecurity.com/p/y-combinators-winter-2022-cybersecurity-privacy-and-trust-startups/">Winter 2022 batch</a>:</p>
<blockquote>
<p>Finding customers at the right level of traction and scale to require more advanced trust and safety operations is potentially tricky. Small companies with seed funding or earlier are usually still seeking traction. This doesn't leave much room to focus on problems outside of growth — trust and safety being one such problem.</p>
</blockquote>
<p>I also called out the variety of content moderation problems companies face:</p>
<blockquote>
<p>There is also a lot of variety in this space. Trust and safety threats and problems vary by company and by industry, as do the processes for solving them.</p>
</blockquote>
<p>SafetyKit does a nice job of addressing the variety by allowing customers to define their own company-specific workflows and rules. The product also provides clear reasoning about moderation decisions made by the platform (lots more detail about this in their <a href="https://www.ycombinator.com/launches/IsK-safetykit-ai-powered-trust-and-safety-automation?ref=content.strategyofsecurity.com">YC launch</a>).</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Content moderation jobs meet all the criteria of jobs that should be automated. Here's a real example of a job posting from Upwork:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/09/CleanShot-2023-09-27-at-21.07.26@2x.png" class="kg-image" alt="" loading="lazy" width="1248" height="1666" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/09/CleanShot-2023-09-27-at-21.07.26@2x.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/09/CleanShot-2023-09-27-at-21.07.26@2x.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/09/CleanShot-2023-09-27-at-21.07.26@2x.png 1248w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Upwork</span></figcaption></figure><p><a href="https://veriswap.com/?ref=content.strategyofsecurity.com">Veriswap</a> isn't your prototypical user generated content giant like Facebook, Twitter, or Airbnb. It's a marketplace for trading sports cards (just like I used to do in person as a kid). Seems innocuous enough, but guess what?! They still need content moderation.</p>
<p>The opportunity for SafetyKit is to help the (growing) long tail of businesses who have user-generated content. Giants like Stripe and Airbnb (where SafetyKit's founders previously worked) aren't necessarily the ideal customer. They're on the front of the curve with the scale and resources to build their own solutions.</p>
<p>It doesn't make sense for companies like Veriswap to build a trust and safety platform (let alone an LLM-powered one) from the ground up. Content moderation is not their core business, as shown by the meager $5-12 hourly rate they're offering for the role above. They're better off integrating a product like SafetyKit and eliminating their entry level roles for good.</p>
<p>From a broader market standpoint, trust and safety has had some interesting acquisitions in the past year. Spotify <a href="https://techcrunch.com/2022/10/05/spotify-acquires-content-moderation-tech-company-kinzen-to-address-platform-safety-issues/?ref=content.strategyofsecurity.com">acquired Kinzen</a> in October 2022 to help address platform safety issues. <a href="https://www.activefence.com/?ref=content.strategyofsecurity.com">ActiveFence</a> <a href="https://techcrunch.com/2023/09/07/activefence-snaps-up-spectrum-labs-last-valued-at-137m-to-help-fight-the-harmful-content-creep/?ref=content.strategyofsecurity.com">acquired Spectrum Labs</a> in September 2023. ActiveFence has raised over $100 million at a $500+ million valuation, according to TechCrunch. It seems likely a big company is going to emerge from this space.</p>
<h2 id="sero-ai">Sero AI</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://getsero.ai/?ref=content.strategyofsecurity.com">Sero AI</a> is an AI-powered content moderation platform for trust and safety teams. This should sound familiar. Both Sero AI and SafetyKit are solving a very similar problem.</p>
<p>The main difference I can see between the companies is their approach to implementing AI. Sero AI focuses more on machine learning. SafetyKit uses LLMs.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Sero AI is a <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#trust-and-safety">Trust and Safety</a> product.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Sero AI faces the same challenges as SafetyKit and other trust and safety startups from previous YC batches.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>All the same opportunities for SafetyKit apply to Sero AI. The differentiator for both companies is their use of AI. Workflows matter too, but AI might end up being the difference in this market.</p>
<h2 id="trench">Trench</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.trytrench.com/?ref=content.strategyofsecurity.com">Trench</a> is an open source fraud prevention platform for marketplaces. The product brings together reviews for buyers, sellers, and payments — along with the services and data needed for the reviews — into a centralized decisioning point.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Broadly speaking, Trench is a <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#fraud-and-risk">Fraud and Risk</a> product. It's focused on the fraud side and relies heavily on <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#identity-proofing">identity proofing</a> and device fingerprinting techniques to aid the verification process.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>There isn't a "one best way" for ecommerce and marketplace businesses to prevent fraud. The result is a wide variety of approaches and products that solve specific use cases (or categories of them). And basically all the financial services giants are in this market.</p>
<p><a href="https://sift.com/?ref=content.strategyofsecurity.com">Sift</a> is a YC company from the Summer 2011 batch now <a href="https://techcrunch.com/2021/04/22/fraud-prevention-platform-sift-raises-50m-at-over-1b-valuation-eyes-acquisitions/?ref=content.strategyofsecurity.com">valued at over $1 billion</a> (from its latest financing round in 2021). Large financial services companies have fraud prevention products (via acquisition):</p>
<ul>
<li><strong>American Express:</strong> Accertify (<a href="https://about.americanexpress.com/newsroom/press-releases/news-details/2010/American-Express-to-Acquire-Accertify-to-Broaden-Fraud-Prevention-Services-11-04-2010/default.aspx?ref=content.strategyofsecurity.com">acquired in 2010</a> for $150 million)</li>
<li><strong>Equifax:</strong> Kount (<a href="https://www.equifax.com/newsroom/all-news/-/story/why-the-equifax-acquisition-of-kount-is-a-big-deal/?ref=content.strategyofsecurity.com">acquired in 2021</a> for $640 million)</li>
<li><strong>LexisNexis:</strong> ThreatMetrix (<a href="https://risk.lexisnexis.com/about-us/press-room/press-release/20180222-threatmetrix-close?ref=content.strategyofsecurity.com">acquired in 2018</a> for $817 million)</li>
<li><strong>MasterCard:</strong> Ekata (<a href="https://www.mastercard.com/news/press/2021/april/mastercard-to-acquire-ekata-to-advance-digital-identity-efforts/?ref=content.strategyofsecurity.com">acquired in 2021</a> for $850 million)</li>
<li><strong>TransUnion:</strong> TruValidate (rebranded product from acquisitions of <a href="https://newsroom.transunion.com/transunion-and-neustar-announce-transaction-close/?ref=content.strategyofsecurity.com">Neustar</a> for $3.1 billion and <a href="https://newsroom.transunion.com/transunion-completes-acquisition-of-sontiq/?ref=content.strategyofsecurity.com">Sontiq</a> for $638 million in 2021)</li>
<li><strong>Visa:</strong> Cybersource (<a href="https://www.nytimes.com/2010/04/22/business/22visa.html?ref=content.strategyofsecurity.com">acquired in 2010</a> for $2 billion)</li>
</ul>
<p><br>
You could argue some of these products are entering "legacy" territory, which is part of the opportunity for Trench.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Building an open source product was a <a href="https://www.trytrench.com/manifesto?ref=content.strategyofsecurity.com">strategic decision</a>. This statement from Trench is a contrarian point of view in the very closed source world of fraud platforms:</p>
<blockquote>
<p>Fraud vendors can't solve fraud for you. Every business eventually needs to build something in-house.</p>
</blockquote>
<p>Trench has a strategic advantage by taking a completely different approach and going open source. From an industry standpoint, the scale of the acquisitions (several listed earlier) by strategic buyers is massive. If Trench can become the equivalent of GitLab for fraud platforms, they can become a big company.</p>
<h2 id="xeol">Xeol</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.xeol.io/?ref=content.strategyofsecurity.com">Xeol</a> is a software supply chain security platform. Its main differentiator is a contextual graph that allows companies to ask specific questions about usage enforce policies.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>It's a <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#software-supply-chain-security">Software Supply Chain Security</a> company.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>The supply chain security incidents we've seen this decade have attracted some of the best talent in the industry. Investors joined the party this year, and financing picked up. It's now a busy and competitive market.</p>
<p>Endor Labs raised a <a href="https://techcrunch.com/2023/08/03/endor-labs-which-helps-companies-secure-their-open-source-packages-raises-70m/?ref=content.strategyofsecurity.com">$70 million Series A</a> last month, which is one of the largest early-stage cybersecurity funding rounds in 2023. They've raised a total of $95 million. <a href="https://www.chainguard.dev/?ref=content.strategyofsecurity.com">Chainguard</a>, <a href="https://fossa.com/?ref=content.strategyofsecurity.com">FOSSA</a>, and other startups also compete in this market.</p>
<p>Bigger cybersecurity companies are coming, too. Major acquisitions and convergence are happening as cloud and application security companies move towards full CNAPP platforms. For example, Snyk <a href="https://snyk.io/news/snyklaunch-june-2023/?ref=content.strategyofsecurity.com">acquired Enso Security</a> in June 2023 for its software supply chain features.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Varun Badhwar, the Founder and CEO of Endor Labs, <a href="https://www.linkedin.com/posts/vbadhwar_its-been-a-busy-few-years-for-supply-activity-7112813308067422208-bIf1?utm_source=share&utm_medium=member_desktop">shared</a> a nice timeline of events that explains the ongoing series of serious software supply chain security incidents:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/09/endor-labs-timeline.png" class="kg-image" alt="" loading="lazy" width="1464" height="866" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/09/endor-labs-timeline.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/09/endor-labs-timeline.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/09/endor-labs-timeline.png 1464w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Endor Labs</span></figcaption></figure><p>We're seeing a lot of new ideas, but this market is still in the early innings. If Xeol can build interesting tech, it's going to attract interest from strategic buyers looking to extend their application security platforms. If software supply chain security continues to be a serious problem, it's possible a large standalone company could emerge.</p>
]]></content:encoded>
            <category>Startups</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/09/Y-Combinator---New.png"/>
        </item>
        <item>
            <title><![CDATA[The Audacious Future of Palo Alto Networks]]></title>
            <link>https://strategyofsecurity.com/the-audacious-future-of-palo-alto-networks/</link>
            <guid>64ef8d80b2cded000153f973</guid>
            <pubDate>Wed, 30 Aug 2023 19:20:12 GMT</pubDate>
            <description><![CDATA[A deeper look into the bold vision for cybersecurity's largest company and its impact on the future of the industry.]]></description>
            <content:encoded><![CDATA[<p>What began as a presumptive funeral ended as a tour de force from the world's largest cybersecurity company. When Palo Alto Networks <a href="https://finance.yahoo.com/news/palo-alto-networks-announce-fiscal-123000831.html?ref=content.strategyofsecurity.com">set its Q4 2023 earnings release</a> for a Friday afternoon, people <a href="https://www.wallstreethorizon.com/blog/Why-is-Palo-Alto-Networks-Reporting-After-the-Bell-on-a-Summer-Friday?ref=content.strategyofsecurity.com">had questions</a>. Questions led to <a href="https://seekingalpha.com/article/4628553-palo-alto-networks-likely-guidance-cut?ref=content.strategyofsecurity.com">investor fears</a> about poor results and lower guidance. Fear became action, which led to a drop in PANW's stock price:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Why is <a href="https://twitter.com/search?q=%24PANW&src=ctag&ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">$PANW</a> struggling? <a href="https://twitter.com/search?q=%24FTNT&src=ctag&ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">$FTNT</a> the answer, or is it something more disturbing?<br><br>IBD weighs in...<br>""Earnings for PANW stock are due after the market close on Friday, and will be followed by an extended call with Wall Street analysts.<br><br>Palo Alto stock plunged on Aug. 2. That's when… <a href="https://t.co/e4GW0JGaTc?ref=content.strategyofsecurity.com">pic.twitter.com/e4GW0JGaTc</a></p>— ARMR Report (@BretRosenthal) <a href="https://twitter.com/BretRosenthal/status/1691875235211997548?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">August 16, 2023</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>Rampant speculation took off from there, including "rumors" about CEO Nikesh Arora's impending resignation:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Rumor is Nikesh Arora may be stepping down but who really knows</p>— R B (@Slushe232) <a href="https://twitter.com/Slushe232/status/1691952850920751223?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">August 16, 2023</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>This bizarre sequence of events set the stage for the spectacle that was Palo Alto Networks' <a href="https://www.fool.com/earnings/call-transcripts/2023/08/20/palo-alto-networks-panw-q4-2023-earnings-call-tran/?ref=content.strategyofsecurity.com">Q4 2023 earnings call</a>. I've never seen anything like it in cybersecurity. The uncertainty leading up to it, followed by the unexpected and thoughtful narrative about the future of the company and the industry was quite the turn of events. Nikesh Arora even acknowledged how unique the situation became:</p>
<blockquote>
<p>Our choice of Friday has definitely made us the topic de jure these past two weeks and has made for some very interesting reading of all the analyst notes.</p>
</blockquote>
<p>To say this stunt (intentional or not — probably intentional) generated attention is an understatement:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">We have 5.5k people dialled into our call. Average attendees last 5 years are about 1k. Not sure what to make of this. Someone just educated me on "Friday Night Lights". Thanks all for working with us on this.</p>— Nikesh Arora (@nikesharora) <a href="https://twitter.com/nikesharora/status/1692661221802016814?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">August 18, 2023</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>Palo Alto Networks delivered in a spectacular way, just like it's been doing for the five years (and counting) of the Nikesh Arora era. Despite several bear-ish analyst estimates and (especially) the rampant speculation about doomsday scenarios, the <a href="https://www.prnewswire.com/news-releases/palo-alto-networks-reports-fiscal-fourth-quarter-and-fiscal-year-2023-financial-results-301904793.html?ref=content.strategyofsecurity.com">Q4 and FY23 earnings</a> were just fine, as were FY24 projections.</p>
<p>The real story is the vision Arora and team laid out for the future of Palo Alto Networks and the cybersecurity industry. It's rare for a company to articulate such a definitive point of view. It's even more rare for them to do it on a Friday afternoon earnings call. And it's <em>exceptionally</em> rare for the point of view to be so outstanding.</p>
<p>So, yes, the event was technically an earnings call — but the implications are so much deeper. Understanding Palo Alto Networks' point of view is a dynamic reflection on several of the most important themes driving the future of the industry.</p>
<h2 id="platformization-as-a-strategic-advantage">Platformization as a strategic advantage</h2>
<p>A foundational idea for everything Palo Alto Networks is doing (and wants to do) is platformization. If you're averse to buzzwords, don't be put off by the term. I'd argue they're using it in the purest sense of the word: integrating a complex set of products and features into a platform with unified data and management. The payoff is an end-to-end platform greater than the sum of its parts.</p>
<p>There's an important distinction between "platformization" and "consolidation." Many people in the industry, including other large cybersecurity companies, have been <a href="https://strategyofsecurity.com/p/2022-cybersecurity-annual-earnings-recap-part-1/">talking</a> <a href="https://strategyofsecurity.com/p/2022-cybersecurity-annual-earnings-recap-part-2/">a lot</a> about consolidation for the past few quarters. In this context, they're referring to customers consolidating the number of security vendors they work with. Vendor consolidation is about cost savings, not value.</p>
<p>The drivers for platformization are very different. It's barely the same thing as vendor consolidation. Platformization has little to do with cost savings. It may <em>result</em> in consolidating products and vendors, saving money as a byproduct. The driver is better security outcomes and value for companies who use the platform.</p>
<p>What does this distinction mean in practice? Consolidation ≠ platformization. Just because you're buying multiple cybersecurity products from a single company doesn't mean the products are integrated or work well together.</p>
<p>Platformization goes beyond consolidation. It's an intentional set of activities to integrate products and unlock value that isn't possible without the integrated platform. It's a <a href="https://www.jimcollins.com/concepts/the-flywheel.html?ref=content.strategyofsecurity.com">flywheel effect</a> — small, incremental wins (new features and modules) accumulate over time, creating increasingly better and more valuable results.</p>
<p>The Palo Alto Networks leadership team did a good job explaining the challenges of disparate products and making their own case for the advantages of platformization. From Nikesh Arora:</p>
<blockquote>
<p>...five years ago, we had customers who had more cybersecurity vendors than they had IT vendors. And it was a customer's responsibility to take these vendors, deploy them across their infrastructure, make them work together to deliver security outcomes.<br>
<br>
You're expecting 2,000 customers out there in the Global 2000 or possibly tens of thousands of customers having security experts trying to stitch together products made by fast growth cybersecurity companies, which are deeply technical and trying to figure out how to correlate what one vendor saw or one set of vendors is telling you versus another. It just seemed like a problem that could not be solved.<br>
<br>
But over the last five years, you've seen that starting to stitch these together, starting to take this disparate solutions for security, trying to provide them in a common fabric has actually allowed us to deliver better security outcomes.<br>
<br>
And we've proven that by doing that in a way, they are -- each of those pieces work in a best-of-breed fashion are leading in their own category. However, they're better together in the platform.</p>
</blockquote>
<p>More from Chief Product Officer Lee Klarich:</p>
<blockquote>
<p>Everything we do is integrated. It's designed to solve hard problems through integration that cannot otherwise be solved with point products. And that combination enables our platforms to be real time and enable real-time security outcomes for our customers.</p>
</blockquote>
<p>You could ask, <em>"What's wrong with point products? We've been doing that forever in cybersecurity."</em> There's also a stigma around monolithic platforms: the individual products making up the platform aren't as good as point solutions. I thought Lee Klarich's explanation of the tension was insightful:</p>
<blockquote>
<p>...prior attempts to do this generally required a tradeoff for the customer. It was the capabilities that were delivered on their attempts to do a platform where not industry leading. And so, the customer had to make a tradeoff between, worse capabilities, but in one place, or best-in-class capabilities, and that's a hard trade off in cybersecurity. That is one thing that we're not asking our customers to do. We're making sure that everything we do is industry leading on its own.<br>
<br>
The second thing we're doing is making sure that when we integrate it, they're actually integrated together in solving hard problems that can't be solved as standalone capabilities. So, we're it's not just about consolidation, although that's a clear value. It's about delivering technical outcomes through the integration that cannot be achieved otherwise.</p>
</blockquote>
<p>Building a platform with best-in-class, industry-leading capabilities is trying to have your cake and eat it, too. It's difficult to pull off and powerful if it works. Palo Alto Networks is one of the few (perhaps the only?) cybersecurity companies capable of building a best-in-class platform across multiple product domains at scale.</p>
<p>Klarich's second point about the value of an integrated platform is also important. There's a reason cybersecurity services is an $80 billion market (<a href="https://investors.paloaltonetworks.com/static-files/4418cf98-419b-415b-823b-c7f315a43c66?ref=content.strategyofsecurity.com">according to PANW</a> on this earnings call). Integrating security products is difficult and expensive. Being intentional about integrating the product up front instead of leaving it to customers to figure out for themselves is a game changer, even if the drudgery of systems integration doesn't excite you.</p>
<p>Integration is just the beginning. Unlocking the ability to solve security problems that aren't possible without an integrated platform is revolutionary. It's not possible to detect attacks reliably, and certainly not proactively, without a common data foundation and set of detections running on top of it. This is just one example — we're all still figuring out what's possible if we have an integrated platform to start with instead of chasing our tails trying to integrate everything.</p>
<p>Longer term, Nikesh Arora played out the impact of platformization even further, predicting the emergence of a standard security platform in the next decade:</p>
<blockquote>
<p>...in the next decade, we will see sort of a standard platform for security out there, just the way we've seen platforms in CRM or we've seen platforms in HR, as you've seen platforms and financial sort of software.<br>
<br>
We think it's time that in the next decade, we will see a security platform in our future, which just works for our customers, and the customers are not spending time integrating multiple vendors trying to stitch their own...that's the only way we're going to get to the future that we need for real-time and AI-based security.</p>
</blockquote>
<p>You have to imagine a bit, but if you're optimistic, it's clear how this vision is possible. The reason it's hard to envision a standard platform for security is because it's really hard to build. Nikesh Arora and Palo Alto Networks are doing the cybersecurity equivalent of <a href="https://www.bbc.com/news/business-32028693?ref=content.strategyofsecurity.com">building Singapore</a>: re-imagining everything from the ground up and pushing the boundaries of what's possible.</p>
<p>Can they pull it off? Time will tell — but you have to admire the audacity of trying.</p>
<h2 id="making-real-time-security-a-reality">Making real-time security a reality</h2>
<p>Real-time security underpins the idea of platformization. Nikesh Arora summarized it nicely:</p>
<blockquote>
<p>The idea that as something is happening, you're able to analyze it real time, on the fly and understand it's good or bad. It is reducing the noise of security in the industry by eliminating all these super close alerts or the bad signal to noise ratio.</p>
</blockquote>
<p>As an industry, we've been talking about the idea of real-time security in various shapes and forms for a long time. Concepts like <a href="https://www.okta.com/identity-101/adaptive-authentication/?ref=content.strategyofsecurity.com">adaptive authentication</a>, <a href="https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2022/should-information-systems-audit-evolve-to-information-systems-continuous-monitoring?ref=content.strategyofsecurity.com">continuous compliance</a>, and plain ol' antivirus scanners are all variations of the same paradigm.</p>
<p>Again, don't get lost in the buzzword here — the underlying idea is important. Nikesh Arora explained it like this:</p>
<blockquote>
<p>What we think lies ahead is the need for security to stop bad actors mid-flight, real-time, as it's happening... What we still aren't good at as an industry is being able to figure out unknowns and stop them before they happen.<br>
<br>
To do that, it requires a fundamentally different way of thinking about security... And that is the idea of having stitched products that work from end to end.</p>
</blockquote>
<p>For as long as cybersecurity has existed (and <a href="https://www.goodreads.com/quotes/1285885-the-art-of-war-is-simple-enough-find-out-where?ref=content.strategyofsecurity.com">longer</a>), we've been trying to close the gap between when something bad happens, when it's detected, and when it's mitigated. Formally, it's the <a href="https://threatpost.com/mttd-and-mttr-two-metrics-to-improve-your-cybersecurity/152149/?ref=content.strategyofsecurity.com">definition of MTTD and MTTR</a>. Nikesh Arora's prediction is a shift towards results, outcomes, and speed:</p>
<blockquote>
<p>It will no longer be about putting a bunch of sensors and thinking about hygiene and security policies. It will be about how do you stop a bad act. And we'll talk more about this because today, the mean time to fix a bad act...is four to six days. That's not acceptable. This thing will have to go down to minutes and near real time.</p>
</blockquote>
<p>This anecdote aligns perfectly with the <a href="https://ventureinsecurity.net/p/future-of-cyber-defense-and-move?ref=content.strategyofsecurity.com">shift from promise-based to evidence-based security</a>. Declaring something as "secure" isn't good enough anymore. We have to prove it's secure and do it in real time.</p>
<p>The challenge with real-time security has always been <em>"how?"</em> As he does, Nikesh Arora took a strong point of view in answering the question:</p>
<blockquote>
<p>Now we sit at a point where everybody is talking about AI. And actually, that is the solution. The solution is to make sure you ingest large amounts of data, you analyze them on the fly, and you're able to deliver superior security.</p>
</blockquote>
<p>At a high level, the "how" is platformization and AI. Anyone who is even mildly technical is likely both intrigued and unsatisfied by this answer. <a href="https://www.linkedin.com/in/gonenfink/?ref=content.strategyofsecurity.com">Gonen Fink</a> to the rescue:</p>
<blockquote>
<p>We need to replace this fragmented architecture with a unified single floor architecture. We need to replace multiple products that collect data with a single data platform and silo detection tools with an AI engine that is trained on a full data center. And then automation should be natively integrated into the flow rather than being placed as an afterthought.</p>
</blockquote>
<p>Here's the same idea in visual form:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/08/CleanShot-2023-08-30-at-13.51.48@2x.png" class="kg-image" alt="Real-time security operations diagram" loading="lazy" width="2000" height="1124" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/08/CleanShot-2023-08-30-at-13.51.48@2x.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/08/CleanShot-2023-08-30-at-13.51.48@2x.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/08/CleanShot-2023-08-30-at-13.51.48@2x.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/08/CleanShot-2023-08-30-at-13.51.48@2x.png 2156w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Palo Alto Networks – Q4 Fiscal Year 2023 Earnings Call &amp; Medium Term Update</span></figcaption></figure><p>Building a real-time security platform like this is a tall order. But, they're right: we do need a fundamental transformation in security operations. Palo Alto Networks is all in on building towards this future. According to Nikesh Arora, it could be within reach:</p>
<blockquote>
<p>We have to make sure every platform that we have continues to grow and continues to get more and more ubiquitous with our customers, at the same time, also stitches these things together. So we believe in the next five to 10 years, we're going to see this shift, which is going to be palpable.</p>
</blockquote>
<p>Getting to a point anywhere close to real-time security across a company's entire security estate is a breakthrough. Skeptics may think it's impossible. They might be right, but these are the shots you need to take when you're trying to be the <a href="https://rakgarg.substack.com/p/the-race-to-100b-the-palo-alto-networks?ref=content.strategyofsecurity.com">first $100 billion cybersecurity company</a>.</p>
<h2 id="convergence-of-cloud-and-application-security">Convergence of cloud and application security</h2>
<p>The convergence of cloud and application security isn't a totally new idea, but we're definitely still in the early innings. This macro-level trend underpins a large part of Palo Alto Networks' strategy. They're one of a few companies with the combination of scale and innovation required to win.</p>
<p>Gartner's term for the convergence of cloud and application security is Cloud-Native Application Protection Platform (CNAPP). Here's how they define it:</p>
<blockquote>
<p>CNAPPs address the full life cycle protection requirements of cloud-native applications from development to production.</p>
</blockquote>
<p>First, the bad news: building a full CNAPP is really hard. In practical terms, building a CNAPP means performing basically every security function across development, build (CI/CD), and production for most of the stack (apps, workloads, networking). In market terms, building a CNAPP requires combining 5-10 other markets into a single platform.</p>
<p>Gartner's latest <a href="https://www.paloaltonetworks.com/blog/prisma-cloud/gartner-cnapp-2023-market-guide/?ref=content.strategyofsecurity.com">Market Guide for Cloud-Native Application Protection Platforms</a> has a graphic that explains the situation quite well:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/08/gartner-cnapp-panw.png" class="kg-image" alt="Chart of CNAPP platform coverage" loading="lazy" width="1668" height="1150" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/08/gartner-cnapp-panw.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/08/gartner-cnapp-panw.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/08/gartner-cnapp-panw.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/08/gartner-cnapp-panw.png 1668w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Market Guide for Cloud-Native Application Protection Platforms</span></figcaption></figure><p>Unsurprisingly, no company has accomplished the massive feat of building a full CNAPP yet. From Gartner:</p>
<blockquote>
<p>No single vendor delivers all of the capabilities [of a full CNAPP] today. CNAPP offerings are emerging from multiple providers, often from different starting points.</p>
</blockquote>
<p>Gartner doesn't do Magic Quadrants for emerging markets like CNAPP, so Palo Alto Networks is listed alongside several other companies as a "representative vendor." Among the representative vendors, Palo Alto Networks is one of the furthest along the path to offering a full CNAPP.</p>
<p>Here's how Palo Alto Networks described the problem space during the forward-looking session of the earnings call (from Ankur Shah):</p>
<blockquote>
<p>In the code phase, there are about half a dozen different tools to scan security posture. In the infrastructure layer, you have yet another set of tools. And finally, in the run time, you have tools for cloud workload protection, network security and application security. Now this is not the right approach to solving this problem for two reasons: number one, each of those tools lack the context. So the customers have to stitch all of that together.<br>
<br>
And the second thing is, like Lee described, there are 33 million developers and a really few security professionals who understand code and cloud. This is a battle that the security team simply can't win with this specific approach.<br>
<br>
We believe there is a better approach. And that's the approach that we have been steadfast in executing over the last four years, and that is an integrated code-to-cloud platform approach that can help customers prevent risks, and breaches in near real time.</p>
</blockquote>
<p>In Palo Alto Networks terminology, the convergence of application and cloud security is called "code-to-cloud." Modules for CNAPP and beyond fall under the Prisma Cloud product umbrella. Their "Code-to-Cloud Platform" approach is a specific example of the platformization and real-time security concepts we talked about earlier. Here's how it works:</p>
<blockquote>
<p>Prisma Cloud does that today by scanning security vulnerabilities at each phase of the application life cycle and also have runtime protection to prevent breaches in runtime.</p>
</blockquote>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/08/CleanShot-2023-08-30-at-13.56.55@2x.png" class="kg-image" alt="Palo Alto Networks code-to-cloud platform approach diagram" loading="lazy" width="2000" height="1122" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/08/CleanShot-2023-08-30-at-13.56.55@2x.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/08/CleanShot-2023-08-30-at-13.56.55@2x.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/08/CleanShot-2023-08-30-at-13.56.55@2x.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/08/CleanShot-2023-08-30-at-13.56.55@2x.png 2156w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Palo Alto Networks – Q4 Fiscal Year 2023 Earnings Call &amp; Medium Term Update</span></figcaption></figure><p>Prisma Cloud began as a cloud security platform, kicked off by the 2018 acquisitions of Evident.io and RedLock. The combination of building and buying on the application security side (including recent acquisitions of BridgeCrew and Cider) have extended Prisma Cloud into CNAPP and beyond.</p>
<p>How is their code-to-cloud strategy working out? On the FY23 earnings call, Nikesh Arora shared that Prisma Cloud has now surpassed $500 million ARR since its <a href="https://www.paloaltonetworks.com/company/press/2019/palo-alto-networks-introduces-prisma--the-secure-way-to-cloud?ref=content.strategyofsecurity.com">initial launch in May 2019</a>. Zero to $500 million ARR in under five years a phenomenal growth, exceeding total ARR for several other public cybersecurity companies.</p>
<p>There's still a long way to go before a clear winner of the CNAPP market emerges —&nbsp;or if the CNAPP market fully materializes in the first place. Many of the best companies in cybersecurity are competing for this market. It's definitely one to keep an eye on.</p>
<h2 id="ais-role-in-security-operations-and-beyond">AI's role in security operations (and beyond)</h2>
<p>The spiciest point of view discussed on Palo Alto Networks' FY23 earnings call was the role of AI in security operations. This topic also happens to be one of the most important in our entire industry, so let's dive in.</p>
<p><em>"The human-driven SOC architecture doesn't work"</em> could not be a more clear indicator of where Palo Alto Networks stands on the current state of things:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/08/CleanShot-2023-08-30-at-13.58.11@2x.png" class="kg-image" alt="Palo Alto Networks human-driven SOC architecture slide" loading="lazy" width="2000" height="1126" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/08/CleanShot-2023-08-30-at-13.58.11@2x.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/08/CleanShot-2023-08-30-at-13.58.11@2x.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/08/CleanShot-2023-08-30-at-13.58.11@2x.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/08/CleanShot-2023-08-30-at-13.58.11@2x.png 2150w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Palo Alto Networks – Q4 Fiscal Year 2023 Earnings Call &amp; Medium Term Update</span></figcaption></figure><p>Here's more color commentary, straight from Nikesh Arora:</p>
<blockquote>
<p>...the biggest opportunity is...security operations and automation because we think the current paradigm is broken. The current paradigm is a reactive security paradigm. It's the paradigm we say, let's hire three more million people to solve security problems.<br>
<br>
No, I don't think that's going to solve the problem. What's going to solve the problem is: Let's collect good data. Let's analyze good data. Let's find out the anomalous behavior. Let's block it while it's happening, so our customers have a better security outcome. I think that's where we're going to be going.<br>
<br>
...<br>
<br>
A future that is driven by software capability, a future that's driven by software solutions with security, and a future which has integration as a key tenet with the objective of delivering a real-time autonomous security outcome. That's where we think the world is going, that's where we'd like to be, and we think we're best positioned in the industry to be able to deliver that future. Not only that, to deliver great security outcomes to our customers.</p>
</blockquote>
<p>How's that for a hot take? The notion of an autonomous SOC was <a href="https://www.forrester.com/blogs/the-autonomous-soc-is-a-pipedream/?ref=content.strategyofsecurity.com">widely criticized</a> when Palo Alto Networks <a href="https://www.paloaltonetworks.com/company/press/2022/palo-alto-networks-introduces-the-autonomous-security-platform--cortex-xsiam--to-reimagine-siem-and-soc-analytics?ref=content.strategyofsecurity.com">announced</a> their Cortex XSIAM platform in February 2022.</p>
<p>Taken literally, the idea of fully automated security operations could seem far-fetched. On the spectrum of beliefs about automation, I'd call myself a realist. I made the case for a framework to help guide decisions about automation in an <a href="https://www.humanlayersecurity.com/blog/the-rise-of-security-augmentation/?ref=content.strategyofsecurity.com">article with Tessian</a> shortly (and coincidentally) before Cortex XSIAM was announced:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/08/hls-augmentation-framework.jpeg" class="kg-image" alt="" loading="lazy" width="1003" height="626" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/08/hls-augmentation-framework.jpeg 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/08/hls-augmentation-framework.jpeg 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/08/hls-augmentation-framework.jpeg 1003w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: [Tessian] Human Layer Security – The Rise of Security Augmentation</span></figcaption></figure><p>XSIAM fits the model perfectly. It's a balance of augmentation and automation, depending on risk:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/08/CleanShot-2023-08-30-at-14.00.28@2x.png" class="kg-image" alt="Palo Alto Networks XSIAM metrics diagram" loading="lazy" width="2000" height="1122" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/08/CleanShot-2023-08-30-at-14.00.28@2x.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/08/CleanShot-2023-08-30-at-14.00.28@2x.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/08/CleanShot-2023-08-30-at-14.00.28@2x.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/08/CleanShot-2023-08-30-at-14.00.28@2x.png 2160w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Palo Alto Networks – Q4 Fiscal Year 2023 Earnings Call &amp; Medium Term Update</span></figcaption></figure><p>Automation is used up front to analyze more data and evaluate relevance. Lower risk incidents are triaged automatically. Higher risk or unknown incidents move up into the augmentation quadrant. They're evaluated by humans with the assistance of technology to improve the speed and accuracy of the investigation.</p>
<p>The combination of automation and augmentation increases coverage (a higher percentage of incidents are addressed) and greater speed (MTTR is reduced from days/months to hours). This example is a best case scenario, of course, but it's a scenario that needs to become reality far more often.</p>
<p>From a business standpoint, the best anecdote I can give to disprove the skeptics is, <em>"show me the pipeline."</em> It's the exact line a former cybersecurity practice leader at PwC used to give when bright, new ideas (often half-baked) were put in front of him. If you couldn't show a tangible pipeline of customers who wanted the potential offering, it wasn't happening.</p>
<p>So, Nikesh... show me the pipeline. Here's the response to this thought exercise, straight from the FY23 earnings call:</p>
<blockquote>
<p>We launched XSIAM to general availability last October and set an aggressive goal of booking north of $100 million in our first year. The year is not over yet. We have closed out the year achieving $200 million in XSIAM.<br>
<br>
This is strong validation that our outcome-based value proposition on XSIAM is resonating well with security organizations and also a sign that interest in applying AI to transform security operations is very high.<br>
<br>
XSIAM is shaping up to be our fastest-growing offering outside our original next-generation firewall releases. XSIAM transactions are large and long term, which helped to further our goal of evolving our customer relationships from vendor to partner.</p>
</blockquote>
<p>How's that for pipeline?! Perfect answer. Zero to $200 million of bookings in less than a year is nothing short of incredible. Especially while the company was continuing to build two other billion dollar businesses and a half-billion dollar business in parallel.</p>
<p>Why did the explosive growth of XSIAM happen? Part of it is the <em>promise</em> of automation. Customers are betting on potential. Revenue is one of the best proxies we have for judging progress, and cybersecurity buyers are voting with their wallets.</p>
<p>We're still early in the journey of transforming security operations with automation. If year one of XSIAM is a sign of what's to come, we could be in for a complete transformation of security operations.</p>
<h2 id="shifting-from-selling-products-to-partnering-on-solutions">Shifting from selling products to partnering on solutions</h2>
<p>The biggest breakthrough shared on the call may also seem to be the most mundane: the company's shift in thinking about go-to-market and moving from selling products to partnering on solutions.</p>
<p>Don't let the simplicity of this transition fool you. It's incredibly difficult to execute. If successful, the implications could be more impactful than any of the flashier topics.</p>
<p>Here's a summary of the GTM transformation shared on the call, shared by BJ Jenkins:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/08/CleanShot-2023-08-30-at-14.01.37@2x.png" class="kg-image" alt="Palo Alto Networks shift from transactional to strategic GTM model" loading="lazy" width="2000" height="1124" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/08/CleanShot-2023-08-30-at-14.01.37@2x.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/08/CleanShot-2023-08-30-at-14.01.37@2x.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/08/CleanShot-2023-08-30-at-14.01.37@2x.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/08/CleanShot-2023-08-30-at-14.01.37@2x.png 2156w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Palo Alto Networks – Q4 Fiscal Year 2023 Earnings Call &amp; Medium Term Update</span></figcaption></figure><p>Jenkins' point of view is relatively straightforward to understand. It's  deceptively profound when you start thinking through the nuances of what it takes to implement and the potential impact if successful.</p>
<p>Most cybersecurity product companies are transactional and everything else on the "from" side of the list above. They sell products and leave it to customers to figure out how the product fits into the strategy and architecture of their respective security programs.</p>
<p>Good professional services firms take the opposite approach. They're strategic partners to clients, and everything else on the "to" side of the list above. They co-create the strategy and transformation journey alongside clients. As part of the strategy, they architect outcomes. Only then do they get into tactics like vendor selection, implementation roadmaps, and everything else required to deliver outcomes.</p>
<p>The difference in approaches is the reason revenue for large professional services firms like Accenture, PwC, Deloitte, and others is orders of magnitude larger than 99% of cybersecurity product companies. The best professional services firms are world-class at helping their customers.</p>
<p>There are many reasons product companies struggle to become strategic partners and focus on outcomes. One of the biggest constraints is having the scale and breadth of products to properly architect outcomes and capture enough of the value to make the effort worthwhile.</p>
<p>Creating a good strategy, a plan for implementing it, and executing well enough to achieve good outcomes is incredibly difficult —&nbsp;something that's hard to appreciate unless you've done it. The size and scope of an enterprise security initiative is often so large that a single point product is barely a blip on the radar. When you're on the side of the point product, it's challenging to be viewed as a strategic and have your voice be heard by the customer.</p>
<p>This is the reason it's difficult to architect outcomes if you're a point solution with a single product. Scaled, multi-product companies like Palo Alto Networks are more capable of architecting outcomes because they have dozens of products and extensive partnerships. They capture more of the value from the outcomes they help architect. It's possible because they have a lot more they can bring to the table, which means customers are more likely to view them as a strategic partner.</p>
<p>A visual from the Palo Alto Networks presentation does a nice job of explaining both the concept and the opportunity:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/08/CleanShot-2023-08-30-at-14.02.36@2x.png" class="kg-image" alt="Palo Alto Networks GTM expansion opportunity" loading="lazy" width="2000" height="1125" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/08/CleanShot-2023-08-30-at-14.02.36@2x.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/08/CleanShot-2023-08-30-at-14.02.36@2x.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/08/CleanShot-2023-08-30-at-14.02.36@2x.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/08/CleanShot-2023-08-30-at-14.02.36@2x.png 2152w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Palo Alto Networks – Q4 Fiscal Year 2023 Earnings Call &amp; Medium Term Update</span></figcaption></figure><p>Expansion of breadth and depth ("land and expand") is the outcome every cybersecurity product company wants. Transitioning from selling products to partnering on solutions is how to get there. If Palo Alto Networks is successful, their reward is a significant financial return and a level of customer value rarely seen in the industry today.</p>
<h2 id="what-happens-if-ubiquitous-platformization-and-real-time-security-outcomes-become-reality">What happens if ubiquitous platformization and real-time security outcomes become reality</h2>
<p>If big ideas like ubiquitous platformization and real-time security become reality, it likely means several major feats in cybersecurity have all been achieved:</p>
<ul>
<li>
<p>An integrated cybersecurity platform with multiple category-leading products within it</p>
</li>
<li>
<p>Demonstrated value and improvement of security outcomes from a unified data layer</p>
</li>
<li>
<p>Meaningful progress in the breadth of coverage and rate of automation for security operations</p>
</li>
</ul>
<p>The future of Palo Alto Networks isn't a consolidation story. It's much larger and more difficult to achieve. And the end state is far more defensible. Platformization is the long, hard road through thoughtful product strategy, integration, and application of new AI and ML superpowers to domain-specific problems.</p>
<p>The problem space and target customers are distinctly enterprise, at least for now. Small and mid-market business segments will likely continue stitching together point products, especially when the products already have pre-built integrations with each other.</p>
<p>It's possible we could see platformization play out on a smaller scale within different customer segments and product categories. You could argue companies like Okta are already doing this today in identity. <a href="https://cyvatar.ai/?ref=content.strategyofsecurity.com">Cyvatar</a> (mid-market and SMB), <a href="https://getagency.com/?ref=content.strategyofsecurity.com">Agency</a> (businesses and individuals), and others are doing the same across different customer segments.</p>
<p>Real-time security is starting to happen, too. The rise of "[X] Posture Management" and "[X] Detection and Response" domains like Cloud Security Posture Management (CSPM), Identity Threat Detection and Response (IDTR), and others are leading indicators of a new wave of real-time security products.</p>
<p>Eventually, products like these are going to mature from nascent, emerging categories to the way everyone does security. Real-time security is inevitable — the only uncertainty is how long it will take us to get there.</p>
<p>What happens to Palo Alto Networks if ubiquitous platformization and real-time security outcomes become reality? They become cybersecurity's <a href="https://www.calcalistech.com/ctechnews/article/byidvs00vi?ref=content.strategyofsecurity.com">first $100 billion company</a>.</p>
<p>Their FY23 earnings call was a grand public rendition of the plan to get there. The success of Palo Alto Networks over the past five years has put them in a rare position to capitalize on advantages only possible at the scale and momentum they have today. Successful or not, they've raised the bar for all of us in the cybersecurity industry.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <category>#featured_article</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2024/02/header-panw-audacious-future.png"/>
        </item>
        <item>
            <title><![CDATA[An Interview with Mitiga’s Tal Mozes on Charting a New Path in Cloud Incident Response]]></title>
            <link>https://strategyofsecurity.com/an-interview-with-mitigas-tal-mozes-on-charting-a-new-path-in-cloud-incident-response/</link>
            <guid>64cbc0938ac2af000156b54e</guid>
            <pubDate>Tue, 08 Aug 2023 12:00:24 GMT</pubDate>
            <description><![CDATA[A discussion about building a product company from a services background, the unique risks and advantages of cloud IR (incident response), the value of tech-enabled services, and the future of his cloud and SaaS IR company, Mitiga.]]></description>
            <content:encoded><![CDATA[<p>I spoke with Tal Mozes, the Co-founder and CEO of <a href="https://www.mitiga.io/?ref=content.strategyofsecurity.com">Mitiga</a>, about the emerging market for cloud incident response. Topics we covered include:</p><ul><li><strong>Leveraging services experience to build a product company: </strong>How 20 years of cybersecurity services experience created an opportunity to build a cloud incident response product.</li><li><strong>The role modern incident response plays in cloud security: </strong>How capabilities have evolved to address the specific risks and opportunities of today’s cloud environments.</li><li><strong>Tech-enabled incident response services: </strong>Discussing why Mitiga blends tech and services to change the paradigm for delivering incident response services.</li><li><strong>The impact of Alphabet’s acquisition of Mandiant: </strong>Perspectives from the incident response market after Alphabet’s acquisition of Mandiant.</li><li><strong>The future of Mitiga: </strong>Where Mitiga is headed after its $25 million Series A round in April 2023.</li></ul><p></p><p><em><strong>Note: </strong>This interview has been lightly edited for clarity.</em></p><h2 id="leveraging-services-experience-to-build-a-product-company">Leveraging services experience to build a product company</h2><p><strong>Cole Grolmus:</strong> I'm curious about your time at EY and the Hacktics services business you owned before EY. You spent 20 years doing pure cybersecurity services before starting Mitiga. Connect the dots going backwards on how that duration of time informed your decision to start Mitiga.</p><p><strong>Tal Mozes:</strong> There are a lot of different aspects to that. In 2004, my current co-founder, Ofer, I, and another co-founder started a company called Hacktics that specializes in application penetration tests. We were pioneers in the application security layer.</p><p>Later on, we automated everything we knew into a product called Seeker Security. We managed to take something that used to be only in professional services and fully automate it into a product. I'll park it there and jump to EY.</p><p>Hacktics was acquired by EY. I joined EY, and I managed the EY Americas Cybersecurity Center of Excellence for a while. Then, I relocated to the UK to build something similar.</p><p>Through that time in EY, selling a lot of professional services, I participated in some of the world's biggest incidents and incident response engagements. Some customers got infected really badly, especially after NotPetya and WannaCry in early 2017.</p><p>We worked with a lot of incident responders, and we saw them send tens of different people just to understand where the system logs were, collect those logs, and sift through them to understand what happened.</p><p>I suggested to those incident responders to automate a lot of legwork—which maybe would have taken three developers around three weeks to build. They told us their business model is time and materials based. They were not looking to be more efficient.</p><p>We had this eureka moment that incident response is a space of cybersecurity that hasn't changed since the internet was public in '94. Not because of the technology challenge, but because of the business model challenge.</p><p>You've worked for a Big Four consulting firm as well, so you know that these firms always strive to give as much value as possible to customers. And the way they deliver that value takes time. At a moment when the financial regulators are talking about the importance of resilience and encouraging companies to increase their ability to bounce back as quickly as possible, there’s potential for misalignment.</p><p>Essentially, if you’re breached, calling a professional services company that will take a time and materials approach to help you recover is misaligned with your goals. I knew at EY that I wanted to change this business model and to build something that allows customers to have a rapid and speedy recovery.</p><p>This is what started the idea for Mitiga: understanding the value customers are looking for and the problems with the business model. In professional services, the holy grail was always to sell value-based projects and not necessarily hourly-based projects.</p><p><strong>Cole Grolmus:</strong> The bigger consulting firms have had a really hard time flipping over into value-based pricing. Maybe someday we'll be able to pull it off with incident response because that’s a company-wide issue when an incident happens.</p><p>But I'm empathetic, too. I understand why it's hard for services firms to shift out of time and materials. It's really hard when the incentives aren't quite aligned. I can understand your feeling where the only real way to tackle this problem effectively is to do it outside the firm and not within it.</p><p><strong>Tal Mozes:</strong> Building a product is a completely different DNA than professional services. So, I had to take it out.</p><h2 id="the-role-modern-incident-response-plays-in-cloud-security">The role modern incident response plays in cloud security</h2><p><strong>Cole Grolmus:</strong> Could you make the distinction between what Mitiga is doing for cloud incident response versus what a Wiz, Orca, or any company in the broader cloud security space is doing with their product?</p><p><strong>Tal Mozes:</strong> Cloud security is a big space. If we take the NIST framework of security, we have: identify, detect, protect, respond, and recover. If you go to Wiz, CASB, it's all about protecting, it's about understanding the controls, misconfigurations, and so on.</p><p>We come in when all of those fail—because unfortunately no protection system is 100% effective. Not surprisingly, cloud and SaaS breaches are rising. We’ve built a unique expertise in cloud and SaaS investigations. It’s part of the recently coined CIRA category—cloud investigation and response automation.</p><p>SaaS risk today is one of the biggest risks. It's like taking your third party risk, multiplied by your Shadow IT risk, multiplied by the application layer risk. This is where you are: SaaS, uncontrolled. Added to the infrastructure risk that you have with AWS, Azure, GCP, and the split responsibility model for security. Many people term this “shared responsibility.” But the truth for IR is that it’s really split.</p><p>We’ve built an expertise in understanding cloud forensics, and from this expertise, we’re able to offer different products and solutions. For example, we understand what kind of forensic data needs to be collected from where, how to store it, and for how long we need to store it—so we built a forensic data lake. Because we understand forensic data so well, we also understand how attacks look in cloud and SaaS environments. So, we were able to proactively build an automated threat hunting capability.</p><p>Knowing all of that, we definitely know how to respond very, very quickly to those incidents when they occur in our clients’ environments. We’re able  to help our customers recover much faster than anyone else. And today, it takes us a few hours to help respond to those incidents instead of weeks and months because we already have all the data we collected in advance and we’ve verified all the data that needs to be kept is being kept.</p><p>We have a lot of automation. Our platform automates the entire process, which is something very, very different than all the other products that you have mentioned. Our approach helps you to gain visibility of your controls, configurations, and stuff that has been misconfigured.</p><p><strong>Cole Grolmus:</strong> Rephrasing what you said in a slightly different way: instead of starting from zero when an incident occurs, you've got a Mitiga customer X percentage along the way of already having the data that they would need to investigate an incident, and the playbooks and the means for how to‌ perform an investigation. That's the starting point for a Mitiga customer, as opposed to starting from scratch and having to build that all on the fly.</p><p><strong>Tal Mozes:</strong> We’ve learned that when it comes to the cloud, if you haven't thought about it in advance, you won't have all the telemetry you will need for a comprehensive investigation. In most cases, you won't be able to ask your cloud provider for those logs, or you will need to wait for weeks to get the data you need to start an investigation.</p><p>Even when you go to certain SaaS services like Office 365, they will only give you the last seven days of data. If you want to look at something older than that, for example, investigate a business email compromise that happened 10 months ago, they will throttle downloading the logs and it'll take you more than 24 hours to download. You'd better save it all in advance, so when you're being called to the response, you don't have to spend three weeks just collecting data. Streamline the investigation with all the automation that we have built.</p><p>You've been through big crises, you know how it is. It's not just the CISO’s office involved. There are different stakeholders taking part in incident response. You have legal and compliance involved, the PR agency, CEO, CFO, Chief Risk Manager. We enable situational awareness by showing everybody on one platform what is going on in their own language. Having an executive summary and timeline of events makes it all a lot easier and saves a lot of time and effort. More than you can imagine.</p><p><strong>Cole Grolmus:</strong> Let’s go further into the approach that Mitiga takes from a product standpoint. On one side, the negatives of cloud security and all the risks are pretty well documented. We don't need to cover that.</p><p>What I'm curious about is the opposite of that, which is: what opportunities are now available to you from an IR perspective in cloud and SaaS that were not there in an on-premise world, back in the days when you were doing EY and other on-prem investigations?</p><p><strong>Tal Mozes:</strong> When you go to on-prem, you won't find two environments that are the same. Each environment has a unique fingerprint. When you go to the cloud, all environments are very similar. My AWS and your AWS would be the same, and my Salesforce and your Salesforce would look the same.</p><p>That allows us to build automation and scale that you couldn't do before. It's not like we can build a Mitiga for on-prem, because you won't have one product that fits all. But in the cloud, we can do that.</p><p>One of the biggest opportunities here is to learn from the network effect. When any of our customers are being breached in their environment, it doesn't matter what they have: GCP, AWS, Slack, Okta. We will deploy a squad of engineers to investigate what had happened, but also codify the incident response for that. And once that has happened, we can execute this exact code against all of our customer environments at once and help everyone respond.</p><p>If you go to the insurance market, one of the biggest risks today in the cyber insurance market is accumulated cyber events, when everybody is being affected at the same time from something like NotPetya, WannaCry, Log4j, or whatever happens. Until today, there was no real answer to that, someone that could handle all those claims at once.</p><p>It takes our technology, or similar technology, the same amount of time to handle one or 4,000 different affected customers of the same cyber campaign. You only need to automate the response for the same breach or attack vector once. This is a huge opportunity for us.</p><p><strong>Cole Grolmus:</strong> That's pretty fascinating from a business model perspective. The network effect gets bigger and better and stronger as the customer base grows, but also cumulatively over time as you see more incidents. Any one customer gets to benefit from every other customer and anything that's happened to them. That's a pretty big advantage.</p><p>On the flip side of that, given that you've spent so much time in on-prem, traditional incident response as well: which cloud security risks and incident response processes are completely different than on-prem? What are new things that we weren't even thinking about before that we now need to worry about?</p><p><strong>Tal Mozes:</strong> When you go to an on-prem IR, usually the methodology is: save the hard drive, capture the memory, split it to three copies, one in the safe, one for the client, one for us to work on, and start investigating from there. Then, look for system logs, application logs if they exist, and so on.</p><p>When we're talking about the cloud, you have to think about logs by design. Logs cost money. There is a risk of not having them, and there is a financial risk of having them. And you need to understand exactly what is missing, why you should allow or enable certain logs, where you should keep them, and how to keep them.</p><p>You can't keep all those logs in your SIEM. SIEM storage can cost three, five million dollars a year. You need to know how to keep the logs, and you need to keep it for more than the 90 days that it’s usually being kept because we see that it takes over 220 days to discover that you've been breached.</p><p>Thinking about all this (we call it a forensics data posture), in advance is mandatory today. It's something that you didn't need to think about as much in the old school.</p><p>We differentiate between infrastructure, SaaS, PaaS, and "lift and shift". A lot of organizations will just move their entire infrastructure into virtualization, but it will look very similar to on-prem. Even in those aspects, we cannot keep treating it all like just another endpoint like we used to do.</p><p>There's a lot you need to understand with the cloud: how it works, what is available for you, what tools are existing, how the logs are being saved. You need to know that they are compressed and encrypted. You have different encryption providers. Every SaaS will have different APIs. Some need to be collected every two minutes and some every 24 hours.</p><p>There's a lot of new knowledge that needs to be gathered to handle this new space of incident response in the cloud. It's completely different from on-prem.</p><p><strong>Cole Grolmus:</strong> So, it's not accurate to say: <em>"I have a solid on-prem incident response process. I can just lift and shift that into the cloud, and it's all of a sudden going to work."</em> It's definitely not anywhere near that easy, and there are a lot of things you need to think about.</p><p><strong>Tal Mozes:</strong> An environment that was breached nine months ago might not even exist today. The cloud is super dynamic. If you don't keep context like: <em>“what were the security settings at that time?” </em>or <em>“what were the configurations at that time?”</em>, those environments won't be there today to investigate. You won't even know where to start.</p><h2 id="tech-enabled-incident-response-services">Tech-enabled incident response services</h2><p><strong>Cole Grolmus:</strong> The tech and services combination within Mitiga is really interesting. We wrote a whole 80-page report on this with Momentum Cyber about services becoming productized, automated, and more of a blend instead of just a service or just a tech platform.</p><p>Could you take me through where you're at with Mitiga on the services and tech spectrum? Which part of the delivery of the overall solution is services, which part is tech, and where do you see that going?</p><p><strong>Tal Mozes:</strong> The majority of what we do is tech. We will sell a subscription to our platform that has a forensic data lake, hunts, and incident response.</p><p>Where the high touch parts are is when you do investigations. We run a continuous and automated threat hunting process, and we get results. Those results could be indications of compromise or indications of attack vectors. You still need someone to look at the results to make sure there are no false positives. We're not alerting the customer and annoying them for no good reason. That can take a few hours.</p><p>When there's an incident response, we can automate‌ parts of it. If we see something for the first time, we need to deploy a team to look at the incident, investigate it, and understand what has happened. They will codify it eventually. You only have to deploy it once. Usually it takes two hours to three days, depending on the incident. You still need to have expert incident responders to understand what happened and investigate it.</p><p>The other part of it is onboarding. We need to work with our customers to explain the risk of why they need to enable a certain log, show them the risk, and show them how to do it. This is where we add people into the technical aspect.</p><p><strong>Cole Grolmus:</strong> It's almost a self-reinforcing thing where the tech is the default mode, but there's expertise, development, and codification of knowledge around that — which makes the tech and data stronger.</p><p><strong>Tal Mozes:</strong> Customers get people supporting them, part of that support reports back to  improve the product for everybody else. For us, they're part of our R&amp;D. For the customer, they get a fully-blown solution. By partnering with our teams they also expand their own internal knowledge and capabilities related to cloud IR.</p><h2 id="the-impact-of-alphabet%E2%80%99s-acquisition-of-mandiant">The impact of Alphabet’s acquisition of Mandiant</h2><p><strong>Cole Grolmus:</strong> One broad industry question: how do you see the incident response market being impacted with Alphabet (Google Cloud) acquiring Mandiant?</p><p>Mandiant is a well-known player in the space, with potential changes occurring with the acquisition and potentially shifting to more of a product-based delivery model. I'm curious about your thoughts on that.</p><p><strong>Tal Mozes:</strong> From what I'm hearing from the market, customers using multi-cloud environments don't want to have one of their cloud providers being in charge of the incident response as well.</p><p>They're still independently serving a lot of customers with hybrid environments. All of them will be hybrid, but not necessarily GCP customers. In that sense, it looks like it's staying‌ the same for now.</p><p>We do have a lot of customers calling us because they were Mandiant customers and they don't want to be using Google for their IR.</p><p><strong>Cole Grolmus:</strong> People still have questions about what the acquisition means and are still figuring out how exactly this is going to impact their business if they’re a Mandiant customer. With such a big deal, it takes a while to truly see what the effects are going to be.</p><p><strong>Tal Mozes:</strong> They're not building the technology to automate IR. We have this platform, and we are not interested in growing the professional services part.</p><p>IR is a very wide term. We're using it loosely. What we are doing very well is a cloud investigation.</p><p>What Mandiant is doing well is holding hands with the customer, talking with comms, with PR, with legal, and other services they can do on top of that.</p><h2 id="the-future-of-mitiga">The future of Mitiga</h2><p><strong>Cole Grolmus:</strong> From the outside looking in, things seem to be going really well. What’s next for you and Mitiga?</p><p><strong>Tal Mozes:</strong> We're starting to work with many insurance providers to allow their customers to buy new insurance products. When they have a breach, they can actually use Mitiga for the IR, quantify their incident response posture, and be more resilient.</p><p>That allows companies to have lower deductibles, allows the insurance company to have lower loss ratios when there is an incident, and so on. The data that we collect from all those incidents is very important to them.</p><p>Most of the insurance companies are suffering from ‌survival bias. They only have data of customers that have been breached, but not of customers that have been attacked and not breached. We collect forensic data insights from customers that have been attacked and not breached, as well as not being attacked or attacked and breached.</p><p>Also, we are developing some more interesting products that we've been asked to build by our customers. A product we call Investigation Workbench allows our customers to do hunts for themselves on top of their data that we're collecting for them.</p><p>There's a lot of stuff on the roadmap. We'll probably launch a new platform capability every quarter. But the essence is always the same: it's expertise in cloud and SaaS investigations.</p><hr><p><em>Thank you to </em><a href="https://www.linkedin.com/in/andrew-smyth-3a1078b4/?ref=content.strategyofsecurity.com"><em>Andrew Smyth</em></a><em> for the introduction and </em><a href="https://www.linkedin.com/in/katielevine/?ref=content.strategyofsecurity.com"><em>Katie Levine</em></a><em> for a detailed review and edits.</em></p>]]></content:encoded>
            <category>Startups</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/02/header-mitiga-interview-c8b7c178260037f8.png"/>
        </item>
        <item>
            <title><![CDATA[The Convergence of Cybersecurity and Everything]]></title>
            <link>https://strategyofsecurity.com/the-convergence-of-cybersecurity-and-everything/</link>
            <guid>64b7ff431b949600017839dd</guid>
            <pubDate>Wed, 19 Jul 2023 18:12:31 GMT</pubDate>
            <description><![CDATA[Exploring the convergence of cybersecurity with adjacent markets, the impact of this trend so far, and what we can expect in the future.]]></description>
            <content:encoded><![CDATA[<p><em>"So, you're working for the FBI?"</em> This was the exact response I got from my grandpa 15 years ago when I told him I was going to work in security after graduating from college. You've heard your own version if you've worked in the industry long enough.</p>
<p>Cybersecurity hasn't been well understood by the public for long. It's hard to pinpoint exactly when this started to change. Anecdotally, awareness seems to have grown alongside the rise of large data breaches regularly sweeping across news cycles.</p>
<p>Broader public awareness of cybersecurity is a side effect of an industry trend that's been building for years: the convergence of cybersecurity and everything. What used to be a narrow and (relatively) isolated domain now seems to be everywhere in tech and society.</p>
<p>We've all noticed individual instances of this phenomenon in passing. You don't start to understand the true magnitude of it until you see how widespread the convergence has become. The qualitative and quantitive impact is even harder to grasp. Movements are easy to feel and difficult to measure.</p>
<p>There are a few rare occasions when you strike a chord and realize you've found a topic people are interested in. This is exactly what happened to me when I tweeted about the convergence of cybersecurity and broader tech last year:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Convergence of cybersecurity and broader tech is definitely a thing:<br><br>– Cloudflare: networking + security<br>– Datadog: observability + security<br>–&nbsp;HashiCorp: infra + security<br>–&nbsp;Snowflake: data lake + security<br>– ServiceNow: ITSM + security<br>–&nbsp;Evervault: database/storage + security</p>— Cole Grolmus (@colegrolmus) <a href="https://twitter.com/colegrolmus/status/1539986719398715393?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">June 23, 2022</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>These companies aren’t successful because they’re cybersecurity companies. They’re successful because they took something that wasn’t inherently secure and made security a core feature. A movement this profound deserves a deeper look.</p>
<h2 id="convergence-with-core-tech-markets">Convergence with core tech markets</h2>
<p>The convergence of cybersecurity and core tech markets is relatively intuitive. Its impact is not. The best way to understand the magnitude is to look at the breadth of domains convergence is touching, along with some relevant anecdotes and data about its impact.</p>
<h5 id="networking">Networking</h5>
<p>The convergence of networking and cybersecurity is far along the maturity scale. What began as plan old "networking" has evolved into multiple markets — including Secure Access Service Edge (SASE), estimated by Gartner to be a $15 billion market with a 36% CAGR by 2025.</p>
<p>Roughly half of the <a href="https://investianalystnewsletter.substack.com/p/sase-breakdown-a-deep-dive-and-the?ref=content.strategyofsecurity.com">SASE market</a> is related to security:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/07/sase-overview.png" class="kg-image" alt="" loading="lazy" width="1184" height="664" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/07/sase-overview.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/07/sase-overview.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/07/sase-overview.png 1184w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: KuppingerCole – SASE Market Overview</span></figcaption></figure><p>Traditional networking companies have fully evolved and converged into major players in the cybersecurity industry. The path towards convergence is an interesting one, <a href="https://www.rbccm.com/en/insights/story.page?dcr=templatedata/article/insights/data/2020/07/why_the_future_of_security_software_is_now&ref=content.strategyofsecurity.com">nicely illustrated</a> by RBC analyst Matt Hedberg:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/07/sase-convergence.jpeg" class="kg-image" alt="" loading="lazy" width="672" height="435" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/07/sase-convergence.jpeg 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/07/sase-convergence.jpeg 672w"><figcaption><span style="white-space: pre-wrap;">Source: RBC – Why the Future of Security Software is “Now”</span></figcaption></figure><p>Cisco and Juniper Networks were early pioneers. Their core networking business (routers and switches) was more than enough to propel both companies to IPOs and establish them as icons of the technology industry.</p>
<p>Fast forward to today, and both companies have made a measurable impact on the cybersecurity industry. Cisco's End-to-End Security business segment now generates $4 billion in annual revenue at a 20% growth rate (as of Q4 2022). It's at the core of the company's growth strategy. From Cisco's Q4 2022 <a href="https://seekingalpha.com/article/4535341-cisco-systems-inc-csco-ceo-chuck-robbins-on-q4-2022-results-earnings-call-transcript?ref=content.strategyofsecurity.com">earnings call</a>:</p>
<blockquote>
<p>...we shared our strategy to help our customers connect their entire security architecture with our new platform, Cisco Security Cloud, which will be a game changer for them as they look to secure their multi-cloud environments with a single cloud-delivered security platform. This is just one part of our broader security innovation cycle. Building on the double-digit growth we saw in security this quarter, we are investing across our security business, focusing on cloud based offerings, best-in-class AI driven threat detection and end-to-end security architectures. These innovations position us well for leadership in the security market.</p>
</blockquote>
<p>The impact of Juniper Networks is more derivative. As Ross Haleliuk <a href="https://ventureinsecurity.net/p/the-power-of-check-point-mafia-the?ref=content.strategyofsecurity.com">pointed out</a>, alumni of the company have founded some of the top companies in cybersecurity. The list includes Palo Alto Networks (the highest valuation among cybersecurity companies today), Netskope (a company in <a href="https://strategyofsecurity.com/p/revisiting-cybersecuritys-2022-ipo-pipeline/">cybersecurity's IPO pipeline</a>), Illumio, Versa Networks, and more.</p>
<p>Cloudflare, Fortinet, Palo Alto Networks, and Zscaler headline a newer generation of companies built from the ground up with network and security convergence in mind. These companies now have a combined $178 billion valuation. They're among the most respected public companies in both cybersecurity and all of tech.</p>
<h5 id="dev-tools">Dev Tools</h5>
<p>Convergence between dev tools and cybersecurity is growing by the day. DevSecOps is now common parlance among both developers and security practitioners. The impact of GitHub, GitLab, and others on driving this trend forward is immeasurable.</p>
<p>GitHub and GitLab began as source code repositories and have since evolved into comprehensive application development platforms. Security is one of the major components. Both companies continue to add major security features, tightening the integration between software development and security.</p>
<p>GitHub has added an impressive set of security features since being acquired by Microsoft, primarily under the <a href="https://docs.github.com/en/get-started/learning-about-github/about-github-advanced-security?ref=content.strategyofsecurity.com">GitHub Advanced Security</a> banner. Features like Dependabot alerts for vulnerable packages are available to all users, while others are part of enterprise licenses. Their velocity of shipping security-related features might be more impressive than any one announcement. A quick scan through the security category of <a href="https://github.blog/category/security/?ref=content.strategyofsecurity.com">GitHub's blog</a> shows a consistent cadence of security releases, both large and small.</p>
<p>Bigger picture, GitHub is one of the most successful technology industry acquisitions of all time, eclipsing $1 billion ARR in late 2022. Growth metrics haven't been shared publicly by Microsoft, but it's safe to assume their advancements in security were a major factor in enterprise growth.</p>
<p>For GitLab, GitHub's open source competitor, security has become a central part of <a href="https://about.gitlab.com/company/strategy/?ref=content.strategyofsecurity.com">their strategy</a>. It's literally the company's main goal:</p>
<blockquote>
<p>...our strategic goal is to be the leading complete&nbsp;DevSecOps Platform.</p>
</blockquote>
<p>A deeper dive into their <a href="https://about.gitlab.com/direction/?ref=content.strategyofsecurity.com#devsecops-stages">product vision</a> (which is, fittingly, open source) talks about their objectives for building a converged DevSecOps platform and estimated timeline for accomplishing it:</p>
<blockquote>
<p>...we expect to continue rapidly maturing our DevSecOps platform so that GitLab is able to replace any DevSecOps point solution.<br>
<br>
To replace any DevSecOps solution will require most of our categories to be lovable, which is likely a 10 year journey. To ensure rapid progress, we have a 3-year&nbsp;goal to have 50% of our categories at lovable maturity by the end of 2023, and this&nbsp;three year product strategy articulates our current focus. Once we achieve that goal, there will still be more work to do, but having half our categories lovable will mean most DevSecOps tools are replaceable by GitLab.</p>
</blockquote>
<p>GitLab's $7.64 billion market cap speaks for itself — it's one of the best technology IPOs in recent years, despite a valuation decline along with the broader tech markets. Their strategy for building a converged DevSecOps platform was the headline for the company's IPO.</p>
<p>The convergence story isn't all about GitHub and GitLab. Products like <a href="https://ngrok.com/?ref=content.strategyofsecurity.com">ngrok</a> are classic examples of dev tools where security is a major component of the product's overall value. There are far more companies than can be mentioned here — a testament to the momentum behind convergence in this market.</p>
<h5 id="application-performance-monitoring-apm-and-observability">Application Performance Monitoring (APM) and Observability</h5>
<p>Log management, APM, observability, and SIEM were destined to be together. Strictly speaking, the Venn diagram for these markets isn't a perfect circle. However, the overall process of collecting performance and log data lends itself to specific use cases. Security happens to be a large one.</p>
<p>Splunk began as a data analytics company focused on application performance and operations. Its product portfolio had a minimal security footprint at the time of its IPO in 2012. Their $190 million <a href="https://venturebeat.com/security/splunk-acquires-cybersecurity-startup-caspida-for-190m/?ref=content.strategyofsecurity.com">acquisition of Caspidia</a> in 2015 was a milestone for Splunk and cybersecurity — their unoffical entrance into the market. The product brought behavioral analytics to the Splunk platform, giving customers the ability to detect suspicious behavior from security logs.</p>
<p>Just over a decade from their IPO, Splunk now has $3.6 billion in annual revenue and is a widely recognized leader in both observability and security. Their product portfolio includes several security operations (SecOps) focused products:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/07/splunk-platform-overview.png" class="kg-image" alt="" loading="lazy" width="1362" height="764" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/07/splunk-platform-overview.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/07/splunk-platform-overview.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/07/splunk-platform-overview.png 1362w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Splunk Investor Relations</span></figcaption></figure><p>They don't break out revenue by business segment, so it's unclear how much revenue is generated by their security portfolio. Specifics aside, the convergence between security, operations, and observability is clear.</p>
<p>In Gartner's latest Magic Quadrant for Application Performance Monitoring and Observability, 16 of the 19 companies included also have significant security product portfolios. I added red dots to the diagram for each company with security products:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/07/Gartner-MQ-for-APM---June-2023---Convergence.png" class="kg-image" alt="" loading="lazy" width="1920" height="1920" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/07/Gartner-MQ-for-APM---June-2023---Convergence.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/07/Gartner-MQ-for-APM---June-2023---Convergence.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/07/Gartner-MQ-for-APM---June-2023---Convergence.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/07/Gartner-MQ-for-APM---June-2023---Convergence.png 1920w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Gartner – Magic Quadrant for Application Performance Monitoring and Observability</span></figcaption></figure><p>My classification of "security products" is admittedly broad — only a few companies have a full SIEM, for example. However, the direction is clear: APM companies are becoming major players in cybersecurity.</p>
<h5 id="infrastructure">Infrastructure</h5>
<p>The convergence between infrastructure and security gained serious credibility when HashiCorp went public in December 2021. HashiCorp pioneered a new approach for building infrastructure products by focusing on workflows and domains, not tools. Their process-focused approach spans multiple domains. In their own words:</p>
<blockquote>
<p>...critical processes involved in delivering applications in the cloud: infrastructure provisioning, security, networking, and application deployment.</p>
</blockquote>
<p>The company (formally) started in 2012 and didn't offer a pure security product until Vault in 2015. The company doesn't disclose revenue by segment, so we don't have enough information to attribute exactly how much revenue is being generated by its security products. As I noted when <a href="https://strategyofsecurity.com/p/hashicorps-ipo-bottom-up-adoption-and-layering">writing about HashiCorp's IPO</a>, the details don't really matter:</p>
<blockquote>
<p>Even though HashiCorp only classifies two of its products as pure security offerings, all of their products support security in important ways. That's the type of future we want —&nbsp;one where security is an inherent part of how we build and deliver tech, not an afterthought.</p>
</blockquote>
<p>HashiCorp's breakthrough is building a fully integrated infrastructure platform where security is a core part of everything. A successful IPO helps validate the trend.</p>
<p>Teleport is an earlier stage company (kind of—it's a <a href="https://techcrunch.com/2022/05/03/2309618/?ref=content.strategyofsecurity.com">unicorn</a>) focused on infrastructure security that has the potential to follow a similar trajectory. Their product helps developers securely access cloud infrastructure without requiring passwords, tokens, or other authentication factors which are easy to compromise.</p>
<p>Just as dev tools and security are converging to make code more secure, infrastructure management and security are converging to do the same for cloud workloads. The success of standalone companies like HashiCorp and Teleport, along with native security features from cloud providers, is a driving force behind the migration of workloads from on-premise to cloud.</p>
<h5 id="it-service-management-itsm">IT Service Management (ITSM)</h5>
<p>IT Service Management (ITSM) and security have always had areas of overlap for necessities like access requests, change management, and other user-related security workflows. However, ServiceNow is pushing the traditional boundary even further. The convergence of ITSM, security operations, risk and compliance, and more into the ServiceNow platform is one of the company's main growth drivers.</p>
<p>ServiceNow's platform has way, way more security and GRC features (more like full-blown products at this point) than many people realize. It's a surprisingly useful aggregator of security processes and data.</p>
<p>Workflows for core security processes like vulnerability management, incident response, and configuration management invariably end in a ticket that someone needs to act upon and remediate (...someday, maybe). ServiceNow makes this handoff natural, both by integrating with other security tools and threat intelligence sources and by developing native features of its own. On the GRC side, it's used for risk management, business continuity management, vendor risk management, and anything else that needs a workflow for ongoing tracking and monitoring.</p>
<p>ITSM and its adjacent ticket-based security workflows are perfect candidates for automation and centralization. ITSM is a necessary capability for any organization with more than a few people. Operationally, it makes sense for many companies to centralize workflows (including security) instead of having workflows all over the place in domain-specific tools.</p>
<p>Similar to other hybrid companies, ServiceNow doesn't break out revenue by product segment in its earnings releases. However, this stat from CEO Bill McDermott in their Q4 2022 earnings call is a nice data point about the role security plays in driving growth:</p>
<blockquote>
<p>Security and Risk Solutions were at 13 of the top 20 [largest deals for the period], with 9 deals over $1 million.</p>
</blockquote>
<p>Strategically, it makes sense for ServiceNow and other ITSM products to accelerate the security convergence customers are asking for.</p>
<h2 id="emerging-areas-of-convergence">Emerging areas of convergence</h2>
<p>The convergence of security and traditional tech markets is just the beginning. Magic is going to happen once convergence reaches the long tail of less obvious markets. This section highlights a few of the many examples where security is converging into previously uncharted territory.</p>
<h5 id="cloud-data-platforms">Cloud Data Platforms</h5>
<p>Cloud data platforms have recognized cybersecurity is a major set of use cases and area of opportunity. Intense <a href="https://research.contrary.com/reports/databrick-vs-snowflake?ref=content.strategyofsecurity.com">competition</a> across verticals between Snowflake, Databricks, and others has been ongoing for years.</p>
<p>Snowflake has developed a massive partner ecosystem across data integration, business intelligence, data science, and (you guessed it) security (red highlight mine):</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/07/snowflake-cybersecurity-ecosystem.png" class="kg-image" alt="" loading="lazy" width="1920" height="1610" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/07/snowflake-cybersecurity-ecosystem.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/07/snowflake-cybersecurity-ecosystem.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/07/snowflake-cybersecurity-ecosystem.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/07/snowflake-cybersecurity-ecosystem.png 1920w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Snowflake – User Guide</span></figcaption></figure><p>Beyond basic data integrations, an entire ecosystem of cybersecurity startups have been building high growth businesses on Snowflake's platform:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/07/mc-snowflake-cybersecurity-ecosystem.png" class="kg-image" alt="" loading="lazy" width="2000" height="952" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/07/mc-snowflake-cybersecurity-ecosystem.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/07/mc-snowflake-cybersecurity-ecosystem.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/07/mc-snowflake-cybersecurity-ecosystem.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/07/mc-snowflake-cybersecurity-ecosystem.png 2000w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Momentum Cyber – Cybersecurity Almanac 2022</span></figcaption></figure><p>The level of interdependence varies by company, but each has established itself as a significant technology partner for Snowflake. It's still unclear if these companies will remain partners or emerge as future acquisition candidates.</p>
<p>Both Snowflake and DataBricks made their first cybersecurity-related acquisitions in 2023. Snowflake <a href="https://www.snowflake.com/blog/snowflake-to-acquire-leapyear/?ref=content.strategyofsecurity.com">acquired LeapYear</a>, a data privacy platform for sharing sensitive data between parties. DataBricks <a href="https://www.databricks.com/blog/welcome-okera-adopting-ai-centric-approach-governance?ref=content.strategyofsecurity.com">acquired Okera</a>, an AI-focused data governance and privacy platform.</p>
<p>Each acquisition brought a complimentary set of security features for to the data platforms — they weren't additive products focused specifically on cybersecurity. LeapYear helped add security capabilities to Snowflake's third party data rooms. Okera brought a set of AI-focused data classification and privacy capabilities to DataBricks, augmenting their rapidly growing set of use cases for LLMs and AI. I expect more acquisitions like these (security features for core data platform use cases) near-term before either company starts acquiring pure cybersecurity companies.</p>
<p>In addition to partnerships and acquisitions, Snowflake has been building cybersecurity-focused features into its platform. Its cybersecurity workload <a href="https://www.snowflake.com/news/snowflake-launches-new-cybersecurity-workload-to-detect-and-respond-to-threats-with-the-data-cloud/?ref=content.strategyofsecurity.com">announcements</a> in 2022 are a recent example, with security log ingestion and analysis as the primary focus.</p>
<p>We're still in the early days of convergence between cloud data platforms and cybersecurity. Cloud data platforms have definitely arrived — Snowflake is a high performing public company with a $60 billion market cap, and DataBricks is a top candidate in tech's IPO pipeline despite <a href="https://www.yahoo.com/lifestyle/data-management-company-databricks-really-122201271.html?ref=content.strategyofsecurity.com">debates about its current valuation</a>. A combination of factors, including the need to fuel growth and shifting markets for SIEM and XDR mean cybersecurity is going to be increasingly more important for both companies.</p>
<h5 id="human-resources">Human Resources</h5>
<p>In the game of corporate politics, human resources has traditionally been one of the arch nemeses for security teams. Turf wars develop over access to people data, integrations with HR systems, and more. HR data is oxygen for workforce identity systems, which rely on timely updates about hiring, job changes, terminations, and more to manage access to corporate systems.</p>
<p>Rippling is bringing these worlds together by combining traditional HR functions with closely related security and IT service management processes. Rippling CEO Parker Conrad described the platform like this in an <a href="https://stratechery.com/2022/an-interview-with-rippling-founder-parker-conrad/?ref=content.strategyofsecurity.com">interview with Stratechery</a>:</p>
<blockquote>
<p>Rippling builds a bunch of things that historically would not have been thought of as belonging to the same system. Payroll, HRIS, a bunch of related systems around HRIS but then also identity, single sign-on user management, security services, device management, and the unifying theme is that each of these systems are reservoirs of employee data in their own right.</p>
</blockquote>
<p>Convergence among this set of related processes is inevitable — especially as both leaders and employees care more about employee experience. Newer companies born in the cloud don't have time for infighting between HR and security teams. They also don't have the technical burden of displacing legacy HR systems.</p>
<p>For many companies, the way forward is an integrated approach like Rippling. When basic employee administration processes just work like they should, people can focus their time on solving value-creating problems on the product side.</p>
<h5 id="fintech-and-fraud">FinTech and Fraud</h5>
<p>Massive progress in FinTech is driving convergence between cybersecurity and fraud. It's also creating a new set of issues. People have wanted to steal money since money was invented. As the internet becomes the default mode for delivering financial services, crime follows suit.</p>
<p>Unsurprisingly, financial motives were overwhelmingly the top driver of breaches identified in <a href="https://www.verizon.com/business/resources/reports/dbir/?CMP=OOH_SMB_OTH_22222_MC_20200501_NA_NM20200079_00001&ref=content.strategyofsecurity.com">Verizon's 2023 Data Breach Investigations Report</a>. They were a factor in 94.6% of breaches studied in the past year, and a consistent leader for many years now.</p>
<p>In response, cybersecurity and fraud features are becoming a core component of FinTech product offerings. There is a whole category of <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#fraud-and-transaction-security">companies focused on fraud</a>. From a convergence standpoint, the interesting development is FinTech platforms building and acquiring cybersecurity and fraud products.</p>
<p>Stripe now has products for <a href="https://stripe.com/identity?ref=content.strategyofsecurity.com">identity verification</a> and <a href="https://stripe.com/radar?ref=content.strategyofsecurity.com">fraud protection</a>. Shopify's <a href="https://www.shopify.com/commerce-components?ref=content.strategyofsecurity.com">enterprise commerce components</a> include fraud protection, identity, customer data management, vaulting of card data, and other security and compliance features. PayPal offers <a href="https://www.paypal.com/us/business/operations/risk-management?ref=content.strategyofsecurity.com">risk management and fraud</a> features for businesses. The list goes on.</p>
<p>Traditional financial services companies are also making moves. Mastercard has been a particularly active buyer of cybersecurity and fraud companies. Recent acquisitions and investments include Baffin Bay Networks, Enveil, RegGenome, Bitfy, CipherTrace, and Ekata. They now offer a full suite of <a href="https://www.mastercard.us/en-us/business/large-enterprise/safety-security/cybersecurity.html?ref=content.strategyofsecurity.com">cybersecurity products</a> for business customers.</p>
<p>FinTech companies are also a major driver of adoption for consumer security technologies. Identity includes many examples, with financial services companies nudging customers to adopt MFA long before the idea was widely accepted as good security practice.</p>
<p>Today, FinTech companies are one of the main drivers for passwordless authentication. Mercury is an <a href="https://mercury.com/blog/inside-mercury/multi-factor-authentication?ref=content.strategyofsecurity.com">early adopter</a> of passkeys for MFA. Finance is one of the top categories on <a href="https://passkeys.directory/?ref=content.strategyofsecurity.com">Passkeys.directory</a>, a site tracking adoption of passkeys. Notable FinTech companies supporting passwords include Robinhood, PayPal, Binance, and others.</p>
<h5 id="storage-and-databases">Storage and Databases</h5>
<p>Security has historically been a secondary feature in storage and database products. We've had full disk encryption, field-level encryption, and an entire <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/">category of database security tools</a> for years. The convergence with cybersecurity is now making these features front and center — including companies where security is the core value proposition. I went <a href="https://strategyofsecurity.com/p/an-interview-with-ryan-cooke-about-jumpwire-and-data-encryption/">deep into this topic</a> with Ryan Cooke, the founder and CEO of JumpWire.</p>
<p>A new generation of security-focused storage and database companies for developers includes Evervault, SkyFlow, Cape Privacy, JumpCloud, and more. AWS offers similar functionality natively with its Nitro Enclaves product. Approaches vary, generally falling within a range from enhancements to existing data stores to dedicated infrastructure for data storage (secure enclaves).</p>
<p>Privacy is also a driving factor for convergence. AI, ML, and LLMs are driving adoption for a new set of privacy-focused companies. Blyss, Zama, Ravel, Duality, Sarus, and other early stage companies are behind the advancements in this space. Homomorphic encryption is the emerging approach many of these companies are using. I analyzed <a href="https://strategyofsecurity.com/p/y-combinators-winter-2023-cybersecurity-privacy-and-trust-startups/">Blyss</a> and <a href="https://strategyofsecurity.com/p/y-combinators-winter-2022-cybersecurity-privacy-and-trust-startups/">Sarus</a> as part of my coverage for their respective Y Combinator batches.</p>
<p>We're in the early stages of a new wave of activity for secure storage and databases. This area is well positioned to be a beneficiary of larger tech trends like AI/ML, privacy regulations, and more — all of which have a need for security as a central part of their value proposition.</p>
<h5 id="domains">Domains</h5>
<p>Convergence has even reached domains, of all things. Unstoppable Domains, a Web3 startup, <a href="https://techcrunch.com/2022/07/27/web3-digital-identity-startup-unstoppable-domains-raises-funds-at-1-billion-valuation/?ref=content.strategyofsecurity.com">raised a $65 million</a> and became a unicorn with its 2022 Series A round. Let's put our Web3 skepticism aside (we're in the "emerging" section of the article, after all) and look at the practical benefits of converging domains and identity.</p>
<p>Unstoppable Domains is the company behind the .eth domain extension, which was seemingly everywhere in tech during the latest peak of crypto hype. Status was undoubtedly a motive, but identity-focused domains have a more practical purpose. From Matthew Gould, founder and CEO of Unstoppable Domains:</p>
<blockquote>
<p>For too long, companies have controlled people’s digital identities, and Unstoppable Domains is putting that power back into the hands of people. As the digital economy becomes a larger part of our lives, it’s time for people to own their identity on the internet.<br>
<br>
We’re thrilled to partner with Pantera and other investors who share our vision of onboarding billions of people onto Web3 through NFT domains that unlock user-owned, private, and portable identities.</p>
</blockquote>
<p>One of the biggest rough edges in crypto-powered commerce is sharing wallet addresses. These long and gnarly character strings are conceptually similar to navigating the internet using only IP addresses. Nobody would use the internet this way, which is why standard DNS is a game changer.</p>
<p>Verifiably linking domains to identities is a massive improvement for Web3. It reduces the friction of moving money while simultaneously reducing fraud and improving security. A win-win if there ever was one. Throw in the added benefit of authentication and portable identities, and we're really on to something.</p>
<p>Time will tell if this approach gains traction. For now, it's an interesting example of the convergence between commerce, identity, and privacy.</p>
<h5 id="national-security">National Security</h5>
<p>The convergence of cybersecurity and national security has the highest stakes of all. The link between cybersecurity and national security isn't new, but its rising level of importance among more traditional forms of warfare definitely is.</p>
<p>As <a href="https://en.wikipedia.org/wiki/Information_warfare?ref=content.strategyofsecurity.com">information warfare</a> gains popularity among nation states and organized crime groups, <a href="https://www.airuniversity.af.edu/Wild-Blue-Yonder/Article-Display/Article/2109784/multi-domain-operations-bridging-the-gaps-for-dominance/?ref=content.strategyofsecurity.com">multi-domain operations</a> become critical. In the MDO model, cyber warfare is a sector of its own, cross-cutting domains like land, air, and water. On a practical level, offensive cyber operations are now <a href="https://www.cnn.com/2022/06/02/politics/us-hackers-ukraine-support/index.html?ref=content.strategyofsecurity.com">part of the playbook</a> for countries like the United States.</p>
<p>Palantir is the company most synonomous with the convergence between national security and cybersecurity (and technology in general). From a private sector standpoint, Palantir is almost single-handedly driving the convergence. The financial outcome was a <a href="https://www.reuters.com/article/us-palantir-ipo/palantir-valued-at-20-billion-in-choppy-stock-exchange-debut-idUSKBN26L3DR?ref=content.strategyofsecurity.com">$20 billion direct listing</a> to the NYSE in 2020. Their market cap has nearly doubled since then (currently at $38 billion) despite steep valuation declines across the technology sector.</p>
<p>This convergence story has two important dynamics. Cybersecurity is a battleground of its own, which is important but now obvious. The second dynamic is the interesting one going forward: technology and AI are going to augment warfare across every domain. From Marc Andreessen's recent <a href="https://a16z.com/2023/06/06/ai-will-save-the-world/?ref=content.strategyofsecurity.com">essay about AI</a>:</p>
<blockquote>
<p>I even think AI is going to improve warfare, when it has to happen, by reducing wartime death rates dramatically. Every war is characterized by terrible decisions made under intense pressure and with sharply limited information by very limited human leaders. Now, military commanders and political leaders will have AI advisors that will help them make much better strategic and tactical decisions, minimizing risk, error, and unnecessary bloodshed.</p>
</blockquote>
<p>The future is widespread use of technology and AI for the benefit of national security. Again from Marc Andreessen:</p>
<blockquote>
<p>...let’s mount major efforts to use AI for good, legitimate, defensive purposes. Let’s put AI to work in cyberdefense, in biological defense, in hunting terrorists, and in everything else that we do to keep ourselves, our communities, and our nation safe.</p>
</blockquote>
<p>That's exactly what companies like Palantir are doing, and is certainly happening within nation state military branches. Progress in national security is one of the best possible outcomes of convergence.</p>
<h2 id="what-does-all-of-this-mean">What does all of this mean?</h2>
<p>I'm certain there are more examples of convergence than I mentioned here, even at nearly 5,000 words. The convergence of cybersecurity and "everything" is hyperbole, but the broader point is undeniable.</p>
<p>Not everything needs security, of course. However, as the examples in this article demonstrate, the surface area for convergence is broader than you might expect — even if you already recognized it's happening. This means a few things.</p>
<p>We're likely to see more acquisitions of cybersecurity companies by strategic buyers outside the industry. Acquisitions will happen more often and at higher dollar volumes than in the past. A couple recent examples help illustrate the point.</p>
<p>Alphabet (Google) <a href="https://strategyofsecurity.com/p/the-mirage-of-mandiant/">acquired Mandiant</a> for $5.3 billion — its second largest acquisition of any kind, and likely more than the total value (disclosed and undisclosed) of its 11 other cybersecurity acquisitions combined. The acquisition price was high because of cybersecurity's strategic importance in driving growth for Google Cloud.</p>
<p>HPE's <a href="https://www.crn.com/news/security/axis-security-acquisition-gives-hpe-the-edge-in-sase-battle-antonio-neri?ref=content.strategyofsecurity.com">acquisition of Axis Security</a> is a recent example of a strategic buyer outside the industry. HPE is a diversified enterprise tech company, not a pure cybersecurity company. HP's current and former entities, including both HP and HPE, have made six cybersecurity acquisitions among 46 total transactions, according to CapIQ and Momentum Cyber data. Axis Security is the company's first cybersecurity acquisition since 2019 and it second largest cybersecurity acquisition after ArcSight.</p>
<p>Bigger picture, convergence leads to a larger overall TAM for cybersecurity sub-sectors and the overall industry. Greater strategic importance in the broader technology sector means both expansion of existing markets and the creation of new ones.</p>
<p>During downturns like we're in right now, it's easy to think with a fixed mindset — things like <em>"the cybersecurity market is stagnant, and the only way to grow is by taking market share from competitors."</em> While <a href="https://strategyofsecurity.com/p/an-intro-to-consolidation-and-aggregation-in-cybersecurity/">partly true</a> for mature sub-sectors of the industry, this point of view is more about industry consolidation than convergence. Convergence with other markets is one of several reasons cybersecurity is a growth market. It's about growing the pie, not reallocating the existing one.</p>
<p>Any market where security is an inherently valuable property is a candidate for convergence, at least to some degree. We're going to see deeper integration of security into everything. Widespread convergence may blur the lines of what the cybersecurity market even is. We can already see that happening with hybrid companies like Cloudflare, Palantir, Synopsis, and others — are they in the cybersecurity industry, or not?</p>
<p>The industry's periphery is becoming less clear, but in a way, that's what we've always wanted. Cybersecurity is moving from an afterthought to a fast follower, if not (gasp) a full-blown influencer.</p>
<p>On a micro level, we have examples like DevSecOps moving security earlier in the development lifecycle and password managers reaching mass adoption. On a macro level, security will play a role in technological shifts sooner. It took people a long time (relatively speaking, in technology terms) to realize that operating systems for PCs need to have good security. Security wasn't absent, but it also wasn't a core part of the value proposition or something buyers prioritized when making purchasing decisions. Mobile was faster. The current wave of AI is faster still. We're making progress.</p>
<p>A transformational shift in thinking is well underway now — one where cybersecurity is inherent to many types of businesses and a driver of growth.</p>
]]></content:encoded>
            <category>Concepts</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/07/v1_-The-Convergence-of-Cybersecurity-and-Everything.png"/>
        </item>
        <item>
            <title><![CDATA[Momentum Cyber's RSA Conference 2023 Recap]]></title>
            <link>https://strategyofsecurity.com/momentum-cyber-rsa-conference-2023-recap/</link>
            <guid>646cdaf661104d0001e16f6e</guid>
            <pubDate>Tue, 23 May 2023 15:35:57 GMT</pubDate>
            <description><![CDATA[Recapping the trends and highlights from RSA Conference 2023 with Momentum Cyber.]]></description>
            <content:encoded><![CDATA[<p>Momentum Cyber's RSA Conference 2023 Recap was released on Monday, May 22nd. It's a recap of trends and highlights from a few of the great sessions and events from the week.</p><p>I was a contributor again for this year's coverage as part of my role as a Senior Advisor to the firm's research team.</p><p>You can read the full report here — no email required:</p><div class="kg-card kg-button-card kg-align-center"><a href="https://momentumcyber.com/docs/Special_Reports/Momentum_Cyber_RSA_Conference_2023_Recap.pdf?ref=content.strategyofsecurity.com" class="kg-btn kg-btn-accent">Read the Report</a></div>]]></content:encoded>
            <category>Events</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/05/Logo_-RSAC-2023.png"/>
        </item>
        <item>
            <title><![CDATA[An Interview with Ryan Cooke about JumpWire and Data Encryption]]></title>
            <link>https://strategyofsecurity.com/an-interview-with-ryan-cooke-about-jumpwire-and-data-encryption/</link>
            <guid>6462a7c26474300001b436fe</guid>
            <pubDate>Tue, 16 May 2023 12:05:51 GMT</pubDate>
            <description><![CDATA[A discussion about new developments in the data encryption market, what to think about when implementing it, and overcoming the fears people have about encryption.]]></description>
            <content:encoded><![CDATA[<p>We’ve entered a new era for data encryption. Early stage companies are making encryption far more accessible, reliable, and easier to use for developers than ever before. <br></p><p>It’s the progress we need as more data moves to the cloud. The network and access-based approaches we’ve used for securing on-premise data don’t fit the model for cloud security. More encryption is a big part of the solution.<br></p><p>I spoke with Ryan Cooke, the Founder and CEO of JumpWire, about what’s happening in the data encryption market. I first covered JumpWire in my <a href="https://strategyofsecurity.com/p/y-combinators-winter-2022-cybersecurity-privacy-and-trust-startups/">analysis of Y Combinator’s Winter 2022 batch</a>. This discussion goes deeper into both JumpWire and much broader topics around data encryption:</p><ul><li><strong>Data encryption in the cloud: </strong>How the age-old problem of data security changes when data moves to the cloud.</li><li><strong>Emerging solutions for data encryption: </strong>Comparing new approaches to data encryption.</li><li><strong>How JumpWire works: </strong>A deeper dive into how JumpWire helps companies implement data encryption on their existing data architecture.</li><li><strong>Doing data classification and enforcement on the fly: </strong>How the approach to data security differs when you can do data classification and enforcement on the fly.</li><li><strong>Approaches for implementing data encryption: </strong>Things to think about and nasty ‘gotchas’ when implementing data encryption.</li><li><strong>Why companies implement data encryption: </strong>A quick, anecdotal exploration into why people implement data encryption.</li><li><strong>Why data encryption is ready for mass adoption: </strong>Overcoming some long-held fears and philosophical concerns about encryption.</li></ul><p></p><p>I intentionally left this discussion long because (personally) I had a lot of learning to do about how data security and encryption have evolved. Some of the discussion was background knowledge for me. I decided to share it with you rather than assuming you already know everything about the topic. The sections are shorter than usual to help you skip around if you find some parts more relevant than others.</p><p><em><strong>Note: </strong>This interview has been lightly edited for clarity.</em></p><h2 id="data-encryption-in-the-cloud">Data encryption in the cloud</h2><p><strong>Cole Grolmus:</strong> Database security has been a known issue forever, or at least as long as I’ve been in security. Why isn't this a solved problem already?! What happened that left an opportunity for JumpWire to solve such a big problem?</p><p><strong>Ryan Cooke:</strong> A big part of it is cloud. Traditional data security and data infrastructure tooling that you had in the past is not translated at all to the cloud. A firewall in your data center is very different than an AWS security group. It’s the same thing for other security categories. The technical implementation is completely different between what you would deploy in your data center versus in the cloud.</p><p>On the encryption side, TLS is great. It's encrypting bytes on your network wire. You absolutely need that when you're in the data center because anybody can look at traffic across the wire. In the cloud, you're on a virtualization plane where you don't have a network you can just snoop on. So TLS‌ is still important, but it's not providing you with the same security provisions.</p><p>In the cloud, all of your infrastructure is‌ an API. Anybody can get access to that infrastructure through the API. Now, your risk and intrusion model changes. In the security industry, we’re going through a pretty major shift in the tooling and the controls of, <em>“okay, what are the actual threats to my data in a Postgres database sitting in Amazon versus a Postgres database sitting on a VM and a blade in a data center?”</em></p><p><strong>Cole Grolmus:</strong> We had a heavy over-reliance on things like network security, firewalls, network segmentation, and other controls like that. We could get away with overcompensating on those controls to protect data when everything was on-premise. Fast forward to today, and it seems like encryption may have been the right answer all along. But we rarely did it because we didn't have to.</p><p><strong>Ryan Cooke:</strong> Yeah, I think that's right. The way I think about it is: because you're in the cloud, you really need to bring everything up to the application level. You need to be putting controls in place between applications and APIs, not at network and storage, which is‌ a lower level part of your compute and tech stack.</p><p>We’re not reinventing encryption. We're just using encryption in a different place where there‌ is more risk for data to get lost or improperly accessed.</p><h2 id="emerging-solutions-for-data-encryption">Emerging solutions for data encryption</h2><p><strong>Cole Grolmus:</strong> It’s an exciting time for data encryption — the most progress I’ve seen in my career, for sure. It’s difficult to keep up with the new approaches because there is so much happening all at once.</p><p>At a high level, they fall into two segments:</p><ul><li>Dedicated encryption infrastructure (secure enclave) you put your data into.</li><li>An encryption layer that works with the data infrastructure you already have.</li></ul><p>What are the reasons an engineering team would want to pick one approach over another?</p><p><strong>Ryan Cooke:</strong> For something like PCI, secure enclaves make a ton of sense. PCI is so strongly scoped to systems that have access to PCI data, you want a narrow scope. That's a use case where you really never want to touch the data. However, there’s a whole long tail of information worth protecting that secure enclaves aren't very well built to do from an engineer’s perspective.</p><p>If you’re using a secure enclave, you end up incorporating their SDK into your application code, and your application code interacts with their SDK. From an ongoing retrieval aspect, you're talking to an API to get your data. That’s very different code than talking to your database. If you've grown up working on CRUD apps, you have a SQL interface to your database. That's‌ how you think about structuring your data.</p><p>Implementing secure enclaves often means segmenting your data. Some of your data is going to be retrieved through a proprietary API. The rest is retrieved through your database. As your data architecture starts to expand, you have to make decisions about where to put the data. You end up putting narrow pieces of data into the secure enclave. There’s a gray area where data may be sensitive or not — it depends on who you ask, or if you’ve compiled a bunch of pieces of data together, now it becomes identifiable, but independently, it’s not.</p><p>Our perspective is to make it much easier for you to put an encryption layer around your own database. That way, you don't have to pick and choose between what data is going to go in the vault and what data is going to go in your main database. You end up owning your data architecture. That’s really powerful.</p><p>As you go through different iterations of scaling your systems, some things are going to break and be hard to fix with your data infrastructure. And when you go back and revisit that, owning the infrastructure yourself is a huge advantage for engineers.</p><p><strong>Cole Grolmus:</strong> Native database security and encryption has been around for a while. Why should engineers use a product like JumpWire or a secure enclave instead of implementing their own solution using native features?</p><p><strong>Ryan Cooke:</strong> That’s one of the hardest points — where we are competing against <em>“let's just build this ourselves.”</em> It's very easy to underestimate the complexity of key management. Even with something like KMS (offered by AWS), you can get into a situation where it's extremely expensive. You're paying for every API call to decrypt the data.</p><p>What we've experienced starting down this path in prior roles, you quickly realize that key management is quite difficult — issuing and managing keys, segmenting and rotating keys, partitioning keys by customer, and more. As you start to scale up the solution, some of these use cases become really challenging to build yourself or to continue dedicating engineering resources for maintenance.</p><p>Where we see an opportunity is when there's a larger class of data that needs to be protected. Many companies don’t want a dedicated security team managing a data plane or some type of consolidated security layer in the architecture itself.</p><h2 id="how-jumpwire-works">How JumpWire works</h2><p><strong>Cole Grolmus:</strong> Could you give me an explanation of how JumpWire works and why you’ve chosen to take this direction with the product?</p><p><strong>Ryan Cooke:</strong> The product has two main components to it. It has a proxy, which we call a proxy engine or policy engine. This is a container that you deploy into your network. It implements HTTP protocols and database protocols. The proxy lives transparently between the application interfaces, whether that's an API, GraphQL, or between an application and a relational database like Postgres.</p><p>The idea is that you don't need to change anything on the application side. We're going to manage data security by inspecting requests. We're looking at data as it flows through applications, then making decisions about that data from a security and policy perspective.</p><p>We’re sitting inside your network. We're not a SaaS product — today, at least. You don't need to‌ give up all of your most sensitive data just to secure it. You can leave it in your architecture. You don't need to change anything. It gives you control.</p><p>The second piece is field-level encryption. We're helping you ‌identify the columns in your database, the properties of a JSON HTTP request, and so on that look like sensitive information. We run heuristics, modeling, and other techniques to say, <em>“this looks like this is sensitive data.”</em> Then, we're giving you a tool that says, <em>“if this is sensitive data, it should be encrypted”</em> with its own key using the approach you want to take for classification, segmentation, and things like that.</p><p>The result is if someone were to get into your database, or even internal tools that should not be exposing sensitive data, they're not going to walk away with everything. They're going to see things that are encrypted.</p><p>There are a couple different modes that we can operate encryption in. Depending on the database, sometimes ‌field-level encryption happens in the database. You can feel very confident that for any data getting inserted there, encryption happens, because we'll manage triggers and keys using native database capabilities. Or, we can encrypt it in flight as data is being passed through our proxy.</p><p><strong>Cole Grolmus:</strong> What is a major driver for why customers decide to buy JumpWire?</p><p><strong>Ryan Cooke: </strong>One of the things engineering leadership finds attractive about our product is their ability to give developers production database access. There are a lot of cases where a non-security incident happens, and someone needs to‌ log in and look at data in the database or inspect production systems. They’re thinking, <em>“Every time I do that, do I open myself up to a risk of that data being compromised?”</em></p><p>What you end up with is a complete picture of data that needs to be treated as sensitive based on its classification. The only way to unencrypt the data is to pass it through our proxy.</p><p>From a security perspective, this gives you a very low surface area where you need to be worried about there being a compromise. You can put a lot of people and a lot of tools into your production database. We're giving a really complete level of protection across a very large surface area with a small appliance.</p><h2 id="doing-data-classification-and-enforcement-on-the-fly">Doing data classification and enforcement on the fly</h2><p><strong>Ryan Cooke:</strong> SOC2 compliance was the kernel that started JumpWire. We’ve been through SOC2 readiness and audits in the past. There’s a huge gap in data classification and data handling policies that never translate into your data architecture. Unless you've‌ been very forward-looking, you lose tons of granularity about how you classify data.</p><p>With JumpWire, we're really trying to push those concepts into what's important about any piece of data. Anything that's highly confidential should be field-level encrypted. That's what our tool really unlocks. We do the discovery and data classification. We'll go to all of the schemas in the database, understand the columns being returned, and then run a data classification heuristics based on that. We automate the labeling of all your tables and columns.</p><p>Then, we're applying policies on classifications, not on a field that says <em>“first_name.”</em> It gives you holistic policy enforcement and control where you can be bridging your information security program to your data infrastructure in a way that really is not possible without a lot of custom built stuff.</p><p>Now, you can audit who's accessing highly confidential data instead of who's accessing social security numbers. You can start to say:</p><p><em>“This application is our email sending service that’s going to send email digests. So, it’s going to need PII. We expect that application to process PII. But this other customer service tool doesn’t ever need an email address. It shouldn't have access to that type of data.”</em></p><p>By running database connectivity through our systems, we can give you that type of control.</p><p><strong>Cole Grolmus:</strong> This is interesting! So, you're saying that an application connecting to a database via JumpWire — that doesn't know it shouldn't have access to things like email addresses or whatever — JumpWire will block it and not return that sensitive data?</p><p><strong>Ryan Cooke:</strong> Yeah. We're creating all these virtual proxies. You can create one proxy that says an internal application that needs confidential information can connect through this proxy, and it's going to have its own username and password. And then you have another proxy that just says, <em>“oh, it's only an internal application, it shouldn't be reading PII.”</em></p><p>We're not restricting it or blocking it, but if someone does write a query in that app to pull out sensitive data like a name and email address, they're just going to get the encrypted blob back. They're not able to read it. They don't have the key to read it, so they can't decrypt it.</p><p><strong>Cole Grolmus:</strong> Data discovery and classification and application-specific enforcement are both really important. For a second, it seemed like magic to me.</p><p>You're into a whole other product category. There are entire data security platforms that scan your data repositories, find sensitive data, classify it, etc. I don't think you're sitting here saying you’re going to replace those tools — they have a purpose. But you are saying, <em>“in addition to that, we can actually help you enforce it.”</em></p><p>The enforcement part is really important because after you’ve discovered sensitive data, your security team is sitting there trying to figure out, <em>“well, now what do I do?”</em> JumpWire can say:<em> “Here's all this data. We helped you find it, and we can also implement what you should do to protect it right away.”</em></p><p><strong>Ryan Cooke:</strong> Yeah, that's right. Where we play is in situations where you know customer data is sitting in this database, but you don't really know all the schemas it's in. We can just automate that part for you.</p><h2 id="approaches-for-implementing-data-encryption">Approaches for implementing data encryption</h2><p><strong>Cole Grolmus:</strong> If I was starting greenfield with a brand new application and had a loose schema in my head, that seems like the easiest time to adopt a secure enclave. It's hard to put a percentage on it, but I suspect that’s less than 10% of use cases.</p><p>I'm sure the use case you see a lot more is, <em>“I already have an existing application.” </em>And probably worse yet, <em>“I already have a massive existing application that's already scaled beyond the point of no return. We're not going back to do a rewrite here.”</em></p><p>…And then a requirement comes in where we need to secure the data better. <em>“Now what do I do?!”</em> If I'm in that headspace, putting security around my existing data by adding secure data infrastructure seems a whole lot more appealing than migrating data.</p><p><strong>Ryan Cooke:</strong> Yeah, definitely. Otherwise, it's like a six-month project, right? If you think about what teams have to do to plug in an existing vault into their microservice architecture, where they have a half a dozen databases already, it’s a lot of effort.</p><p><strong>Cole Grolmus:</strong> Can you talk more about that? What has your experience been with customers bringing existing data architectures and infrastructure in with them?</p><p><strong>Ryan Cooke:</strong> It's been a big area of focus for us on the product side — how we've architected and implemented our proxies to speak database protocols. There's really no impact that has to happen to your architecture other than self-hosting our proxy.</p><p>All of our customers self-host the product today. We think about the rollout in multiple stages. They're not about cycles of engineering work the customer has to do. It’s really validation that everything is working and not breaking existing code in unexpected ways.</p><p>We drop our proxy, and it starts forwarding requests to the database. What you're testing is network latency and whether there are any queries that are going to be negatively impacted by JumpWire. If that looks good, we move on to manipulating the data on the fly. So, we're not going to change the data that's been stored in the database. We're simply going to manipulate it as we see the request pass through our proxy.</p><p>Then, we create policies and do the classification work that determines which of your fields are sensitive. At that point, if things are looking good, we move to the final phase, which is to rewrite the data in your database. We have tooling that helps do that efficiently. You can run a fairly large scale data migration without impacting in production.</p><p>Once that finishes, you’re at a point where new data coming in is being stored in a secure format. Your application is expecting to get it through JumpWire in a particular format, and things run as you expect.</p><p>We put a lot of thought into how to roll out a tool and migrate an existing application stack with the least possible interruption, or potential availability faults as we can. What people are really concerned about is not just losing control of their architecture, but introducing something that really degrades the performance of their app. They don't discover that until it's in production and in front of users.</p><p><strong>Cole Grolmus:</strong> That level of thinking matters — the amount of detail and consideration that's gone into helping people implement JumpWire in their existing data architecture. When you think about customer adoption for something like this, a massive barrier to getting started is, <em>“OMG, how do I take all this data and not break my app to make encryption happen?”</em></p><p>That's got to be a non-starter for a lot of people who don't have a burning platform to implement data encryption. The fact that you can do it in a staged out way that doesn't require a big-bang cutover is really appealing.</p><p><strong>Ryan Cooke:</strong> We really think about engineering teams. A lot of times, they're not the ones who have decided that they need to have this in their overall architecture. The reality of engineering work is that you get pushed things from others.</p><p>We want to make encryption as easy as possible for teams, where the organization has decided it’s the priority, and they're now on the hook to implement it. Do they want to spend several months out of their iteration cycles working on this problem? Or, can we solve it a lot faster so they can go back to product development?</p><h2 id="why-companies-implement-data-encryption">Why companies implement data encryption</h2><p><strong>Cole Grolmus:</strong> What is the main driver of people wanting to adopt a data encryption solution?</p><p>Developers are a lot more security-conscious now, but an encryption solution this sophisticated isn’t super high on most people’s priority list. It seems more likely to be pushed down from somewhere else, as opposed to, <em>“hey, we want to do the right thing here.”</em></p><p><strong>Ryan Cooke:</strong> We actually do get a decent number of engineers coming to us saying, <em>“I'm uncomfortable with how we're storing data.”</em> Now, can they prioritize that into an initiative to adopt JumpWire? Unfortunately, not always.</p><p>Early in the life of a business, the goal is to build a viable product. But there are a set of engineers who are aware of security. There's an opportunity for that basic level of awareness to come to the next level — where I‌ need to have a little more consideration for data that's been stored in my database and how it's getting secured.</p><p><strong>Cole Grolmus:</strong> I’m interested in the intrinsic versus extrinsic motivation here. Is this developers wanting to do the right thing? Or is it somebody telling them that they have to do it?</p><p>I’m sure the reality is some of both. But it’s encouraging to hear people realize that there's some data that's just not okay to have sitting in plain text and know they need to do something about it.</p><p><strong>Ryan Cooke:</strong> It’s some of both, but mostly external. My expectations when we were starting was the motivation would be 100% external. I've been really surprised with these cases where there is some self-identification happening on the engineering side.</p><p>But you're absolutely right — the vast majority of motivation is going to come from higher levels in the organization, maybe even someone in Legal saying, <em>“we're not we're not doing the what we should be doing to handle this data properly.”</em></p><p><strong>Cole Grolmus:</strong> Motivation for adoption being driven by other people probably lends itself better to a solution like JumpWire, where they're not having to totally refactor everything. That’s my concern about companies in this category that need developers to be on board from the beginning of an app. Somebody would really have to want to do the right thing from the start.</p><p>For that business to work, it requires developers changing a behavior that’s really hard to change. JumpWire is sort of the beneficiary on the other side. The behavior that’s more likely to happen is engineering teams are going to get told down the line that they have to implement encryption. Now they’re stuck working within the data infrastructure they already have. JumpWire is a good solution for doing that.</p><h2 id="why-data-encryption-is-ready-for-mass-adoption">Why data encryption is ready for mass adoption</h2><p><strong>Cole Grolmus:</strong> A lot of people are afraid of encrypting their data. They try to encrypt as little as possible because there’s this fear of<em> “encryption is really hard.”</em> And, <em>“If I mess this up, I'm going to lose my data.”</em></p><p>The downside of bad things happening with my data that were irreversible was worse than the risk of having unencrypted data get hacked. That might be an outdated mindset.</p><p>What strikes me about companies like yours and other early stage companies who focus on encryption is that you’re making encryption less scary.</p><p><strong>Ryan Cooke:</strong> Yeah. If you make a mistake, you can shoot yourself in the foot. When you automate and have a programmatic approach to key management, you're reducing the risk of losing a key considerably. That's the worst case scenario.</p><p>I remember when we would generate the root encryption keys, put it on a thumb drive, and put it in a safety deposit box. We were so afraid of losing the key because it’s everything. When you approach key management programmatically, it becomes a lot more predictable. We can put in guarantees in the system that's handling the encryption that those keys aren't going to get lost and that they are recoverable.</p><p>From a cost perspective, by having a system like ours where we can make decisions around whether to decrypt or not, that's going to vastly reduce the potential that you end up spending a lot on compute to decrypt swaths of data. We’re applying a policy-driven approach. It's very predictable about what is going to happen to compute needs for decrypting some quantity of data. We can demonstrate that up front.</p><p>So, those are a lot of the fears practitioners might have from a philosophy standpoint. A lot of things these days are encrypted by default. AWS made a big push on S3, where everything's now encrypted on the server side by default. Every website uses TLS. So, some of the philosophical concerns about encryption are becoming less and less concerning.</p>]]></content:encoded>
            <category>Startups</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/05/Logo_-JumpWire.png"/>
        </item>
        <item>
            <title><![CDATA[Y Combinator's Winter 2023 Cybersecurity, Privacy, and Trust Startups]]></title>
            <link>https://strategyofsecurity.com/y-combinators-winter-2023-cybersecurity-privacy-and-trust-startups/</link>
            <guid>644c21144b4427003dce076c</guid>
            <pubDate>Fri, 28 Apr 2023 20:45:50 GMT</pubDate>
            <description><![CDATA[Analyzing opportunities and challenges for the nine cybersecurity, privacy, and trust startups in Y Combinator's Winter 2023 batch.]]></description>
            <content:encoded><![CDATA[<p>Demo Day for Y Combinator's Winter 2023 batch took place on April 5-6, 2023. Notably, this was the first batch with <a href="https://techcrunch.com/2022/08/29/garry-tan-is-the-next-president-and-ceo-of-y-combinator/?ref=content.strategyofsecurity.com">YC's new President and CEO Garry Tan</a> at the helm.</p>
<p>Nine cybersecurity, privacy, and trust startups were among the <a href="https://www.ycombinator.com/blog/meet-the-yc-winter-2023-batch?ref=content.strategyofsecurity.com">282 companies</a> unveiled at the two-day event. In YC's current era of smaller batch sizes, nine companies is still a healthy representation for the cybersecurity ecosystem. Batches across the past two years have included roughly a dozen cybersecurity companies. Numbers have remained resilient despite the recent slant towards AI/ML companies, including <a href="https://www.ycombinator.com/companies?batch=W23&tags=Artificial%20Intelligence&tags=Machine%20Learning&ref=content.strategyofsecurity.com">60 in the Winter 2023 batch</a>.</p>
<p>We'll be doing a quick analysis of each cybersecurity, privacy, and trust company in this article, just as we've done for previous batches. Companies in the Winter 2023 batch include:</p>
<ul>
<li>
<p><strong>0pass:</strong> A passwordless authentication platform for an organization's workforce.</p>
</li>
<li>
<p><strong>Blyss:</strong> A privacy-focused data warehouse built on homomorphic encryption.</p>
</li>
<li>
<p><strong>Credal:</strong> A data security product for AI apps.</p>
</li>
<li>
<p><strong>EdgeBit:</strong> A software supply chain security platform focused on prioritization.</p>
</li>
<li>
<p><strong>Escape:</strong> A GraphQL API security platform.</p>
</li>
<li>
<p><strong>Intrinsic:</strong> API-based technologies for trust and safety teams.</p>
</li>
<li>
<p><strong>Infiscal:</strong> An open source secrets manager for developers.</p>
</li>
<li>
<p><strong>Matano:</strong> An open source, cloud-native SIEM.</p>
</li>
<li>
<p><strong>Nucleus:</strong> A Know Your Business (KYB) compliance orchestration platform.</p>
</li>
</ul>
<p>An overall observation before we get into the analysis: only one of the nine companies (Escape) has disclosed financing other than Y Combinator's investment. This is somewhat unusual for Y Combinator companies, who are generally regarded as the best of the best among early stage startups.</p>
<p>Each of the nine companies likely have capital raises in the works, but it's a clear departure from the earlier trend of YC companies announcing funding on or before Demo Day. I expect the timing for this batch is more reflective of the overall funding environment than the companies themselves — all of which are at or above the level of quality from previous batches. It's a trend to watch as other early stage companies are likely facing similar (or worse) situations.</p>
<h2 id="0pass">0pass</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://0pass.com/?ref=content.strategyofsecurity.com">0pass</a> is a passwordless authentication platform for a company's workforce. Their passwordless implementation is based on Public Key Infrastructure (PKI) and implements authentication through Windows Hello, TouchID, FaceID, and Yubikeys. The platform also provides features for managing the full lifecycle of PKI enrollment, certificate renewals, and more for end users.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>0pass is one of many early stage companies competing in the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#passwordless-and-multi-factor-authentication">Passwordless and Multi-Factor Authentication</a> market.</p>
<p>Customer segments are an important nuance of this market. 0pass is currently focused on passwordless authentication for workforce, meaning a company's internal employees and third party business partners. Their solution is not currently focused on customers — a completely different user group with a slightly different set of use cases and implementation requirements.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>From an implementation standpoint, many security leaders avoid deploying hardware-based authentication solutions for non-technical users because using external devices for authentication is unnatural. The behavior of authenticating without passwords is still in the early stages of user adoption. It's going to take time for people to get on board.</p>
<p>At a macro level, passwordless authentication is an extremely competitive market with competition among a range of companies, from early stage to tech giants like Apple, Google, and Microsoft. Many startups are well financed — for example, Transmit Security's <a href="https://techcrunch.com/2021/06/22/transmit-security-raises-543m-series-a-to-kill-off-the-password/?ref=content.strategyofsecurity.com">$543 million Series A round</a> that was the largest Series A investment in cybersecurity history.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Passwordless authentication is one of the most important paradigm shifts in cybersecurity. It's a generational transition — we're not going to see many of these in our careers.</p>
<p>A Gartner <a href="https://www.gartner.com/en/documents/3978384?ref=content.strategyofsecurity.com">research report</a> predicted 30% of organizations would use <em>at least one</em> form of passwordless authentication by 2023, which is...still not a lot. However, it's still a positive upward trend in a massive market. As I wrote in my <a href="https://strategyofsecurity.com/p/1passwords-blue-ocean-strategy/">deep dive on 1Password</a>, we're still in the early days of passwordless adoption. There is plenty of room in the market for more companies to succeed.</p>
<p>Yubico, a later stage startup that helped pioneer hardware-based authentication (Yubikeys), just <a href="https://www.inforisktoday.com/authentication-vendor-yubico-to-go-public-at-800m-valuation-a-21735?ref=content.strategyofsecurity.com">announced</a> it's going public via SPAC and disclosed impressive growth metrics. Their announcement is likely the best financial data on a pure passwordless company that's been made publicly available to date. Yubico's strong revenue, growth, and an impending public listing are all positive signals for earlier stage companies in this market.</p>
<h5 id="who-are-their-investors">Who are their investors?</h5>
<p>According to PitchBook data, <a href="https://www.ycombinator.com/blog/ycs-500-000-standard-deal?ref=content.strategyofsecurity.com">Y Combinator's $500,000 SAFE note</a> is the only investment disclosed to date.</p>
<h2 id="blyss">Blyss</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://blyss.dev/?ref=content.strategyofsecurity.com">Blyss</a> is building a privacy-focused data warehouse using homomorphic encryption. Their company description explains what this means with perfect clarity:</p>
<blockquote>
<p>Data sent into Blyss is permanently sealed; once it enters, it's never decrypted. All analysis happens directly on the encrypted data. Regulated enterprises can use Blyss to unlock value from sensitive data without risking leaks.</p>
</blockquote>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>I would roughly classify Blyss as a <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#data-deidentification-and-pseudonymity">Data Deidentification and Pseudonymity</a> company. However, they're potentially creating a new product category that is a hybrid of security and data warehouses.</p>
<p>Blyss is a fascinating instance of a non-security product (data warehouse) with security and privacy (homomorphic encryption) at its core. In other words, the product is differentiated from other types of data warehouses because of the security and privacy benefits.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>How much had you heard about homomorphic encryption before reading about Blyss? Probably not much — myself included.</p>
<p>That's the challenge: the big idea of privacy-focused data stores is still pretty new to most people. Awareness is something we're still working through, although the trend of developers embracing security is accelerating quickly. There's a risk of this being a "solution in search of a problem" situation, although homomorphic encryption is a legitimate solution for difficult problems like facial recognition, voice assistance, and smart contracts.</p>
<p>From an implementation standpoint, adopting an entirely new data warehouse (privacy-focused or not) is a challenge for companies who already have one or more. Many companies don't have the luxury of starting from a clean slate, so data migration is a huge obstacle. I'll be discussing more about this topic in an upcoming interview with a previous YC founder, so stay tuned.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Widespread adoption of a security and privacy-focused data warehouse would be a huge win for cybersecurity. There are a variety of different approaches for bringing security and privacy to data stores, and homomorphic encryption is among the most promising.</p>
<p>The technology is so new that there is relatively little direct competition. <a href="https://www.zama.ai/?ref=content.strategyofsecurity.com">Zama</a> is one example of another company making progress with open source homomorphic encryption tools. It's a very nascent market, which means Blyss has plenty of room to establish itself as the clear leader.</p>
<p>Bigger picture, Blyss is advancing technology that wasn't previously possible and making it something that's widely available and commercialized for engineers. The product is a massive advancement in the security and privacy of data, which means it has a chance to become a big company.</p>
<h5 id="who-are-their-investors">Who are their investors?</h5>
<p>According to PitchBook data, <a href="https://www.ycombinator.com/blog/ycs-500-000-standard-deal?ref=content.strategyofsecurity.com">Y Combinator's $500,000 SAFE note</a> is the only investment disclosed to date.</p>
<h2 id="credal">Credal</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://credal.ai/?ref=content.strategyofsecurity.com">Credal</a> protects sensitive data used with AI apps, including major providers of Large Language Models (LLMs) like ChatGPT. The product provides enterprise-grade controls over use of company data, including DLP-like tools for data exfiltration, logging, proxying, and Master Service Agreements (MSAs).</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Credal broadly fits into the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/">Data Loss/Leakage Prevention</a> category, albeit with a very specialized use case that could easily be considered a standalone segment. AI security is beginning to establish itself as an entirely new (and potentially massive) market within cybersecurity.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Security for LLMs isn't something many companies have on their radar yet. Slower-adopting organizations may not have tested or adopted LLMs yet. Or, if they have, they're still determining what the impact on their company could be. Even with the recent popularity of ChatGPT, it's fair to say that security for LLMs is still almost unheard of.</p>
<p>Longer term, the question is whether data security for AI and LLM apps is a standalone category or part of an established enterprise data security platform. A product like Credal could be a valuable acquisition target — not a challenge, but a factor that may keep them from reaching later stages of growth as a standalone company.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>You may have heard about ChatGPT...<em>basically everywhere</em> on the internet in 2023. There's a brilliant quote by Paul Virilio that's useful here: <em>"When you invent the ship, you invent the shipwreck."</em> In this instance, LLMs like ChatGPT are the ship, and security and privacy are the shipwreck.</p>
<p>Multiple flavors of security issues have already occurred — including companies <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/">leaking sensitive data</a> to ChatGPT, and ChatGPT itself <a href="https://openai.com/blog/march-20-chatgpt-outage?ref=content.strategyofsecurity.com">leaking data between users</a>. The explosive growth of LLMs themselves and applications built on top of them are sure to bring more security and privacy issues.</p>
<p>LLMs and ChatGPT were a huge topic of conversation at RSA Conference this week. Rak Garg shared a nice <a href="https://www.linkedin.com/feed/update/urn:li:activity:7056783719273025536?updateEntityUrn=urn%3Ali%3Afs_feedUpdate%3A%28V2%2Curn%3Ali%3Aactivity%3A7056783719273025536%29&ref=content.strategyofsecurity.com">summarization</a> on LinkedIn:</p>
<blockquote>
<p>Everyone is aware of the risk of employees inadvertently leaking data to ChatGPT, and there's no great solution outside of domain blocking at the network layer.</p>
</blockquote>
<p>Most companies, especially those based in the United States, are unlikely to go the way of Italy and <a href="https://www.bbc.com/news/technology-65139406?ref=content.strategyofsecurity.com">issue full-blown bans</a> of LLMs. The upside is too high, even with the potentially catastrophic downside risks.</p>
<p>For security teams, this means finding ways to allow employees to safely interact with AI apps and LLMs. The Cloud Security Alliance recently <a href="https://cloudsecurityalliance.org/artifacts/security-implications-of-chatgpt/?ref=content.strategyofsecurity.com">published an analysis</a> of the security implications for ChatGPT — a nice starting point, but not yet a full solution. If Credal becomes the solution for companies who need to secure AI apps used by employees, it's going to be a big company.</p>
<h5 id="who-are-their-investors">Who are their investors?</h5>
<p>According to PitchBook data, <a href="https://www.ycombinator.com/blog/ycs-500-000-standard-deal?ref=content.strategyofsecurity.com">Y Combinator's $500,000 SAFE note</a> is the only investment disclosed to date.</p>
<h2 id="edgebit">EdgeBit</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://edgebit.io/?ref=content.strategyofsecurity.com">EdgeBit</a> dynamically monitors, analyzes, and prioritizes software supply chain vulnerabilities. The product takes a unique new approach to prioritization by understanding which code is executing in your environment. The result is a live inventory of relevant vulnerabilities...instead of a laundry list of vulnerabilities you aren't sure if you need to worry about.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>EdgeBit is a <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#software-supply-chain-security">Software Supply Chain Security</a> company. Although their differentiator is focused on prioritization, their product is comprehensive enough to compete with other supply chain security companies in this market.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Starting with a narrow focus on prioritizing supply chain vulnerabilities is exactly what EdgeBit needs to do as an early stage company. However, this is both a challenge and an opportunity.</p>
<p>Winning prioritization could be a wedge into the broader supply chain security and vulnerability management markets, or it could make them a prized acquisition target. Acquisitions are fine, of course, but there's a chance that being <em>too good</em> at prioritization catches the eye of strategic acquirers hungry for buying promising early stage companies.</p>
<p>Competition is also a challenge, with many of the top early stage companies (and investors) focused on supply chain security. Companies that didn't start with prioritizing supply chain vulnerabilities will get to those features eventually. Does EdgeBit have enough time to establish itself before competitors catch up?</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>There is a clear trend towards vulnerability prioritization in the overall <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#vulnerability-management-and-testing">Vulnerability Management (VM)</a> market. Large vulnerability management companies like Qualys, Rapid7, and Tenable talked extensively about vulnerability prioritization in their most recent <a href="https://strategyofsecurity.com/p/2022-cybersecurity-annual-earnings-recap-part-2/">annual earnings announcements</a>. Vulnerability management fatigue is one of the most well-known challenges (and complaints) for security practitioners today.</p>
<p>Ironically, if we had to build VM again from scratch, prioritizing vulnerabilities would be one of the first features to build. Supply chain security is probably the closest thing we're going to get to a do-over. If EdgeBit's real-time prioritization approach wins out, they can become a big company.</p>
<h5 id="who-are-their-investors">Who are their investors?</h5>
<p>According to PitchBook data, <a href="https://www.ycombinator.com/blog/ycs-500-000-standard-deal?ref=content.strategyofsecurity.com">Y Combinator's $500,000 SAFE note</a> is the only investment disclosed to date.</p>
<h2 id="escape">Escape</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://escape.tech/?ref=content.strategyofsecurity.com">Escape</a> helps engineering and security teams find and fix vulnerabilities in GraphQL APIs. The product is a security testing tool that runs in CI/CD pipelines, not a scanning tool that runs after deployment in test or production environments.</p>
<p>The magic is in a new testing approach called feedback-driven API exploration, which progressively learns from API responses and generates increasingly relevant tests over time.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Escape is an <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#api-security">API Security</a> company with a specific focus on GraphQL-flavored APIs.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Like several other cybersecurity companies in this YC batch, Escape's challenge (and opportunity) is focusing on a relatively narrow slice of a growing market — GraphQL security within API security, in this case. Competition in the overall API security market is intense, including unicorns <a href="https://nonamesecurity.com/?ref=content.strategyofsecurity.com">Noname Security</a> and <a href="https://salt.security/?ref=content.strategyofsecurity.com">Salt Security</a>.</p>
<p>Beyond API security, application security platforms like Snyk and Veracode have raised significant venture capital and private equity financing, respectively. Escape is already an <a href="https://snyk.io/blog/introducing-snyk-technology-alliance-partner-program-tapp-new-members-2023/?ref=content.strategyofsecurity.com">early member</a> of Snyk's technology alliance program. The value they bring is undoubtedly on the radar for Snyk and others already. Their focus on GraphQL and innovative testing approach could make them an early stage acquisition target.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>We're still in the early days of API security for traditional REST APIs. Adoption of GraphQL itself is increasing rapidly, and security desperately needs to keep up. Two stats shared by Escape in their <a href="https://www.ycombinator.com/launches/I4v-escape-secure-your-graphql-apis?ref=content.strategyofsecurity.com">YC launch</a> help make the point: GraphQL is now used by 20% of developers, and 95% of GraphQL APIs have unremediated security vulnerabilities.</p>
<p>These are astonishing figures, even if they're only directionally correct. GraphQL is on its way to becoming the dominant architecture for APIs. An even more significant development is the rise of <a href="https://www.apifirst.tech/p/how-far-api-first-companies-have?ref=content.strategyofsecurity.com">API-first companies</a>. According to <a href="https://www.apifirstindex.com/?ref=content.strategyofsecurity.com">GGV Capital research</a>, API-first companies have raised over $14 billion in capital, including the likes of Stripe, Plaid, Segment, and many more.</p>
<p>Escape is well positioned to become the leader in security for GraphQL with its team, tech, and Y Combinator backing. They'll become a big company if they can ride the wave of GraphQL growth and become the go-to platform for security.</p>
<h5 id="who-are-their-investors">Who are their investors?</h5>
<p>According to PitchBook data, Escape has raised a total of $850,000 across two early stage financing rounds. In addition to Y Combinator, investors include Irregular Expressions, Frst Capital, and a handful of individual angel investors.</p>
<h2 id="intrinsic">Intrinsic</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p>Intrinsic provides tools for trust and safety teams through a unified API. Examples of tools include image and text scanning, content policy definitions, scoring, and analytics.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Intrinsic is a welcomed addition to the growing <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#trust-and-safety">Trust and Safety</a> market, which builds workflows and tools for online platforms to reduce the risk of fraud, harm, and abuse among users.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Intrinsic shares many of the challenges I wrote about when covering <a href="https://cinder.co/?ref=content.strategyofsecurity.com">Cinder</a>, a Y Combinator company from the Winter 2022 batch:</p>
<blockquote>
<p>Finding customers at the right level of traction and scale to require more advanced trust and safety operations is potentially tricky. Small companies with seed funding or earlier are usually still seeking traction. This doesn't leave much room to focus on problems outside of growth — trust and safety being one such problem.<br>
<br>
There is also a lot of variety in this space. Trust and safety threats and problems vary by company and by industry, as do the processes for solving them. Cinder offers customizable workflows for this exact reason, but managing the variety is a potentially difficult product management challenge.</p>
</blockquote>
<p>Intrinsic is more focused on tools than workflows, providing a base set of technologies that can be used by engineers working within trust and safety teams to integrate features directly into products. This requires a slightly higher level of process maturity and technical sophistication in exchange for the flexibility to customize and enhance products with world-class trust and safety primitives.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>As I discussed with Cinder, the problems addressed by trust and safety teams are massive societal problems:</p>
<blockquote>
<p>Problems with abusive content, fraud, and threats <em>were</em> a nascent problem that only existed in the world of large social media companies. Or so we thought. We've now entered an era of misinformation, abuse, and outright information warfare that causes <a href="https://strategyofsecurity.com/p/rhetoric-reality-and-riots/">massive societal problems</a> and elevates the discussion about trust and safety into the public spotlight.</p>
</blockquote>
<p>For companies like Intrinsic, the seemingly narrow target market of trust and safety teams is deceiving. User Generated Content (UGC) is among the internet's most profound breakthroughs. The most common UGC examples we think of are social media and YouTube — however, the impact of UGC spans almost every vertical of tech and society, including online gaming, Esports, travel, commerce, and more.</p>
<p>A recently published <a href="https://www.tandfonline.com/doi/abs/10.1080/00913367.2020.1740631?ref=content.strategyofsecurity.com">academic study</a> in the Journal of Advertising measures the effectiveness of UGC and traditional media for customer acquisition and retention, concluding UGC is more effective for acquiring customers. Studies like this are one of many signals we intuitively understand as people in the tech industry: UGC is both profoundly important and dangerous when misused.</p>
<p>Now, the <a href="https://strategyofsecurity.com/p/rhetoric-reality-and-riots/">dangers</a> of online misinformation and abuse are widely understood. Along with the looming possibility of <a href="https://hbr.org/2021/01/are-we-entering-a-new-era-of-social-media-regulation?ref=content.strategyofsecurity.com">social media regulation</a> and growing support for <a href="https://www.pewresearch.org/short-reads/2023/03/31/by-a-more-than-two-to-one-margin-americans-support-us-government-banning-tiktok/?ref=content.strategyofsecurity.com">outright bans</a> of platforms like TikTok, it's clear we are on the brink of entering a new phase of <a href="https://stratechery.com/2019/a-regulatory-framework-for-the-internet/?ref=content.strategyofsecurity.com">governing content</a> on the internet. If Intrinsic can establish itself as a foundational platform for trust and safety, it can become one of the most important companies for this inevitable next phase.</p>
<h5 id="who-are-their-investors">Who are their investors?</h5>
<p>According to PitchBook data, <a href="https://www.ycombinator.com/blog/ycs-500-000-standard-deal?ref=content.strategyofsecurity.com">Y Combinator's $500,000 SAFE note</a> is the only investment disclosed to date.</p>
<h2 id="infiscal">Infiscal</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://infisical.com/?ref=content.strategyofsecurity.com">Infiscal</a> is an open source platform for managing developer secrets. "Secrets" include a specific subset of credentials like API keys, service account passwords, certificates, and more. The product includes several developer-focused features like injection into local dev environments, synchronization across teams, secrets rotation, versioning, and more.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Infiscal is a secrets management platform, which is a subset of the overall <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#privileged-access-management-pam">Privileged Access Management (PAM)</a> market.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>As a major category within PAM, secrets management is a relatively established product category in cybersecurity with strong market leaders.</p>
<p>CyberArk is a <a href="https://strategyofsecurity.com/p/2022-cybersecurity-annual-earnings-recap-part-1/">high performing</a> public company, and their Conjur product has been a successful add-on to their core PAM product for enterprise customers. HashiCorp <a href="https://strategyofsecurity.com/p/hashicorps-ipo-bottom-up-adoption-and-layering/">IPO'ed in late 2021</a>. Vault, an open source secrets manager, is one of the company's core products. <a href="https://strategyofsecurity.com/p/1passwords-blue-ocean-strategy/">1Password</a>, a later stage startup, is also in this market with its <a href="https://1password.com/product/secrets/?ref=content.strategyofsecurity.com">Secrets Automation</a> product.</p>
<p>Beyond traditional competitors, secrets management is becoming a native feature in code repositories like GitHub and GitLab and cloud platforms like AWS, Azure, and Google Cloud Platform (GCP).</p>
<p>Despite the volume of established companies competing in this market, problems with secrets management are far from solved. It's too early to declare this market has been won, which could leave a window of opportunity for Infiscal.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Any time a cybersecurity company shows success by growing through bottom-up adoption and winning over developers, you need to pay attention. Infiscal's open source repository already has 5,743 starts on GitHub and 64 contributors (as of today). Their <a href="https://www.ycombinator.com/launches/I6Z-infisical-the-open-source-secrets-manager-for-developers?ref=content.strategyofsecurity.com">YC launch</a> also stated 220+ community members in their private Slack. Those are impressive numbers for a very young company.</p>
<p>Adoption and maturity of secrets management among engineering teams is still relatively early stage. A <a href="https://www.prnewswire.com/news-releases/report-mismanaging-secrets-costs-companies-1-2m-annually-301317447.html?ref=content.strategyofsecurity.com">1Password report</a> on the topic includes all kinds of interesting statistics. I wrote about secrets management in a <a href="https://strategyofsecurity.com/p/what-developers-need-to-know-about-the-strategy-of-security/">previous article</a> about security for developers:</p>
<blockquote>
<p>In a 2021&nbsp;<a href="https://blog.1password.com/risks-of-mismanaging-corporate-secrets/?ref=strategyofsecurity.com">1Password survey</a>, 80% of IT/DevOps organizations admitted to not managing their secrets well. That's...not great. It's also a more pervasive problem than you'd think. In the same survey, 65% of companies reported having over 500 secrets, and 18% have more than they can count.</p>
</blockquote>
<p>Products that are relentlessly focused on making it easier for developers to securely use and manage secrets are going to rise to the top. Like HashiCorp, Infiscal needs to keep winning over developers. Their open source model makes it easy for engineering teams to adopt the product and eventually upgrade to paid plans. Developers  are a difficult but valuable audience. If Infiscal can continue the rate of traction they're already gaining with developers, they're going to be a big company.</p>
<h5 id="who-are-their-investors">Who are their investors?</h5>
<p>According to PitchBook data, <a href="https://www.ycombinator.com/blog/ycs-500-000-standard-deal?ref=content.strategyofsecurity.com">Y Combinator's $500,000 SAFE note</a> is the only investment disclosed to date.</p>
<h2 id="matano">Matano</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p>Matano is building an open source, cloud-first Security Information and Event Management (SIEM) platform. The product ingests security log data from sources like SaaS, network, endpoints, and more and allows companies to analyze and build detection rules on top of the aggregated data.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Matano is an open source <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#security-information-and-event-management-siem">Security Information and Event Management (SIEM)</a> platform.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>It's counterintuitive to be building a SIEM product alongside companies like Splunk, a public company with $3.65 billion in revenue for its most recent fiscal year, Google's Cloud's market entry via its acquisition of <a href="https://cloud.google.com/blog/products/identity-security/raising-the-bar-in-security-operations?ref=content.strategyofsecurity.com">Siemplify</a>, Sumo Logic, a <a href="https://www.franciscopartners.com/media/sumo-logic-to-be-acquired-by-francisco-partners-for-17-billion?ref=content.strategyofsecurity.com">recently acquired</a> Francisco Partners portfolio company, Panther, one of the most promising cybersecurity unicorns, and more.</p>
<p>Direct competition aside, larger questions loom about the future of the SIEM market due to the rise of <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#extended-detection-and-response-xdr">XDR</a> platforms from Palo Alto Networks, CrowdStrike, SentinelOne, and others. Competing anywhere near the vicinity of SIEM, XDR, and the ultra-powerful companies in these markets is challenging.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Jack Naglieri, the Founder and CEO of <a href="https://panther.com/?ref=content.strategyofsecurity.com">Panther</a>, describes his own experiences as an engineer building a custom cloud-native SIEM internally at Airbnb. He also discusses the temptation (and pitfalls) for security teams to build their own SIEM on <a href="https://www.businessofcyber.com/listen/boc-53-jack-naglieri-ceo-at-panther?ref=content.strategyofsecurity.com">this episode</a> of the Business of Cyber. His commentary is relevant background for the problem Matano is trying to solve. TL;DR: some companies insist on buiding their own SIEM, and they shouldn't.</p>
<p>The critical market insight for Matano is exactly that: a lot of companies still want to build their own SIEM (or SIEM-equivalent platforms for security log analysis). This segment of the market is bigger than it might sound, especially with the <a href="https://ventureinsecurity.net/p/the-rise-of-security-engineering?ref=content.strategyofsecurity.com">rise of security engineering</a> and plenty of born-in-the-cloud technology companies. Matano can be a big company if it can appeal to people in this market segment as a better alternative than building a SIEM from scratch.</p>
<h5 id="who-are-their-investors">Who are their investors?</h5>
<p>According to PitchBook data, <a href="https://www.ycombinator.com/blog/ycs-500-000-standard-deal?ref=content.strategyofsecurity.com">Y Combinator's $500,000 SAFE note</a> is the only investment disclosed to date.</p>
<h2 id="nucleus">Nucleus</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.usenucleus.io/?ref=content.strategyofsecurity.com">Nucleus</a> is an orchestration service for Know Your Business (KYB) compliance — a U.S. federal government requirement for institutions like banks, fintech companies, securities brokers, and other financial institutions to verify the identity of business customers and reduce the risk of fraud and money laundering.</p>
<p>The product is conceptually similar to AiPrise, a YC company from the Summer 2022 batch who focuses on orchestration for Know Your Customer (KYC) compliance — a similar regulation for individuals. A nuance I explained while covering AiPrise also applies to Nucleus:</p>
<blockquote>
<p>The "integration and orchestration" part is an important distinction — it doesn't <em>do</em> the verifications. There are plenty of good products that do this already. [The] problem space is how to <em>manage</em> the identity verification providers — an adjacent but tricky challenge.</p>
</blockquote>
<p>What the product does may sound complex if you don't spend much time dealing with financial regulations. If that's the case, a quick <a href="https://www.loom.com/share/7133a46e0c414db18a0f4e75572b880b?ref=content.strategyofsecurity.com">demo</a> of the product is better than words.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Nucleus generally fits into <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#identity-proofing">Identity Proofing</a>, with the nuance I pointed out earlier about managing but not doing the validation. The product focuses on validating the identities of <em>businesses</em>, not individual people or the employees who work for a business.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Similar to AiPrise, Nucleus faces the challenges that come with competing in a market that's perceived to be niche:</p>
<blockquote>
<p>Managing multiple identity verification and KYC providers is somewhat of a niche. The pain is most commonly felt by fintech companies. Many investors would question if the problem space and market is big enough to become a large company.<br>
<br>
Niche markets and specific problems like this are YC's bread and butter, though. What seems like an obscure problem is often bigger than people expect. Solving a niche problem well also unlocks adjacent opportunities in broader domains (<a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#fraud-and-transaction-security">Fraud and Transaction Security</a>, in this case).</p>
</blockquote>
<p>Competition is also somewhat of a challenge. For example, <a href="https://www.middesk.com/?ref=content.strategyofsecurity.com">Middesk</a> is a Series B company in this space that's backed by top venture capital firms like Accel, Sequoia, Insight Partners, and more.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>During a period of time where cost savings are the top priority, companies will be looking for ways to spend less on essential but non-core activities like regulatory compliance. Nucleus states that its product can reduce manual KYB operations time by 60%. Anywhere close to that is a massive amount of savings for financial institutions who devote substantial resources to KYB.</p>
<p>User experience matters, too. Customers don't want to wait days or weeks to get started while they wait for their business to be verified. They don't want to answer pointless compliance questions, either. If Nucleus can help financial institutions both save money on KYB compliance <em>and</em> improve customer experience in a meaningful way, they can become a large company.</p>
<h5 id="who-are-their-investors">Who are their investors?</h5>
<p>According to PitchBook data, <a href="https://www.ycombinator.com/blog/ycs-500-000-standard-deal?ref=content.strategyofsecurity.com">Y Combinator's $500,000 SAFE note</a> is the only investment disclosed to date.</p>
]]></content:encoded>
            <category>Startups</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/04/Y-Combinator---New.png"/>
        </item>
        <item>
            <title><![CDATA[2022 Cybersecurity Annual Earnings Recap (Part 2)]]></title>
            <link>https://strategyofsecurity.com/2022-cybersecurity-annual-earnings-recap-part-2/</link>
            <guid>642f30f321a789004de9a262</guid>
            <pubDate>Thu, 06 Apr 2023 21:15:05 GMT</pubDate>
            <description><![CDATA[Part 2 of a series analyzing annual earnings announcements, including Qualys, Rapid7, and Tenable.]]></description>
            <content:encoded><![CDATA[<p>This article continues coverage of 2022 annual earnings for cybersecurity companies. <a href="https://strategyofsecurity.com/p/2022-cybersecurity-annual-earnings-recap-part-1/">Part 1</a> discussed Cloudflare, Check Point, CyberArk, and Fortinet.  Today, we're going to take a look at Qualys, Rapid7 and Tenable — three direct competitors in the vulnerability management market.</p>
<p>The strategy for each company is expansion into other adjacent product categories to broaden their platform and consolidate other standalone vendors. Each is executing their strategy in a slightly different way with varying levels of (early) success. We'll cover some of the nuances as we break down the earnings for each company.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/04/Logo_-Qualys.png" class="kg-image" alt="Qualys logo" loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/04/Logo_-Qualys.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/04/Logo_-Qualys.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/04/Logo_-Qualys.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/04/Logo_-Qualys.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>From Qualys's annual earnings <a href="https://www.qualys.com/company/newsroom/news-releases/usa/2022-02-09-qualys-announces-fourth-quarter-and-full-year-2022-financial-results/?ref=content.strategyofsecurity.com#:~:text=Revenues%3A%20Revenues%20for%202022%20increased,compared%20to%2078%25%20in%202021.">press release</a>:</p>
<blockquote>
<p>Qualys, Inc. (NASDAQ: QLYS), a pioneer and leading provider of disruptive cloud-based IT, security and compliance solutions, today announced financial results for the fourth quarter and full year ended December 31, 2022. For the quarter, the Company reported revenues of $130.8 million, net income under United States Generally Accepted Accounting Principles (GAAP) of $28.3 million, non-GAAP net income of $38.9 million, Adjusted EBITDA of $55.1 million, GAAP net income per diluted share of $0.74, and non-GAAP net income per diluted share of $1.01. For the full year ended December 31, 2022, the Company reported revenues of $489.7 million, GAAP net income of $108.0 million, non-GAAP net income of $146.5 million, Adjusted EBITDA of $218.6 million, GAAP net income per diluted share of $2.74, and non-GAAP net income per diluted share of $3.72.<br>
<br>
"We are pleased to report another quarter of strong revenue growth, profitability, and cash flow generation," said Sumedh Thakar, president and CEO. "In 2022, we continued to innovate, introducing new applications as well as enhancing existing applications, to further strengthen our market position in the cybersecurity space. As validated by the 2022 SC Awards having named Qualys' Vulnerability Management, Detection and Response as the Best Vulnerability Management solution, we believe that our natively integrated platform that is detecting, remediating, and reducing cyber risk brings a highly differentiated value proposition to organizations and positions us well for durable profitable growth."</p>
</blockquote>
<p>Qualys's recent financial performance has been much better than the overall tone of the earnings call. Their financial performance is nicely summarized in a chart from their investor deck, which compares <a href="https://www.mckinsey.com/industries/technology-media-and-telecommunications/our-insights/saas-and-the-rule-of-40-keys-to-the-critical-value-creation-metric?ref=content.strategyofsecurity.com">Rule of 40</a> calculations across peers in both cybersecurity and SaaS:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/04/qualys-financials-1.png" class="kg-image" alt="" loading="lazy" width="1087" height="595" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/04/qualys-financials-1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/04/qualys-financials-1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/04/qualys-financials-1.png 1087w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Qualys Q4 2022 Investor Presentation</span></figcaption></figure><p>Qualys maintained this level of financial performance despite being (in their own words) focused on investments in R&amp;D and sales and marketing. From CFO Joo Mi Kim:</p>
<blockquote>
<p>2022 was another notable year of product innovation for Qualys as we continued our product leadership while growing revenues by 19%, maintaining our gross margin at 81% despite inflationary pressures, and generating EBITDA margin of 45%. While our profit margin was well-above our industry peers, 2022 was a year of investment for Qualys with both R&amp;D and sales and marketing growing faster than revenues.</p>
</blockquote>
<p>I summarized the strategy behind their investments during a <a href="https://strategyofsecurity.com/p/q3-2021-cybersecurity-earnings-strategies-for-services-saas-and-platforms/">previous analysis</a> of their earnings:</p>
<blockquote>
<p>Qualys is at an interesting juncture as a company. They have long been known for vulnerability management, dating all the way back to their beginnings in 2000 when they became the first SaaS-based vulnerability management platform. They're a market leader in vulnerability management, but the company has struggled with growth relative to top performing cybersecurity companies...<br>
<br>
Qualys is a notable exception among public cybersecurity companies because they're profitable at the expense of growth. To increase growth, they are now pursuing a broader platform strategy with product consolidation as its primary value proposition.</p>
</blockquote>
<p>Just over a year later, their platform strategy is starting to shape up. The company is still a work in progress (one of the major themes from the annual earnings call), but there's a lot to learn from their transformation.</p>
<h5 id="enterprise-buyers-want-consolidation-and-quantifiable-outcomes">Enterprise buyers want consolidation and quantifiable outcomes.</h5>
<p>Add Qualys to the list of cybersecurity companies with consolidation as a major theme on the earnings call. In the words of CEO Sumedh Thakar:</p>
<blockquote>
<p>I’ve met with over a hundred CISOs over the past few months, and their message is clear; they are looking to pivot to a platform-based solution to solve their complex security problems.</p>
</blockquote>
<p>They went as far as publishing a slide showing exactly <em>which</em> vendors and categories their cloud platform can consolidate:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/04/qualys-consolidation.png" class="kg-image" alt="" loading="lazy" width="1086" height="623" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/04/qualys-consolidation.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/04/qualys-consolidation.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/04/qualys-consolidation.png 1086w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Qualys Q4 2022 Investor Presentation</span></figcaption></figure><p>Their roadmap for consolidation is more illustrative than reality at this point. Outside of Qualys's core vulnerability management capabilities, other areas of the platform are still maturing. For example, their endpoint security product isn't yet mentioned or included in Gartner's latest Magic Quadrant for Endpoint Protection Platforms. However, this visual is a clear demonstration of the company's vision and strategy.</p>
<p>Signs of progress are starting to show. Sumedh Thakar discussed customer perception of their platform and strong growth in large accounts:</p>
<blockquote>
<p>As more and more customers are beginning to perceive Qualys as a leading security platform they can leverage to solve their complex and difficult security problems, we are growing increasingly confident in our ability to drive growth and gain market share.<br>
<br>
This is evidenced by the continued growth in our large customer spend, with customers spending $500,000 or more with us growing to 116 in Q4 up 27%, from a year ago.</p>
</blockquote>
<p>This theme is consistent with several other large cybersecurity companies. However, Qualys's large account growth comes with a tradeoff: they're struggling with mid-market and SMB customer segments. More on this later.</p>
<p>Sumedh Thakar shared one of the most insightful perspectives I've seen on consolidation during this year's earnings calls:</p>
<blockquote>
<p>...everybody is talking about security budgets and the layers being added and the scrutiny, but really it's a question of the spend that you're putting in security is that giving you meaningful outcomes from a risk reduction perspective and that's really the question that's being asked.<br>
<br>
If we're going to spend this money, are we getting a risk reduction? And that's where the TruRisk that we introduced last year and the enhancement that we have done now, it has resonated well with the CISOs, because now we're able to give them risk score and they're able to actually tie the spend that they're doing to bring that risk score down and really able to quantify how that investment is making sense.<br>
<br>
...<br>
<br>
So it's not just the projects in security you're executing, but what is the outcome that you are bringing? And I think that's kind of what's resonating with our customers.</p>
</blockquote>
<p>Risk quantification (and the topic of measurement, more broadly) has always been a tricky subject in cybersecurity. In difficult economic periods, business leaders want their CISOs to measure and quantify spend and outcomes. There's no way around it, even though it's difficult to do in this profession.</p>
<h5 id="qualys-is-facing-challenges-with-economic-uncertainty-especially-in-mid-market-and-smb">Qualys is facing challenges with economic uncertainty, especially in mid-market and SMB.</h5>
<p>Qualys's leadership team talked a lot about the impact economic uncertainty had on the company during Q4 2022. Their assessment and 2023 guidance couldn't have been more blunt. From Joo Mi Kim:</p>
<blockquote>
<p>Q4 was a tough quarter for us. As Sumedh mentioned, it was lower-than-expected bookings performance. And what we've assumed in the 2023 guidance is that that condition continues.</p>
</blockquote>
<p>Their specific challenges seem to lie in mid-market (SME) and small business (SMB) sales. Another pointed analysis from Joo Mi Kim:</p>
<blockquote>
<p>...where we've seen the lack of growth and the inefficiency if you will is on the SME and SMB space, where if you take a look at as an example, customers who spent less than $20,000 with us, the count really didn't grow that much and that's been a drag on our business. That's where we're really focused on right now with the new product and packaging, we knew that there was friction.</p>
</blockquote>
<p>The company seems to be caught in the middle of top-down enterprise sales and bottom-up adoption with Product-Led Growth (PLG). Two anecdotes show the tension. First, operating expenses skyrocketed in Q4 because of spend on sales and marketing:</p>
<blockquote>
<p>Operating expenses in Q4 increased by 25% to $58.4 million, primarily driven by the growth in sales and marketing investments including higher headcount and related costs as well as spend on trade shows.</p>
</blockquote>
<p>However, Sumedh Thakar mentioned product-led growth and alignment of product marketing multiple times on the call:</p>
<blockquote>
<p>...aligning product marketing, product management, product market being and driving more product-led growth, we believe we can use our platform itself as a way to create more opportunities for our sellers to show the value prop much more quickly.</p>
</blockquote>
<p>In cybersecurity, it's hard (but not impossible) to have both top-down and bottom-up adoption. Companies like Cloudflare (discussed in Part 1), <a href="https://strategyofsecurity.com/p/hashicorps-ipo-bottom-up-adoption-and-layering">HashiCorp</a>, and <a href="https://ventureinsecurity.net/p/product-led-growth-in-cybersecurity?ref=content.strategyofsecurity.com">others</a> have done it with varying degrees of success. Qualys is aiming to be one of the rare companies that has both sides of the growth equation working.</p>
<h5 id="qualys-is-well-positioned-for-vulnerability-management-in-hybrid-environments">Qualys is well positioned for vulnerability management in hybrid environments.</h5>
<p>Qualys introduced <a href="https://blog.qualys.com/product-tech/2022/11/01/introducing-totalcloud-cloud-security-simplified?ref=content.strategyofsecurity.com">TotalCloud</a> in October 2022, officially marking their entry into the hot <a href="https://www.wiz.io/blog/what-is-a-cnapp?ref=content.strategyofsecurity.com">Cloud-Native Application Protection Platform (CNAPP)</a> market. The launch was partly fueled by the company's <a href="https://www.qualys.com/company/newsroom/news-releases/usa/qualys-acquires-blue-hexagons-ai-machine-learning-platform/?ref=content.strategyofsecurity.com">Blue Hexagon acquisition</a> in October 2022.</p>
<p>Sumedh Thakar gave some commentary about both on the earnings call:</p>
<blockquote>
<p>Additionally, TotalCloud, which is our cloud-native risk management solution for public clouds, is now GA, and since our acquisition of Blue Hexagon in October, we’ve already added a new Cloud Detection and Response module to our TotalCloud solution.<br>
<br>
As organizations increasingly prioritize moving workloads to hybrid and multi-cloud environments, we view this new ML/AI-based technology for zero-day threat hunting and response as another strong competitive differentiator in a rapidly evolving market.</p>
</blockquote>
<p>For all the hype about cloud security and the well-funded companies in this market, a practical problem remains: large enterprises are going to have material amounts of on-premise infrastructure for a long time. We're probably talking decades.</p>
<p>That's a tough dilemma for both security leaders and product companies during this long and unpredictable period of transition. Cloud security products aren't built for on-premise environments. Yet security leaders need to keep both types of environments secure.</p>
<p>Enter Qualys — a company originally built for on-premise infrastructure, yet early enough and agile enough to adapt their vulnerability management product into a SaaS offering. Sumedh Thakar shared several interesting comments about how enterprises with hybrid environments are behaving:</p>
<blockquote>
<p>...customers are looking for flexibility moving workloads from on-prem into cloud multi-cloud and back...<br>
<br>
...feedback has been very positive because of the comprehensiveness of the scanning capability that we bring and sort of just focusing on a snapshot-only scan or agent-only scan, we're giving them the most flexible options.<br>
<br>
Our large enterprises are excited about it instead of looking at cloud-only security solutions that only give them visibility near the cloud. Most companies applications have or hybrid some of it is in cloud some of it is in on-prem, and they want to see the overall risk...</p>
</blockquote>
<p>Even with the buzz and large financing rounds in cloud security, Qualys has an important role to play as an established leader in vulnerability management and adjacent domains.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/04/Logo_-Rapid7.png" class="kg-image" alt="Rapid7 logo" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/04/Logo_-Rapid7.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/04/Logo_-Rapid7.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/04/Logo_-Rapid7.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/04/Logo_-Rapid7.png 1920w" sizes="(min-width: 720px) 720px"></figure><p>“Rapid7 ended the year with revenue, operating profit, and free cash flow that exceeded our targeted ranges. Amidst an evolving economic landscape, we see customers continuing to expand their wallet share around our leading Insight platform, with ARR per customer growing double-digits from the prior year,” said Corey Thomas, Chairman and CEO of Rapid7.</p>
<p>Rapid7 is delivering solid financial results despite being a company in transition from its well-known vulnerabilty management product to a multi-product Security Operations company. A quick summary of revenue growth from CFO Tim Adams:</p>
<blockquote>
<p>Full year revenue of $685 million grew 28% over the prior year and exceeded the high end of our guidance range.</p>
</blockquote>
<p>The company's strong FY22 performance was somewhat overshadowed by rumors of an acquisition. Let's get straight to that.</p>
<h5 id="rapid7s-leadership-team-didnt-comment-on-acquisition-rumorsbut-lets-discuss-them-anyway">Rapid7's leadership team didn't comment on acquisition rumors...but let's discuss them anyway.</h5>
<p>The most significant news about Rapid7's annual earnings was barely discussed on the earnings call. On February 1st, Reuters <a href="https://www.reuters.com/markets/deals/cybersecurity-firm-rapid7-explores-sale-sources-2023-02-01/?ref=content.strategyofsecurity.com">reported</a> the company is exploring a take-private sale. Investors liked the idea — Rapid7's stock price jumped 31% on the day the news surfaced:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/04/rpd-sale-news-stock-price.png" class="kg-image" alt="" loading="lazy" width="690" height="455" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/04/rpd-sale-news-stock-price.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/04/rpd-sale-news-stock-price.png 690w"><figcaption><span style="white-space: pre-wrap;">Source: Google Finance</span></figcaption></figure><p>Comments on the rumored acquisition was the first question out of the gates for the analyst Q&amp;A portion of the call. Unsurprisingly, CEO Corey Thomas wasn't able to address the question directly, but his commentary gave some important context:</p>
<blockquote>
<p>...we have a pretty massive opportunity in front of us, and we’re executing well against this. In that context, it’s not a shocker that people will talk about us, because we have both a good opportunity, and we’re well positioned to actually capture that opportunity in the broader market. That said, we just have a policy [of not commenting] on numerous speculation and we’re going to continue that.</p>
</blockquote>
<p>In this current phase of large cybersecurity take-privates, these are the exact criteria private equity buyers are looking for. Rapid7 isn't financially performing on the level of the very highest performers in cybersecurity, but it's a quality company with well-established assets in vulnerability management and pentesting to build from.</p>
<p>Moving beyond the earnings call and into speculation about what a take-private sale might look like, two analysts provided <a href="https://seekingalpha.com/news/3931296-rapid7-could-see-as-much-as-90share-in-takeout-though-unlikely-analyst?ref=content.strategyofsecurity.com">important commentary</a> about the deal structure. First, from Matt Hedberg at RBC:</p>
<blockquote>
<p>While we wouldn't expect RPD to go for a multiple as high as that of SAIL, given its SaaS mix-shift, strategic pivot away from VM to DevSecOps and positive margins, for reference, 8.0x EV/NTM revenue would imply ~$90 per share.</p>
</blockquote>
<p>Next, from Fatima Boolani at Citi:</p>
<blockquote>
<p>RPD's inferior financial profile/end-market dynamics vs. recent cyber M&amp;A does cast the 8-9x EV/S transaction precedents as a high watermark, in our view, but we think the rest of the aforementioned ingredients at work do offer credible reasons for a potential transaction outcome.</p>
</blockquote>
<p>Both analysts are pointing out that the deciding factor for an acquisition would likely boil down to the valuation and underlying factors that drive the multiple. The 8-9x EV/NTM multiple referenced by both analysts implies the acquisition price could be well over $10 billion.</p>
<p>We've seen transactions of that size happen recently. Proofpoint's <a href="https://www.globenewswire.com/en/news-release/2021/08/31/2289228/35374/en/Thoma-Bravo-Completes-Acquisition-of-Proofpoint.html?ref=content.strategyofsecurity.com">acquisition by Thoma Bravo</a> is a good comparison in terms of company size. Revenue as of the company's 2020 fiscal year (its last full year of reporting as a public company) was <a href="https://en.wikipedia.org/wiki/Proofpoint,_Inc.?ref=content.strategyofsecurity.com">$1.05 billion</a> — compared to the $685 million in revenue just reported by Rapid7 for its 2022 fiscal year. Thoma Bravo paid $12.3 billion for Proofpoint.</p>
<p>Several factors have to align for a deal of this size to materialize, so it's hard to predict what will happen with Rapid7 in 2023. This is definitely the headline to monitor, though.</p>
<h5 id="rapid7s-focus-for-consolidation-is-on-increasing-arr-per-customer">Rapid7's focus for consolidation is on increasing ARR per customer.</h5>
<p>Like many other public cybersecurity companies, Rapid7 is executing its own strategy for building a multi-product portfolio to drive vender consolidation among its customers. They took a slightly different approach to explain their strategy. It's worth a quick look.</p>
<p>Rapid7's leadership team believes there is a lot of upside for ARR growth at existing customers:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/04/rpd-consolidation-arr-potential.png" class="kg-image" alt="" loading="lazy" width="1087" height="622" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/04/rpd-consolidation-arr-potential.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/04/rpd-consolidation-arr-potential.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/04/rpd-consolidation-arr-potential.png 1087w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Rapid7 Q4 2022 Investor Presentation</span></figcaption></figure><p>The graphic illustrates that the path towards ARR growth is through vendor consolidation. For Rapid7, this means extending beyond their traditional entry point of vulnerability management to upsell additional products in their platform.</p>
<p>On the earnings call, Corey Thomas explained their strategy and clarified how vulnerability management — the product Rapid7 is most well known for — fits into the company's broader product strategy:</p>
<blockquote>
<p>Our strategy is pretty straightforward. As we are taking a cloud-first because that’s what strategic assets are as we go forward, and a holistic risk view and a holistic threat view of the environment.<br>
<br>
In that context, vulnerability management is strategic. We have people working on that. We have teams who are dedicated to it. But it is a feature and component of our platform.<br>
<br>
We are a SecOps cloud-first company that actually offers vulnerability management as a part of our platform that allows people to have the visibility that they need to manage our overall security. As part of that overall strategy, it is just a part of our offering included in the price point.</p>
</blockquote>
<p>Proactively driving consolidation is important enough that the company's sales metrics are weighted towards increasing ARR per customer over adding new customers, at least for the near term. Again from Corey Thomas:</p>
<blockquote>
<p>...we have an increased focus with our consolidation offerings on our installed base across the company...<br>
<br>
...we do expect internally to see a much heavier weighting towards ARR per customer versus new customer adds because we have a pretty good installed base is actually looking to actually consolidate that we have great relationships with, and is looking to be oriented towards the future that’s actually more cloud-based.<br>
<br>
...<br>
<br>
We’ll add customers in the future. But right now, we’re heavily focused on ARR per customer.</p>
</blockquote>
<p>While this may sound like a conservative "protect the base" strategy, it's probably the best thing for the company to do as it transforms its product portfolio and, you guessed it, navigates an uncertain econoy in 2023.</p>
<h5 id="more-concerns-about-the-economy-in-2023-but-from-a-customer-point-of-view">More concerns about the economy in 2023, but from a customer point of view.</h5>
<p>Add Rapid7 to the long list of company leaders with concerns about the economy in 2023. We don't need to keep discussing that.</p>
<p>The insightful part about Corey Thomas's commentary was how he articulated the mindset of a customer and how they're thinking about the impact to their organizations:</p>
<blockquote>
<p>Customers continue to face an evolving and complex threat landscape and there remains broad-based executive and board level support for cybersecurity projects. Despite this fundamental demand, the ability to obtain incremental budgets for these projects has gotten more difficult in the current environment.<br>
<br>
As a result, CISOs are being forced to scrutinize and prioritize our budgets, driving longer deal cycles and more uncertainty around deal timing as contracts take longer to push through procurement. This dynamic is exacerbated by the increasing size of our deal opportunities as we gain traction as a platform consolidator.<br>
<br>
Despite a challenging budget environment, we're seeing certain tailwinds gain traction. Constrained security budgets are accelerating customers' focus on security vendor consolidation with greater value being placed on the efficiency and impact of integrated platform technology in a fragmented IT landscape.</p>
</blockquote>
<p>So, budgets are generally stable, but not increasing. And buyers are heavily scrutinizing and prioritizing every dollar they spend.</p>
<p>Further complicating the problem, security has some domain-specific challenges with wage inflation and manual processes:</p>
<blockquote>
<p>...what we actually see is...every organization is trying to figure out how to get a handle on spending. It really comes down to sort of like two big things. As you said, security is one of the bigger wage inflationary areas. So they’re actually trying to figure out how to actually think about managing the fact that they've got a lot of overhead and an expensive talent market, so how to manage that. And there’s lots of actually security tools that require a lot of manual interaction.<br>
<br>
We actually tackle both of those, which is why we believe that we actually have lots of leverage over the mid and the long-term is from a core platform perspective, we built a broad platform, but we have the core capabilities that mostly we have a heavy automation focus that’s really focused on driving the productivity of our customers and security operations across vulnerability management, across cloud security and a cost detection and response.</p>
</blockquote>
<p>It's an interesting conundrum that partially explains the cybersecurity industry's (relative) level of durability so far during the economic downturn.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/04/Logo_-Tenable.png" class="kg-image" alt="Tenable logo" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/04/Logo_-Tenable.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/04/Logo_-Tenable.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/04/Logo_-Tenable.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/04/Logo_-Tenable.png 1920w" sizes="(min-width: 720px) 720px"></figure><p>From Tenable's annual earnings <a href="https://investors.tenable.com/news-releases/news-release-details/tenable-announces-fourth-quarter-and-full-year-2022-financial?ref=content.strategyofsecurity.com">press release</a>:</p>
<blockquote>
<p>Tenable Holdings, Inc. (“Tenable”) (Nasdaq: TENB), the Exposure Management company, today announced financial results for the quarter and year ended December 31, 2022.</p>
</blockquote>
<p>“We are very pleased with our Q4 results as we exceeded our expectations on the top and bottom line,” said Amit Yoran, Chairman and CEO of Tenable. “We are seeing incredible traction with Tenable One, which helps customers understand and reduce risk across the interconnected attack surface. Product innovation, coupled with continued focus on financial performance, including strong free cash flow generation, position us well in this fluid market.”</p>
<p>Tenable is in an interesting place as a company — now well into their transition from the company's founders to the next generation of leadership. They're also firmly established as a multi-product company that has successfully built upon its vulnerability management roots (with Nessus) and is now seeing early financial results on an integrated security platform.</p>
<p>In many ways, Tenable is the precursor to <a href="https://strategyofsecurity.com/p/hashicorps-ipo-bottom-up-adoption-and-layering">HashiCorp</a> in our industry — a company with strong open source roots (Nessus, in the case of Tenable), that grows through bottom-up adoption, and successfully builds a company around the open source offering.</p>
<p>All of this adds up to the positive momentum the company talked about on its 2022 annual earnings call. Their Tenable One platform offering is working, and the company's financial and competitive landscape is seeing positive changes as a result.</p>
<h5 id="tenable-is-one-of-the-few-companies-who-had-a-good-q4-and-is-optimistic-about-2023">Tenable is one of the few companies who had a good Q4 and is optimistic about 2023.</h5>
<p>Tenable turned in strong financial performance for its 2022 fiscal year with full year revenue of $683.2 million, a 26% year-over-year increase. In the current economic environment, they'll get some scrutiny from analysts for a $92.2 million net loss on the year. I'd rationalize it by saying they're in a position to take market share and need to sustain growth-level investments longer than companies in other less competitive markets.</p>
<p>Their 2022 results speak for themselves — Tenable is one of the only companies with strong momentum and (relative) optimism heading into 2023. Look no further than Q4. From CEO Amit Yoran:</p>
<blockquote>
<p>Additionally, we had another strong quarter with large deals as we added 140 net new six-figure customers, which is a record for us and is up 40% year-over-year.<br>
<br>
Even more importantly, the number of six-figure deals accelerated throughout the year, further validating our corporate strategy and demonstration of the momentum we are building.</p>
</blockquote>
<p>And more specifics from CFO Steve Vintz:</p>
<blockquote>
<p>Underpinning our better than expected topline results is strong customer demand. Specifically, we added 571 new enterprise platform customers and 140 net new six-figure customers in Q4. While both metrics are exceptional, large deals, in particular, grew 40% year-over-year.</p>
</blockquote>
<p>How did they do it? By executing a strategy of channel partnerships and layering on multiple products beyond their core vulnerability management offering — long before it was needed. From Steve Vintz:</p>
<blockquote>
<p>The takeaway here is the investments we've made over the years to build a vast ecosystem of partners and extend our global reach allow us to effectively serve customers of all sizes in most major markets for traditional VM or increasingly for unified risk and exposure management.</p>
</blockquote>
<p>When turbulent economic conditions hit, it's too late to jumpstart growth strategies like channel partnerships and product portfolio expansion. Both of these take time to develop, and Tenable was fortunate and intelligent enough to start both at the right time.</p>
<p>For Tenable, this adds up to confident CFO and lots of optimism about 2023:</p>
<blockquote>
<p>...we're delighted with our results for the quarter, which gives us a lot of confidence heading into 2023. We're beating the top and bottom-line, added hundreds of new customers and closed a record number of large deals in one of the most highly dynamic markets we see in many years.</p>
</blockquote>
<h5 id="tenable-ones-early-success-is-driving-the-strategy-and-narrative-around-vendor-consolidation">Tenable One's early success is driving the strategy and narrative around vendor consolidation.</h5>
<p>Every cybersecurity company has talked about vendor consolidation in annual earnings calls, but Tenable has one of the most concrete and data-driven narratives around their story. There are several factors in play that span product strategy, a paradigm shift in vulnerability management, and macroeconomic conditions.</p>
<p>First, a few comments on product strategy and positioning from Amit Yoran:</p>
<blockquote>
<p>As the market leader in vulnerability management, we're seeing great demand in the market, including new customer acquisition, renewals, and expansions. Our years of leadership in VM has put Tenable in a great position to target bigger, more strategic deals as customers continue to move beyond traditional VM to understand and reduce their cyber risk. We believe this thesis is driving the acceleration of six-figure deals.</p>
</blockquote>
<p>Every security practitioner knows about Nessus and Tenable. They walk into any company or opportunity with instant credibility in their core <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#vulnerability-assessment-and-management">vulnerability management market</a>. That's a great start, but the trend Yoran mentioned about customers moving from traditional VM to broader cyber risk management is what's important going forward.</p>
<p>Another way to think about this mindset shift is the idea of preventative security — identifying vulnerabilities earlier in their lifecycle, often before a CVE is even created. He went on to explain this paradigm shift, why it's hard, and how Tenable is positioned to win:</p>
<blockquote>
<p>Operationalizing preventative security has been an objective in the market for a long time. It's really hard to do and it requires a deep understanding of vulnerabilities, context and prioritization. It's our long history of understanding exposures at a very deep level that uniquely positions us to deliver on this objective.<br>
<br>
[Customers] can look at a more complete understanding of cyber exposure, a more complete perspective of risk, a much more compelling set of analytics, including attack path analytics and asset inventory types of things, which they haven't historically gotten with the vulnerability management program.</p>
</blockquote>
<p>We're still in the early days of this paradigm shift, but it's an important one. The companies (public, startups, or otherwise) who lead the transition from traditional VM to proactive, risk-based exposure management are going to thrive.</p>
<p>Finally, Tenable has a logical story behind market conditions and how consolidation benefits them. What stands out to me is how much more specific they were about exactly how they drive vendor consolidation. From Amit Yoran:</p>
<blockquote>
<p>...by [customers] increasing their Tenable One spend to cover not only traditional VM, but also look at a cloud-based assets or also looking at their identity, we can offer them some volume-based pricing, which ends up being much more attractive than going to one vendor for VM, going to another vendor for external attack surface management, going to another vendor for cloud security. So, we're seeing great leverage in go-to-market function, and it really has been resonating with customers. We expect that trend to continue, if not accelerate.</p>
</blockquote>
<p>There was no complaining about budgets or delayed sales cycles. Yoran's point of view is that budgets are there if you can demonstrate the value and benefits of consolidation:</p>
<blockquote>
<p>So, customer budgets are there. I think to the extent that we can become a cost-effective vendor consolidation platform play for them. There's a lot of interest, a lot of strategic dialogue around that. And I think customers are very excited about some of the newer analytics that we've introduced with Tenable One.</p>
</blockquote>
<p>All three of these factors add up to Yoran being confident about the future of Tenable One and the impact it will have on the company in 2023:</p>
<blockquote>
<p>So, we look forward to updating you during the course of the year, but I feel like Tenable One looks like it will continue to play a larger and larger factor throughout the year and going into next year.</p>
</blockquote>
<h5 id="tenables-competition-is-shifting-from-traditional-vulnerability-management-companies-to-broader-security-platforms">Tenable's competition is shifting from traditional vulnerability management companies to broader security platforms.</h5>
<p>A less obvious theme from Tenable's annual earnings discussion was the changing dynamics around their competition. At a high level:</p>
<ul>
<li>There is some uncertainty around Tenable's traditional competitors in the vulnerability management market.</li>
<li>Other large cybersecurity companies are building vulnerability management products, bringing new competition to Tenable's core market.</li>
<li>Tenable is continuously broadening its product portfolio with Tenable One, igniting new competitions in markets outside of vulnerability management.</li>
</ul>
<p>First, the existing vulnerability management market. Amit Yoran was asked about Tenable's competition and the acquisition rumors surrounding Rapid7. He wasn't able to comment directly, unsurprisingly, but did offer this:</p>
<blockquote>
<p>Yes, I mean, obviously, we wouldn't speculate about that, but I feel really good about the competitive environment. We are pretty consistent saying that we have exceptionally strong win rates especially in this market against our primary competitors. That remains -- those win rates remain exceptionally strong.<br>
<br>
And while we don't have a specific update to that, I'd say anecdotally, continues to climb in the sales team feels exceptionally confident going into any VM opportunity, but those are really ours to lose. And candidly, they feel like Tenable One gives them a very significant value differentiated capability to talk about as well.</p>
</blockquote>
<p>This is anecdotal, and obviously unsurprising to hear such confidence coming from a CEO, but interesting nonetheless during a time where a lot of other leaders aren't feeling confident or optimistic.</p>
<p>An analyst asked about increased competition from other large cybersecurity companies starting to offer vulnerability management products. Amit Yoran summarily dispatched them:</p>
<blockquote>
<p>Yes, there's been a lot of vendors over the course of years, making a lot of noise about VM going back four, five-plus years, Tanium, CrowdStrike, Microsoft others. And what I would tell you is they make noise. We see them for a quarter or two and then very quickly their sales team understand that their products are inferior and they start gravitating to their core markets and candidly, where their companies are investing much more aggressively in logging, SEIM, and elsewhere.<br>
<br>
So, especially in a product like VM where independent audit is an important function and where we feel like we've got a quantitatively and qualitatively differentiated product and experience and understanding the enterprise. We almost never see those larger IT vendors participating and certainly never see them beyond a first phase of competition.</p>
</blockquote>
<p>This is hilarious commentary for an earnings call. Banter aside, Tenable clearly doesn't view this type of competition as a serious threat. I don't take this as being overly dismissive, either — just that Tenable's leadership team is aware of their market leadership position.</p>
<p>Finally, Amit Yoran discussed competition and market opportunities in two new markets — Identity Threat Detection and Response (IDTR) <em>(Note: My words for the market, not his.)</em> and Operational Technology (OT). Here's what Amit Yoran said about IDTR:</p>
<blockquote>
<p>Active Directory is a trick and mess to deploy in any large environment and almost impossible to keep clean when you look at the number of pieces of software and the complexity of Active Directory, the number of pieces of software we should modify as they get installed into an enterprise environments.<br>
<br>
So, having a solution -- and most organizations don't have a solution in this area. The security teams know it's a big problem. They maybe do a consultant and an annual audit or assessment of their Active Directory environments, which is clearly not enough.<br>
<br>
So, we feel like there's tremendous market opportunity. The sales team has a lot of confidence in the Active Directory product and bringing it into customers. We had a great quarter with Active Directory in Q4. So, excited about the potential, both in 2023 as well as Active Directory playing an increasingly large role in Tenable One and some of the analytics that we're unlocking with Active Directory and identities.</p>
</blockquote>
<p>The overview of the problem is absolutely correct — every large organization struggles with securing and maintaining their Active Directory domains. I also agree about the market opportunity.</p>
<p>The interesting part about competition is that ITDR (Identity Protection, in CrowdStrike terminology) is that it brings Tenable into competition with non-tranditional competitors. CrowdStrike and SentinelOne are both heavily invested in this space, as I discussed in detail during my <a href="https://strategyofsecurity.com/p/earnings-crowdstrike-and-sentinelone-2022-annual-earnings-recap">review of both companies' annual earnings</a> last year.</p>
<p>There are also several well-funded startups competing in this space, including <a href="https://www.authomize.com/?ref=content.strategyofsecurity.com">Authomize</a>, <a href="https://oort.io/?ref=content.strategyofsecurity.com">Oort</a>, <a href="https://www.semperis.com/?ref=content.strategyofsecurity.com">Semperis</a>, <a href="https://www.spera.security/?ref=content.strategyofsecurity.com">Spera</a>, and more. The strategic question is whether security leaders want to buy these products from security platform companies like Tenable and others or standalone companies.</p>
<p>Finally, Amit Yoran described new competition in OT like this:</p>
<blockquote>
<p>In terms of competitive dynamics and competitive landscape, I'd say we're predominantly competing against just a small number, two or three private pure-play-focused vendors in the OT space. We feel like our technology is compelling and really leads the market when it comes to looking at the converged IT/OT environment.<br>
<br>
So, if you look at a factory floor today or if you look at pipeline operations or other OT environments, they are exclusively OT. They have a bunch of IT systems, IT control systems in those factory floors as well. And so we're, I think, unique in our ability to deliver incredible insight for overall risk of facility, which would include both OT and IT, and we think it's a significant competitive advantage for us.</p>
</blockquote>
<p>There is a similar theme here: when security leaders are buying OT security products, do they want to buy it as part of a platform, or from a pure-play company in the space? Time will tell, but it's interesting to think about now.</p>
<p>Overall, it's an exciting time for Tenable, especially as they head into 2023 with a lot of positive momentum and traction in new product categories.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/04/v1_-Cybersecurity-Earnings---FY-2022-Part-2.png"/>
        </item>
        <item>
            <title><![CDATA[An Interview With dope.security Founder and CEO Kunal Agarwal]]></title>
            <link>https://strategyofsecurity.com/an-interview-with-dope-security-founder-and-ceo-kunal-agarwal/</link>
            <guid>641d0ef1311ec8003d4f043e</guid>
            <pubDate>Fri, 24 Mar 2023 14:01:47 GMT</pubDate>
            <description><![CDATA[A discussion about re-imagining the Secure Web Gateway (SWG) with fly direct, building an authentic brand, and the future of dope.security.]]></description>
            <content:encoded><![CDATA[<p>A Secure Web Gateway (SWG) isn’t the place most people would go when looking to build a breakthrough cybersecurity product. That is, unless you’re deeply experienced in this space and know the opportunities others have missed.</p><p>Enter Kunal Agarwal, the founder and CEO of <a href="https://dope.security/?ref=content.strategyofsecurity.com">dope.security</a>. He and the team at dope.security are re-imagining the SWG using a “fly direct” model built for today’s remote first, cloud-based world.</p><p>I spoke with Kunal before their recent <a href="https://techcrunch.com/2023/03/22/dope-security-nabs-16m-led-by-gv-to-build-out-secure-web-gateways-designed-to-work-on-endpoints-not-in-the-cloud/?ref=content.strategyofsecurity.com">Series A announcement</a>. We covered several topics, including:</p><ul><li><strong>The making of dope.security: </strong>How the experiences gained from a decade at large cybersecurity product companies led to dope.security.</li><li><strong>The tech behind fly direct: </strong>Why the fly direct architecture is a breakthrough for SWG.</li><li><strong>Cybersecurity marketing, but make it dope: </strong>An approach to marketing that’s both authentic and clear.</li><li><strong>The future of dope.security: </strong>Where all of this is headed for the company and our industry.</li></ul><p></p><p><em>Note: This interview has been lightly edited for clarity.</em></p><hr><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/KunalHeadshot-KC_D_Hybird-May-20221663_edit.jpg" class="kg-image" alt="Kunal Agarwal headshot" loading="lazy" width="1224" height="1836" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/03/KunalHeadshot-KC_D_Hybird-May-20221663_edit.jpg 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/03/KunalHeadshot-KC_D_Hybird-May-20221663_edit.jpg 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/KunalHeadshot-KC_D_Hybird-May-20221663_edit.jpg 1224w" sizes="(min-width: 720px) 720px"></figure><h2 id="the-making-of-dopesecurity">The making of dope.security</h2><p><strong>Cole Grolmus:</strong> Your background is super relevant to the dope.security story. You worked for Symantec and Forcepoint, two large product companies, both in the SWG product domain and adjacent domains in their product portfolio. I definitely would like to hear about the connection between what you learned there and the reasons you decided to start dope.security.</p><p><strong>Kunal Agarwal:</strong> My background has always been in hacking since a very young age. After university, I moved to Symantec, and then to Forcepoint for almost 10 years between the two companies. I started out as an engineer and then moved into product management.</p><p>Moving from a large cybersecurity company into a startup is unusual, right? I didn't really have any specific need to do that. But really, what made this whole thing come together? It was the day to day customer experience. You cannot imagine the amount of people that would be complaining on a regular basis about Forcepoint's web proxy capability. The same thing happened at Symantec. Every single day.</p><p><a href="https://www.linkedin.com/in/rehanjalil/?ref=content.strategyofsecurity.com">Rehan Jalil</a>, the CEO of a company called <a href="https://securiti.ai/?ref=content.strategyofsecurity.com">Securiti.ai</a>, came in and said, <em>"If you were not going to do some random big company, what would you do?"</em> And I was like, this is the most mainstream problem that exists today. Every single company out there has this issue because they all use a capability like this. And we can fix it. Because right now, there's an architectural change. There's a terrible user experience. I mean, this is ripe for disruption. Rehan said, <em>"That sounds great Kunal. Go do it!"</em></p><p>It's a scary thought, right? But this whole company has been born from the experience of that, and just kind of making changes and saying, <em>"hey, maybe we could do it better ourselves."</em></p><p><strong>Cole Grolmus:</strong> I definitely think that's the best way to do it — being well grounded in experience and knowing what you're getting into. And having the expertise to actually be able to do it is something that's really important.</p><p><strong>Kunal Agarwal:</strong> I work a lot with musicians. There are two types of musicians. There's career musicians that are gonna go in, and that's their life and blood, and they're gonna crush it. And then there are tourist musicians who happen to have a decent voice that go into a studio, record a voice and do one single. Which one are you? Are you the person that's going to be in this day in and day out, no matter if we were making a living or not making a living?</p><p>That is what the people in dope.security are. We are so passionate about this. We want to make it good. We're not just people that stumble into this just because we want a stint and tour around saying, <em>"Oh, how in cybersecurity today?"</em> These are people that have done this for their whole lives.</p><p>It's not saying that you have to be a hacker to be able to do this stuff and that you have to do black hat hacking like myself to do this. But you should have the energy. This is something I really, really, really enjoy doing. And I would not be doing anything else but this. That is the underscore of dope.security.</p><hr><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/dopesecurity-tech.jpg" class="kg-image" alt="" loading="lazy" width="2000" height="1047" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/03/dopesecurity-tech.jpg 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/03/dopesecurity-tech.jpg 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/03/dopesecurity-tech.jpg 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/dopesecurity-tech.jpg 2000w" sizes="(min-width: 720px) 720px"></figure><h2 id="the-tech-behind-fly-direct">The tech behind fly direct</h2><p><strong>Cole Grolmus:</strong> Can you talk about the serious advantages of fly direct as compared to the old SWG architecture? To me, that's the clear benefit of what's going on here and something that's radically different from a tech perspective.</p><p><strong>Kunal Agarwal:</strong> It's like taking a flight. If you're flying from Minneapolis to San Francisco, would you stop over in New York? No. That's the answer.</p><p>When every single person who's at a company accesses the internet today, they stop over. You access the internet, it goes to a data center, and from there, it's processed, decrypted. And then it goes to its destination, which could be anything from YouTube, to Gmail, to Office 365, to pretty much anything on the internet.</p><p>The fly direct architecture is: <em>why stop over if you could fly direct?</em> We actually implemented those capabilities into the device itself rather than in some remote data center.</p><p>There are a few big challenges we used to see with these stopover approaches which just don't exist with the fly direct approach. You have a huge reliability challenge when data centers are having a problem. Maybe your internet is getting blocked to that data center. It could just be a performance problem where it's slow and not working correctly. Or it could be a privacy problem where you're decrypting everything in a data center.</p><p>If you take those three together, it's a pretty awful experience. With fly direct, we make it a much better architecture, and then we wrap it in a beautiful user experience. That is the heart of what dope.security is.</p><p><strong>Cole Grolmus:</strong> I suspect this is one of those things that sounds simple because you explained it in a really elegant way, but it's deceptively hard to execute.</p><p>If you're not thinking critically, you sit there and listen to the explanation you just gave and start to wonder things like: <em>"Well, why hasn't this been done before? Oh, this can't be that hard to build. Why don't Forcepoint and others build this instead?</em></p><p>Unpack that a little bit for me. What makes this actually hard to do?</p><p><strong>Kunal Agarwal:</strong> Think about 20 years ago. You'd be sitting in an office, and in your office, there would be a back room with a mini data center in the closet. You'd have a proxy, a secure web gateway, and that SWG would take all the traffic from all the devices in the office and then only send it out if it's acceptable. So it's very close to the user.</p><p>When Zscaler, Symantec, Forcepoint, and all these other companies came about, they all said, <em>"Well, what if we hosted that proxy for you so you didn't have to install it in everyone's environment?"</em></p><p>And then the evolution came where your laptop is actually moving in and out of the office. <em>"So what if we give you some software agent that reroutes the internet, no matter where you are, to our data center for protection?"</em></p><p>If you think about, it's a very big company mentality. It's, <em>"Hey, we're not able to just fix the problem. We need to make a patch or an enhancement to the existing infrastructure to actually allow for people that are outside the office to be secure."</em> It makes perfect sense, then 10 or 15 years later, it doesn't really make that much sense. It's 2023. These products were built in 2010 or 2011.</p><p><strong>Cole Grolmus:</strong> From a technical perspective, what all of a sudden made it possible to build a SWG that works on-device?</p><p><strong>Kunal Agarwal:</strong> The first part of it is the willpower. If you went back a couple of years ago when I raised the first round of funding, and you asked everyone, <em>"Hey, what do you think of this?"</em>, probably 60 percent of people would say this is not possible. That is half of it: so many people out there think this is not possible.</p><p>What they don't realize is that our software is 50 to 100 megabytes of RAM max. My browser uses gigabytes. That's because it's doing tons and tons more processing than SSL decryption, re-encryption, and some regex's for for security purposes — block this URL, inject this, that kind of stuff.</p><p>It's actually not just that so many people have said "no" and that's why it was never done. The architecture from the past was like a Titanic ship. It's going in a direction, and you can't shift it at all. You can't change it.</p><p>That's the genesis for dope.security: we're able to do something because we wanted to do it and we knew it was possible. So we built it.</p><p><strong>Cole Grolmus:</strong> Among the people who were in the <em>"this isn't possible"</em> camp, did you ever get anybody to substantiate why it wasn't possible? Or, was it more of the overall inertia where people feel like a SWG is what it is and needs to be routed through some central proxy?</p><p><strong>Kunal Agarwal:</strong> No. We quickly started to see that there was an old school mentality, which is like, <em>"The CFO is gonna hate the name dope.security. It's too colloquial, etc."</em> <em>"Oh, and it'll never work on a device. It's not powerful enough and, and, and, and, and..."</em></p><p>Then, there's the shift to the new thinkers, the creative people that are thinking, <em>"look, why isn't this possible?"</em> At some point, people said that machine learning couldn't be done on an endpoint protection platform or EDR software on the device. These things are possible. They just have to be rethought.</p><p>And they can't be done by companies that have existed for 10 or 20 years, because they can't let go of all their existing investment and all the infrastructure around the world. You can't let go of that overnight. For them, there isn't even value in doing something like this.</p><p>In fact, we used to think about doing this at Symantec many times. Even one of our board members will always tell you they thought of it at Symantec, but it was not possible due to bureaucracy. There's too much infrastructure around what's being built. It's not possible just go in and say, <em>"take this out, build it from scratch, and make it modern."</em></p><p><strong>Cole Grolmus:</strong> I want to make sure we don't lose a technical point that you touched on. I could definitely see technical skeptics saying, <em>"Doing all of this client side is going to impact the performance on my clients. And I already have enough agents running on there, yada yada yada."</em></p><p>I'm sure you run into this objection at least once in a while. Talk about that a little bit. Is that problem even true? Or, how were you able to engineer this in a way that runs efficiently client-side?</p><p><strong>Kunal Agarwal:</strong> Your viewpoint of practitioner versus enthusiast is completely in this spectrum here. A practitioner will quickly realize that <em>"Hey, I already have an agent on my system. So I'm just replacing it with a nice, beautiful, natural one."</em> You're not taking up more room on the block. You're just renovating the old house renovated with a nice, new, beautiful house.</p><p>It's the enthusiast that gets confused, right? The person that heard at some point, <em>"Oh, people don't like agents anymore"</em> and this and that. Yeah, but you're not looking at it from a practitioner perspective, you're looking at from an enthusiast perspective, where you're just reading about things.</p><p>It's like when you hear from people, <em>"Yeah, and you can take all these things and it all work together and it's gonna be great, and that's the platform pitch, and we're all integrated together!"</em> That's not the way the world works, unfortunately, and that I have always believed is missing from cybersecurity.</p><p>As a person in a company, whether you are an engineer, or a leader or The Supreme Leader, it doesn't matter. You must know how your capabilities and products work. I've worked with CEOs and vice presidents who have never even used their product. I've even worked with product managers who have never used their product before. They cannot set it up.</p><p>At dope.security, everyone, from your engineer, to your QA, to your marketing, to your sales person, have all used the product and they can show it to you right now.</p><hr><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/DS_analytics_editorial_FAMA_03.jpg" class="kg-image" alt="" loading="lazy" width="1620" height="911" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/03/DS_analytics_editorial_FAMA_03.jpg 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/03/DS_analytics_editorial_FAMA_03.jpg 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/03/DS_analytics_editorial_FAMA_03.jpg 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/DS_analytics_editorial_FAMA_03.jpg 1620w" sizes="(min-width: 720px) 720px"></figure><h2 id="cybersecurity-marketing-but-make-it-dope">Cybersecurity marketing, but make it dope</h2><p><strong>Cole Grolmus:</strong> What led you to call the company dope.security? It's a really unique name — maybe a turn-off for some people, and I'm sure other people love it. I think it's awesome. I was just curious how you decided on it.</p><p><strong>Kunal Agarwal:</strong> The name has been in my head for years and years, all the way back to Symantec. I would be chatting with my bosses at the time and just saying this name. It was just a pipe dream at the time. It took something that you get really passionate about — not just something that works really well, but also something that can be a very successful business.</p><p>Ultimately, I want the reaction that you had when you went website and you're like, <em>"damn, that website is dope."</em> And I'm not saying this in a different way — this is exactly what we see from pretty much anyone in the company.</p><p>All of us look at something, we see it, we feel it and then we put our signature on it when it goes out there into the world. And we say, <em>"that's dope because we stand behind it.</em>”</p><p><strong>Cole Grolmus:</strong> The vibe of your marketing and brand is clearly a lot different than your plain old cybersecurity marketing site. I would even include a lot of the new marketing sites from other startups.</p><p>What gave you the confidence to be able to do that instead of being afraid it might turn a bunch of people off and work against you?</p><p><strong>Kunal Agarwal:</strong> The first thing that people see when they see dope.security is think, <em>"Oh dope, that's too crazy a word for us."</em> We want people to like take one level deeper and ask, <em>"why do they call it dope.security?"</em> It's because this is a labor of love. The company, the product, all of us at the company.</p><p>The average age of the company is 40 or 50 years — we worked ages in big cybersecurity companies. We were the people that would probably get laid off because we were working really hard on a product that just wasn't the main line stuff. Products that were built on a direction by some executive who really didn't understand the product and had never even seen the product, never used the product.</p><p>That is why we call it dope.security. When you look at the website, the words are very, very specific. We do SSL inspection. We do URL categorization. We do cloud application control. We do this all from a cloud-based console.</p><p>It's very, very, very clear because that's what we wanted. We wanted those product requirements. We wanted those visions of the company. We wanted everything to be clear so we could go in and crush it, add our beauty, add our designs, add our passion and energy into the product.</p><p>Why is it dope.security? Because our vision is to give the customer, the person, the user, the viewer, a first class experience.</p><hr><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/DS_analytics_editorial_FAMA_04.jpg" class="kg-image" alt="" loading="lazy" width="1620" height="911" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/03/DS_analytics_editorial_FAMA_04.jpg 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/03/DS_analytics_editorial_FAMA_04.jpg 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/03/DS_analytics_editorial_FAMA_04.jpg 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/DS_analytics_editorial_FAMA_04.jpg 1620w" sizes="(min-width: 720px) 720px"></figure><h2 id="the-future-of-dopesecurity">The future of dope.security</h2><p><strong>Cole Grolmus:</strong> Where is all of this going? You're starting with a SWG — that's something you knew really well. You have a lot of product management experience at senior levels and other domains. SWG just happens to be part of SASE, which is a very popular, big, and highly valued domain. You've got some room to maneuver here. What's the plan?</p><p><strong>Kunal Agarwal:</strong> First off, Secure Web Gateway can directly replace any existing Secure Web Gateway that's out there. There is no if, ands, or buts — we will replace it.</p><p>The second part of that is enhancing it with what I consider as two parts of CASB. One is really making the shadow IT nature and the inline control nature come through in the product. Such as, for example, being able to actually identify all the personal emails that are being used in your organization and the content that's been uploaded to those Google Drives. That is not possible, very easily, today. It's extremely difficult to get up and running.</p><p>After the CASB part, there's also the API controls which says, <em>"here's all the applications that have been connected into your GitHub, your Google your 365,"</em> or <em>"here's all the files that are externally shared, that have PII in them,"</em> that kind of stuff.</p><p>And last, but not least, is what we call private access. The grand finale, which is the private access, is ultimately a fly direct private access the same way we have a fly direct Secure Web Gateway.</p><p>If you FaceTime audio me right now, it'll connect from your phone to my phone, and then it's done. Data does not flow through Apple servers. Similarly, your endpoint can directly connect behind a firewall through NAT traversal to a connector, and we will have a fly direct capability on the private access at the same time.</p><hr><p><em>Thank you to </em><a href="https://shomik.substack.com/?ref=content.strategyofsecurity.com"><em>Shomik Ghosh</em></a><em> and </em><a href="https://boldstart.vc/?ref=content.strategyofsecurity.com"><em>Boldstart Ventures</em></a><em> for the introduction that made this interview possible.</em></p>]]></content:encoded>
            <category>Startups</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/logo-background.png"/>
        </item>
        <item>
            <title><![CDATA[2022 Cybersecurity Annual Earnings Recap (Part 1)]]></title>
            <link>https://strategyofsecurity.com/2022-cybersecurity-annual-earnings-recap-part-1/</link>
            <guid>6419c9c0311ec8003d4f0026</guid>
            <pubDate>Tue, 21 Mar 2023 19:33:15 GMT</pubDate>
            <description><![CDATA[Part 1 of a series analyzing annual earnings announcements, including Cloudflare, Check Point, CyberArk, and Fortinet.]]></description>
            <content:encoded><![CDATA[<p>It's annual earnings busy season in cybersecurity, and February and March are the busiest months. I covered the annual earnings announcements of a few companies last year. This year, I'm covering as many of the high performing companies as I can. I'm breaking this analysis up into a multi-part series with 3-5 companies per part.</p>
<p>At a macro level, what's changed with annual earnings in cybersecurity is take-private transactions. Ten companies have been taken private by private equity firms or strategic buyers since this time last year:</p>
<figure class="kg-card kg-image-card kg-width-wide"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/cybersecurity-take-privates-2022.png" class="kg-image" alt="List of ten cybersecurity take-private transactions in 2022." loading="lazy" width="844" height="383" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/03/cybersecurity-take-privates-2022.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/cybersecurity-take-privates-2022.png 844w"></figure><p>With only two new public companies (via SPACs) during the same period, the number of take-privates represents a relatively large contraction for the industry's public companies.</p>
<p>That's not necessarily a bad thing — <a href="https://strategyofsecurity.com/p/bravo-thoma-bravo">Thoma Bravo</a>, Vista Equity Partners, and Turn/River are good owners for the companies that were taken private. It's often better to refactor a company for long-term success outside the pressures and scrutiny that come with being a public company. This trend is likely to play out over 3-5 years (or more) with additional companies being taken private and (eventually) companies re-emerging from their private equity owners as public companies again.</p>
<p>One last overall point before going into individual companies: <em>why are public companies worth paying attention to?</em> There are several reasons, but one of the main ones is that public cybersecurity companies are an indicator of the health of all companies in the industry.</p>
<p>Large cybersecurity companies are one of the main strategic acquirors ("strategics") of earlier stage companies. If strategics aren't doing well, their performance impacts the entire ecosystem. M&amp;A and financing are directly impacted, and things like hiring, partnerships, product development, and more are second order consequences.</p>
<p>Now that we've covered the macro-level discussion points, let's get into the annual earnings announcements.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/Logo_-Cloudflare.png" class="kg-image" alt="Cloudflare logo" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/03/Logo_-Cloudflare.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/03/Logo_-Cloudflare.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/03/Logo_-Cloudflare.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/Logo_-Cloudflare.png 1920w" sizes="(min-width: 720px) 720px"></figure><p>From Cloudflare's Q4 earnings <a href="https://www.cloudflare.com/press-releases/2023/cloudflare-announces-fourth-quarter-and-fiscal-year-2022-financial-results/?ref=content.strategyofsecurity.com">press release</a>:</p>
<blockquote>
<p>Cloudflare, Inc. (NYSE: NET), the security, performance, and reliability company helping to build a better Internet, today announced financial results for its fourth quarter and fiscal year ended December 31, 2022.<br>
<br>
"In the fourth quarter, we delivered record operating profit, operating margin, and free cash flow. We also surpassed more than 2,000 large customers paying us over $100,000 per year and signed a record number of deals greater than $500,000," said Matthew Prince, co-founder &amp; CEO of Cloudflare. "During economic slowdowns, we believe that it's important to show discipline and optimize for efficiency. We have our hands on the levers of our business and a full-throttle innovation engine that is the envy of the industry. There's no better time to outpace the competition and continue to deliver products on our customers' ‘must-have’ list.”</p>
</blockquote>
<p>The story of Cloudflare's annual earnings call was humility and conservatism. Credit to their leadership team for reading the room and adjusting their tone — especially considering the high-flying spectacle that is a typical Cloudflare event or earnings call.</p>
<p>It's unusual to hear public companies talk so candidly about areas of improvement. That's exactly what Cloudflare did for both marketing and sales and public sector growth.</p>
<p>Cloudflare is a "hybrid" networking and cybersecurity company, but it's clear in the earnings call how important cybersecurity is to their business and strategy. They're too important <em>not</em> to cover alongside other pure cybersecurity companies.</p>
<h5 id="cloudflare-is-benefiting-from-convergence-and-vendor-consolidation">Cloudflare is benefiting from convergence and vendor consolidation.</h5>
<p>For all the generalized chatter we hear about convergence and vendor consolidation in cybersecurity, its important to look at specific and current instances as they play out. Cloudflare is one of the best case studies because it sits squarely in the middle of both convergence and vendor consolidation.</p>
<p>Before we get too deep into analyzing this, there's an important distinction to make about convergence and consolidation: <em>they're related, but they're not the same thing.</em> These terms are often muddled together, and knowing the difference matters.</p>
<p>Convergence is a macro-level phenomenon where entire product categories or industries overlap or merge entirely. It's driven by innovation and market forces beyond any single company.</p>
<p>Consolidation is the result of things like M&amp;A (on the industry side) and vendor consolidation (among buyers on the practitioner/operator side), among other reasons. I <a href="https://strategyofsecurity.com/p/an-intro-to-consolidation-and-aggregation-in-cybersecurity/">wrote an intro</a> about cybersecurity consolidation in the context of aggregation if you want to go deep down the rabbit hole.</p>
<p>Lately, we've been hearing a lot about vendor consolidation as cybersecurity buyers try to reduce and manage spend during uncertain economic times. There are examples all over the place in this set of earnings announcements from February. We'll kick off the examples with Cloudflare.</p>
<p>From CEO Matthew Prince:</p>
<blockquote>
<p>A European financial services company signed a five-year $1.8 million deal, replacing a dozen different security and network vendors with Cloudflare...They wanted to consolidate and simplify their numerous point solutions into a single pane of glass solution.</p>
</blockquote>
<p>Displacing 12 (!!!) different vendors in one shot is an impressive sales feat. Situations like this don't happen without a powerful strategic driver. In this case, consolidation of network security functions was that driver. Implicitly, cost savings were the motivating factor. In the case of Cloudflare, it's likely the company also wanted to move forward towards a modern cloud platform and away from legacy products.</p>
<p>This is obviously a cherry-picked example, but it's a good one if you want to see what vendor consolidation looks like at customers. There are countless other examples that didn't get highlighted in earnings calls, and potentially an acceleration of similar instances as enterprises continue to manage the economic downturn at a tactical level.</p>
<p>At the level of financial statements, large customer growth is a partial indicator of consolidation. Matthew Prince summarized Cloudflare's large customer growth on the earnings call:</p>
<blockquote>
<p>We added 134 large customers, those who pay us over $100,000 per year, and now have 2,042 large customers, including 33% of the Fortune 500. Revenue from large customers grew 56% year-over-year, and they now contribute 63% of our total revenue.</p>
</blockquote>
<p>A trend throughout the entire set of earnings calls we're discussing is growth in large customer segments. While not a direct indicator of consolidation, it's definitely a causal relationship. Increased consumption (e.g. existing customers using more of Cloudflare's services) is one component of the growth — that's normal and expected. Consumption alone doesn't get you to 56% year-over-year growth. Vendor consolidation is likely a contributing factor.</p>
<h5 id="theyre-starting-to-pull-the-profitability-lever">They're starting to pull the profitability lever.</h5>
<p>Matthew Prince started the call talking about discipline and efficiency:</p>
<blockquote>
<p>We achieved a record operating profit of $16.8 million, representing an operating margin of over 6%.<br>
<br>
While we continue to invest to capture the huge market ahead of us, we believe that during economic slowdowns, like the one we're in the midst of, it's important to show discipline and optimize for efficiency. We have our hands on the levers of our business and are adjusting them based on the macroeconomic conditions.</p>
</blockquote>
<p>If you've followed Cloudflare long enough, you know this isn't Matthew Prince's normal tone. Prince is excitable and upbeat, especially about Cloudflare's growth. Unsurprisingly, growth was the theme of my analysis of Cloudflare earnings <a href="https://strategyofsecurity.com/p/earnings-february-2022-recap/">last year</a>. They're still growing at a nice clip, but the shift towards profitability late in the year is the interesting part about this year's earnings.</p>
<p>This feels like Cloudflare showing the market they're capable of profitability if they want. Put differently, they're not a growth machine running amok. As Matthew Prince said, they "have [their] hands on the levers of the business" and can make adjustments as needed.</p>
<p>The  $16.8 million operating profit (non-GAAP accounting — they technically still had a $50.7 million loss under GAAP) isn't much, but the statement it makes about Cloudflare's <em>ability</em> to be profitable is far more valuable.</p>
<p>At a macro level, Cloudflare's lack of optimism about the economy should be cause for concern. From CFO Thomas Seifert:</p>
<blockquote>
<p>In our guidance, we have not factored in any improvement in the macroeconomic environment or from our go-to-market initiatives. Specifically, despite a notable improvement in our pipeline exiting 2022 as compared to with the first half of the year, we have assumed the increase in sales cycle, which we observed in the second half of last year, continues in 2023 and have, therefore, incorporated close rates below recent historical lows.<br>
<br>
...the important takeaway in the guidance that we put forward is that we did not assume any help from the macroeconomic environment. We did not plan that things would get better.</p>
</blockquote>
<p>When a company that's almost optimistic to a fault is saying things like this about their guidance for all of 2023, it's alarming. The tone is partly conjecture, of course — their job is to manage the expectations of analysts and investors, so conservatism is expected. We're just not used to seeing <em>this</em> level of conservatism from a company wired for innovation and growth.</p>
<h5 id="enterprise-sales-and-public-sector-expansion-are-huge-opportunities-for-improvement">Enterprise sales and public sector expansion are huge opportunities for improvement.</h5>
<p>Enterprise sales and public sector expansion are where the unexpected candor part came in. Matthew Prince was brutally honest about his company's marketing and sales efforts:</p>
<blockquote>
<p>While our innovation engine is the best in the industry and has unlocked $125 billion total addressable market we have ahead of us, if we're honest with ourselves, our go-to-market organization hasn't yet been fully optimized.<br>
<br>
As our product become more complicated and we are selling to larger and larger customers, it's increasingly clear that we need to step up our game in marketing and sales. I introduced Marc Boroditsky who joined last quarter to lead our sales organization. Last week, he briefed me and Michelle on his first 100 days. My initial reaction, if I'm honest, was embarrassment over some of the basic things we should have been doing better. But my second reaction was excitement as there are so many opportunities for us to improve.</p>
</blockquote>
<p>For me, the interesting part is Cloudflare's dichotomy between being highly successful at <a href="https://ventureinsecurity.net/p/product-led-growth-in-cybersecurity?ref=content.strategyofsecurity.com">product-led growth (PLG)</a> and simultaneously being embarassed (in Prince's words) about sales. Cloudflare is one of the few cybersecurity companies who has reached a stage where this problem exists in the first place.</p>
<p>There are only a handful of cybersecurity companies with significant PLG (or bottom-up adoption) from consumers and/or developers, while <em>also</em> having a growing presence in sales-driven mid-market and enterprise companies. <a href="https://strategyofsecurity.com/p/hashicorps-ipo-bottom-up-adoption-and-layering/">HashiCorp</a> and <a href="https://strategyofsecurity.com/p/1passwords-blue-ocean-strategy/">1Password</a> are a couple others that come to mind, but this PLG-to-enterprise transition in cybersecurity is a relatively unique challenge.</p>
<p>I agree with Prince's optimism about the opportunity for improvement. Cloudflare's growth is so consistently good that most people wouldn't bother to notice the sales side could be doing better. They look committed to being great at both, as emphasized by Matthew Prince here:</p>
<blockquote>
<p>We’ve been leaders on the product and engineering side. Now we're focusing on becoming a leader in the go-to-market side as well.</p>
</blockquote>
<p>Opportunities for public sector growth are a similar reason for optimism. On the call, Prince shared that Cloudflare is now FedRAMP certified:</p>
<blockquote>
<p>I'm happy to report that after our longer than expected wait at the proverbial DMV, we officially received Cloudflare’s FedRAMP certification.</p>
</blockquote>
<p>FedRAMP certification itself isn't earth-shattering news, but the possibilities now that it's been attained are interesting. Matthew Prince shared a breakout of Cloudflare's public sector revenue prior to the certification:</p>
<blockquote>
<p>...the public sector space is only 3% of our revenue today, so we believe it's only the beginning of what we'll be doing in the future.</p>
</blockquote>
<p>That's a low percentage, especially compared to Cloudflare's traditional network security competitors. Another (adjacent, but relevant) peer-level comparison is CrowdStrike, which typically reports around 25% of revenue from public sector customers.</p>
<p>The early results are promising. Matthew Prince reported a nice win for the .gov registry:</p>
<blockquote>
<p>We were awarded the $7.2 million, five-year deal to operate the .gov registry. We were awarded the contract because of our modern infrastructure, technical prowess, relentless innovation and proven ability to defend against the largest cyber attacks. Every e-mail sent to the White House, every agency's webpage and most of the other ways the U.S. government connects to the Internet now depend on Cloudflare and our network.</p>
</blockquote>
<p>Not too shabby of a start for an area of Cloudflare's business that should become much more important going forward.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/Logo_-Check-Point.png" class="kg-image" alt="Check Point logo" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/03/Logo_-Check-Point.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/03/Logo_-Check-Point.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/03/Logo_-Check-Point.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/Logo_-Check-Point.png 1920w" sizes="(min-width: 720px) 720px"></figure><p>From Check Point's annual earnings press release:</p>
<blockquote>
<p>Check Point® Software Technologies Ltd.](<a href="https://www.checkpoint.com/?ref=content.strategyofsecurity.com">https://www.checkpoint.com/</a>)&nbsp;(NASDAQ: CHKP), today announced its financial results for the fourth quarter and full year ended December 31, 2022.<br>
<br>
“We delivered solid fourth quarter and 2022 full year financial results despite a volatile year-end macro-environment. Revenue and non-GAAP earnings per share came in at the top end of our projections,” said Gil Shwed, Founder &amp; CEO of Check Point Software Technologies. “We continued building the future of cyber security with the prevention-first Infinity architecture and realized triple-digit growth in Infinity revenues. Building on this success we are driving security innovation with a focus on the 3Cs of the Best Security – a&nbsp;Comprehensive&nbsp;set of technologies that address the key attack vectors; a&nbsp;Consolidated set of&nbsp;solutions with a unified management portal, with&nbsp;Collaborative&nbsp;security technologies – to prevent the next cyber-attack.”</p>
</blockquote>
<p>Check Point is in a state of transition. They've been a consistently profitable company since before the current economic downturn. However, they're facing challenges with growth, drawing the inevitable comparisons to other high growth competitors.</p>
<p>On the annual earnings call, these factors amounted to analyst concerns about growth, concerns about the economy, and a glimmer of hope about M&amp;A. Like many companies, it appears tough times are ahead, but Check Point has been through this before.</p>
<h5 id="analysts-are-concerned-about-check-points-growth">Analysts are concerned about Check Point's growth.</h5>
<p>Analysts didn't hide their concerns about Check Point's growth. This was a clear theme from the earnings call, which drew pointed questions and comments.</p>
<p>From Joseph Gallo at Jefferies:</p>
<blockquote>
<p>...what is needed to explicitly grow double digits? Is it products? I saw you lean more into SD-WAN or is it go to market?</p>
</blockquote>
<p>And from Keith Bachman at BMO Capital Markets:</p>
<blockquote>
<p>Your competitor Fortinet gave guidance kind of mid-teens for product revenue growth...I'm just wondering, you talk about the strength of your product and whatnot and the efficacy of it, and yet you're still under growing one of your major competitors.</p>
</blockquote>
<p>They're concerned because Check Point ranked among the lower growth cybersecurity companies at 5.7% (LTM) revenue growth in (calendar year) 2022:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/mc-chkp-low-growth.png" class="kg-image" alt="" loading="lazy" width="2000" height="1125" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/03/mc-chkp-low-growth.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/03/mc-chkp-low-growth.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/03/mc-chkp-low-growth.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/mc-chkp-low-growth.png 2000w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Momentum Cyber 2023 Cybersecurity Almanac</span></figcaption></figure><p>As a result, Check Point's leadership team had some tough questions to answer about their plans for growth in (let's face it) an economic environment that's making growth difficult.</p>
<p>CEO Gil Shwed's main focus is on expanding their sales organization:</p>
<blockquote>
<p>I think what's needed is mainly go to market. When we see -- when we engage with customers, when we deliver our message to the customer, to the CSOs, to the CIOs, they love the message, and they expand the usage.</p>
</blockquote>
<p>...which was lacking, by his own admission:</p>
<blockquote>
<p>...our potential and opportunity is reaching more customers, engaging more. And I think we are working very, very hard internally to achieve it. I think we have what it takes, but we need to get our act together on that.</p>
</blockquote>
<p>Bigger picture, Shwed signaled Check Point's plan to stick with good old fashioned profitability:</p>
<blockquote>
<p>...we do want to invest. Our goal is to grow. Our goal is to do what's right, and I think our margins are very rich. So my focus is not on -- again, I've always been proud and I'm still proud to be a profitable company and don't intend to change that.</p>
</blockquote>
<p>I'm sure some analysts and investors weren't satisfied with these responses. The reality is that it's hard to answer questions about growth in the midst of an economic downturn. The most sensible strategy is for Check Point to hang on to the profitability it already has.</p>
<p>I don't expect low growth will make Check Point a take-private acqusition target. Their history of profitability is a positive. The company's $15B+ market cap would also make them a large transaction. That said, anything is possible in 2023, and we've seen acquisitions of this size recently.</p>
<h5 id="check-point-is-cautiously-optimistic-about-ma">Check Point is cautiously optimistic about M&amp;A...</h5>
<p>Check Point isn't widely thought of as a prolific strategic buyer in cybersecurity, but past and future M&amp;A was an interesting topic on the earnings call. The company has been more active in recent years. From Gil Shwed:</p>
<blockquote>
<p>...we made many acquisitions. If you look, we've made I think like 18 acquisitions over the history of Check Point. Over the last three, four years, I think made like six or seven.</p>
</blockquote>
<p>According to Momentum Cyber data, Check Point has made seven acquisitions since 2018:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/chkp-acquisitions-2018-2023.png" class="kg-image" alt="" loading="lazy" width="714" height="320" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/03/chkp-acquisitions-2018-2023.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/chkp-acquisitions-2018-2023.png 714w"></figure><p>Application security, cloud security, infrastructure security, and messaging security have been their focus. Three of four acquisitions have been under $100 million, except for <a href="https://www.crn.com/news/security/check-point-to-acquire-email-security-startup-avanan?ref=content.strategyofsecurity.com">Avanan</a> in 2021.</p>
<p>In the context of growth, Shwed spoke openly about how well their Avanan acquisition is performing:</p>
<blockquote>
<p>...we had three "rockets." One was the e-mail rocket based on acquisition we did, which actually grows very, very fast. I don't know, we didn't mention it much today, but the e-mail aspects, that acquisition is very successful, and it's contributing a lot to our growth.<br>
<br>
...<br>
<br>
The one that's growing very fast and the one that we are very happy with is the Harmony e-mail, doing extremely well, reaching -- meets all the expectation from an important acquisition like that, integrates well with the rest of our technology like our anti-malware engine is used in that product. Their anti-phishing engine is used in many, many of our other technologies, everything that I said about centralizing this threat cloud brain is working well.</p>
</blockquote>
<p>That's the type of value Check Point wants out of a larger acquisition: fast growth and integration with other parts of their product portfolio.</p>
<p>His commentary about future M&amp;A is exactly where many strategic buyers are at right now — interested in acquisitions, but holding tight to see if valuations will decline further:</p>
<blockquote>
<p>On the private market, I think we will see some opportunities in the future. I'm not sure that the valuation reached the level that we need to reach yet. Some -- we do get once in a while a call from a company that we think is interesting and reached this point of time that it may be interesting.</p>
</blockquote>
<p>He also left open the possibility of a larger acquisition:</p>
<blockquote>
<p>So, it's not that we are not active on the M&amp;A frame. But I think in the future, there's definitely an opportunity that we will do more. And by the way, that is a good reason to keep some cash, especially if we will find something more transformative, and then not that I'm underestimating spending a few hundred million dollars on a company is also a big bet and a big investment. But maybe we'll find something even bigger, and then it's good to have some cash to fund that.</p>
</blockquote>
<p>A larger acquisition would satiate many of the analysts and investors who are focused on Check Point's limited growth. However, the message was clear that Check Point is seeking value acquisitions and will do so with fiscal discipline. So, don't expect a buying spree to ignite growth.</p>
<h5 id="but-also-has-concerns-about-the-economy">...but also has concerns about the economy.</h5>
<p>In a recurring theme across earnings calls, Check Point's leadership team expressed their concerns about the economy and the impact it's having on their business. In the case of Check Point, you could dismiss this as conjecture from a company struggling with growth. However, it's worth noting that the same concerns are being shared by nearly every cybersecurity company (and beyond).</p>
<p>Gil Shwed highlighted Q4 2022 in particular as a challenging period for the company:</p>
<blockquote>
<p>Q4 was a little bit different, and we did face some challenges towards year-end. Projects were postponed. Customers didn't have the budget flash, which usually expect in Q4. Despite that, again, the numbers that we have are very, very good, but I just want us to know that it's not business as usual and that -- and even though we have good numbers and good forecast for next year, I think we need to be a little bit cautious more than usual.</p>
</blockquote>
<p>Like several other CEOs, he believes consolidation could work in Check Point's favor:</p>
<blockquote>
<p>I think, by the way, in the mid- and long range, it can play to Check Point's strength because in times like that, people look for consolidation. In times like that, people look for strong vendors. And I think that can very much play into our strength of providing the best security.</p>
</blockquote>
<p>I'm not sure that competitors like Cloudflare, Zscaler, Palo Alto Networks, Fortinet, or other SASE companies would agree, but we're all inherently biased. We'll see how consolidation plays out in this space.</p>
<p>Finally, speaking on behalf of all of us, Shwed commisserated about the current economy:</p>
<blockquote>
<p>But I can do without the bad about the economy. And right now, I think it's nothing to do with network security or anything like that. It's clearly the more of the macro economy that's behaves a little bit different in the last quarter.</p>
</blockquote>
<p>It's a trying time for Check Point, but the company has been around and made it through challenging times before.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/Logo_-CyberArk.png" class="kg-image" alt="CyberArk logo" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/03/Logo_-CyberArk.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/03/Logo_-CyberArk.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/03/Logo_-CyberArk.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/Logo_-CyberArk.png 1920w" sizes="(min-width: 720px) 720px"></figure><p>From CyberArk's annual earnings <a href="https://www.cyberark.com/press/cyberark-announces-strong-fourth-quarter-and-full-year-2022-results/?ref=content.strategyofsecurity.com">press release</a>:</p>
<blockquote>
<p>CyberArk (NASDAQ: CYBR), the global leader in Identity Security, today announced strong financial results for the fourth quarter and full year ended December 31, 2022.<br>
<br>
“Our results in the fourth quarter and full year 2022 demonstrate the durability of demand for our solutions and strong execution,” said Udi Mokady, CyberArk Chairman and CEO. “Our subscription bookings mix reached a new record of 90 percent in the fourth quarter, well above the mix assumed in our guidance framework. The higher mix drove our Annual Recurring Revenue to $570 million, an increase of 45 percent year over year and significantly above our guidance, but also negatively impacted our recognized revenue in the quarter. We also once again set a record for net new Total ARR and Subscription ARR in the fourth quarter compared to the third quarter 2022."</p>
</blockquote>
<p>CyberArk is doing exceptionally well in a tumultuous period where other cybersecurity companies (and direct competitors) are facing challenges. Their financial performance is sneaky good — "sneaky" because they've been in a period of transition in their revenue model that's making their revenue growth apper lower than it is (more on that soon). Analysts were using terms like "defy gravity" on the earnings call.</p>
<p>The company's annual earnings announcement was one of the most eventful among all cybersecurity companies. Why? CyberArk's co-founder and CEO, Udi Mokady, announced he is transitioning into an Executive Chair role. That's clearly the headline here, so let's get into it.</p>
<h5 id="cyberark-will-have-a-new-ceo-in-2023">CyberArk will have a new CEO in 2023.</h5>
<p>Here's the news, straight from Udi Mokady:</p>
<blockquote>
<p>We entered 2023 with a more durable, more resilient and highly visible business model. CyberArk is in a position of strength well on our way to our $1 billion ARR target, and we have already reset our sights well beyond that. Because of this execution, as we are gearing up for 2023, we recognized that CyberArk was in the best possible position to make the executive changes we announced this morning. In early April, I will move into the Executive Chair role and Matt Cohen, our Chief Operating Officer, will become our CEO. Matt is an incredible leader, and I can't imagine a better person to be the next CEO of CyberArk.</p>
</blockquote>
<p>As a long time follower (and implementation partner) of CyberArk, I was a bit rattled when I heard the announcement. Udi Mokady is an icon in cybersecurity — right along with a rare and special group of founder-CEOs who were with their companies on Day 1 and remained as CEO long after going public. Any time one of these people steps down, it's a big deal.</p>
<p>However, CyberArk's leadership team has clearly thought this transition through. Throughout the call, it was made clear that Udi Mokady will remain actively involved with the company, and that incoming CEO Matt Cohen is sticking with their strategy because it's working:</p>
<blockquote>
<p>While my role with CyberArk is changing as Executive Chair, I'll stay very active, working with Matt and the management team...It is very important to me that we get this right and that we have a smooth transition, continuity of leadership and that we don't skip a beat in our execution.</p>
</blockquote>
<p>Cohen faces the difficult challenge of replacing an icon. He said all the right things:</p>
<blockquote>
<p>...when you look at what has worked so well for Udi and I is that we do share a similar view on the market, on the importance of culture and the importance of the teams that we've built here. And we've been so kind of intricately linked from a standpoint of coming up with the strategy that we have today. So I think what I promise to the team and to Udi really is a continuation of the great momentum that we have. We feel like we've never been in a better position in a better place.<br>
<br>
And we have a special opportunity here in the market and a group of special people here at the company. And so I'm kind of excited to continue the spirit, as you said, of where we've been and to bring it forward for the years ahead.<br>
<br>
...<br>
<br>
We don't need to pivot to a new strategy. We need to go and execute or continue to execute against the current strategy to go get that opportunity.</p>
</blockquote>
<p>The company's leadership transition is clearly something to follow as it plays out across the upcoming quarters and year. There's never an ideal time to replace a person like Udi Mokady, but doing so from a position of strength is probably the best place.</p>
<h5 id="theyre-one-of-the-only-companies-who-feels-confident-about-their-performance-in-the-current-economy">They're one of the only companies who feels confident about their performance in the current economy.</h5>
<p>In a rare departure from nearly every other cybersecurity leadership team during this earnings season, CyberArk is feeling good about how they're doing in the current economy and their prospects going forward. From Udi Mokady:</p>
<blockquote>
<p>...we wanted to comment on the macro environment. While Identity Security remains top priority, more approvals continue to be required in deals, consistent with what we saw in prior quarters. The demand trends, deal progression, win rates, renewal rates and sales cycles remain healthy across the board, which we see in our strong ARR growth.</p>
</blockquote>
<p>The big question behind CyberArk's strong performance and optimism is "why?" I thought Udi Mokady did a great job explaining the drivers behind their current success:</p>
<blockquote>
<p>Privileged Access Management is one of the few critical security layers that really make a difference in enterprise security. I would categorize it in one of the few that are on the must have side of enterprise buying decisions. And no matter how you dissect every attack that's in the news, there's -- that point of no return is when they elevated privileges, moved laterally, captured identities. And CyberArk captures both the human and machine identities in our PAM platform and in our Identity Security platform.<br>
<br>
And today, it's become clear that Identity is not just the new perimeter. Identity is the attack surface. And so it's one of the few things that enterprises do today. And of course, we pioneered the space. We're a market leader in the space. And the flip side of it is also executing on that opportunity that we created through our best-in-class go-to-market team, our channels and of course, delivering great solutions, all of these years. And I would say that the team is executing and firing all cylinders against a growing opportunity.</p>
</blockquote>
<p>Cybersecurity budgets appear to be remaining stable, but not all categories within them remain equal. Mokady's observation about PAM being "on the must have side of enterprise buying decisions" is absolutely correct.</p>
<p>For CyberArk, that's a great position to be in. It's also a great position to build from — a reliable foothold into growth for other areas of their product portfolio during a time when companies on less stable ground are just hanging on.</p>
<p>They're so confident about their position that CFO Josh Siegel even shared they might be able to grow even faster:</p>
<blockquote>
<p>...if we look at our win rates, our pipeline and in the macro, we actually believe we can grow faster than that...I'd say we're actually really confident in the underlying demand environment, and we have the pipeline to actually support a faster growth than in the ARR side.</p>
</blockquote>
<p>You don't hear a CFO say things like that unless the company truly believes they can do it. The takeaway is that CyberArk is in an enviable position, and they're a company to watch as we navigate uncertain economic times.</p>
<h5 id="their-transition-to-saas-and-subscription-based-revenue-has-gone-very-well">Their transition to SaaS and subscription-based revenue has gone very well.</h5>
<p>I started talking about CyberArk's SaaS transition and move to subscription-based revenue back in 2021. At the time, I acknowledged how difficult of a journey it was for a PAM product to move to the cloud From <a href="https://strategyofsecurity.com/p/cyberark-and-the-new-paradigm-for-privileged-access/">CyberArk and the New Paradigm for Privileged Access</a>:</p>
<blockquote>
<p>Privileged Access Management (PAM) is going to be one of the last cybersecurity services companies move to the cloud. Many security leaders (enterprises in particular) are reluctant to move their most sensitive credentials out of their own data centers. Privileged accounts and their credentials are the holy grail for attackers. If the vault the credentials are stored in is compromised, it's game over.</p>
</blockquote>
<p>...while also agreeing with their strategy on SaaS and subscriptions:</p>
<blockquote>
<p>This approach is unsurprising, and completely the right strategy. In CyberArk's case, transitioning to SaaS is even more of a sensitive topic given the nature of their business and their flagship PAM product.</p>
</blockquote>
<p>Looking at where CyberArk is at on this journey at the end of their 2022 fiscal year, it's hard to imagine how this could have gone any better for them. I would not have predicted CyberArk to make (arguably) the most successful transition, while peers like SailPoint, ForgeRock, and Ping Identity continue to work through similar challenges — now as private PE-backed companies.</p>
<p>Three charts from CyberArk's investor presentation show exactly how dramatic the transformation to subscription revenue has been. First, subscriptions are driving total revenue growth. In FY22, 88% of new licenses sold are subscriptions:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/cybr-rev-growth-fy22.png" class="kg-image" alt="" loading="lazy" width="2000" height="1133" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/03/cybr-rev-growth-fy22.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/03/cybr-rev-growth-fy22.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/03/cybr-rev-growth-fy22.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/cybr-rev-growth-fy22.png 2320w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: CyberArk Investor Relations Presentation (February 2023)</span></figcaption></figure><p>There is no going back at this point — customers have clearly been willing to transition to subscription-based licensing. With 88% of new bookings via subscription, the revenue mix will continue to shift in favor of subscriptions.</p>
<p>Second, the breakdown of recurring revenue improved significantly in FY22:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/cybr-sub-rev-fy22.png" class="kg-image" alt="" loading="lazy" width="2000" height="1125" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/03/cybr-sub-rev-fy22.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/03/cybr-sub-rev-fy22.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/03/cybr-sub-rev-fy22.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/cybr-sub-rev-fy22.png 2318w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: CyberArk Investor Relations Presentation (February 2023)</span></figcaption></figure><p>Revenue from perpetual licenses is down $66m year-over-year, exactly as you'd want to see during the transition to subscriptions.</p>
<p>More importantly, SaaS revenue is up $97 million year-over-year. This is impressive because it shows customers are adopting their SaaS product, not just transitioning on-premise implementations to subscription licenses. In a perfect world for CyberArk, a majority of their implementations (and revenue) would be coming from SaaS. They're well on their way.</p>
<p>Third, the transition to subscriptions is making top line revenue growth look less impressive than it is:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/cybr-recurring-rev-mix-fy22.png" class="kg-image" alt="" loading="lazy" width="2000" height="1123" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/03/cybr-recurring-rev-mix-fy22.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/03/cybr-recurring-rev-mix-fy22.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/03/cybr-recurring-rev-mix-fy22.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/cybr-recurring-rev-mix-fy22.png 2322w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: CyberArk Investor Relations Presentation (February 2023)</span></figcaption></figure><p>TL;DR, this is due to differences in revenue recognition for software subscriptions versus term-based licenses. We're not going to unpack that here — just know that's the reason for the obscure "headwinds" they mention.</p>
<p>If you're only looking at the headlines, CyberArk's revenue growth looks decent but relatively pedestrian. When you factor in the headwinds, 27% topline growth puts the company among the very best in cybersecurity.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/Logo_-Fortinet.png" class="kg-image" alt="" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/03/Logo_-Fortinet.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/03/Logo_-Fortinet.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2023/03/Logo_-Fortinet.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/Logo_-Fortinet.png 1920w" sizes="(min-width: 720px) 720px"></figure><p>From Fortinet's annual earnings <a href="https://www.fortinet.com/corporate/about-us/newsroom/press-releases/2023/fortinet-reports-fourth-quarter-full-year-2022-financial-results?ref=content.strategyofsecurity.com">press release</a>:</p>
<blockquote>
<p>Fortinet® (Nasdaq: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, today announced financial results for the fourth quarter and full year ended December 31, 2022.<br>
<br>
“Total revenue grew 32% in 2022 and year-over-year to $4.42 billion, and we generated GAAP net income of $857.3 million. This marks the 14th consecutive year that we have been GAAP profitable, including every year since our 2009 IPO. Cash flow from operations was $1.73 billion and free cash flow was a Fortinet record of $1.45 billion for the year,” said Ken Xie, Founder, Chairman and Chief Executive Officer.</p>
</blockquote>
<p>In a period of time where profitability is valued by investors more than growth, Foritinet's streak of GAAP profitability (net income) looks even more remarkable. Fourteen consecutive years of profitability is unheard of in cybersecurity — yet here they are, just doing what Fortinet does: consistently churning out profits and growth at scale.</p>
<p>Investors have rewarded them accordingly. As of January 31, 2023, Fortinet had the second highest market cap ($40.89 billion) among all pure cybersecurity companies in public markets:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/mc-jan-2023-public-valuations.png" class="kg-image" alt="" loading="lazy" width="1279" height="720" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/03/mc-jan-2023-public-valuations.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/03/mc-jan-2023-public-valuations.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/mc-jan-2023-public-valuations.png 1279w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Source: Momentum Cyber Cybersecurity Snapshot (January 2023)</em></i></figcaption></figure><p>As you might expect, their strategic drivers are remarkably consistent with past years — highlighted by convergence and consolidation and growth through R&amp;D. Their competition with Palo Alto Networks, Zscaler, and others in the network security market — and especially SASE, where their strategy is most actively playing out.</p>
<h5 id="fortinet-is-benefiting-from-convergence-and-vendor-consolidation">Fortinet is benefiting from convergence and vendor consolidation.</h5>
<p>As a multi-product networking and SASE company, Fortinet is another example of a company that believes it's positioned to benefit from vendor consolidation. Fortinet CEO Ken Xie cited consolidation as one of the main drivers of revenue growth in FY22:</p>
<blockquote>
<p>For the full-year, revenue growth accelerated to 33%. We continue to gain market share in the service security industry with customers increasingly recognizing how Fortinet integrate and a single platform approach to security delivers along total cost of ownership and a greater return on investment than competing solutions.</p>
</blockquote>
<p>Here's what vendor consolidation looks like for the company — in this case, an example where it played out nicely in their favor. From CFO Keith Jensen:</p>
<blockquote>
<p>If we look at a few of our large deals of the year, let's start with a competitive upsell deal. Fortinet displaced a 11 different vendors by consolidating the customer's network security functions on our Security Fabric. This worldwide wholesaler previously purchased secure SD-WAN and FortiProxy.</p>
</blockquote>
<p>On a broader basis, what's good for Fortinet — a multi-product company with an established network security platform — is bad for other cybersecurity companies. In this example, 11 other vendors are now gone or saw their footprints reduced by the hand of a consolidated technology platform fueled by cost savings. The displaced vendors likely include a mix of point products and other platforms, neither of which could match the maturity and cost efficiency of Fortinet.</p>
<p>On the topic of convergence, Keith Jensen discussed another nice example with security and networking:</p>
<blockquote>
<p>There's been an explosion of devices that must be connected to the cloud, data center and edge compute. As a result, the infrastructure has expanded to support secure connectivity via distributed firewalls, it is no longer feasible to overlay security on top of networking in the data center. They must be deployed as a converged solution.</p>
</blockquote>
<p>The convergence of security and networking is a part of the broader trend that's easier to recognize. Convergence in these two domains is much more mature than others, with examples like Fortinet, Palo Alto Networks, Zscaler, and other large companies. They started with networking and followed the path of convergence to become full on cybersecurity companies.</p>
<p>Looking forward, Fortinet is making big predictions about convergence and consolidation. From CEO Ken Xie:</p>
<blockquote>
<p>As networking and security continue to converge and consolidate, we believe we are well positioned to achieve our 2025 building target of $10 billion.</p>
</blockquote>
<p>Justifying revenue growth with convergence and consolidation is a clear tell that Fortinet (and others) should believe these are real themes that are shaping cybersecurity markets.</p>
<h5 id="fortinets-growth-strategy-is-to-build-new-products-not-buy-them">Fortinet's growth strategy is to build new products, not buy them.</h5>
<p>Two slides in Fortinet's investor presentation tell us almost everything we need to know about their growth strategy around products. The company is heavily invested in R&amp;D and internal product development, spending very little on M&amp;A. These slides are a direct shot at Palo Alto Networks, a company <a href="https://investianalystnewsletter.substack.com/p/the-race-to-100b-the-palo-alto-networks?ref=content.strategyofsecurity.com">notorious for M&amp;A</a>.</p>
<p>The first slide is a comparison about product revenue growth and overall growth on an LTM (last twelve months) basis:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/ftnt-growth-1.png" class="kg-image" alt="" loading="lazy" width="1073" height="611" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/03/ftnt-growth-1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/03/ftnt-growth-1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/ftnt-growth-1.png 1073w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Fortinet Investor Presentation (December 2022)</span></figcaption></figure><p>Fortinet's product revenue is growing faster than Palo Alto Networks — perhaps a lagging indicator of Fortinet's long-term approach to product strategy playing out.</p>
<p>Total revenue growth between Fortinet and Palo Alto Networks is similar at 29% and 27%, respectively. The punch line here isn't the direct growth comparison — it's the comparison of two very different growth strategies. Fortinet's revenue is growing at the same pace as Palo Alto Networks despite Fortinet spending less than 1/10th the amount of capital on M&amp;A as Palo Alto Networks.</p>
<p>The second slide zooms in on Fortinet's build vs. buy strategy, highlighting investments in R&amp;D and share repurchases over the past five years:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/ftnt-growth-2.png" class="kg-image" alt="" loading="lazy" width="1072" height="617" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2023/03/ftnt-growth-2.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2023/03/ftnt-growth-2.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/ftnt-growth-2.png 1072w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Fortinet Investor Presentation (December 2022)</span></figcaption></figure><p>You read that correctly — Fortinet invests in R&amp;D over M&amp;A at a 90/10 ratio. An important side note to their R&amp;D spend is that they've invested this much while remaining profitable, unlike some other cybersecurity companies with high R&amp;D spend.</p>
<p>A specific example of this strategy playing out is Ken Xie's response to an analyst question about the SD-WAN and OT markets:</p>
<blockquote>
<p>So advantage much huge compared to other competitors, quite some mostly come from acquisition. And at the same time, they don't have the ASIC help to increase speed, lower the cost and the power consumption. So that's why we feel we're keeping growing above the market, so above the market growth rate. There's a different research about how the market is growing. But I do agree it's a fast-growing market compared to the cybersecurity space and there will be a lot of potential going forward.</p>
</blockquote>
<p>Fortinet is deeply committed to their long-term product innovation strategy, as we'll see next in the highly competitive SASE market. While they could be opportunistic with reduced valuations, don't expect any major M&amp;A activity out of Fortinet.</p>
<h5 id="fortinet-is-taking-an-integrated-and-long-term-approach-to-sase">Fortinet is taking an integrated and long-term approach to SASE.</h5>
<p>Secure Access Service Edge (SASE) is the market where the intense competition among network security heavyweights is currently playing out. Three of the four most highly valued (pure) cybersecurity companies — Palo Alto Networks, Fortinet, and Zscaler, plus (hybrid) Cloudflare — have SASE offerings. Game on.</p>
<p>SASE is a massive topic, so we'll focus on Fortinet's strategy here. From Ken Xie on the annual earnings call:</p>
<blockquote>
<p>Our strategy...in the last few years is: first, we want to have a SASE integrated in the same system, the same OS, including all the SD-WAN or the SASE function. So making SASE can be more easily broader deploy and also working with service provider to leverage their infrastructure to offer a SASE. So it's a little bit different than some of the SASE players right now in the market. So we do believe this is highly integrated the single system as will be more efficient and same time will be more secure.</p>
</blockquote>
<p>...we believe long-term leverage...will be much more efficient than the profit model compared to some of the SASE solution or player kind of losing money, which will be difficult to last long. So that's what we will keep investing in this area. And also, we want to be a long-term player in this space and also we'll be keeping internal innovation R&amp;D and keeping driving this space.</p>
<p>Fortinet is all about integration across its proprietary hardware and software. They're committed to this approach (even at the expense of speed and time to market) because they believe quality and value will win out in the long term.</p>
<p>Xie's comment about "some of the SASE solutions or players losing money" and how that will be "difficult to last long" is prescient. Fortinet has clearly demonstrated the ability to compete while remaining profitable as a company. With public markets placing an increased emphasis on profitability over growth (and no end in sight), Fortinet has a lot to gain from being positioned to outlast the competition.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/03/v1_-Cybersecurity-Earnings---FY-2022.png"/>
        </item>
        <item>
            <title><![CDATA[An Interview With Ron Nissim About Entitle and the Cloud IGA Renaissance]]></title>
            <link>https://strategyofsecurity.com/an-interview-with-ron-nissim-about-entitle-and-the-cloud-iga-renaissance/</link>
            <guid>63f4dffdaa5acd003d5eefdb</guid>
            <pubDate>Wed, 22 Feb 2023 12:05:35 GMT</pubDate>
            <description><![CDATA[Co-founder and CEO Ron Nissim and I discussed the launch of Entitle, a Cloud Identity Governance and Administration (IGA) company emerging from stealth today.]]></description>
            <content:encoded><![CDATA[<p>We’re at the beginning of a renaissance in digital identity, but most people don’t know that yet. Early stage startup founders are some of the best people to talk with if you want to find out what’s happening and where the future is headed.</p>
<p>I had the opportunity to speak with Ron Nissim, the co-founder and CEO of <a href="https://entitle.io/?ref=content.strategyofsecurity.com">Entitle</a>, shortly before the Cloud IGA company emerged from stealth. We covered a wide range of topics during our discussion, including:</p>
<ul>
<li>
<p><strong>Building a Cloud IGA product from the ground up:</strong> What the Entitle team has learned from customers and the advantages of building from the ground up in today’s cloud-based world.</p>
</li>
<li>
<p><strong>How Entitle works:</strong> What Entitle does and how the team chose where to start within the massive surface area of Cloud IGA.</p>
</li>
<li>
<p><strong>Product strategy:</strong> The conundrum of starting with provisioning or governance, just-in-time provisioning, and the advantages of being cloud-first.</p>
</li>
<li>
<p><strong>Convergence of IGA and PAM:</strong> Observations about the convergence of use cases between IGA and Privileged Access Management (PAM).</p>
</li>
<li>
<p><strong>Transitioning from on-premise to cloud:</strong> How IGA products can bridge the gap during the transition from on-premise to cloud.</p>
</li>
</ul>
<p><em><strong>Note:</strong> This interview has been lightly edited for clarity.</em></p>
<h2 id="the-journey-towards-building-entitle">The journey towards building Entitle</h2>
<p><strong>Cole Grolmus:</strong> Could you give me some background on Entitle —&nbsp;what you've built up to this point and how you decided to build it? I'm also curious what you believe are the big differentiators versus both the well-established identity products on the markets, and also among the new generation of competitors.</p>
<p><strong>Ron Nissim:</strong> Permission management is still one of the biggest risks to organizations, even though IGA solutions have been around for decades. When we asked companies what their biggest problems are, the first thing that we heard from all the security people we spoke with was governance — knowing who has access to what, how do I know who has access, is it still relevant, and so on.</p>
<p>We spoke not only with security professionals but also with IT and DevOps. They also spoke about permission management, but from a different side of, <em>"how do employees get permissions to begin with when someone joins the company?"</em>, <em>"how do I know what they what they get when someone changes positions?"</em>, <em>"how do I know they should be getting versus what should be taken away?"</em> We realized the whole operational side of things was very, very manual even in the most forward thinking companies.</p>
<p>We identified three types of companies: the big enterprises of the world that had SailPoint or other traditional IGA products for provisioning and governance, very large cloud companies, and smaller cloud companies. Cloud companies almost didn't look at traditional IGA products as a viable alternative. We spoke with a few who ran proof of concepts, figured out that wasn't working for them, and then developed their own internal solution. A lot of big cloud companies developed internal solutions for Cloud IGA — companies that were cloud resource intensive and got to the size where they could hire a 20 person team and develop an access management solution.</p>
<p>Smaller cloud companies are the SaaS companies that we all know and love, but they're smaller in size than very large cloud companies (around 1,000 employees). They haven't reached the size where they wanted to develop their own solution. They were doing very manual processes. When the process is manual, it has a lot of direct challenges for the business with how long it takes people to be efficient and getting access to what they need. For many companies, 30% of tickets to the IT department are access requests, which is a huge burden on both the business and DevOps.</p>
<p>The real interesting part was because processes were manual, downstream security teams had no auditability. When you get your access by calling up your friend and it and saying, <em>"hey, I need access to Salesforce,"</em> no one knows how you got access to Salesforce. That's what gave light to a bunch of new identity governance companies and compliance automation tools, which are very focused on the visibility side.</p>
<p>Our <em>"aha"</em> moment was when we realized the real problem was not governance. The real problem is how it's done to begin with, and because it's done in such a manual fashion, governance is very, very hard. We realized if we automate the way that employees get access, a business will be more efficient because employees have access and they're not waiting around. IT teams will be more efficient because they're not processing access requests. And security teams will have auditability because everybody knows who's getting access and what they're getting.</p>
<h2 id="how-entitle-works">How Entitle works</h2>
<p><strong>Cole Grolmus:</strong> Could you give an overview of how Entitle works and some of the core aspects of the product?</p>
<p><strong>Ron Nissim:</strong> The solution itself has four core aspects. The first part is self-service, which is what we call front end agnostic because you can attach it to whatever employees are used to using — Slack, Teams, ServiceNow, JIRA, whatever.</p>
<p>The second part is the policy engine. We have a no code workflow where security teams can define what that flow would look like in different cases. Based off the risk profile, they can identify who should be signing off on what. A concrete example that's really popular to start with: create a policy for someone who's on call with pager duty. If this person requests access for less than six hours, they get it automatically, even if it's super sensitive because they're probably firefighting. If they're not on call, then they have to go through the approval of the Head of Engineering unless it doesn't include PII. In that case, they could get access just with the approval of their direct manager. The idea is to enable companies to strike the balance between being bureaucratic enough in places that are really sensitive, but enabling people to get what they need and being able to audit that in retrospect.</p>
<p>The third part is API fulfillment. This is a big part of what we bring to the table, as opposed to the traditional IGA products, because we're very much focused on cloud resources. It's a very self-service installation. IGA tools are historically renowned for being bought through consulting agencies and having multi year projects with a ton of professional services hours. One of the huge powers of what we're doing is because everyone uses AWS, everyone uses Salesforce, everyone uses this bulk of 100, 200, or 300 applications, which we've already pre-researched. We come out of the box with what should be the 80% to 90% of what you need. Within a day, you already have Entitle configured to provision to all your different core applications.</p>
<p>The fourth part is governance. Governance is a byproduct of good provisioning. So once we're the ones that are giving and taking away access, then knowing who had access, when they had that access, why they have the access, should it still exist, have they changed roles since, so on and so forth — that's the easy part. The next step is very, very trivial, as opposed to the provisioning aspect.</p>
<p>To give a concrete example, a customer that we're at right now already bought one of our startup competitors. Their GRC team bought them for access reviews. And now they're trying to upsell into provisioning, and it's a completely new sales process. It's a different buyer. They're starting from scratch. We have just as strong of a case as they do — they don't have an edge because they're already installed because it's a completely different business unit. The other way around, this is not the case. If Entitle were installed in a company and provisioning permissions inside that company, then opening a user for the GRC team is really easy. That's why starting from provisioning is the much more interesting case long term.</p>
<p>There's a logical case for why to start from governance instead of provisioning. The biggest case is because Fortune 500 companies need governance. They're very compliance-driven. But when you speak with companies that are more agile, they're much more focused on what best serves security than what ticks the box from a compliance perspective.</p>
<h2 id="starting-with-provisioning-versus-governance">Starting with provisioning versus governance</h2>
<p><strong>Cole Grolmus:</strong> The philosophy about whether to build the product starting with provisioning or governance is interesting. There is a grand experiment going on right now among the early-stage, cloud-first IGA companies.</p>
<p>If you're starting with governance, you're accepting the mess of entitlements that is there in a company's environment. You're almost intentionally, saying: <em>"We're not going to proactively intervene in that mess. We're just going to visualize all of it through our governance tool and then fix the problem through access reviews."</em></p>
<p>Starting on the on the provisioning side, you're more deeply ingrained operationally and intervening with the problem early in the provisioning process. You're hoping that governance will be easier later on because you've done a better job with the management side of it.</p>
<p>It will be interesting to see which approach ends up being more effective, or even if this set of problems gets solved at all in this round of companies. In some ways, this space seems like one of the existential problems of security that may never be completely fixed. I hope it does, though.</p>
<p><strong>Ron Nissim:</strong> You're completely right about this being a grand experiment. There's a lot that's still to be determined. It's on us as ‌vendors to figure out what customers want and what's going to work.</p>
<p>Customers need to have both provisioning and governance. But the question is: what do you do really well, and what do you do just good enough? Compliance is where customers want to be just good enough. They don't need a kick-ass product. They need something good enough to get them through their audit.</p>
<p>From a provisioning perspective, there are real business implications — from people not having permissions in time to people getting stuck without the access they need. That's why we believe provisioning is the more interesting place to focus on.</p>
<p><strong>Cole Grolmus:</strong> There are a lot of ways the provisioning side of it can go wrong. You can definitely see the impact when that happens.</p>
<p>What happens in governance is a recertification doesn't get done on time, the scope of it is wrong, or something else isn't quite right about it. Even if you get a control deficiency in an audit, there's usually still time to make the control operational again. There's some margin for error.</p>
<p>If you do something wrong with provisioning, de-provisioning, etc. — even if it's one person — sometimes that person is the wrong person, and you get a call from the CEO. The stakes are definitely higher when you're managing access.</p>
<p><strong>Ron Nissim:</strong> That's the hardest part of Entitle. We have to earn our customers' trust. And that is a very big challenge. There are a lot of things, even from a security perspective, that we've done to help enable trust.</p>
<p>We need we need admin privileges to all the systems we manage so that we can edit permissions. Governance tools don't need that. They just need visibility and read-only permissions. That's a harder challenge to solve, but if we solve it, then we'll be number one. That's how we've been looking at it.</p>
<p><strong>Cole Grolmus:</strong> From an early stage founder's point of view, provisioning is riskier because there is more to build from an integration standpoint. It's also harder to convince your potential customers to trust you and let your product have the privileges it needs to do its job.</p>
<p>Provisioning is a steeper mountain to climb, but it's also an important barrier to entry. That problem is not unique to you. Anybody else that's entering the market now also has to solve the same challenges.</p>
<p>So, it's really a question of who has the perseverance and the runway and all of the attributes that it takes to climb that metaphorical mountain and make it work. That's probably who's going to win this time.</p>
<h2 id="customer-demand-for-just-in-time-provisioning">Customer demand for just-in-time provisioning</h2>
<p><strong>Cole Grolmus:</strong> IGA has such a massive surface area of problems. Where did you decide to start? Did you make any adjustments based on early feedback from customers?</p>
<p><strong>Ron Nissim:</strong> We started with the change management aspects. So, when an employee needs access to something they don't have and put in a ticket. That's a fairly easy place to start, and we took it from there.</p>
<p>What customers took us towards was just-in-time access. What we said is we're automating the way that employees get access and take away that access when it's no longer needed. But what customers heard was: if you're making it really easy for employees to get access, I can now feel comfortable taking away that access. Whereas beforehand I felt uncomfortable taking access because I knew the burden would be very high in getting it back.</p>
<p>Just-in-time access has become almost ubiquitously the first use case with customers. We start with a few core applications and provide temporary access to those sensitive resources. That could be databases, production environments, admin roles in Okta, admin roles in Salesforce, or specific areas which are very sensitive.</p>
<p><strong>Cole Grolmus:</strong> It's interesting and surprising to me to hear you say that just-in-time provisioning came up a lot with customers and that you ended up deciding to focus on it from a product perspective.</p>
<p>The reason it's interesting to me is because just-in-time provisioning has been talked about for a long time. I remember presentations from ten years ago with people talking about temporal and just-in-time access. But the secret was that it never worked. It was a better idea on paper than it‌ was in practice.</p>
<p>What about your tech stack, or the tech stack of your customers, that has now made it possible to do just-in-time access?</p>
<p><strong>Ron Nissim:</strong> The reason we ended up focusing on just-in-time is, when I put myself in our customers' shoes, a lot of these companies are at the beginning of the process of thinking about their identity and Cloud IGA infrastructure. Or maybe not at the very beginning — the beginning is you buy Okta — but what's the next step?</p>
<p>If you're in the CISO's shoes and decide you need to do Cloud IGA, where do you start? I start with my most sensitive resources. I start with Okta admin, Salesforce admin, super sensitive databases, and critical infrastructure. In all of those places, there often isn't a need for someone to have access to those resources all the time.</p>
<p>I believe that's why, from a priorities perspective, it makes sense for customers to start with just-in-time access — because it's very easy to show quick value. Within a week of using Entitle, there are no constant admins in all the applications that are critical to you. It's powerful to see that kind of success very quickly. Onboarding and off-boarding is important, and it's good to know you have a tool for that. But it's hard to see well-defined success, so that's why I think our customers ended up pulling us in that direction. You want to start with your crown jewels.</p>
<p>What has changed over the last five to 10 years is a couple things. First of all, systems now have APIs which enable configuration from the outside. For CyberArk to manage access to databases, they had to sanitize your query. You put the query into CyberArk, it looked at the query, and then determined you're accessing a table that you shouldn't be accessing. StrongDM and a lot of these other solutions had to be met in the middle from a networking perspective to be able to control ‌what you get access to.</p>
<p>All these solutions now have awesome APIs that enable us to control access from the outside. It's as if there are a lot of faucets and we're the ones opening and closing all the different faucets based off the configuration. You want access to that table? No problem. We'll edit your user. Now you can access that table. You want it for only three hours? After three hours, we'll go in and remove the setting inside that database that enables you to get access to that table.</p>
<p>The second thing I wanted to mention is that authentication to these systems is becoming a solved problem. I don't think it's fully solved. Five years from now, it will be a solved problem, whereas five years back, Teleport didn't exist. A lot of other startups have solved authentication to more complex cloud infrastructures. Before that, the only way you could solve authentication was with a jump server.</p>
<p>Now, a lot of companies have some sort of authentication mechanism for servers, databases, and SaaS applications. SSO is becoming standard, whereas 5-10 years ago, a lot of companies didn't buy SSO. Now, you can't start a company without buying SSO very, very early on.</p>
<p>Once authentication has become a solved problem, then being able to discuss the more fine grained access management inside the applications becomes more interesting. It's now possible to look at problems like, <em>"Who is Cole inside a lot of these different applications?"</em> It's a hard question.</p>
<p>Those are the two things that have changed over the last five or so years that have enabled a more clear focus on permission management.</p>
<h2 id="building-an-iga-product-for-the-cloud">Building an IGA product for the cloud</h2>
<p><strong>Cole Grolmus:</strong> I have a follow-up question, and I'm trying to get at something abstract. What you described earlier are factors external to your product — progress in the technology environment that now makes things like just-in-time provisioning possible. Is there anything within Entitle itself that also makes it possible?</p>
<p>The reason I'm asking is because changes to external factors are good for everybody. That's good for SailPoint. That's good for any of your competitors. What is it that's differentiated about the Entitle that lets you win because of these changes in technology?</p>
<p><strong>Ron Nissim:</strong> First of all, what's interesting about our company and how we build things, we're a team of security engineers. Everyone in the company is or was a security engineer. So, we've been tackling this from a security-centric approach in a world where traditional IGA is very governance and bureaucracy- driven. Bringing that fresh approach has enabled us to make a lot of interesting decisions and how we should be building the product in terms of recommendations, understanding what's relevant, what's good from security perspective, and what's just adding more bureaucracy and friction to the system.</p>
<p>We've been investing a lot of time researching different applications and understanding how permissions should be provisioned inside every application. A lot of times, companies will come to us and say things like, <em>"We don't know how to manage access in Kubernetes. You tell us what we should be doing."</em> We come with that expertise. We know what should be done and how it should be done.</p>
<p>The second part is because we've researched these applications very well, and on the other side, we know the organizations very well because we're integrated with the HRIS, the identity provider, and all these other systems, we can now recommend what permissions are relevant and irrelevant. I like to draw similarities to what Amazon does when they say people who bought this usually also bought that when you're buying things.</p>
<p>It's very similar from a permissions perspective. How can you cluster together permissions that are often that often come together that are similar from a business or a risk perspective? For example, what does it matter if you have access to the PII database that sits in Ireland on AWS or that sits in Iowa on AWS? It's the same database, so from a risk perspective, it doesn't matter if you're getting access to one or the other.</p>
<p>That's something Entitle can tell you. It will tell you, this is actually the same permission, so you can get access to both of these. It shouldn't be another step. It shouldn't be another process. What that enables is a consolidation between business enablement and security.</p>
<p><strong>Cole Grolmus:</strong> It's interesting to hear about the advantages of building a product greenfield versus being an already established company in this space. The way you would manage access to Kubernetes or cloud environments is fundamentally different than how you would manage access to some on-prem Active Directory environments.</p>
<p>The IGA product tends to reflect the environment that it's managing, in some ways. Or, even more abstractly, the philosophy of the people who are doing the management. What's going to end up benefiting new companies like Entitle is that you're starting with a fresh approach to IGA in a new world of cloud infrastructure. That is going to make the product more advanced and kick off some of the cruft that used to be there from the old days of on-prem.</p>
<h2 id="convergence-of-iga-and-pam">Convergence of IGA and PAM</h2>
<p><strong>Ron Nissim:</strong> Another topic that I'm really keen to hear your thoughts on as someone that's been in this space for a while: I have a theory that IGA and PAM are converging in the cloud; that PAM in the cloud has become very API-centric, and that vaults are becoming commoditized.</p>
<p>What's essentially been happening to us is that we've been solving a lot of CyberArk use cases. We used to compare ourselves often to SailPoint. I'm starting to realize that people find SailPoint synonymous with governance more than they do with provisioning. And a lot of the provisioning aspect of who has access to different resources is often covered by some sort of jump server, like a temporary access management solution.</p>
<p>A big benefit of being in the cloud is you don't have to be man in the middle from a networking perspective. To give you access to MongoDB, you don't need to connect to us so that we can connect you to MongoDB. We will go to MongoDB, create a connection string, and send it to you. Your connection is done directly to MongoDB. And because everything's logged, we can take the logs and give them to you. We can provide a lot of the things that customers need from PAM, like just-in-time, temporary access management.</p>
<p><strong>Cole Grolmus:</strong> The convergence of IGA and PAM is definitely ‌something I see and believe, too. I've felt like they were inevitably going to converge in some way, shape, or form, for a while now.</p>
<p>There were so many reasons it was going to happen, or it will eventually happen. Some of it is operational — a lot of the things that you're saying, and the way that people are engaging with technology, how architecture has changed, and other factors that just necessitate them to be tightly integrated. If you also look at the business end of the industry with large private equity firms buying identity companies, it's going to make sense economically to have some of the IGA and PAM companies under the same umbrella.</p>
<p>The challenge is going to be — at least for ‌established companies with products that were built separately — I don't know if they're ever going to be able to truly integrate the products in a way that really works. That's a really hard challenge to take products that are years, if not decades old, and get them to work well together in an acceptable way that's better than just a light integration. I don't know if that's going to be possible.</p>
<p>Not that it's easy to build a company, either. At least you get to start with a fresh approach from a product perspective and build it in a way where the product is incorporating some of the PAM use cases you and your customers feel are really important and putting them together from the start. It's a more natural and organic integration from a product perspective right from the beginning, instead of having to piece that together later.</p>
<p>Both of those approaches are hard, but I wonder if the companies that had a chance to like start greenfield are going to end up being more effective eventually.</p>
<p><strong>Ron Nissim:</strong> Yeah, that's a benefit of starting from scratch and a new technological environment — you don't have to deal with all the legacy stuff. It's not that we're not supporting IBM mainframes. That's just not the place where we're 10x better. You have your proprietary stuff, you have your on-prem stuff, you have that solved because it's a problem that's 30 years old. The new problem is your SaaS, your infrastructure — those are things that are changing rapidly. Those are the new things to your environment. What do you do there?</p>
<p>I met with a Fortune 100 company not too long ago. I really appreciated them because he was super brutal. He said, <em>"Wait, I don't get it. I have SailPoint, CyberArk, and a bunch of internal scripts. What do you what do you replace for me, and what do you sit beside?"</em> My response was, <em>"I'm willing to bet that SailPoint and CyberArk cover your old on-prem corporate applications, but all of your cloud infrastructure stuff, your databases, your SaaS applications you've bought, those are either untouched, or you've developed internal scripts that cover those."</em> He said, <em>"That's exactly right. We've built an internal system that does self-service for these."</em> That's what Entitle replaces and improves. And that's a theme I'm seeing repeat itself.</p>
<p>From a go-to-market perspective, there are two types of companies that like Entitle. One is companies that are "born in the cloud." They don't have to be born in the cloud, but they have to be cloud resource intensive. That's their core business. And then you have really large companies that maybe have SailPoint, maybe they have IBM mainframes. They have all these other traditional applications, but they have a cloud environment that's been untouched. We want to partner with them to be able to solve for that aspect. The hope is that over time, as more and more of their workload moves to the cloud, we will be the natural partner.</p>
<h2 id="managing-permissions-during-the-transition-from-on-premise-to-cloud">Managing permissions during the transition from on-premise to cloud</h2>
<p><strong>Cole Grolmus:</strong> Supporting cloud versus on-premise is a really interesting conundrum. Especially the latter category of companies who have some on-prem workloads and legacy apps, some cloud apps, and an increasingly growing cloud.</p>
<p>If I were to put myself in the shoes of a Fortune 500 CISO that's in charge of identity, what do I do?! I've already spent all this money to implement SailPoint, CyberArk, or their equivalents, and that's taken care of my on-prem infrastructure and maybe some of my very common cloud infrastructure. But I don't know if they're going to get to my cloud infrastructure from a product perspective. They may not keep pace ‌with where you're starting — with a focus on the cloud. It's going to take them a long time to get those integrations taken care of and adapt the product to be able to have full coverage of both on-premise and cloud applications. That's hard.</p>
<p>From your end, it's also hard because you can come in and help cover my cloud applications, but you're never going to touch my mainframe. So, what do I do? As a CISO, I'm stuck in this hell where I have to have both old and new IGA and PAM products. That's probably just going to be ‌reality for a while.</p>
<p><strong>Ron Nissim:</strong> There are two things that need to happen. First, one of the biggest challenges in IGA is that every person in the company has some sort of interface with the IGA tool, which just makes it so much more complicated.</p>
<p>So, in that meantime when larger companies need both a Cloud IGA tool and a traditional IGA tool for on-premise access, we're working on creating a unified front end to the end employee so that they don't feel that they're working with two systems. I put in a request in JIRA or ServiceNow, and that's routed to either Entitle or another tool automatically. That way, users don't have to know, <em>"For this, I go to Entitle, and for that I go somewhere else."</em></p>
<p>The second part is that, at some point, we'll have to acquire an on-premise product to join the Entitle family.</p>
<p><strong>Cole Grolmus:</strong> So the point where you think this conundrum is going to get resolved is convergence from a business perspective, as opposed to established companies building out all the cloud integrations, or in your case, building out mainframe integrations.</p>
<p><strong>Ron Nissim:</strong> There's going to be a point where we'll have to do that. It's just that on the mainframe, we don't plan to be 10x better. We want to be good enough. Where we want to be 10x better is in the cloud environment.</p>
<p><strong>Cole Grolmus:</strong> That makes sense. For clarity, I know that I'm talking about things that are way down the road and problems that are not anywhere near your near-term vicinity as an early stage founder. This part of the discussion was more about the long-term vision of the market and how it ends up playing out.</p>
<p>Identity is such a hard market because these are legitimately hard problems that we're talking about here. Probably some of the hardest in security. People who don't understand identity look at these problems and say, <em>"Oh, of course you should build an IGA platform that covers mainframes, on-prem, Active Directory, and cloud."</em> That's really hard to do. It would probably take a billion dollars of capital and a decade to build.</p>
<p>I think what we do in this messy middle period is fascinating. That's why I called it a renaissance. I feel like we're getting new ideas and fresh energy back into this problem domain that had waned for a little while. It felt like progress had become stagnant in a way that made you think the current state was as good as we could do. In the last two or three years, there's been this renewal of new people who want to tackle this problem, who are really serious about it, and actually have a chance to do it.</p>
<hr><p><em>Thank you to </em><a href="https://www.linkedin.com/in/elizabeth-safran-18a5b/?ref=content.strategyofsecurity.com"><em>Liz Safran</em></a><em> and the team at </em><a href="https://montner.com/?ref=content.strategyofsecurity.com"><em>Montner</em></a><em> for helping to make this interview possible.</em></p>]]></content:encoded>
            <category>Startups</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/02/Logo_-Entitle.png"/>
        </item>
        <item>
            <title><![CDATA[The Evolution of Cybersecurity Services]]></title>
            <link>https://strategyofsecurity.com/the-evolution-of-cybersecurity-services/</link>
            <guid>63d837af4aeeb5004dac8326</guid>
            <pubDate>Mon, 30 Jan 2023 21:36:50 GMT</pubDate>
            <description><![CDATA[A special report on the impact of Google Cloud's acquisition of Mandiant and the convergence of next-generation cybersecurity services.]]></description>
            <content:encoded><![CDATA[<p>I'm excited to announce the release of Momentum Cyber’s special report on the evolution of cybersecurity services. This is the first in-depth report we're releasing as part of my Senior Advisor role on the firm's research team.</p><p>There has never been a more exciting time for this sector of the market. Google Cloud’s $5.4 billion acquisition of Mandiant, one of two public cybersecurity companies with significant services revenue, was a signature move that will impact the entire industry for years to come. This special report focuses on the impact of this deal on the industry and what to expect next.</p><p><strong>Key Report Discussion Topics</strong></p><ul><li>The impact of Google Cloud’s $5.4B acquisition of Mandiant, along with the impact of this landmark deal on the industry and what to expect next</li><li>The convergence of next-generation cybersecurity services</li><li>Analysis of key players in the cybersecurity services market by sector</li><li>Breakdown of emerging trends in the cybersecurity services landscape</li><li>Special contributions from Charlie Thomas (Deepwatch CEO), Aaron Sandeen (Securin CEO), Michael Aiello (Secureworks CTO), and Dave DeWalt (NightDragon Founder)</li></ul><p></p><p>You can read the full 80 page report here — no email required:</p><div class="kg-card kg-button-card kg-align-center"><a href="https://momentumcyber.com/docs/Special_Reports/Momentum_Cyber_The_Evolution_of_Cybersecurity_Services.pdf?ref=content.strategyofsecurity.com" class="kg-btn kg-btn-accent">Read the Report</a></div>]]></content:encoded>
            <category>Ecosystem</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2023/01/Momentum-Cyber-1.png"/>
        </item>
        <item>
            <title><![CDATA[Agency: Personalized Managed Cybersecurity]]></title>
            <link>https://strategyofsecurity.com/agency-personalized-managed-cybersecurity/</link>
            <guid>637457b93b4634003dc6e56a</guid>
            <pubDate>Thu, 17 Nov 2022 20:03:16 GMT</pubDate>
            <description><![CDATA[Exploring a new paradigm to secure personal devices for individuals and defend against cyber attacks.]]></description>
            <content:encoded><![CDATA[<p>Today's article is a special commissioned report I've been working on with <a href="https://getagency.com/?ref=content.strategyofsecurity.com">Agency</a> since July. It's a deep dive into an emerging trend of attacks that begin with individuals and cross over to the companies they work for.</p>
<p>I first wrote about Agency in my <a href="https://strategyofsecurity.com/p/y-combinators-winter-2022-cybersecurity-privacy-and-trust-startups/">article on Y Combinator's Winter 2022 batch</a>. I was excited about them then — here's what I wrote at the time:</p>
<blockquote>
<p>Agency is one of my favorite companies from this batch. I backed that statement up with my money — I like this company so much that I bought a plan for myself.</p>
</blockquote>
<p>I'm even more excited now that I've had the unique opportunity to study the company and the problems they're solving in detail. I hope you enjoy the report.</p>
<hr><h2 id="overview">Overview</h2>
<p>Our work and personal lives have become one and the same. Attackers are seeking increasingly devious ways to exploit companies, including attacks on the personal accounts and devices of individual employees and business partners. People are now targeted as individuals because of their work lives. It’s time for cybersecurity to adapt to this new reality.</p>
<p>Managed security and privacy for individuals is an emerging paradigm for addressing this reality and keeping people’s digital lives secure. Forward-thinking companies and sophisticated individuals are turning to cybersecurity experts to help them defend personal devices and accounts. A new generation of personal services now makes enterprise-level cybersecurity accessible to individuals.</p>
<p>Agency commissioned Strategy of Security to explore the intersection of personal and enterprise cybersecurity and new approaches for managing the new wave of attacks. The analysis found vast differences in the tactics and rigor taken by organizations to keep their people secure at work compared to individuals at home. The traditional “you’re on your own” model for managing the security and privacy of individuals isn’t working. It’s time for a better approach.</p>
<p>Organizations that offer managed security and privacy services for employees’ digital lives — or forward-thinking individuals who subscribe on their own — are taking a proactive stance. They’re more prepared and resilient against attacks that impact their personal lives. They also prevent attacks from crossing over into their work lives. This is a security model built for the future.</p>
<h2 id="key-findings">Key Findings</h2>
<h5 id="the-traditional-model-for-personal-digital-security-isn%E2%80%99t-working-anymore">The traditional model for personal digital security isn’t working anymore.</h5>
<p>Over-reliance on one-off countermeasures like antivirus are leaving people exposed to new kinds of threats. The “go it alone” approach we’ve taken towards security in the past isn’t enough to keep us safe. It’s not how security is done in enterprises. In the future, it won’t be how security is done for individuals, either.</p>
<h5 id="the-individual-threat-model-matters-and-it%E2%80%99s-converging-with-the-enterprise-threat-model">The individual threat model matters, and it’s converging with the enterprise threat model.</h5>
<p>Just like company systems, individuals also face risks and threats on the internet. Acknowledging a personal threat model exists at all is a new concept. Worse, it’s quickly becoming a central part of enterprise threat models as personal security incidents escalate into enterprise security breaches.</p>
<h5 id="managed-security-and-privacy-for-individuals-can-reduce-the-impact-of-security-incidents-on-people-and-the-companies-they-work-for">Managed security and privacy for individuals can reduce the impact of security incidents on people and the companies they work for.</h5>
<p>The best way to reduce the risk of personal cybersecurity incidents impacting a company is to proactively manage them. It’s not as straightforward as protecting company assets, though — many people don’t want their employers to have access to their personal devices and accounts. Managed security and privacy for individuals balances the risks faced by companies while respecting the fundamental right to privacy for individual employees.</p>
<div class="kg-card kg-callout-card kg-callout-card-grey"><div class="kg-callout-emoji">🔗</div><div class="kg-callout-text">You can get a free copy of the full report by following the link below. Email registration is required — no spam.</div></div><p></p><div class="kg-card kg-button-card kg-align-center"><a href="https://getagency.com/personalizedmanagedcybersecurity/?ref=content.strategyofsecurity.com" class="kg-btn kg-btn-accent">Read the Full Report</a></div>]]></content:encoded>
            <category>Startups</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/11/Logo_-Agency.png"/>
        </item>
        <item>
            <title><![CDATA[The Mirage of Mandiant: Post-Acquisition Follow-Up]]></title>
            <link>https://strategyofsecurity.com/the-mirage-of-mandiant-post-acquisition-follow-up/</link>
            <guid>63604023a6f6e3003d298405</guid>
            <pubDate>Mon, 31 Oct 2022 21:52:28 GMT</pubDate>
            <description><![CDATA[Revisiting the strategic implications of Google Cloud and Mandiant following the Google Cloud Next conference.]]></description>
            <content:encoded><![CDATA[<p>Shortly after Google Cloud's acquisition of Mandiant was announced, I wrote an <a href="https://strategyofsecurity.com/p/the-mirage-of-mandiant/">in-depth analysis</a> of the strategy and impact to both companies. The analysis was highly speculative because very little information was public at the time.</p>
<p>The deal has closed, and Google is talking now. After a barrage of articles, interviews, and a full-on conference (Google Next) this month, now feels like an opportune time to revisit the topic, tie up any loose ends in my analysis, and highlight any areas that remain undetermined.</p>
<p>The purpose of today's article isn't to keep score on what I got right or wrong. Google's acquisition of Mandiant is a big and evolving topic in cybersecurity. It's important to stay on top of the evolution and how it impacts strategy — both directly to Google and Mandiant, as well as the second order consequences to others within the industry.</p>
<p>There's no need to revisit every section of the original article. Some of it was context and background that's still a good read if you're trying to get your mind around this acquisition. Today, we're going to focus on specific (and interesting) topics based on the new information we have.</p>
<p>A quick note: this article has a few more long block quotes than usual. I did that to save you from having to jump back and forth between this article and the original analysis. For newer readers, it's also enough background for this article to be useful even if you haven't had time to read the original one yet.</p>
<p>On to the updated analysis.</p>
<h2 id="what%E2%80%99s-going-to-happen-to-mandiant">What’s Going To Happen to Mandiant?</h2>
<p>When the acquisition was announced in March 2022, a lot of big and existential questions came up. I summarized the sense of uncertainty like this:</p>
<blockquote>
<p>Big picture, an acquisition changes the equation for Mandiant in a different way than going private and remaining an independent company. There is more uncertainty about what the future holds for Mandiant as we know it and how the company fits within the vast Alphabet (Google) empire. People have a lot of questions and concerns about what's going to happen next.</p>
</blockquote>
<p>Questions about where and how Mandiant was going to fit within Google Cloud were valid, especially at the time. They're still valid now, but we'll get to that in detail later.</p>
<p>I felt some uneasiness when I first heard the acquisition news, but I quickly realized this was something Google was going to put its full resources behind:</p>
<blockquote>
<p>Right on cue, the skeptics started talking about how Mandiant is (eventually) going to end up in Google's <a href="https://killedbygoogle.com/?ref=content.strategyofsecurity.com">notorious product graveyard</a> after the news was announced. There are a lot of valid questions surrounding the acquisition, but this isn't one of them. Mandiant is absolutely not headed for Google's product graveyard.<br>
<br>
...<br>
<br>
Alphabet employs some of the smartest people on the planet. They are absolutely not going to make a multi-billion dollar acquisition without a plan for making it successful. We should expect Alphabet to make the same level of commitment for Mandiant.</p>
</blockquote>
<p>Google (Alphabet) and Mandiant kept us wondering for over six months. It was essentially radio silence from both companies as the acquisition completed diligence, regulatory review, and closing. That's par for the course with large acquisitions like this.</p>
<p>However, concerns about Mandiant being dismantled were summarily dismissed in the wave of post-acquisition media appearances:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Kevin Mandia  and <a href="https://twitter.com/philvenables?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">@philvenables</a> delivering the opening keynote at the inaugural <a href="https://twitter.com/mWISEConference?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">@mWISEConference</a><a href="https://twitter.com/hashtag/mwise?src=hash&ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">#mwise</a> <a href="https://t.co/Onp6OfROFj?ref=content.strategyofsecurity.com">pic.twitter.com/Onp6OfROFj</a></p>— Vikram Ramesh (@vikramesh) <a href="https://twitter.com/vikramesh/status/1582385551562665984?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">October 18, 2022</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>...and also the important little details like employee swag:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Big thank you and shoutout to <a href="https://twitter.com/googlecloud?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">@googlecloud</a> for our awesome swag! I’m super excited to be joining the family, and y’all…this water bottle is legit. Glass with a sleeve, and a window with times to help track drinking water!  <a href="https://twitter.com/hashtag/feelingthelove?src=hash&ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">#feelingthelove</a> <a href="https://twitter.com/hashtag/GKnowsImADehydratedB?src=hash&ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">#GKnowsImADehydratedB</a> <a href="https://t.co/PBE8PMRIsI?ref=content.strategyofsecurity.com">pic.twitter.com/PBE8PMRIsI</a></p>— Ushi (@ush1c) <a href="https://twitter.com/ush1c/status/1585607129431506955?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">October 27, 2022</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>The employee swag part might not seem like an important detail, but it's more symbolic than you might think. If Google was playing lip service with keeping the Mandiant brand, you'd see a media blitz and no employee appreciation or perks behind the scenes. The fact that Google went as far as customizing swag for 2,000+ Mandiant team members is a small indicator about the importance they're placing on integration and retention.</p>
<p>Why was keeping the Mandiant brand a no-brainer? Instant credibility. From Kyle Alspach in <a href="https://www.protocol.com/enterprise/google-cloud-chronicle-microsoft-sentinel?ref=content.strategyofsecurity.com">Protocol</a>:</p>
<blockquote>
<p>In the world of incident-response services, which provide investigation and remediation after a breach, Mandiant is the marquee name. Without a doubt, linking up Google Cloud’s security business with Mandiant “adds a level of credibility” with customers, said Benny Henderson, cloud practice manager at IT services provider World Wide Technology.</p>
</blockquote>
<p>The Google Cloud leadership team was definitive about continuing to use the Mandiant brand going forward. This shows the respect, value, and power of the brand Mandiant has developed. Mandiant's annual revenue is less than 1% of Alphabet's annual revenue, yet the intangible value of Mandiant's brand was worth keeping.</p>
<h2 id="what-about-mandiants-professional-services">What About Mandiant's Professional Services?</h2>
<p>Aside from what Google Cloud would do with Mandiant in general, the elephant in the room was the fate of Mandiant's professional services business:</p>
<blockquote>
<p>Perhaps the biggest open question about Alphabet's acquisition of Mandiant is what will happen with their well-known professional services business. It's a valid question with the potential for significant impact depending on what Alphabet decides to do.</p>
</blockquote>
<p>The starting point couldn't be further apart. As I quipped in the original article, Alphabet literally calls Google's products "services" in earnings reports. It's no stretch to question whether a company with product so deeply engrained into its DNA has the long-term appetite for cybersecurity professional services.</p>
<p>Productized services was the <a href="https://strategyofsecurity.com/p/mandiant-and-the-future-of-cybersecurity-professional-services/">direction Mandiant was headed</a> as a company when they divested FireEye — long before Google came around. Once Google entered the picture, the mutual alignment with moving away from pure services was obvious:</p>
<blockquote>
<p>Google's idea of "services = products" seems to align well with Kevin Mandia's recent <em>"we're not a services company"</em> declaration...except that professional services makes up roughly half of Mandiant's annual revenue. It's even more nuanced than that, though — mainly because the other half of Mandiant's business <em>also</em> includes services sold via subscriptions. Mandiant is a professional services business that's actively trying not to be. And Google would be glad to help with that.</p>
</blockquote>
<p>I may have taken this prediction a little too far by floating the idea that Google could end Mandiant's consulting business entirely:</p>
<blockquote>
<p>In the long run, subscription-based services revenue is likely to be much more appealing to Google than one-off, non-recurring professional services projects. I wouldn't be surprised if Google ends Mandiant's consulting business entirely. That statement may sound heretical, but it's definitely in the realm of possibility.</p>
</blockquote>
<p>Recent public comments have made it clear that's not going to happen. From Jeff Reed, VP of Product for Cloud Security in <a href="https://www.crn.com/news/cloud/-unprecedented-google-mandiant-integration-in-full-swing-cloud-security-vp?itc=refresh&ref=content.strategyofsecurity.com">CRN</a>:</p>
<blockquote>
<p>Mandiant is a step function in terms of capabilities, both from a security operations perspective and the product side, but also the incident response and the consulting capabilities.<br>
<br>
Also, the relationships that they have throughout the world with both enterprises and government institutions is really amazing.</p>
</blockquote>
<p>However, my observation about subscription-based revenue being more appealing looks pretty accurate. I specifically called out the value of Mandiant's threat intelligence business:</p>
<blockquote>
<p>Within the recurring, subscription-based services, Mandiant's Threat Intelligence and Managed/Automated Defense services should both be highly appealing to Google and its Google Cloud customers. Especially the world-famous threat intelligence services.<br>
<br>
...<br>
<br>
At an abstract level, threat intelligence <em>is</em> information. And great threat intelligence is <em>highly valuable</em> information. It's also notoriously difficult to organize and make universally accessible and useful — exactly the part Google specializes in.<br>
<br>
...<br>
<br>
The same concept applies for threat intelligence. Combined with tech, it gives customers information about cybersecurity threats. Mandiant is the best at sourcing this information. Google is the best at providing it. The combination is potentially a winning strategy.</p>
</blockquote>
<p>That's exactly where this is headed with Google. From Jeff Reed in <a href="https://www.crn.com/news/cloud/-unprecedented-google-mandiant-integration-in-full-swing-cloud-security-vp/2?ref=content.strategyofsecurity.com">CRN</a>:</p>
<blockquote>
<p>We know that Mandiant had excellent threat intelligence, so it’s about how do we bring that threat intel on Chronicle as soon as possible? They do a bunch of things in a proactive perspective, so how do we do that now [at Google]?</p>
</blockquote>
<p>My takeaway for Mandiant's professional service is <em>"let's wait and see."</em> The Google Cloud team clearly isn't going to abolish services on Day 1. Reading between the lines, their commentary implies some of Mandiant's services and subscription offerings are more valuable than others.</p>
<p>What happens to specific service offerings within Mandiant depends a lot on how much autonomy they retain. If Mandiant is truly a standalone business operating within Google Cloud, there's a higher probability they will continue offering their full range of services. If Mandiant gets partly or wholly integrated into Google Cloud, I expect we'll see the core incident response and threat intelligence service maintained and non-core services retired.</p>
<h2 id="how-will-mandiant-advantage-fit-into-google-cloud">How Will Mandiant Advantage Fit Into Google Cloud?</h2>
<p>The fate of Mandiant Advantage is complicated. Google Cloud's portfolio of security products — Chronicle, in particular — has a checkered past. They're at an interesting crossroads with the re-vitalization of Chronicle, acquisition of Siemplify, and the addition of the Mandiant Advantage platform.</p>
<p>The <a href="https://www.vice.com/en/article/9kej3e/chronicle-is-dead-and-google-killed-it?ref=content.strategyofsecurity.com">death of Google Chronicle</a> was greatly exaggerated — or, so it appears in hindsight. Mandiant's data and technology platform is clearly being viewed as a breath of fresh air into the current iteration living within Google Cloud.</p>
<p>The Chronicle project has had its share of issues, no doubt. The vision has shifted from the astronomical moonshot expectations Chronicle was  born into nearly seven years ago within <a href="https://x.company/?ref=content.strategyofsecurity.com">X</a>. From former Chronicle CEO <a href="https://medium.com/chronicle-blog/give-good-the-advantage-75ab2c242e45?ref=content.strategyofsecurity.com">Stephen Gillett</a>:</p>
<blockquote>
<p>We want to 10x the speed and impact of security teams’ work by making it much easier, faster and more cost-effective for them to capture and analyze security signals that have previously been too difficult and expensive to find. We are building our intelligence and analytics platform to solve this problem.</p>
</blockquote>
<p>The announcement went on to (ominously) predict:</p>
<blockquote>
<p>We know this mission is going to take years, but we’re committed to seeing it through.</p>
</blockquote>
<p>The first part was right — Chronicle's mission is going to take years. The second part, not so much. As lofty internal projects often go, the project's leadership stepped down as the formerly standalone company was <a href="https://cloud.google.com/blog/topics/inside-google-cloud/the-security-moonshot-joins-google-cloud?ref=content.strategyofsecurity.com">acquired and folded into</a> Google Cloud.</p>
<p>Five years later, Google Cloud is still holding up the commitment of seeing it through. As Chronicle Co-Founder and Chief Security Officer Mike Wiacek wrote when <a href="https://iroot.net/blog/to-the-stars/?ref=content.strategyofsecurity.com">announcing his departure</a>:</p>
<blockquote>
<p>Chronicle is in good hands with the brilliant folks at GCP, and I hope to see amazing things continue to happen. I may not be a custodian of it anymore, but I sincerely want to see it thrive! We had only just started to scratch the surface of what could be, and the future potential is so very high.</p>
</blockquote>
<p>He also left a clue that's much more clear in hindsight:</p>
<blockquote>
<p>What’s next? Well, that’s easy, “Second star to the right, and straight on ‘til morning.”</p>
</blockquote>
<p><em>"Second star to the right, and straight on ‘til morning"</em> is a quote from Peter Pan about finding Neverland. In this story, it translates to keeping a sense of curiosity and pursuing your dreams. For Wiacek, that meant founding <a href="https://stairwell.com/?ref=content.strategyofsecurity.com">Stairwell</a> — a startup that, in some ways, is the spiritual successor of Chronicle's original vision.</p>
<p>With the acquisition of Mandiant, Chronicle itself is undergoing a major transformation. This month at Google Next, the next iteration of Chronicle was <a href="https://cloud.google.com/blog/products/identity-security/introducing-chronicle-security-operations?ref=content.strategyofsecurity.com">unveiled</a>. Google summarized both the current and planned changes in their announcement:</p>
<blockquote>
<p>Chronicle Security Operations brings together the capabilities that many security teams depend on to more quickly identify threats and rapidly respond to them. It unifies Chronicle’s security information and event management (SIEM) tech, with the security orchestration, automation, and response (SOAR) solutions from our Siemplify acquisition and threat intelligence from Google Cloud. The recently-completed Mandiant acquisition will add even more incident and exposure management and threat intelligence capabilities in the future.<br>
<br>
Moving forward, all security operations software will come under the Chronicle brand. The Siemplify brand will be replaced with Chronicle SOAR, and security analytics capabilities of the suite will be named Chronicle SIEM.</p>
</blockquote>
<p>A couple things stand out:</p>
<ul>
<li>
<p>This answers the question about where the $500 million <a href="https://cloud.google.com/blog/products/identity-security/raising-the-bar-in-security-operations?ref=content.strategyofsecurity.com">Siemplify acquisition</a> fits into Google Cloud's product equation.</p>
</li>
<li>
<p>The announcement itself was more about the future than the present. It made clear that any of Mandiant's tech and data that Google chooses to keep will be part of the Chronicle brand and platform.</p>
</li>
</ul>
<p>From a product and engineering standpoint, it's too early to expect much (or any) of Mandiant's threat intelligence data or the Mandiant Advantage platform to be integrated. There's a lot of product planning and rationalization to do.</p>
<p>Jeff Reed outlined the initial planning and rationalization to CRN:</p>
<blockquote>
<p>Think of the security operations space and what we’ve done with Chronicle. We’ve been focused on the analytics, the SIEM [Security Information and Event Management] market, we acquired Siemplify and integrated orchestration, automation and response to that.<br>
<br>
What Mandiant adds is capabilities like validation and attack service mitigation. Chronicle in that world is more of a reactive defense—so looking for data, trying to find what might be going on in your environment, threat hunting and all that.<br>
<br>
...<br>
<br>
One of the big things we’re talking about is how we’re bringing those capabilities together with what we’re doing with Chronicle and the SecOps [security operations] space.<br>
<br>
So you’re going to see a set of new offerings come out over the coming quarters that are tying together what we’re doing in Chronicle with what Mandiant has done in validation, attack surface mitigation and threat intelligence.</p>
</blockquote>
<p>Google has already given us an early glimpse. Part of the Mandiant Advantage automated defense platform has been branded <a href="https://www.mandiant.com/advantage/breach-analytics?ref=content.strategyofsecurity.com">"Breach Analytics for Chronicle."</a> Re-platforming other Mandiant tools is also underway. From Jeff Reed via <a href="https://www.crn.com/news/cloud/-unprecedented-google-mandiant-integration-in-full-swing-cloud-security-vp/2?ref=content.strategyofsecurity.com">CRN</a>:</p>
<blockquote>
<p>Another good example is the Mandiant incident response teams are rebasing the tools that they use when they’re called in to investigate a breach, so it runs on top of Chronicle.</p>
</blockquote>
<p>Consider these examples a placeholder for now — I'm sure there will be many more changes and, eventually, a lot more clarity to come.</p>
<h2 id="mandiants-threat-intelligence">Mandiant's Threat Intelligence</h2>
<p>Mandiant's threat intelligence offering turned out to be a far more important part of the deal than I originally discussed. I raised the question about whether it would continue at all:</p>
<blockquote>
<p>A topic the information security community is particularly interested in is whether Mandiant's public research and threat intelligence information sharing is going to continue.</p>
</blockquote>
<p>Financially, it's a valid question — threat intelligence and public research is expensive to maintain. Along with incident response services, threat intelligence is Mandiant's bread and butter. Strategically, it makes a lot more sense for Google to invest in growing and integrating Mandiant's threat intelligence than doing away with it.</p>
<p>The Google Cloud leadership team has had nothing but high praise for Mandiant's threat intelligence. From Jeff Reed:</p>
<blockquote>
<p>They also bring amazing threat intelligence. They are there in the world’s worst breaches. So they have some of the absolute freshest threat intelligence that we’ll also complement.</p>
</blockquote>
<p>As it turns out, integrating Mandiant's threat intelligence is one of the first major areas of investment for Google Cloud. Again from Jeff Reed:</p>
<blockquote>
<p>"...threat intelligence integration, their proactive controls and bringing those together—that is already off and running."</p>
</blockquote>
<p>Unsurprisingly, these comments and priorities are slanted towards Mandiant's paid threat intelligence offerings; however, it's safe to assume the public research and reporting is likely to continue as well.</p>
<h2 id="antitrust-nah">Antitrust? Nah.</h2>
<p>At the time of the acquisition, many people (including me) pointed out the potential antitrust implications:</p>
<blockquote>
<p>First, it's not completely certain this deal is actually going to close. There is already speculation and <a href="https://www.economicliberties.us/press-release/googles-acquisition-of-mandiant-will-only-serve-to-choke-off-necessary-cybersecurity-innovation/?ref=content.strategyofsecurity.com">demands</a> for the transaction to be struck down because of antitrust. Alphabet is already facing significant <a href="https://www.marketwatch.com/story/google-enters-2022-battling-antitrust-actions-on-multiple-fronts-with-more-likely-to-come-11640643570?ref=content.strategyofsecurity.com">antitrust scrutiny</a> from regulators. Tech regulation in general is <a href="https://stratechery.com/2021/regulators-and-reality/?ref=content.strategyofsecurity.com">en vogue</a> with governments across the globe.</p>
</blockquote>
<p>From the outside, antitrust seems to have been a non-issue for Alphabet with this acquisition. The real headline was how quickly the United States Department of Justice (DOJ) came to a favorable decision and put investor concerns to rest.</p>
<p>The DOJ did <a href="https://www.theregister.com/2022/04/22/doj-google-mandiant/?ref=content.strategyofsecurity.com">conduct a probe</a> starting in April. It was effectively <a href="https://www.crn.com/news/security/google-mandiant-deal-closer-after-doj-ends-antitrust-inquiry?ref=content.strategyofsecurity.com">over by mid-July</a> after the DOJ granted an early termination of the waiting period for the transaction.</p>
<p>I didn't try to predict the timeline, but I did expect this deal would eventually be approved and move forward:</p>
<blockquote>
<p>Antitrust is a fluid topic, and I'm certainly not an antitrust lawyer. However, it <em>seems</em> unlikely this acquisition is going to be blocked. Despite the likely drama and rhetoric, reasonableness should enter the picture at some point in the process. The case against this being an antitrust concern is relatively strong.</p>
</blockquote>
<p>Ironically, there was a lot of post-acquisition discussion about how the deal could <em>help</em> create competition. As Google Cloud CISO Phil Venables told <a href="https://www.axios.com/2022/10/11/google-mandiant-acquisition-plans?ref=content.strategyofsecurity.com">Axios</a>:</p>
<blockquote>
<p>There's a little bit of a sigh of relief that there is going to be some competition to the other company [Microsoft] that typically serves government.</p>
</blockquote>
<p>Longer term, I expect the deal actually will create competition — just not exactly how Google's leadership team is predicting. There is already an emerging class of technology-enabled companies in <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#managed-detection-and-response-mdr">Managed Detection and Response (MDR)</a>, <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#incident-management-and-response">Incident Response</a>, <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#threat-intelligence">Threat Intelligence</a>, and other areas of the cybersecurity ecosystem where Mandiant operates.</p>
<h2 id="mandiant%E2%80%99s-future-within-google-cloud">Mandiant’s Future Within Google Cloud</h2>
<p>After my original analysis, I felt pretty optimistic about Mandiant's chances of success within Google:</p>
<blockquote>
<p>...I feel a lot more positive and optimistic about the combined future of Mandiant and Google. The new Mandiant may have been a mirage, but I'm hopeful the best parts of their vision can still be carried out — and maybe even improved and accelerated — under Google.</p>
</blockquote>
<p>I still feel that way now — even more so with commentary and details that have emerged in the past month.</p>
<p>This acquisition is clearly a priority for Alphabet. From Phil Venables via <a href="https://www.axios.com/2022/10/11/google-mandiant-acquisition-plans?ref=content.strategyofsecurity.com">Axios</a>:</p>
<blockquote>
<p>It's not this kind of little acquisition. It's this big part of our ongoing security transformation in terms of building a much bigger security business.</p>
</blockquote>
<p>Alphabet takes big acquisitions seriously. If the historical track record of other large acquisitions is an indicator, that's great news for Mandiant.</p>
<p>If we zoom out and look at the vision behind Mandiant's productized services model, it's exactly what Google is world class at — information. From Jeff Reed in CRN:</p>
<blockquote>
<p>...we at Google love trying to solve really hard problems. In a place like security operations, it’s based on Google’s expertise in large data, search and analytics.<br>
<br>
So that really works well in the sense that we are able to ingest and index amazing amounts of data.<br>
<br>
We can search them with other tools—which would take others minutes or sometimes hours—in less than a second.<br>
<br>
So that’s just something that we’re just really good at from my core engineering technology perspective. We’ve applied that expertise to the security operations.<br>
<br>
Both of those are really based on things that Google broadly is uniquely capable of.</p>
</blockquote>
<p>Google's decision to put its full resources behind security operations is a big deal. As I previously discussed in <a href="https://strategyofsecurity.ghost.io/ghost/?ref=content.strategyofsecurity.com#/editor/post/627bf1b22e416f004de95142/">An Intro to Consolidation and Aggregation in Cybersecurity</a>, cloud providers like Google Cloud are driving aggregation in the industry:</p>
<blockquote>
<p>Cybersecurity companies aren't the ones <em>doing</em> the aggregating; they are <em>being</em> aggregated. Aggregators (cloud providers) are modularizing suppliers (cybersecurity product companies) and using control of customer demand (businesses using their cloud services) to control distribution of products and services (via marketplaces).</p>
</blockquote>
<p>When aggregators enter the picture, existing demand and distribution models can change entirely. Operating at the scale of an aggregator makes new things possible, usually in favor of the aggregator (Google Cloud, in this example). Here's one example, again from Jeff Reed in CRN:</p>
<blockquote>
<p>...we’re able to take these amazing economies of scale around [the fact that] we produce our own security chips at Google, we custom-build hardware to reduce the number of peripherals, we are able to do things that any single organization is not going to have because of our large IT budget.<br>
<br>
But because we’re servicing tens of thousands of customers and our own Alphabet stuff, we can make these additional investments in security that wouldn’t make sense for anybody else. It makes sense for us.</p>
</blockquote>
<p>It's still too early to tell all of the possibilities that will be unlocked for Google by owning Mandiant. Similarly, we can't know for sure what every downstream impact will be on the rest of the industry, positive or negative.</p>
<p>Most of the challenges that come with acquisitions are still likely to happen here: mistakes will be made, people will move on to new opportunities, and some of the lofty expectations and goals may not be achieved. However, it can still be a huge success for both companies, even if everything doesn't go quite as planned.</p>
]]></content:encoded>
            <category>M&amp;A</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/10/Google-Cloud-x-Mandiant.png"/>
        </item>
        <item>
            <title><![CDATA[Y Combinator's Summer 2022 Cybersecurity, Privacy, and Trust Startups]]></title>
            <link>https://strategyofsecurity.com/y-combinators-summer-2022-cybersecurity-privacy-and-trust-startups/</link>
            <guid>6331c23ced1083003d38cae8</guid>
            <pubDate>Fri, 30 Sep 2022 12:05:00 GMT</pubDate>
            <description><![CDATA[Analyzing opportunities and challenges for the 13 cybersecurity, privacy, and trust startups in Y Combinator's Summer 2022 batch.]]></description>
            <content:encoded><![CDATA[<p>Y Combinator showcased a fresh batch of cybersecurity, privacy, and trust companies as part of its Summer 2022 Demo Day on September 8-9. Just like we've done for the previous <a href="https://strategyofsecurity.com/p/yc-s21-cybersecurity-startups/">two</a> <a href="https://strategyofsecurity.com/p/y-combinators-winter-2022-cybersecurity-privacy-and-trust-startups/">batches</a> since Strategy of Security has been around, we'll take a deeper look at every company in this batch with a connection to the cybersecurity ecosystem.</p>
<p>The Summer 2022 batch was intentionally smaller than Y Combinator's recent batches. This is no surprise — YC <a href="https://techcrunch.com/2022/08/02/y-combinator-narrows-current-cohort-size-by-40-citing-downturn-and-funding-environment/?ref=content.strategyofsecurity.com">warned everyone</a> batch sizes were being reduced by 40% back in August. The surprise was this: the Summer 2022 batch <em>still</em> included 13 companies in cybersecurity, privacy, or trust. That's consistent with the Winter 2022 batch, which included 12 companies.</p>
<p>Companies in the Summer 2022 batch that are in (or around) the domains of cybersecurity, privacy, and trust include:</p>
<ul>
<li>
<p><strong>AccessOwl:</strong> Provisioning and management of access to SaaS applications for a company's workforce.</p>
</li>
<li>
<p><strong>Allero:</strong> Code scanning in CI/CD pipelines to perform security, code quality, and compliance checks before deployment.</p>
</li>
<li>
<p><strong>AiPrise:</strong> Integration and orchestration of identity verification and Know Your Customer (KYC) checks across multiple providers.</p>
</li>
<li>
<p><strong>Ballerine:</strong> An identity and risk management platform that allows companies to automate workflows for customer onboarding, transaction monitoring, credit underwriting, and more.</p>
</li>
<li>
<p><strong>Chainsight:</strong> An API for Web3 background checks.</p>
</li>
<li>
<p><strong>Conversion Pattern:</strong> Tracking for user analytics and measurement of ad spend without cookies.</p>
</li>
<li>
<p><strong>Derisk:</strong> Cryptographic key custody software that secures cryptocurrency assets for businesses.</p>
</li>
<li>
<p><strong>Notebook Labs:</strong> Decentralized, anonymous, and verifiable identity for Web3.</p>
</li>
<li>
<p><strong>Oneleet:</strong> Pentesting services delivered through a combination of AI and human expertise.</p>
</li>
<li>
<p><strong>Openline:</strong> An open source customer data and orchestration platform.</p>
</li>
<li>
<p><strong>Overwatch:</strong> Detection and management of business risks that could impact an enterprise company's operations, supply chain, or reputation.</p>
</li>
<li>
<p><strong>Slauth.io:</strong> A platform that secures access to cloud infrastructure.</p>
</li>
<li>
<p><strong>TrueBiz:</strong> Background checks for businesses.</p>
</li>
</ul>
<p>Admittedly, 13 companies is a bit of a stretch. Eight of these companies operate at the intersection of cybersecurity and adjacent domains (fraud and risk, for example).</p>
<p>Hybrid cybersecurity companies are big these days — look no further than Cloudflare or the host of cybersecurity startups building on Snowflake. Hybrid companies absolutely should not be dismissed because they aren't "pure" cybersecurity companies. So, we'll include the hybrid companies here.</p>
<p>On to the analysis of the 13 cybersecurity, privacy, and trust companies in YC's Summer 2022 batch.</p>
<h2 id="accessowl">AccessOwl</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.accessowl.io/?ref=content.strategyofsecurity.com">AccessOwl</a> orchestrates provisioning and management of access to SaaS applications for a company's workforce. The product's interface is Slack-first, which allows people to request and approve access directly within Slack.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Provisioning, deprovisioning, and management of access are clearly features of an <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#identity-governance-and-administration-iga">Identity Governance and Administration (IGA)</a> platform. AccessOwl is focused on SaaS applications, a narrow but important slice of the market.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>The IGA market is incredibly competitive, both among incumbents and earlier stage startups. SailPoint, ForgeRock, and Oracle are all market leaders with growing businesses. SailPoint received a <a href="https://strategyofsecurity.com/p/bravo-thoma-bravo/">Thoma Bravo-powered</a> jolt of energy earlier this year.</p>
<p>Financing and M&amp;A activity in IGA has been one of the busiest segments in the cybersecurity ecosystem. <a href="https://strategyofsecurity.com/p/balkanid-and-the-evolution-of-access-governance/">BalkanID</a>, <a href="https://clearskye.com/?ref=content.strategyofsecurity.com">Clear Skye</a>, <a href="https://frontegg.com/?ref=content.strategyofsecurity.com">Frontegg</a>, <a href="https://opal.dev/?ref=content.strategyofsecurity.com">Opal</a>, <a href="https://pathlock.com/?ref=content.strategyofsecurity.com">Pathlock</a>, and <a href="https://zillasecurity.com/?ref=content.strategyofsecurity.com">Zilla</a> have all raised large rounds in 2022.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>IGA is a wide open market right now. The value of IGA products to mid-sized companies through enterprises has been clearly established — to a point where <a href="https://www.sailpoint.com/press-releases/thoma-bravo-completes-acquisition-of-sailpoint/?ref=content.strategyofsecurity.com">SailPoint was worth $6.9 billion</a> to Thoma Bravo. Any product that stands out and gains traction in this market has the potential to be a big company.</p>
<h2 id="allero">Allero</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.allero.io/?ref=content.strategyofsecurity.com">Allero</a> scans code in CI/CD pipelines to perform security, code quality, and compliance checks before deployment. It's a CLI-based tool for use by developers.</p>
<p>The company's value proposition is to <em>"ensure only compliant code makes it to production."</em> It's counter-intuitive to think that <em>preventing</em> software from reaching production is valuable, but that's definitely the case here.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Allero fits broadly into <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#application-security">Application Security</a>. I would argue it also intersects with <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#governance-risk-and-compliance">Governance, Risk, and Compliance (GRC)</a>.</p>
<p>The product focuses on the quality and adherence of code to standards — not the code-level vulnerabilities tools like Snyk are after. Allero is somewhat of a meta-layer: it can be configured to check if Snyk security scans are part of the CI/CD pipeline.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Inertia and apathy are probably bigger challenges for Allero than any competitive product. Organizations are still embracing the idea of developer-friendly application security. Unfortunately, it's going to take more time for this to catch on.</p>
<p>This is a challenge with long-term upside — it's going to happen eventually. I'd even call it existential: the least capable development shops will have to either get with the program or go out of business. Nobody knows how long it will take for the revolution to happen, but it will.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Many developers and engineering leaders are hard-wired to ship code fast. This often means shortcutting or bypassing security, code quality, or compliance. It's unlikely for code to be rolled back once it's deployed, which is a recipe for disaster if non-compliant code keeps finding its way into production.</p>
<p>Allero is a neutral, automated voice of reason: its job is to stop bad things from happening. Expectations are codified into Allero's configuration — the rules are the rules. That's a big deal because no human judgment is involved, and the rules are automatically and consistently enforced.</p>
<p>Everything Allero does have been a huge and recent problems in cybersecurity, including many of the trends and topics I discussed in <a href="https://strategyofsecurity.com/p/what-developers-need-to-know-about-the-strategy-of-security/">What Developers Need to Know About the Strategy of Security</a>. Protecting the CI/CD pipeline and the code that flows through has to get better, and Allero could be one of the companies leading the way.</p>
<h2 id="aiprise">AiPrise</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://aiprise.com/?ref=content.strategyofsecurity.com">AiPrise</a> integrates and orchestrates identity verification and Know Your Customer (KYC) checks across multiple providers.</p>
<p>The "integration and orchestration" part is an important distinction — it doesn't <em>do</em> the verifications. There are plenty of good products that do this already. AiPrise's problem space is how to <em>manage</em> the identity verification providers — an adjacent but tricky challenge.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>AiPrise generally fits into <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#identity-proofing">Identity Proofing</a>, with the nuance I pointed out earlier about managing but not doing the validation.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Managing multiple identity verification and KYC providers is somewhat of a niche. The pain is most commonly felt by fintech companies. Many investors would question if the problem space and market is big enough to become a large company.</p>
<p>Niche markets and specific problems like this are YC's bread and butter, though. What seems like an obscure problem is often bigger than people expect. Solving a niche problem well also unlocks adjacent opportunities in broader domains (<a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#fraud-and-transaction-security">Fraud and Transaction Security</a>, in this case).</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Having a meta-layer to manage the identity verification mess is incredibly valuable for companies operating in multiple geographies. Nobody wants to integrate and maintain multiple identity verification platforms. With AiPrise, you don't have to.</p>
<p>Companies like Segment have <a href="https://investors.twilio.com/news/news-details/2020/Twilio-to-Acquire-Segment-the-Market-leading-Customer-Data-Platform/default.aspx?ref=content.strategyofsecurity.com">proven the value</a> and potential scale of integration and orchestration products. AiPrise could follow in similar footsteps. Segment proved orchestration for customer data and analytics was a deceptively large problem, and AiPrise could do the same for identity verifications.</p>
<h2 id="ballerine">Ballerine</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.ballerine.io/?ref=content.strategyofsecurity.com">Ballerine</a> is an identity and risk management platform that allows companies to automate workflows for customer onboarding, transaction monitoring, credit underwriting, and more.</p>
<p>This is one of the hybrid companies I referred to in the article's intro. The product has clear elements of cybersecurity, but it also extends well into financial services.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>A product like Ballerine spans multiple categories of the cybersecurity ecosystem, including <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#customer-identity-ciam">Customer Identity (CIAM)</a> and <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#fraud-and-risk">Fraud and Risk</a>.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Larger financial institutions are the potential customers who feel problems with customer onboarding, transaction monitoring, and fraud acutely. Unfortunately, they're often the slowest to adopt new technology to help solve the problem. They've been forced to build their own solutions, and the result is usually a legacy technology stack that's ready to fall apart from the slightest change.</p>
<p>Modernization and (gasp) <em>digital transformation</em> is coming, though. The problems Ballerine solves are part of financial services companies' core operations, which puts new technologies higher up on the priority list when modernization finally comes around.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Thankfully, Ballerine can capitalize on the revolution in fintech and neobanks while it waits for larger institutions to come around. There are plenty of companies building their identity and fraud stacks from the ground up. It makes a lot more sense for them to work with a company like Ballerine than build the stack on their own.</p>
<p>An open and extensible platform like Ballerine might also be the antidote to skepticism from larger financial institutions. The best retort to <em>"...but we're special"</em> scenarios from enterprises is to let them build whatever they need on their own. Ballerine makes that possible.</p>
<p>In the adjacent market for digital identity, ForgeRock has proven it's possible to win over a meaningful portion of a market with an open, extensible platform. Ballerine could do the same for the intersection of identity, risk management, and fraud.</p>
<h2 id="chainsight">Chainsight</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.chainsight.com/?ref=content.strategyofsecurity.com">Chainsight</a> is an API for Web3 (a.k.a. blockchain or cryptocurrency) background checks. The company uses a direct comparison that's helpful: <em>"Checkr for Web3."</em></p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>The company fits into my broadly defined <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#blockchain-and-web3">Blockchain and Web3</a> domain of the cybersecurity ecosystem. They could also be grouped with traditional companies in the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#background-screening">Background Screening</a> market.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Mostly macro: where Web3 is headed is still very much in flux. We're currently sitting in the middle of yet another crypto crash. Competition among early stage companies and protocols is intense — all the <a href="https://strategyofsecurity.com/p/an-intro-to-consolidation-and-aggregation-in-cybersecurity/">usual traits</a> of an industry at the embryonic stage of its lifecycle.</p>
<p>The good news for Chainsight is that background checks are among the foundational set of services needed for Web3. It's a relatively safe bet that wherever Web3 ends up going, background checks are going to be needed.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Web3 fraud and scams are <a href="https://web3isgoinggreat.com/?theme=hack&ref=content.strategyofsecurity.com">rampant</a>. The problem has become a serious headwind for Web3 users, companies, and protocols. Help is desperately needed.</p>
<p>Chainsight isn't another <em>"build something that exists in Web2, but now on blockchain?!"</em> type of company. Yes, background checking services have conceptually existed for a long time. Web3 brings a different set of challenges and use cases that require a new solution.</p>
<p>Why is a new solution needed? Web3 has a lot of data and assets to monitor for background checks to work. According to Chainsight, the company currently monitors over 300,000 dApps and tokens, over 100 million phishing sites, and labels 25 billion blockchain transactions.</p>
<p>Paradigm-altering technology shifts create spaces of opportunity for new products and companies. That's exactly what Chainsight is taking advantage of in a space with massive upside.</p>
<h2 id="conversion-pattern">Conversion Pattern</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.conversionpattern.com/?ref=content.strategyofsecurity.com">Conversion Pattern</a> helps companies track user analytics and measure ad spend without cookies.</p>
<p><em>"...wait, what? Why is this company on the list?!,"</em> you might ask. It's another hybrid company that crosses over into cybersecurity and privacy to solve a business problem.</p>
<p>Digital identity is at the core of Conversion Pattern's product, including a unique identifier for visitors and an identity resolution engine to help correlate activity across multiple sessions and devices.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>The company fits broadly into <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#identity-graphing-and-resolution">Identity Graphing and Resolution</a>. They're really a user analytics company that happens to intersect with digital identity and privacy to solve problems for their customers.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Changes to third-party tracking and user privacy are dynamic. Requirements (and underlying tech) are evolving rapidly. The discourse is part technical, and part political. This makes for a messy situation.</p>
<p>Anything Conversion Pattern builds could be partially or completely wiped out by the whims of powerful companies like Apple and Google. That's also an opportunity, of course — being the company who helps <em>other</em> companies navigate the turmoil is incredibly valuable.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>The end of third-party tracking is an <a href="https://mcgaw.io/blog/end-of-third-party-cookies-ios14-itp?ref=content.strategyofsecurity.com">existential crisis</a> for marketers. Without cookies, new solutions are needed to help businesses understand their customers and measure ad spend.</p>
<p>It's unrealistic to expect this type of measurement for eCommerce and digital ad spend will go away just because Apple killed third-party tracking. Once people are given something, it's hard to take it away — especially when it's directly related to a company's revenue and profitability.</p>
<p>If the market decides Conversion Pattern is the best solution for balancing third-party tracking with the user privacy requirements of device manufacturers, they can become a big company.</p>
<h2 id="derisk">Derisk</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.getderisked.com/?ref=content.strategyofsecurity.com">Derisk</a> builds cryptographic key custody software that secures cryptocurrency assets for businesses. Their product uses <a href="https://flax-stem-1ba.notion.site/Multi-party-computation-a-friendly-intro-350a48dc031045adb9d2e2dce24e19ac?ref=content.strategyofsecurity.com">multi-party computation (MPC)</a> to secure keys among multiple parties without anyone knowing the full key.</p>
<p>It's a new solution to the <a href="https://www.ledger.com/academy/not-your-keys-not-your-coins-why-it-matters?ref=content.strategyofsecurity.com">"not your keys, not your coin"</a> dilemma in cryptocurrency that has found the spotlight recently. TL;DR – if a company holding digital assets implodes, there's no guarantee its users will be able to get their assets back because they technically don't hold the private keys needed to access them. That's a problem in a lightly regulated industry like cryptocurrency — the FDIC isn't there to save you.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Like Chainsight, Derisk fits into my broadly defined <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#blockchain-and-web3">Blockchain and Web3</a> domain. The company is also a new-generation entrant into the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#public-key-infrastructure">Public Key Infrastructure</a> market with a specific focus on Web3.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>One of the biggest challenges for Derisk is convincing cryptocurrency asset custodians it's safe to use a product from a startup to secure their private keys. Ironically, building on MPC helps address this problem because its core design principle is that nobody has to trust anyone else.</p>
<p>The other macro-level challenges are value capture and defensibility. Products built on top of open protocols (an entire sub-field of cryptography, in this case) often struggle to capture the value they create. It can also be challenging to build a defensible moat when part of the core IP is open and available for competitors to copy.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Derisk is a real life instance of the cryptocurrency <a href="https://moxie.org/2022/01/07/web3-first-impressions.html?ref=content.strategyofsecurity.com">"centralization vs. decentralization" debate</a> where the decentralized solution could (objectively) be the best solution. MPC is great because it's both secure and redundant by design — excellent benefits when we're talking about securing digital assets with monetary value.</p>
<p>In the case of managing the private keys that protect cryptocurrencies, many people <em>shouldn't</em> be at either end of the trust spectrum: wholly trusting third parties or relying on ourselves to protect our digital assets. The best answer might be in the middle — spreading some, but not all, trust among a few parties and enforcing it with distributed computation.</p>
<h2 id="notebook-labs">Notebook Labs</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.notebooklabs.xyz/?ref=content.strategyofsecurity.com">Notebook Labs</a> is building decentralized, anonymous, and verifiable identity for Web3. The company calls it <em>"KYC for crypto,"</em> which loosely means it's doing identity proofing.</p>
<p>This might sound similar to Chainsight, but the nuances are important. Notebook is an on-chain store of verified identity information (a smart contract). It's integrated with an NPM package versus an API for Chainsight. Bigger picture, Notebook also seems to be building towards a fully self-soverign identity store, not just an identity proofing service.</p>
<p><em>Side Note: They also use AiPrise, another company we discussed earlier, for identity proofing during user onboarding.</em></p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Notebook is another company that maps to the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#blockchain-and-web3">Blockchain and Web3</a> domain. They're also similar to an <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#identity-wallets">Identity Wallet</a>, although technically implemented as a smart contract.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Web3 identity is an extremely competitive segment. Multiple other companies, including several funded by YC (<a href="https://www.spruceid.com/?ref=content.strategyofsecurity.com">Spruce</a> and <a href="https://magic.link/?ref=content.strategyofsecurity.com">Magic</a>, for example) are building in and around the same identity wallet vicinity.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Identity for is one of the biggest opportunities up for grabs in Web3. Several attempts have been made, and new companies keep getting better and better.</p>
<p>Balancing verifiable identity with user privacy and decentralization is a tricky thing to do. It's also the <em>right</em> thing to do. Notebook can be a big company if it pulls this off.</p>
<h2 id="oneleet">Oneleet</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.oneleet.com/?ref=content.strategyofsecurity.com">Oneleet</a> is a pentesting service delivered through a combination of AI and human expertise. The platform includes tools to execute and manage the pentest, plus a marketplace of talent to guide, validate, and report the results.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>The company sits at the intersection of <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#penetration-testing">Penetration Testing</a>, <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#professional-services">Professional Services</a>, and <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#crowdsourcing">Crowdsourcing</a>. It's part technology platform and part professional services marketplace.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Forward-thinking professional services firms have caught on to the idea of productized penetration testing services. Companies like <a href="https://bishopfox.com/news/series-b-funding?ref=content.strategyofsecurity.com">Bishop Fox</a>, <a href="https://www.netspi.com/news/press-release/cybersecurity-funding-investment-kkr/?ref=content.strategyofsecurity.com">NetSPI</a>, <a href="https://www.businesswire.com/news/home/20200213005205/en/Praetorian-Closes-10M-Series-A-Funding-Round-to-Help-Enterprises-Navigate-the-Escalating-Cybersecurity-Risks-of-the-Coming-Decade?ref=content.strategyofsecurity.com">Praetorian</a>, <a href="https://www.businesswire.com/news/home/20200528005407/en/Synacks-52-Million-Investment-Fuels-Future-of-Remote-Security-Testing-from-Worlds-Elite-Hackers?ref=content.strategyofsecurity.com">Synack</a>, and more have all raised significant capital to address this exact problem.</p>
<p>The challenge is also an opportunity for Oneleet. Companies that began as traditional professional services firms have to deal with organizational and culture change to bend their offerings into productized services. Oneleet is one of the first companies with the opportunity to build a productized service from the ground up.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>The productization of cybersecurity services is one of my favorite topics <em>(more on this soon...hint hint)</em>. Naturally, I'm excited about what Oneleet is doing.</p>
<p>I talked extensively about this topic when <a href="https://strategyofsecurity.com/p/mandiant-and-the-future-of-cybersecurity-professional-services/">analyzing</a> Mandiant's shift towards productized services. Substitute Oneleet for Mandiant, and it's exactly the reason they could become a big company:</p>
<blockquote>
<p>Building a successful productized services business to address an important societal issue like cybersecurity attacks is an interesting problem to solve. In the process, Mandiant may also revolutionize the delivery model for professional services in the industry.</p>
</blockquote>
<p>A shift towards productized services is bound to happen, especially in cybersecurity. Too many incentives are aligned for this not to happen: labor shortages, budget constraints, speed of delivery, and never-ending fear are a recipe for innovation. The question is whether Mandiant will be the company to execute this strategy and successfully capture the value.</p>
<p>Bigger picture, the company describes itself as <em>"your security department as a service."</em> That obviously means a lot more than pentesting. The ceiling here is high. Anyone who accomplishes this will become a massive company in the process.</p>
<h2 id="openline">Openline</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.openline.ai/?ref=content.strategyofsecurity.com">Openline</a> is an open source customer data and orchestration platform. It takes customer data and interactions from multiple sources to personalize experiences and automate support.</p>
<p>Like Conversion Pattern, you might be wondering why this company made the list. Same reason: digital identity is at the core of the product. From their <a href="https://www.ycombinator.com/companies/openline?ref=content.strategyofsecurity.com">YC company profile</a>:</p>
<blockquote>
<p>Third-party tracking and analytics tools do not work in the current world of GDPR, HIPAA, CCPA, ad blockers, and cookie deprecation.  We allow you to get the most comprehensive view of your customers without sending personal identifying and/or usage data to third parties.</p>
</blockquote>
<p>Identity and privacy are enablers for everything else Openline does.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Openline fits broadly into <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#identity-graphing-and-resolution">Identity Graphing and Resolution</a>. More broadly, they're a customer data platform.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Competition. Cliché, I know. Customer data platforms is a competitive space in tech. The The Forrester New Wave™: B2B Standalone CDPs, Q4 2021 report evaluated 14 companies. That's a lot of companies already, and newer startups haven't made the list yet.</p>
<p>Competition alone isn't cause for concern, though. The market for customer data platforms is an emerging one (hence the "New Wave" terminology by Forrester). Companies and buyers are still sorting out the features they value most.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>The macro-level shift is clear: companies are moving away from building and maintaining their own customer data platforms. Combine this trend with ripple effects from privacy regulations and Apple's ban of third-party tracking cookies, and you've got an important problem space that needs solutions.</p>
<p>Openline's open source platform could be a major advantage over competitors with proprietary platforms. Open source companies in adjacent markets (ForgeRock, GitLab, and <a href="https://strategyofsecurity.com/p/hashicorps-ipo-bottom-up-adoption-and-layering/">HashiCorp</a>, to name a few) have proven this model can be successful to the point of becoming a public company.</p>
<h2 id="overwatch">Overwatch</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="http://www.overwatchdata.io/?ref=content.strategyofsecurity.com">Overwatch</a> helps large enterprises detect and manage business risks that could impact their operations, supply chain, or reputation.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>The company sits at the intersection of <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#enterprise-risk-management">Enterprise Risk Management</a> and <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#risk-ratings">Risk Ratings</a>. An important nuance is that Overwatch's risk profiling is mostly outward-facing. That is, it's focused on external risks that could impact a company, not internal risks within the company itself.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>The problems they're solving are huge, gnarly ones. That's a challenge in the best possible way — exactly the type high potential early stage startups should be going after.</p>
<p>The difficulty with solving hard problems is that they're sometimes <em>too hard</em> to move the needle. Finding and surfacing relevant business risks among a sea of global activity is challenging.</p>
<p>The product has to do a great job of justifying continued spend — too many false negatives or false positives could cause enterprise buyers to lose trust and revert to old ways.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Third party risk is a huge problem for every enterprise company. Entire departments are dedicated to monitoring, managing, and auditing partners, suppliers, territories, and more.</p>
<p>However, their approach is typically reactive and narrow in scope (think vendor risk assessment questionnaires and the like). This behavior is partly a relic of legacy thinking, and partly because advanced tech didn't exist to monitor risk on a global scale. Overwatch can be a big company because it changes the game completely.</p>
<p>The company already has amazing customers (Stripe and Goldman Sachs were mentioned publicly) for an early stage startup. They will undoubtedly draw the attention of many more companies who want to be proactive about managing enterprise risk.</p>
<p>The three-person founding team deserves special mention, too — their backgrounds are incredible. A company like Overwatch can't be started by just anyone. Subjects like geopolitics, global supply chain risks, financial crimes, and others are highly specialized. This looks like a unique team solving a unique problem at a unique time in the world.</p>
<h2 id="slauthio">Slauth.io</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://slauth.io/?ref=content.strategyofsecurity.com">Slauth.io</a> secures access to cloud infrastructure. The product scans IAM configurations for each of the three large cloud infrastructure providers, generates a map of access, identifies potential vulnerabilities, and recommends remediation actions.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>The product maps to <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#cloud-infrastructure-entitlements-management-ciem">Cloud Infrastructure Entitlements Management (CIEM)</a> within Cloud Security.</p>
<p>For clarity, Slauth.io isn't an <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#access-management">authentication service</a> like Okta or Ping. It's focused on analyzing and identifying issues with access control, not performing the day-to-day authentication or authorization of users.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Cloud Infrastructure Entitlements Management is dangerously close to the broader <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#cloud-security-posture-management-cspm">Cloud Security Posture Management (CSPM)</a> market that awesome companies like Wiz, Orca, and more are well on their way to owning. It's an open question whether access control is a standalone problem or a subset of the problems CSPM platforms monitor and remediate.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Access to cloud infrastructure is one of the top security weaknesses and causes of cloud-related breaches. Unit 42 at Palo Alto Networks went <a href="https://unit42.paloaltonetworks.com/iam-cloud-threat-research/?ref=content.strategyofsecurity.com">deep into this subject</a> if you're interested in the data behind it.</p>
<p>Two identity protection companies (Attivo and Preempt, conceptually similar products) had nice exits in the past year (to <a href="https://strategyofsecurity.com/p/earnings-crowdstrike-and-sentinelone-2022-annual-earnings-recap/">SentinelOne and CrowdStrike</a>, respectively). This category is gaining visibility as an important capability beyond core IAM systems.</p>
<p>An effective solution to cloud infrastructure access is a strategic acquisition target at minimum, and potentially an even larger company.</p>
<h2 id="truebiz">TrueBiz</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://truebiz.io/?ref=content.strategyofsecurity.com">TrueBiz</a> performs background checks for businesses. Traditionally, this is both a lengthy and laborious requirement that financial institutions are required to perform when doing business with corporate entities due to Know Your Business (KYB) legislation. TrueBiz automates away the paper pushing and makes the verification process both faster and easier.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>The company maps to <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#background-screening">Background Screening</a> with a specific focus on businesses, not individuals.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Large financial institutions are typically slow to adopt new technologies, so it might be a while before TrueBiz can make a dent in a meaningful number of enterprise accounts.</p>
<p>Like Ballerine, the good news for TrueBiz is there are plenty of emerging fintech startups that would be glad to use their service for KYB while building a stack from the ground up.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Tech for performing business background checks is lagging behind its consumer counterparts. The potential for financial institutions to eliminate manual processes and headcount is a powerful incentive, too. If TrueBiz can build a product that is legitimately better than other products, it can become a big company.</p>
]]></content:encoded>
            <category>Startups</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/09/Y-Combinator---New.png"/>
        </item>
        <item>
            <title><![CDATA[Revisiting Cybersecurity's 2022 IPO Pipeline]]></title>
            <link>https://strategyofsecurity.com/revisiting-cybersecuritys-2022-ipo-pipeline/</link>
            <guid>630fd790e65a5f004d2e9a1b</guid>
            <pubDate>Wed, 31 Aug 2022 22:16:02 GMT</pubDate>
            <description><![CDATA[Assessing the impact of the current economic downturn on cybersecurity's IPO candidates.]]></description>
            <content:encoded><![CDATA[<p>Life comes at you fast in cybersecurity. That's certainly true for the later stage companies who had their sights set on going public in 2022.</p>
<p>The state of public markets has completely changed since I wrote a <a href="https://strategyofsecurity.com/p/cybersecuritys-2022-ipo-pipeline-part-1/">two</a> <a href="https://strategyofsecurity.com/p/cybersecuritys-2022-ipo-pipeline-part-2/">part</a> series about cybersecurity's IPO pipeline this January...which now seems like forever ago. It's time to revisit this topic and take a look at where things stand now.</p>
<p>Spoiler alert: it's gloomy out there. This isn't going to be the upbeat, full of excitement type of piece you're used to reading here lately. It's important to talk about what's happening, though — even if the news isn't good right now.</p>
<p>In this article, we're going to cover:</p>
<ul>
<li>
<p><strong>Overall Market Conditions:</strong> Analysis of overall market conditions and impact to publicly traded cybersecurity companies.</p>
</li>
<li>
<p><strong>2022 Cybersecurity IPOs:</strong> Recapping the one cybersecurity IPO (via SPAC) so far this year.</p>
</li>
<li>
<p><strong>IPO Pipeline Developments:</strong> Checking back in with companies in the IPO pipeline, including recent comments and events (financing, layoffs, etc.).</p>
</li>
<li>
<p><strong>Emerging Candidates:</strong> Highlighting companies who have emerged as IPO candidates that weren't included in the original series I wrote in January.</p>
</li>
<li>
<p><strong>What to Expect:</strong> Where we go from here and what to expect as the U.S. economy teeters on the edge of a recession.</p>
</li>
</ul>
<p>We're going to start our melancholy little tour by looking at the overall condition of public markets. That's where the current challenges start for companies in the cybersecurity IPO pipeline.</p>
<h2 id="overall-market-conditions">Overall Market Conditions</h2>
<p>As of July 31, 2022, valuations for public cybersecurity companies have fallen roughly 20% in the past year. The decline of cybersecurity company valuations is almost exactly in line with the overall market decline.</p>
<p>This chart from Momentum Cyber's <a href="https://momentumcyber.com/cybersecurity-snapshot-july-2022/?ref=content.strategyofsecurity.com">monthly snapshot for July 2022</a> slices the downward trends in a few different ways:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/08/mc-snapshot-july-2022.png" class="kg-image" alt="" loading="lazy" width="1338" height="733" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/08/mc-snapshot-july-2022.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/08/mc-snapshot-july-2022.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/08/mc-snapshot-july-2022.png 1338w" sizes="(min-width: 720px) 720px"><figcaption><b><strong style="white-space: pre-wrap;">Source: Momentum Cyber - Cybersecurity Snapshot (July 2022)</strong></b></figcaption></figure><p>A notable observation about this chart is the steeper decline of high growth cybersecurity companies compared to other benchmarks. Why have high growth companies been impacted more (especially recently)? One reason is hype.</p>
<p>I have previously talked about hype, including some now ominous comments from my <a href="https://strategyofsecurity.com/p/cybersecurity-is-going-public/">Cybersecurity Is Going Public</a> article:</p>
<blockquote>
<p>The entire public cybersecurity market is hyped. It's hard to quantify "hype" precisely. Generally speaking, it's a combination of growth, revenue, and momentum.</p>
</blockquote>
<p>Zooming in further, this table from Momentum Cyber's <a href="https://momentumcyber.com/cybersecurity-market-review-1h-2022/?ref=content.strategyofsecurity.com">mid-year report</a> shows the decline in the ratio of Enterprise Value (EV) to estimated revenue — another way of illustrating the decline in valuations for individual companies:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/08/mc-cyber-multiples-yoy.png" class="kg-image" alt="" loading="lazy" width="2000" height="1095" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/08/mc-cyber-multiples-yoy.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/08/mc-cyber-multiples-yoy.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/08/mc-cyber-multiples-yoy.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/08/mc-cyber-multiples-yoy.png 2000w" sizes="(min-width: 720px) 720px"><figcaption><b><strong style="white-space: pre-wrap;">Source: Momentum Cyber - Cybersecurity Market Review (1H 2022)</strong></b></figcaption></figure><p>When previously discussing hype, I highlighted four companies in particular:</p>
<blockquote>
<p>...in an already hyped market, there are four <em>very</em> hyped public cybersecurity companies — Cloudflare, CrowdStrike, Zscaler, and Okta.</p>
</blockquote>
<p>Sure enough, these companies have had the largest year-over-year declines in multiples. In the chart above, declines for Okta, Crowdstrike, and Zscaler were all over 50%. As of today, Cloudflare's valuation has declined 56.3% in the past year (<em>Note: not included in the table above as a hybrid networking and cybersecurity company</em>). Okta suffered a 74% decline due to an untimely combination of a <a href="https://www.okta.com/blog/2022/04/okta-concludes-its-investigation-into-the-january-2022-compromise/?ref=content.strategyofsecurity.com">data breach</a> and unfavorable market conditions.</p>
<p>In <em>Cybersecurity Is Going Public</em>, I also talked about the fickle behavior of markets. It's worth mentioning again here:</p>
<blockquote>
<p>Hype is mostly a good thing, so take this data as a positive indicator overall for cybersecurity companies. Markets and hype cycles are fickle, though. If the market leaders start to miss their (admittedly high) expectations consistently, it could impact perception of the entire market. For now, all is well, especially for companies who are growing at a high rate.</p>
</blockquote>
<p>Despite the valuation declines for hyped companies, there's something important to remember: <em>they're still performing really well!</em></p>
<p>Jason Lemkin recently wrote a SaaStr article about the <a href="https://www.saastr.com/down-markets-and-the-evaporation-of-liquidity/?ref=content.strategyofsecurity.com">impact of reduced liquidity</a> (in other words, what happens when public company valuations are down). The article noted something counter-intuitive — valuations are down, but SaaS revenue is still growing faster than ever:</p>
<blockquote>
<p>At this point, any founder in SaaS should know the public markets have fallen 50% or so from the peaks of 2021. It’s profoundly frustrating as SaaS revenue growth hasn’t fallen. The best in SaaS are growing faster than ever, even past $1B or more in ARR. And yet, they are still worth half of what they were just a few months ago.</p>
</blockquote>
<p>The <em>"It’s profoundly frustrating as SaaS revenue growth hasn’t fallen"</em> part is exactly the situation a lot of cybersecurity companies are in. Here's a quick sampling of public company earnings data to illustrate the point:</p>
<ul>
<li>
<p>Palo Alto Networks <a href="https://twitter.com/InvestiAnalyst/status/1561818100730937347?s=20&t=N6a09uqkqPrQKnTaaTpZ0w&ref=content.strategyofsecurity.com">crushed Q4 earnings guidance</a>, grew billings 44% YoY, and issued strong guidance for the upcoming fiscal year.</p>
</li>
<li>
<p>CrowdStrike <a href="https://ir.crowdstrike.com/news-releases/news-release-details/crowdstrike-reports-first-quarter-fiscal-year-2022-financial?ref=content.strategyofsecurity.com">reported</a> Q1 revenue growth of 61.1% YoY and $190.5 million net new ARR added during the quarter. Their <a href="https://www.nasdaq.com/articles/crowdstrike-holdings-q2-results-beat-street-view-lifts-fy-outlook-shares-down-3-2021-08-31?ref=content.strategyofsecurity.com">Q2 results</a> (reported yesterday) were even better.</p>
</li>
<li>
<p>Cloudflare raised 2022 sales guidance to $968M-$972M and reported a 53.9% YoY increase in revenue for Q2.</p>
</li>
</ul>
<p>The impact of valuation declines hits companies in different ways, though. High profile acquisitions and rumors of more by private equity firms and strategic buyers have generated headlines in the past month:</p>
<ul>
<li>
<p>Ping Identity was <a href="https://www.thomabravo.com/press-releases/ping-identity-to-be-acquired-by-thoma-bravo-for-2.8-billion?ref=content.strategyofsecurity.com">acquired by Thoma Bravo</a>.</p>
</li>
<li>
<p>Darktrace <a href="https://www.thisismoney.co.uk/money/markets/article-11115849/Darktrace-confirms-takeover-approach-private-equity-firm.html?ref=content.strategyofsecurity.com">confirmed</a> preliminary acquisition talks with Thoma Bravo.</p>
</li>
<li>
<p>CrowdStrike is <a href="https://seekingalpha.com/news/3860845-radware-gains-amid-report-of-crowdstrike-targeting-potential-israeli-company?ref=content.strategyofsecurity.com">rumored to be acquiring</a> an Israeli cybersecurity company. <a href="https://www.radware.com/?ref=content.strategyofsecurity.com">Radware</a> is one of the speculated targets.</p>
</li>
</ul>
<p><em>Whew...</em> that's a lot to handle. For me, the important takeaway is that financial performance and valuations for public cybersecurity companies have held up <em>relatively well</em> given the circumstances.</p>
<p>We're not going to be in this quasi-downturn mess forever. Valuations will increase again. IPOs will eventually resume.</p>
<p>Next, we'll take a quick look at the broader trend in tech IPOs and the cybersecurity IPO that (technically) did happen.</p>
<h2 id="2022-cybersecurity-ipos">2022 Cybersecurity IPOs</h2>
<p>It's been a rough year for tech IPOs in general, as Flexport founder Ryan Petersen summarized in a recent tweet:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Proceeds from IPOs of technology companies have amounted to $512M, down from $58.7B last year.</p>— Ryan Petersen (@typesfast) <a href="https://twitter.com/typesfast/status/1552288006861643776?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">July 27, 2022</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>Metaphorically, it's like we were driving 100 mph and slammed the brakes to a complete halt. Now, the Ferrari is just sitting here idling and burning up premium gasoline at $4.60/gallon.</p>
<p>Shortly after the tweet above, <a href="https://www.zerofox.com/press-release/lf-acquisition-corp-and-zerofox-inc-announce-effectiveness-of-registration-statement-and-august-2-2022-extraordinary-general-meeting-to-approve-business-combination/?ref=content.strategyofsecurity.com">ZeroFox went public</a> on Nasdaq via SPAC on August 4, 2022. SPACs are still a non-traditional way for companies to go public, but it still counts!</p>
<p>ZeroFox going public is a relatively significant win for the industry: it's the <a href="https://www.scmagazine.com/news/cloud-security/it-security-company-zerofox-goes-public-despite-concerns-over-market-conditions?ref=content.strategyofsecurity.com">first</a> pure threat intelligence company to go public. Other public companies (CrowdStrike, for example) have significant threat intelligence offerings, among <a href="https://www.scmagazine.com/news/cloud-security/it-security-company-zerofox-goes-public-despite-concerns-over-market-conditions?ref=content.strategyofsecurity.com">many other products and services</a>. ZeroFox is unique because threat intelligence is their primary focus (for now).</p>
<p>That's it. There are no other IPOs to speak of in the first half of the year. It's very possible there won't be any more by the end of the year. So it goes...</p>
<p>Now that we've covered the one and only IPO, it's time for a deeper dive into the companies still in the IPO pipeline.</p>
<h2 id="ipo-pipeline-developments">IPO Pipeline Developments</h2>
<p>First, a caveat for all companies in the IPO pipeline: any of them are candidates to be acquired by private equity firms at any time (Thoma Bravo, for example).</p>
<p>If SailPoint, Ping Identity, and other public companies with half a billion or more in revenue can be acquired, so can anyone in the IPO pipeline. We may not see any acquisitions, but it's always possible.</p>
<p>Caveats aside, let's look at the pipeline company-by-company.</p>
<h3 id="bigid">BigID</h3>
<p>BigID has been clear about their intention to remain patient about going public — even before the current economic downturn. Repeating a quote from my IPO pipeline coverage in January from co-founder Nimrod Vax:</p>
<blockquote>
<p>"BigID doesn’t need the cash and most of the capital has yet to be used. However, the offers we received were just too attractive to turn down, they allow us to accelerate growth and establish our leadership in both product and sales."</p>
</blockquote>
<p>True to form, there have been no major developments on the IPO front for BigID. They haven't had any layoffs, raised any capital, or said a peep about going public. <em>Note: Really starting my coverage with a bang here, right?!</em></p>
<p>In times like these, no news is probably good news. BigID appears to be in a great position. They raised extra capital at a favorable valuation long before the downturn started. It means they can ride out the freeze in IPOs and make a move when they're ready. This should result in a strong IPO once it eventually happens.</p>
<h3 id="cybereason">Cybereason</h3>
<p>Cybereason is where the IPO pipeline developments really start. It's been a gut-wrenching journey for them, unfortunately.</p>
<p>They raised a $355 million Series F round at a $2.37 billion valuation in July 2021. Everything was peachy at the time, and their leadership team was candid and clear about their intentions to IPO in 2022. Cybereason confidentially <a href="https://www.reuters.com/markets/us/exclusive-softbank-backed-cybereason-confidentially-files-us-ipo-sources-2022-01-31/?ref=content.strategyofsecurity.com">filed for an IPO</a> in January 2022 — right before things got rocky.</p>
<p>Instead of proceeding as planned with an IPO in the second half of 2022, they had to reprioritize profitability over growth. The practical implication of this strategic shift was <a href="https://www.crn.com/news/security/cybereason-lays-off-10-percent-of-workforce-after-recently-filing-for-ipo?ref=content.strategyofsecurity.com">laying off 10% of their workforce</a>. The company's messaging was a bit more somber, too:</p>
<blockquote>
<p>As the bullish tech market conditions have turned and the tech IPO market has essentially closed, companies like us must now exercise more strict financial discipline and prioritize profitably over top line growth.</p>
</blockquote>
<p>It's not all bad, though. The statement continues by highlighting strong growth and reinforcing eventual plans for an IPO:</p>
<blockquote>
<p>Our market traction remains strong as we continue to build a company that matters with long-term objectives in mind and plans for a tremendous outcome when the markets – and we – are ready.</p>
</blockquote>
<p>Despite the setbacks, Cybereason is still likely to be one of the first cybersecurity companies to IPO once activity resumes. It might not happen at exactly the valuation they'd hoped for when filing in January 2022, but going public feels inevitable.</p>
<h3 id="exabeam">Exabeam</h3>
<p>Exabeam is in the "wait patiently" camp of IPO pipeline candidates. There are no major developments to report. They've had no layoffs, no fundraising, and no commentary on an IPO. In fact, they're hiring — CEO Michael DeCesare even tried to <a href="https://www.linkedin.com/feed/update/urn:li:activity:6938250243943661568/?updateEntityUrn=urn%3Ali%3Afs_feedUpdate%3A%28V2%2Curn%3Ali%3Aactivity%3A6938250243943661568%29&ref=content.strategyofsecurity.com">recruit Tesla employees on LinkedIn</a>.</p>
<p>DeCesare heavily implied before the downturn that an IPO would happen but that it wasn't a top priority. If an IPO wasn't a top priority then, it <em>definitely</em> isn't now.</p>
<p>The interesting part about Exabeam is revisiting this statement from DeCesare:</p>
<blockquote>
<p>“We have a chance to be to cyber what ServiceNow is to the services market — the unification, the ability to create a CMDB and sit on top of your service system, your ticketing systems — that’s the real estate we occupy.”</p>
</blockquote>
<p>Looking at it in the context of today, it means acquisitions and product expansion. Exabeam has only acquired one company to date (SkyFormation in 2019). However, decreased valuations create opportunities to acquire companies at favorable prices.</p>
<p>Exabeam has raised a total of $393 million, which is enough to make some smaller acquisitions before they IPO. Don't expect an IPO soon, but Exabeam could become an active strategic buyer in the near-term.</p>
<h3 id="illumio">Illumio</h3>
<p>Illumio is another "wait patiently" company, but this time we have updates! CEO and co-founder Andrew Rubin gave some <a href="https://www.sdxcentral.com/articles/news/illumio-rides-microsegmentation-new-wave-no-ipo-rush/2022/03/?ref=content.strategyofsecurity.com">fairly detailed commentary</a> in March 2022. This quote says it all:</p>
<blockquote>
<p>"I don’t have to worry about day in and day out what is the right date for that to happen. Because there’s no market pressure and there’s no funding pressure, and those are usually the two things that would drive an answer of we’re gonna do it this week or next week or next quarter."</p>
</blockquote>
<p>I also thought this quote was insightful, particularly the prediction that <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#microsegmentation">microsegmentation</a> is a big enough category in tech to have a public company:</p>
<blockquote>
<p>"I think that journey is playing itself out. Even though the segmentation category is still in its early stage, there is zero doubt in my mind that whoever emerges in that space as the category and market leader will become and be a public company."</p>
</blockquote>
<p>Aside from commentary, there isn't much business-related news with Illumio — no layoffs or funding. Again, no news is probably good news.</p>
<h3 id="lacework">Lacework</h3>
<p>Of all the companies in the cybersecurity IPO pipeline, Lacework has probably received the highest amount of negative press. They suffered an unfortunate combination of circumstances — a massive $1.3 billion funding event in 2021, aggressive hiring and growth, and subsequent layoffs:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Just in: <a href="https://twitter.com/Lacework?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">@Lacework</a> - data-driven security platform for the cloud - lays off ~300 employees, about 20% of staff today.<br><br>The layoffs come 6 months after the company raised $1.8B, valued at $8.3B.<br><br>Some people let go were hired 1-2 months ago. Company yet to post an announcement.</p>— Gergely Orosz (@GergelyOrosz) <a href="https://twitter.com/GergelyOrosz/status/1529575067117658112?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">May 25, 2022</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>Despite the drama that ensued from the broader tech world, Lacework still appears to be in a good position. Sure, a 20% workforce cut stings — but they still raised $1.3 billion in capital under favorable conditions. Assuming they're able to responsibly invest and prolong this money, they'll recover well on the other side of the downturn.</p>
<h3 id="netskope">Netskope</h3>
<p>Netskope is content to wait things out on an IPO. Here's a <a href="https://www.bizjournals.com/sanjose/news/2021/07/09/netskope-raises-300m-plans-ipo-next.html?ref=content.strategyofsecurity.com">good quote</a> from CEO and founder Sanjay Beri in 2021:</p>
<blockquote>
<p>"We frankly weren’t looking for capital, and we feel that we could have been public now. But this will help us to grow fast as a private company and invest in R&amp;D. Our next move, though, will be an IPO."</p>
</blockquote>
<p>Based on publicly available information, I agree with the "could have been public now" assessment. Netskope's post-money valuation as of their Series H round in July 2021 was $7.5 billion, among the highest of private cybersecurity companies.</p>
<p>Time will tell if it's a good thing Netskope remained a private company instead of going public last year. Regret is definitely possible — it may take years for markets to return to 2021 levels. Regardless, Netskope is likely to be one of the first cybersecurity IPOs once activity resumes.</p>
<h3 id="pindrop">Pindrop</h3>
<p>Pindrop is in an interesting position. They've historically been in the "wait patiently" group of companies, with one important twist: they haven't raised any capital since 2018.</p>
<p>Most other companies in the IPO pipeline raised large rounds in 2021. 3+ years is a long time for a high growth company to go without raising capital. Either they're a highly profitable business, or they're in a tricky spot with raising capital or going public at a lower valuation than they'd like.</p>
<p>I said this about the bear case for Pindrop's IPO when covering the company in January:</p>
<blockquote>
<p>Contact center platforms like Talkdesk are growing quickly (Talkdesk is currently <a href="https://www.talkdesk.com/news-and-press/press-releases/talkdesk-raises-series-d-funding/?ref=content.strategyofsecurity.com">valued at $10 billion</a>). These platforms <a href="https://www.talkdesk.com/contact-center-platform/security-compliance/authentication-identity-management/?ref=content.strategyofsecurity.com">already have</a> or will develop authentication features to include natively. The question for Pindrop is whether voice-based security is a standalone product or a feature within larger contact center platforms.</p>
</blockquote>
<p>Looking at this strategic dilemma in the context of today's economic environment and duration since fundraising, it's fair to say Pindrop could be an acquisition target. That's purely speculation on my part — just an observation that several of the common ingredients for an acquisition are present.</p>
<p>That said, Pindrop has been hiring high profile executives, including <a href="https://www.streetinsider.com/Business+Wire/Pindrop+Welcomes+Marc+Diouane+as+President+and+Chief+Operating+Officer/20521529.html?ref=content.strategyofsecurity.com">Marc Diouane</a> as President and Chief Operating Officer. This comment doesn't sound like a person who's there to help sell the company:</p>
<blockquote>
<p>"Joining Pindrop was an easy decision for me. Voice is a critical part of the fabric of everyday human computer interactions. The widespread use of voice will only accelerate with new applications opportunities. Pindrop is clearly the leader and best positioned to benefit from this trend. I am beyond excited to get started and help Pindrop grow."</p>
</blockquote>
<p>We'll see what happens here. Another financing round or an acquisition seems more probable in 2022 than an IPO.</p>
<h3 id="qomplx">QOMPLX</h3>
<p>QOMPLX was on a treacherous path towards an IPO well before the current market conditions. Here's a quick recap of their previous attempt to go public via SPAC from late 2021:</p>
<blockquote>
<p>QOMPLX <a href="https://www.nasdaq.com/press-release/qomplx-a-leader-in-cloud-native-risk-analytics-elects-to-become-a-public-company?ref=content.strategyofsecurity.com">announced a SPAC</a> in March 2021. As SPACs do, the intent was to take the merged company public that year. They even acquired two companies to round out the company's product portfolio.<br>
<br>
By August, the SPAC <a href="https://www.marketwatch.com/story/spac-tailwind-acquisition-qomplx-call-off-14-billion-merger-citing-market-conditions-2021-08-17?ref=content.strategyofsecurity.com">merger was off</a>. The chairman of the SPAC company stated "market conditions" as the reason the plans were scrapped.<br>
<br>
This was a curious answer since, well, a bunch of other cybersecurity companies managed to go public in 2021 under the same "market conditions." Intuitively, it seems likely there were more factors in play.</p>
</blockquote>
<p>There have been very few updates on the IPO front since. No layoffs have been publicly announced. They raised a small $200,000 financing round from Martinson Ventures in January 2022. The size of the round seems curious for a company that has raised a total of $102 million.</p>
<p>Given the timing of ZeroFox's recent SPAC, I wouldn't be surprised to see QOMPLX try again with a different partner. They could also be an acquisition candidate (again, my speculation). Both seem more likely than an additional round of substantial financing.</p>
<h3 id="snyk">Snyk</h3>
<p>Snyk still looks like one of the top candidates to go public once market conditions improve. The big news since I covered Snyk in January is they've hired Morgan Stanley and Goldman Sachs in preparation for an IPO, as <a href="https://www.reuters.com/technology/cybersecurity-startup-snyk-taps-morgan-stanley-goldman-ipo-sources-2022-03-07/?ref=content.strategyofsecurity.com">reported by Reuters</a>.</p>
<p>The article included a brief comment about timing:</p>
<blockquote>
<p>The timing of the IPO is uncertain given the market volatility fueled by Russia's attack on Ukraine, the sources said. Snyk aspires to double its valuation from its last funding round, the sources added.</p>
</blockquote>
<p>The timing uncertainty is no surprise given everything we've discussed in this article. Doubling their valuation is somewhat of a surprise —&nbsp;especially considering it was $7.92 billion pre-money as of their Series F round in September 2021.</p>
<p>Hiring investment bankers is the headline news, but Snyk has also had minor fundraising and layoff events since January:</p>
<ul>
<li>
<p>According to PitchBook, they raised an undisclosed amount from existing investors in January 2022.</p>
</li>
<li>
<p>They also <a href="https://snyk.io/blog/announcing-organizational-updates-to-better-serve-our-customers/?ref=content.strategyofsecurity.com">announced restructuring and layoffs</a> in June. Changes spanned across product, engineering, and sales that impacted around 5% of their workforce.</p>
</li>
</ul>
<p>Based on the internal memo they shared publicly, the changes appeared to be more about evolving their organizational structure than cost cutting. There was also one important tidbit from an IPO perspective:</p>
<blockquote>
<p>"We’ve accelerated our plans by a full year to become free cash flow positive in 2024."</p>
</blockquote>
<p>With public markets currently prioritizing profitability, accelerating plans by a year is a big deal. Snyk may not end up going public in 2022, but this announcement sets them up well to be a public company in 2023.</p>
<h3 id="tanium">Tanium</h3>
<p>Tanium's path towards an IPO is one of the most mysterious among the companies in the cybersecurity IPO pipeline. Recent articles have <a href="https://www.businessinsider.com/tanium-cybersecurity-firm-exodus-ipo-uncertainty-2021-9?ref=content.strategyofsecurity.com">questioned</a> whether the company will ever go public at all despite solid revenue and growth disclosures.</p>
<p>The company hasn't raised capital since its $150 million Series G round in May 2021. Layoffs have been <a href="https://www.businessinsider.com/tanium-layoffs-senior-product-marketing-2021-8?ref=content.strategyofsecurity.com">reported</a>, including their Chief Marketing Officer and senior product marketing team members.</p>
<p>Tanium's three strategic options appear to be:</p>
<ul>
<li>
<p><strong>Remain Private:</strong> Continue operating as a private company indefinitely, which CEO Orion Hindawi has previously stated he's perfectly content to do.</p>
</li>
<li>
<p><strong>Private Equity Acquisition:</strong> Get acquired by a private equity firm. In the <a href="https://strategyofsecurity.com/p/bravo-thoma-bravo/">era of Thoma Bravo</a> and other large scale private equity acquisitions, anything is possible.</p>
</li>
<li>
<p><strong>Go Public:</strong> IPO when market conditions and valuations are stable enough for a public exit.</p>
</li>
</ul>
<p>Remaining private is the most probable option for Tanium, especially given Hindawi's statements about being content as a private company. I also don't see Tanium's founders as the type of people who would want to work with a private equity firm. Going that route seems unlikely unless they have no other choice.</p>
<h3 id="transmit-security">Transmit Security</h3>
<p>Transmit Security is another member of the "wait patiently" club. Technically, they are still a Series A stage company. Albeit, the largest Series A round ever in cybersecurity...which comes with certain expectations. Co-founder Mickey Boodaei has been clear the company has no planned date for an IPO, even though that's the intended outcome.</p>
<p>They haven't needed capital since raising $543 million in June 2021. Layoffs were <a href="https://www-themarker-com.translate.goog/technation/2022-07-05/ty-article/.premium/00000181-cd88-dd1b-a7d1-efffaa730000?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=wapp&ref=content.strategyofsecurity.com">reported</a> in July that affected 7% of the workforce (27 people). Similar to Snyk, they appear to be an organizational change and not a reaction to market conditions.</p>
<p>We already knew Transmit Security was at an earlier stage of the IPO pipeline than several other cybersecurity companies. Current market conditions don't change that trajectory. I expect Transmit Security to keep building and growing as a private company in 2022 and 2023.</p>
<h2 id="emerging-candidates">Emerging Candidates</h2>
<p>A couple companies have emerged as IPO candidates and probably should have been mentioned in my January 2022 coverage. We're going to talk about them briefly here and get them on the radar for future coverage.</p>
<h3 id="arctic-wolf">Arctic Wolf</h3>
<p>Arctic Wolf is a <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#managed-detection-and-response-mdr">Managed Detection and Response (MDR)</a> company that recently raised a $150 million Series F round at a valuation of $4.3 billion. The company's leadership team has been open about their plans to IPO. President and CEO Nick Schneider told <a href="https://www.sdxcentral.com/articles/news/arctic-wolf-targets-ipo-cloud-security-ma/2022/01/?ref=content.strategyofsecurity.com">SDxCentral</a> in January 2022:</p>
<blockquote>
<p>"We’ve been pretty public that our intent is to go public this year. We’ll do it when the market is right and when the company’s right."</p>
</blockquote>
<p>By February, plans had already cooled off a bit. From <a href="https://www.scmagazine.com/analysis/incident-response/arctic-wolf-backs-off-ipo-talk-looks-to-scale-business?ref=content.strategyofsecurity.com">SC Magazine</a>:</p>
<blockquote>
<p>"We’re continuously evaluating what we would do from a financing perspective, but at this point we’re not commenting on financing plans. I just can’t comment on timing. We’ll continue to look at different avenues for financing. One option is an IPO, but there are other options we can consider and we’ll make that known when we get to that point in time."</p>
</blockquote>
<p>They're certainly not alone in having their IPO plans derailed. The intent is clearly there, so expect plans to resume once markets improve.</p>
<h3 id="optiv">Optiv</h3>
<p>In February 2022, Reuters <a href="https://www.reuters.com/business/finance/exclusive-kkr-explores-sale-or-ipo-cybersecurity-consultant-optiv-sources-2022-02-01/?ref=content.strategyofsecurity.com">reported</a> that private equity firm KKR is exploring options for taking Optiv public:</p>
<blockquote>
<p>Buyout firm KKR &amp; Co Inc (KKR.N) is exploring a sale or an initial public offering for Optiv Security Inc, a U.S. cybersecurity solutions distributor and consultant it controls at a valuation of more than $3 billion, including debt, according to people familiar with the matter.</p>
</blockquote>
<p>The article reported Optiv's annual revenue at $650 million, which is in the range of several other publicly traded cybersecurity companies.</p>
<p>If KKR decides to take Optiv public, they would become the second (or third, depending on when Arctic Wolf goes public) public cybersecurity company that earns most of their revenue from professional services. The only other company is SecureWorks.</p>
<p>KKR has owned Optiv for five years — a typical, but not mandatory — timeline for PE firms to exit holdings. An IPO definitely seems like the probable option here, but KKR may elect to hold longer than planned to get more favorable market conditions.</p>
<h2 id="what-to-expect">What to Expect</h2>
<p>Despite spending 4,000 words analyzing and making predictions about companies in the cybersecurity IPO pipeline, I have no idea what's actually going to happen —&nbsp;at least not with precise accuracy. I'm just a person with a keyboard looking at the same information as everyone else.</p>
<p>In trying to make sense of it all, a few things I've read have resonated with me. That's the perspective I wanted to share here.</p>
<p>The big question is: <em>how long will this downturn last?</em> I found this stat from a recent <a href="https://lyticalventures.com/what-to-do-now-momentum/?ref=content.strategyofsecurity.com">Lytical Ventures report</a> interesting:</p>
<blockquote>
<p>Since World War II, there have been twelve recessions, lasting 10.3 months on average. The ‘Great Recession’ of 2008, allegedly the perfect storm of recessions, lasted eighteen months. The most recent recession, in February 2020, lasted only two months. Data suggests that the average length of recessions is shortening.</p>
</blockquote>
<p>Recessions are a dire topic, but data like this is encouraging. As a person old enough to live through a couple, recessions <em>feel</em> like an eternity. From a long term perspective, 10.3 months isn't <em>that</em> bad. We'll get through it.</p>
<p>Regardless of the exact duration, there are a couple downstream implications of an economic downturn. One is the impact of valuations for pre-IPO companies. This ultimately drives the timing of when IPOs will start happening again. Jason Lemkin gave some perspective on this topic in a recent Twitter reply:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">No one knows<br><br>The tougher part is will folks be OK IPO'ing at current multiples or not<br><br>The IPO market should reopen once we have just a bit more good news<br><br>But valuations may still be half of 2021</p>— Jason ✨2022 SaaStr Annual Sep 13-15 ✨ Lemkin (@jasonlk) <a href="https://twitter.com/jasonlk/status/1549497724621402112?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">July 19, 2022</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>That's the big question for companies in the cybersecurity IPO pipeline — what valuation are they willing to live with? Companies who need additional financing may be forced to take lower valuations if an IPO is the only option. Other companies in the "wait patiently" club can wait until valuations return to a point they're comfortable with.</p>
<p>The other implication is that liquidity flows downhill. Low liquidity in public markets affects strategic buyers and limits their ability to acquire earlier stage companies. This is especially limiting in transactions involving equity. Later stage private companies are in the most difficult position, but the second and third order consequences can affect earlier stage companies.</p>
<p>Bad news aside, there are some flashes of positivity for the current set of companies in cybersecurity's IPO pipeline. Let's hope we're in for a short downturn and the IPO freeze comes to an end.</p>
]]></content:encoded>
            <category>Startups</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/08/v1_-Revisiting-2022-IPO-Pipeline.png"/>
        </item>
        <item>
            <title><![CDATA[The Strategic Impact of Verizon's 2022 Data Breach Investigations Report]]></title>
            <link>https://strategyofsecurity.com/the-strategic-impact-of-verizons-2022-data-breach-investigations-report/</link>
            <guid>62e014bf513e96003d73cbe2</guid>
            <pubDate>Wed, 27 Jul 2022 20:44:22 GMT</pubDate>
            <description><![CDATA[Analyzing the themes and impact of security incidents and breaches from Verizon's 2022 DBIR.]]></description>
            <content:encoded><![CDATA[<p>Look no further than <a href="https://verizon.com/dbir?ref=content.strategyofsecurity.com">Verizon's Data Breach Investigations Report</a> for data about the operational side of security — especially incidents and breaches. Now in its 15th (!!!) year, the report is one of the deepest and most comprehensive sources of information about the threats we face as an industry.</p>
<p>The report is awesome, full stop. Everyone working in and around cybersecurity should read it. That said, it's necessarily long and dense on information — anything less would omit important details and nuances.</p>
<p>At this point, it's safe to say the <a href="https://en.wikipedia.org/wiki/Lindy_effect?ref=content.strategyofsecurity.com">Lindy effect</a> has set in for the Verizon DBIR report. It's incredible that a data set and methodology has continued for so long and exponentially <em>increased</em> in relevance. The report is just now hitting its stride and only keeps getting better.</p>
<p>The opportunity to summarize and interpret the report has created a whole cottage industry of derivative commentary and analysis. This metaphor from Digital Shadows CISO <a href="https://twitter.com/rickhholland?ref=content.strategyofsecurity.com">Rick Holland</a> on the <a href="https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/special-david-thejl-clayton-talks-rolling-your-own-verizon-dbir?ref=content.strategyofsecurity.com">ShadowTalk Threat Intelligence Podcast</a> explains it well:</p>
<blockquote>
<p>It's like a Marvel movie or a Star Wars movie. It's very re-watchable because you'll pick up different things every time you read through it.</p>
</blockquote>
<p>In my view, more discussion is better. There are so many ways to think about and remix the data. Multiple InfoSec professionals looking at the same base dataset, deriving their own meaning, and adding their own perspectives is a powerful phenomenon that's somewhat unique to the Verizon DBIR report.</p>
<p>I've been looking forward to taking my own shot at analyzing and interpreting the data. The release of the 2022 report was the perfect time. I'd love to do it every year.</p>
<p>This time, I'm staying closely aligned to the Results and Analysis section of the report. My hope is for this analysis to make it easier to a side-by-side read of the actual report with some pointed commentary about the impact on business and strategy.</p>
<p>We're going to jump straight into the core of the report. The <em>Results and Analysis</em> section is an extensive, wide-ranging tour de force of the Verizon DBIR dataset. The 15th edition of the DBIR report includes analysis of 914,547 incidents, 234,638 breaches, and 8.9 terabytes of cybersecurity data...<em>wow!</em></p>
<p>The four components of the VERIS model are: Actors, Actions, Assets, and Attributes. The DBIR report also includes a bonus Timeline component. We'll go through all five components individually. Each has its own insights and nuances that are worth spending time on.</p>
<p>Wrangling and making sense of this much data is, unsurprisingly, quite hard. To help create order from the chaos, the Verizon DBIR team aligns this section of the report closely with the VERIS framework <a href="http://veriscommunity.net/incident-desc.html?ref=content.strategyofsecurity.com">incident description</a> model, or A4 threat model. Spending a bit of time understanding the basics of VERIS is a good prerequisite if you have time. Basic fluency with the terms makes a big difference.</p>
<p>There's a lot going on in this report with both data and interpretation — so, buckle up. It's time to go deep on one of the most iconic reports in the industry.</p>
<h2 id="actors">Actors</h2>
<p>The actors section looks at who causes breaches and incidents. Contrary to what we're often told, most breaches result from external parties — not insiders or business partners. Straight from the report:</p>
<blockquote>
<p>Our findings indicate that data compromises are considerably more likely to result from external attacks than from any other source. Nearly three out of four cases yielded evidence pointing outside the victim organization.</p>
</blockquote>
<p>Despite all the chatter and hyperbole about insider threats, the report shows a clear trend about external threats. The authors' blunt description is the perfect summary:</p>
<blockquote>
<p>Most data thieves are professional criminals deliberately trying to steal information they can turn into cash.</p>
</blockquote>
<p>Yes, there are other people and motivations that lead to breaches. Those are the exception, not the rule. The results aren't even close:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/07/1.png" class="kg-image" alt="" loading="lazy" width="1864" height="818" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/07/1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/07/1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/07/1.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/07/1.png 1864w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Verizon 2022 DBIR Report</span></figcaption></figure><p>The Verizon DBIR report findings directly contradict data from other vendor-produced reports about the percentage of breaches attributable to insiders. It's very confusing, and the confusion makes it difficult to know where to allocate resources to defend your company.</p>
<p>Look at incentives when you're deciding which report to trust. The DBIR data comes from dozens of different sources. It's not perfect, but there is no larger or more diversified set of cybersecurity incident data in the world.</p>
<p>Further complicating the situation, Verizon's DBIR data has an interesting plot twist. Even though most breaches are caused by external parties, the relative impact of insider breaches is <em>much</em> greater — over ten times greater, to be (somewhat) precise:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/07/2.png" class="kg-image" alt="" loading="lazy" width="616" height="900" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/07/2.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/07/2.png 616w"><figcaption><span style="white-space: pre-wrap;">Source: Verizon 2022 DBIR Report</span></figcaption></figure><p>Partner breaches involve a much higher number of compromised records than external breaches, too. Even though external breaches happen at a higher <em>frequency</em>, internal and partner breaches have a much greater impact when they occur.</p>
<p>Motives are also interesting to look at. This conclusion is far more clear —&nbsp;threat actors are motivated by financial gains:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/07/3.png" class="kg-image" alt="" loading="lazy" width="1190" height="598" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/07/3.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/07/3.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/07/3.png 1190w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Verizon 2022 DBIR Report</span></figcaption></figure><p>Hacktivism does happen, particularly in larger organizations. However, the overwhelming motive is money. This conclusion isn't surprising — it just puts data behind something most of us intuitively know.</p>
<p>The tricky part is that attackers aren't always after money directly. Bank accounts and credit cards are always an attractive target because they are directly related to money. However, it's often easier to exploit other types of assets and turn them into money. For example, customer data can be sold, or data can be ransomed. The motive is still money, but threat actors are devious about how they get it.</p>
<p>Unfortunately, there's no way to put a nice, tidy bow on threat actors. The conclusion we should make is that external, internal, and partner threat actors all matter, and they're probably after money. The best we can do is to implement controls around all three types of threat actors with a slant towards the company's financial resources.</p>
<h2 id="actions">Actions</h2>
<p>The Verizon DBIR report's classification of actions is interesting because it gives structure to the methods used to carry out attacks. This is both incredibly hard to do and incredibly valuable when finished.</p>
<p>It's a <em>lot</em> easier to classify actors because they're people: insiders, partners, and outsiders — done. Classifying the myriad ways attackers cause incidents and breaches is a lot more nebulous.</p>
<p>The data in this year's report reinforced some consistent, long-running themes. Attackers compromising and gaining control of remote access has been a central theme for years. The recent, exponential increase in remote work has just created new opportunities for attackers in an area we already knew was a problem.</p>
<p>This theme lends credibility to recent attention and financing activity in remote access and secure networking. A few recent examples:</p>
<ul>
<li>
<p>Teleport <a href="https://techcrunch.com/2022/05/03/2309618/?ref=content.strategyofsecurity.com">raised a $110 million Series C</a> at a $1.1 billion post-money valuation in May.</p>
</li>
<li>
<p>BastionZero was <a href="https://www.bastionzero.com/rsa-2022?ref=content.strategyofsecurity.com">named the runner-up</a> for the RSAC Innovation Sandbox Contest in April.</p>
</li>
<li>
<p>Firezone and Netmaker were unveiled as members of <a href="https://strategyofsecurity.com/p/y-combinators-winter-2022-cybersecurity-privacy-and-trust-startups/">Y Combinator's Winter 2022 class</a> at Demo Day in March.</p>
</li>
</ul>
<p>Denial of Service (DoS) and credential stuffing attacks against web applications are also repeat offenders. The data makes an important distinction clear: DoS attacks cause a lot of incidents (46% of the total), but <em>not</em> a lot of breaches. In other words, they're an annoyance that impacts operations and availability more than security.</p>
<p>The theme for breaches is both commonality and diversity. The report states that <em>"73% of breach varieties are found in the top 10 varieties"</em> — a lot of commonality considering how many ways a breach can happen. However, the report's "Other" category is a kitchen sink of causes that accounts for ~30% of breaches. That's a lot of diversity bundled together, and it shows how murky the picture still is.</p>
<p>Use of stolen credentials (e.g. attackers stealing legitimate username and password combinations to log in directly) is a common attack and the leading cause of breaches. It's closely paired with credential stuffing, which is a brute-force attempt to gain access using stolen credentials. We've known about this problem for a long time.</p>
<p><a href="https://fidoalliance.org/apple-google-and-microsoft-commit-to-expanded-support-for-fido-standard-to-accelerate-availability-of-passwordless-sign-ins/?ref=content.strategyofsecurity.com">Recent developments</a> around passwordless authentication (WebAuthn and Passkeys, specifically) gives us a glimmer of hope about a real solution. There's a lot of chatter and nuance about passwordless that creates confusion about its viability as a solution, but let's ignore the drama for a second.</p>
<p>The strategic takeaway is this: attackers using stolen credentials to gain access is much, much less likely to happen with WebAuthn (Passkeys). Increasing adoption of WebAuthn by consumers and businesses makes a direct impact on reducing the frequency of this type of attack. As an industry, we need to lean into passwordless and make it happen.</p>
<p>The overall story for actions is persistence. We know what causes most incidents and breaches. Creating and implementing solutions to reduce or eliminate them is a much longer road. There are viable solutions out there, and we'll get to them with consistent effort and patience.</p>
<h2 id="assets">Assets</h2>
<p>Data about which assets are being attacked is useful because it helps security practitioners know what to defend. <em>(Note: It's also useful for investors because it's an indicator about which companies are solving the most important security problems.)</em> The report describes assets like this:</p>
<blockquote>
<p>Assets are the THING that the Action happens to. So, this is where you find WHAT was hacked via an exploit, WHO was socially engineered by an attacker or WHAT was lost or stolen.</p>
</blockquote>
<p>The data is explicitly clear: bad actors attack servers more than anything else. A <em>lot</em> more — like, 80% of the time:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/07/4.png" class="kg-image" alt="" loading="lazy" width="606" height="1014" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/07/4.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/07/4.png 606w"><figcaption><span style="white-space: pre-wrap;">Source: Verizon 2022 DBIR Report</span></figcaption></figure><p>The frequency and volume of attacks on servers will be surprising to some, especially given the emphasis of public markets on <a href="https://strategyofsecurity.com/p/earnings-crowdstrike-and-sentinelone-2022-annual-earnings-recap/">endpoint security companies</a>. With the shift to cloud computing, "servers" can roughly be translated to "cloud workloads" — and that has important strategic implications.</p>
<p>Endpoint security is important, but this data could be interpreted as overwhelming evidence in support of emerging Cloud Security Posture Management (CSPM) and Cloud Workload Protection (CWP) companies. When <a href="https://strategyofsecurity.com/p/crowdstrike-and-the-bundling-of-cybersecurity/">discussing CrowdStrike</a> last year, I said this about emerging CSPM and CWP companies:</p>
<blockquote>
<p>Endpoint computing isn't going away any time soon. However, the number of assets to protect is growing more quickly in the cloud. Well-funded cloud startups like <a href="https://www.wiz.io/?ref=content.strategyofsecurity.com">Wiz</a> and <a href="https://orca.security/?ref=content.strategyofsecurity.com">Orca Security</a> are rapidly gaining traction and building great products. The competition in this part of the cybersecurity ecosystem is intense.</p>
</blockquote>
<p>As this DBIR data shows, protecting servers and cloud workloads is critical for both organizations and companies in the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#endpoint-security">endpoint security market</a>.</p>
<p>The report's data about asset varieties is also insightful. In a preview of the Incident Classification Patterns we'll be discussing later, web application and mail servers get attacked a lot. Desktop and laptop endpoints do too, but not nearly at the same frequency as servers:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/07/5.png" class="kg-image" alt="" loading="lazy" width="656" height="1166" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/07/5.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/07/5.png 656w"><figcaption><span style="white-space: pre-wrap;">Source: Verizon 2022 DBIR Report</span></figcaption></figure><p>The big takeaway from the Verizon DBIR report about assets is that Internet-facing servers get attacked far more than anything else. Longer term, this gets even more complicated as more server workloads move to cloud providers. Based on the data, investments should be focused on protecting servers no matter where they live.</p>
<h2 id="attributes">Attributes</h2>
<p>In the Verizon DBIR report, attributes are used to describe the type of data that is compromised in breaches. Here's the data from the report, which includes figures from both 2008 and a trend from 2017-2021:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/07/6.png" class="kg-image" alt="" loading="lazy" width="1202" height="1308" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/07/6.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/07/6.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/07/6.png 1202w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Verizon 2022 DBIR Report</span></figcaption></figure><p>A notable part about the trend of attributes is the decline in payment card data over time. It's still high, but a ~60% decline in a decade (including a ~10% decline in the past two years) is a meaningful change.</p>
<p>Why did this decline happen? Based on the data, I think it's fair to say <a href="https://www.pcisecuritystandards.org/?ref=content.strategyofsecurity.com">PCI DSS</a> has worked. The standard isn't perfect, but it's hard to argue with data like this. Companies had to make significant financial investments over this period to be compliant (especially Level 1 merchants), but the results are paying off.</p>
<p>Ironically, we can't seem to do the same for people. Digital identities, inclusive of both personal data and authentication credentials, are neck-and-neck for the most frequently compromised data variety. Both lead other varieties by a wide margin.</p>
<p>I'm curious to see if privacy regulations make an impact on breaches of personal data over time. Privacy regulations are on a much earlier timeline than payment card standards. PCI DSS version 1.0 is <a href="https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard?ref=content.strategyofsecurity.com#History">eighteen years old</a> now. Privacy regulations like GDPR have only been enforceable since 2018. What will this chart look like in 10-15 years?</p>
<p>The actionable trend from the attributes section of the Verizon DBIR report is to focus on protecting personal data and credentials. Protecting personal data likely overlaps with existing privacy projects organizations have been working on. Protecting credentials is hard, but it's on the verge of becoming easier with recent <a href="https://fidoalliance.org/multi-device-fido-credentials/?ref=content.strategyofsecurity.com">convergence around passkeys</a>. There's a lot to look forward to in this area of the report over time.</p>
<h2 id="timeline">Timeline</h2>
<p>Finally, the Verizon DBIR report includes a small section about breach timelines. Here's the core chart:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/07/7.png" class="kg-image" alt="" loading="lazy" width="1192" height="642" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/07/7.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/07/7.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/07/7.png 1192w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Verizon 2022 DBIR Report</span></figcaption></figure><p>The cruel irony about the report's timeline data is that it looks good for bad reasons. Companies find out about breaches because attackers disclose the breach first:</p>
<blockquote>
<p>The top Discovery Method for breaches (more than 50%) is now “Actor Disclosure” (normally either on the asset in the form of a ransomware note or on a criminal forum to sell the data or announce the breach). Neither of which is desirable.</p>
</blockquote>
<p>That's one way to shorten the discovery timeline... but clearly not what we want to happen. Unfortunately, what we want doesn't matter.</p>
<p>The strategic impact of this data is that companies need to be prepared for unexpected public disclosure of breaches. The odds of this happening are basically 50/50. This means "soft" exercises like incident response tabletops, public relations communications, and more matter.</p>
<p>Another insightful observation is the amount of steps threat actors take to breach a company. Most breaches are accomplished in five or fewer steps:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/07/8.png" class="kg-image" alt="" loading="lazy" width="1522" height="778" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/07/8.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/07/8.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/07/8.png 1522w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Verizon 2022 DBIR Report</span></figcaption></figure><p>The report's recommendation is to prioritize lengthening the attack path, which is good advice. Reframing this conclusion slightly (in my own words): most threat actors go after low hanging fruit, so to speak. If an attack is going to take more than five steps, it's probably not worth the effort. They'll give up unless the incentives for proceeding make it worthwhile to continue.</p>
<p>Finally, this section of the report goes into the overall value chain for breaches. This is one of the newer parts of the report — the data has only been collected for two years. It's also one of the most interesting parts. It feels like this section will be much larger in the future and could even be a report on its own.</p>
<p>Why is the entire value chain for breaches important? Because breaches aren't isolated incidents — they take preparation to execute, and they feed off each other:</p>
<blockquote>
<p>...an attacker ecosystem exists both before and after the breach, and it plays into and feeds off of the incident.<br>
<br>
It often seems that breaches beget more breaches, creating a Circle of Breach so to speak.</p>
</blockquote>
<p>I also liked this analogy from the report about how to think about breaches:</p>
<blockquote>
<p>The takeaway is not to think of breaches only in terms of starting or ending. Instead, think of them like you might think of a sports team: they are either on the field or preparing to be.</p>
</blockquote>
<p>People focus a lot of their attention on breaches themselves. It's totally reasonable — breaches are often major events that grab news headlines and create ripple effects throughout the industry. If we take a step back, though, the bigger picture is just as important. We need to look at the end-to-end value chain if we're going to make a meaningful reduction in breaches and cybercrime.</p>
<p>Understanding the cybercriminal ecosystem is one of the first steps. An adjacent (but relevant) project is the World Economic Forum's <a href="https://www.weforum.org/agenda/2022/05/disrupting-cybercrime-networks/?ref=content.strategyofsecurity.com">Cybercrime ATLAS</a> research. The objective is to understand and map the ecosystem to help direct actions and resources. If you want to take a deeper dive, the project was discussed in detail by a <a href="https://www.rsaconference.com/usa/agenda/session/Mapping%20the%20Cybercriminal%20Ecosystem?ref=content.strategyofsecurity.com">panel at RSA Conference 2022</a> (paywalled, replay available for attendees and digital passes).</p>
<p>The value chain data in the Verizon DBIR report is incredibly useful, especially with a relatively short history compared to other data points in the report. Continued collection and analysis of data over time, combined with macro-level ecosystem research like the Cybercrime ATLAS project, is an exciting development to watch.</p>
<h2 id="long-term-trends-and-conclusions">Long-Term Trends and Conclusions</h2>
<p>If you look at the Verizon DBIR report year after year, it's clear that many trends and observations from the report repeat themselves. The authors fully embrace this and use it to provide excellent commentary and look backs at previous reports.</p>
<p>The recurring themes are:</p>
<ul>
<li>
<p>Data compromises result from external attacks.</p>
</li>
<li>
<p>The primary motive behind cybercrime is financial gain.</p>
</li>
<li>
<p>Most breaches are caused by stolen credentials, ransomware, and phishing.</p>
</li>
<li>
<p>Servers are attacked far more than any other asset.</p>
</li>
<li>
<p>Credentials and personal data are the most frequently targeted data types.</p>
</li>
</ul>
<p>On one hand, it's troubling that the same themes keep coming up. A pessimist would say that we just can't seem to fix problems we've known about for years. There's some truth to that point of view, but I see it differently.</p>
<p>Cybersecurity is a classic definition of a <a href="https://en.wikipedia.org/wiki/Wicked_problem?ref=content.strategyofsecurity.com">wicked problem</a>. It has no solution because it's so complex and intertwined. Framed that way, it's <em>encouraging</em> that trends about our problems have remained relatively stable for years.</p>
<p>Securing our organizations and ourselves is a <a href="https://strategyofsecurity.com/p/what-is-security/">difficult enough problem</a> already. Knowing what our challenges are and how to face them should give us some solace, even if they're impossible to fully solve.</p>
<p>The heroic effort by the Verizon DBIR team to quantify and explain our problems in a manageable, actionable way is one of the most valuable and impactful contributions in the history of our industry. I'm excited to cover the 2023 report in even more depth next year.</p>
<hr><p><em>Thank you to the DBIR Team: Gabriel Bassett, C. David Hylender, Philippe Langlois, Alex Pinto, and Suzanne Widup for producing yet another amazing report for all of us to learn from. Your work over the years is appreciated.</em></p>
]]></content:encoded>
            <category>Security Strategy</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/07/Verizon-DBIR-2022.png"/>
        </item>
        <item>
            <title><![CDATA[SYN Ventures and the Specialization of Cybersecurity Venture Capital]]></title>
            <link>https://strategyofsecurity.com/syn-ventures-and-the-specialization-of-cybersecurity-venture-capital/</link>
            <guid>62ba0975513e96003d73c952</guid>
            <pubDate>Thu, 30 Jun 2022 17:05:00 GMT</pubDate>
            <description><![CDATA[A deep dive into SYN Ventures and the rise of specialist venture capital funds within the cybersecurity ecosystem.]]></description>
            <content:encoded><![CDATA[<p>The venture capital dynamics in cybersecurity are shifting, and SYN Ventures is a force among the new class of sector specialists. You may have seen the recent news: SYN <a href="https://www.businesswire.com/news/home/20220525005231/en/Cybersecurity-Focused-SYN-Ventures-Closes-300-Million-Fund-II?ref=content.strategyofsecurity.com">announced</a> its $300 million Fund II on May 25, 2022 — less than a year after its $200 million debut fund.  Half a billion in total capital is big news, but we're on to something even bigger here.</p>
<p>SYN is redefining the model for venture capital firms in cybersecurity. There's a lot behind this statement. We'll spend most of the article unpacking it in detail. The TL;DR is moving far, far beyond <em>"Let me know how I can be helpful..."</em> to, well, actually <em>being</em> helpful in specific ways for cybersecurity-focused companies.</p>
<p>In this article, we're going to take a deep dive into both the macro-level changes in venture capital and the micro-level details of SYN's forward-thinking approach to cybersecurity investing. Topics we'll cover include:</p>
<ul>
<li>
<p><strong>Agglomerators vs. Specialists in Venture Capital:</strong> Exploring Nikhil Basu Trivedi's abstraction of venture capital models.</p>
</li>
<li>
<p><strong>Cybersecurity Sector Specialization:</strong> A summary of venture capital specialist funds in the cybersecurity ecosystem.</p>
</li>
<li>
<p><strong>Value Creation Cycle:</strong> The magic behind SYN Ventures —&nbsp;a mutually reinforcing value cycle among investors, founders, and CISOs.</p>
</li>
<li>
<p><strong>Evolution:</strong> The evolution from Blackstone to ClearSky Security to SYN Ventures.</p>
</li>
<li>
<p><strong>Portfolio Construction:</strong> How SYN invests and operates as a sector specialist.</p>
</li>
<li>
<p><strong>Fund II, Specialists, and Beyond:</strong> What's next for SYN, other cybersecurity sector specialist firms, and cybersecurity startups exploring funding options.</p>
</li>
</ul>
<p>Ultimately, the meaning behind all of this is a choice cybersecurity founders have to make about which investors to work with and who they want on their company's cap table.</p>
<p>There isn't one right answer. However, understanding the choices that are available and the dynamics that are in play can make a dramatic impact on the outcome of a company.</p>
<p>We'll start by taking a look at the macro view and narrow it down from there.</p>
<h2 id="venture-capital-agglomerators-vs-specialists">Venture Capital: Agglomerators vs. Specialists</h2>
<p>To truly understand the genius of SYN, we need to zoom way out and look at what's happening in overall venture capital markets today. Nikhil Basu Trivedi wrote an <a href="https://nbt.substack.com/p/agglomerators-vs-specialists?ref=content.strategyofsecurity.com">iconic piece</a> entitled <em>Agglomerators vs. Specialists</em>. The article explains the difference between the two classes of venture capital firms — exactly the starting point we need for this analysis.</p>
<p>The general concept behind <em>Agglomerators vs. Specialists</em> is based on Ben Thompson's <a href="https://stratechery.com/concept/aggregation-theory/?ref=content.strategyofsecurity.com">Aggregation Theory</a>. I <a href="https://strategyofsecurity.com/p/an-intro-to-consolidation-and-aggregation-in-cybersecurity/">recently explored</a> this concept in the context of cybersecurity companies, but the theory is broadly applicable. For this discussion, it's safe to use the terms "Agglomerator" and "Aggregator" interchangeably.</p>
<p>In the context of venture capital, Nikhil Basu Trivedi defines agglomerator firms like this:</p>
<blockquote>
<p>They invest at every stage, across every sector, and they are becoming larger in fund sizes and in teams. They offer many different products to both founders and limited partners (LPs) under one roof.</p>
</blockquote>
<p>Venture capital firms in the "agglomerators" category function much like the aggregators in Thompson's Aggregation Theory: they have a unique level of control over both the supply of capital (from LPs) and demand for capital (from startups).</p>
<p>Conversely, here's how Nikhil Basu Trivedi defines specialist firms:</p>
<blockquote>
<p>On the other side are the specialist firms, either by sector, or by stage, or both. They offer specialized products to founders and to LPs.</p>
</blockquote>
<p>Unlike agglomerator firms, specialist firms are intentionally focused. Focus inherently means smaller fund sizes, portfolios, and investment teams. Although this <em>could</em> sound like an obvious disadvantage on the surface, specialist funds can use focus to their advantage and offer value to portfolio companies in ways that are hard to match at scale.</p>
<p>Both models have advantages and disadvantages. The right answer depends on what a company is looking for with investor involvement, capital, exit size and type, timing, and more. My objective here isn't to tell founders what to do — it's to look at what's happening on a macro level and provide a unique perspective into the inner workings of a specialist firm.</p>
<p>Visually, Nikhil Basu Trivedi's model looks like this:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/06/nbt-agglomerators-vs-specialists.png" class="kg-image" alt="" loading="lazy" width="2000" height="1125" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/06/nbt-agglomerators-vs-specialists.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/06/nbt-agglomerators-vs-specialists.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/06/nbt-agglomerators-vs-specialists.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/06/nbt-agglomerators-vs-specialists.png 2400w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Source: Next Big Thing, Agglomerators vs. Specialists</em></i></figcaption></figure><p>Firms in the top right quadrant are agglomerators. Firms in the other three quadrants are specialists of varying types, either by stage, sector, or both. The examples above are illustrative for venture capital across the entire tech sector.</p>
<p>Where venture capital deviates from the Aggregation Theory model is asymmetric outcomes. Capital is commoditized (a dollar from VC Firm 1 is literally worth the same as a dollar from VC Firm 2). However, the relationships, advice, judgment, and everything else that comes with capital is not. That's why asymmetric outcomes happen —&nbsp;the unique combination of capital, execution, and myriad other factors that result in a company's success or failure.</p>
<p>Agglomerators and specialists have two different approaches to the same objective: generating the best possible outcomes from their investments. As Nikhil Basu Trivedi discusses in his article, it's still too early to tell which investment model is going to win in the long term.</p>
<p>For us, the most interesting part is looking under the hood at how venture capital specialization works in cybersecurity and how SYN is making it happen. That's where we're headed next.</p>
<h2 id="sector-specialization-cybersecurity-funds">Sector Specialization: Cybersecurity Funds</h2>
<p>Two years into the current decade, venture capital specialization is an emerging theme within the cybersecurity ecosystem. The emergence of new cybersecurity-focused firms and a total of over $2 billion in capital raised from LPs is definitive data to back this trend.</p>
<p>Chris Behrens, a Principal at SYN Ventures, summarized the explosion in capital raised by cybersecurity-only VC funds in 2022 alone:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Cybersecurity-only VC funds raised so far this year:<br><br>- Ten Eleven: $600m<br>- YL Ventures: $400m<br>- SYN Ventures: $300m<br>- Cyberstarts: $200m <br><br>$1.5b of fresh capital 🤩</p>— Chris Behrens (@CrispAarons) <a href="https://twitter.com/CrispAarons/status/1532773646648938498?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">June 3, 2022</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>Rewinding back to 2020 and 2021, two notable cybersecurity-focused firms also raised large funds:</p>
<ul>
<li>
<p>NightDragon: <a href="https://www.prnewswire.com/news-releases/nightdragon-closes-750m-growth-fund-as-part-of-next-generation-cybersecurity-safety-security-and-privacy-platform-301340695.html?ref=content.strategyofsecurity.com">$750 million</a> (NightDragon Growth I, 2021)</p>
</li>
<li>
<p>ForgePoint: <a href="https://www.prnewswire.com/news-releases/forgepoint-capital-raises-450-million-cybersecurity-focused-fund-301007276.html?ref=content.strategyofsecurity.com">$450 million</a> (Forgepoint Cybersecurity Fund II, 2020)</p>
</li>
</ul>
<p>That's another $1.2 billion on top of the fresh $1.5 billion in capital raised in 2022. In combination, the total is <em>at least</em> $2.7 billion.</p>
<p>Remember, I'm being <em>super stingy</em> about this calculation. The firms behind the math are strictly cybersecurity-focused firms. When broadened to firms that invest in cybersecurity and other industries, the total number is obviously much larger.</p>
<p>My purist stance is to illustrate a point: the new generation of sector specialists in cybersecurity has raised a lot more capital than most people realize. This is a meaningful milestone because it legitimizes the movement towards specialization in cybersecurity venture capital.</p>
<p>This is where things get even more interesting. Now that we've established specialist funds are a legitimate force in cybersecurity, it's time to go deeper on how one of the best funds operates. Welcome to SYN Ventures.</p>
<h2 id="value-creation-cycle-founders-cisos-and-leadership-team">Value Creation Cycle: Founders, CISOs, and Leadership Team</h2>
<p>To understand the genius of SYN, we first need to look at the value creation cycle the founding partners have spent over 20 years creating. The model transcends any particular fund or investment that SYN does. It's one of the enduring ingredients to the success of the firm — and more importantly — the founders they work with.</p>
<p>Jay Leek and Patrick Heim are both former CISOs at companies ranging from Fortune 9 (McKesson), to Blackstone (managing $170b AUM when Jay joined in 2012), to tech companies and startups (Salesforce and Dropbox). On top of their world-class practitioner credentials, they're equally accomplished investors at Blackstone, ClearSky Security, and now SYN Ventures.</p>
<p>Without question, the founding partners bring a unique combination of skills, experience, and relationships to the firm. What matters more, though, is how they put all of this to use. SYN's polymathic cybersecurity investor-practitioner specialization allows them to bring cybersecurity leaders into the picture as true equals in the value creation cycle.</p>
<p>The standard model in venture capital is a bi-directional relationship between investors and founders. Expanding the circle and creating value for cybersecurity leaders, a critical stakeholder in the overall equation, makes a massive difference for everyone involved. A truly balanced system of value creation across three stakeholders is nearly impossible to create, and certainly not something that can be done overnight.</p>
<p>Let's unpack SYN's value creation model in detail and explain all of the moving parts. The value for each of the three stakeholders deserves further explanation. We'll start with CISOs — the linchpin of SYN Ventures.</p>
<h3 id="cisos">CISOs</h3>
<p>CISOs want to work with the SYN Ventures team and portfolio companies because of peer connections and access to innovation. SYN has built has a powerful network effect that's still underrated by many people today.</p>
<p>SYN's network exists because CISOs want to collaborate with other CISOs. That may seem obvious, but it's only possible under a unique set of circumstances. Plenty of people <em>want</em> to create a network of the top CISOs in the world. Few people <em>have</em> the trust and permission to do it. SYN Ventures is one of the rare places that does.</p>
<p>The core of SYN's network is a CISO board of advisors. Members of the board aren't publicly disclosed, but it's an eclectic mix of leaders that range from large enterprises to high-growth tech companies.</p>
<p>The mix is important because it helps peer CISOs openly share experiences and learn from each other about what's being done in companies at varying levels of maturity and scale. SYN's focus on quality over quantity also matters. The objective is to have a small group of CISOs that is deeply engaged instead of a large group with lower engagement and less camaraderie.</p>
<p>The board of advisors gets together in person 2-4 times per year alongside SYN portfolio companies and curated speakers to talk on a loose agenda, build relationships, and understand each other's challenges. Participation in the advisory board is a way for CISOs to see what's happening in the most cutting edge environments.</p>
<p>The idea of access to innovation may seem nebulous, but it's highly functional in practice. For a CISO, the hard part about finding innovative new companies to work with isn't discovery — it's filtering. CISOs get bombarded by companies all the time. How do they separate the signal from the noise and narrow down who they should pay attention to? That's where the SYN Ventures team steps in.</p>
<p>Direct access to venture partners who are also CISO practitioners is a clear benefit. Having a trusted advisor who understands both sides of the table just an email or phone call away is very nice to have amid a CISO's daily chaos.</p>
<p>The collaboration goes deeper, though. The SYN team methodically keeps a pulse on the priorities and challenges for each CISO in their network. The relationship isn't just a one-way broadcast of portfolio companies to every CISO in the network. It's a nuanced and highly tailored matching process.</p>
<p>That's how the magic of filtering works. The SYN team can sit in between CISOs and companies, understand the needs and benefits of both, and make introductions when a clear benefit exists for everyone involved. Instead of directly talking with hundreds of companies per year, they get a curated list via the unique lens SYN has of the entire ecosystem.</p>
<p>Being part of a network that's carefully managed and maintained by the SYN Ventures team is incredibly valuable for CISOs. The value speaks for itself — connections and access to innovation makes participation a clear win.</p>
<h3 id="founders">Founders</h3>
<p>Founders want to work with SYN because of the value their CISO network and practitioner experience brings. At a macro level, venture capital firms can typically help founders with three things:</p>
<ul>
<li>
<p><strong>Capital:</strong> Making direct investments in the current round and recruiting follow-on investors for later rounds.</p>
</li>
<li>
<p><strong>Recruiting:</strong> Helping companies hire engineers, sales teams, leaders, and more.</p>
</li>
<li>
<p><strong>Customers:</strong> Generating leads, finding early customers, and increasing ARR more quickly than a company could do on its own.</p>
</li>
</ul>
<p>Providing capital is essentially table stakes. SYN has plenty of that already. The value the SYN team focuses on is helping portfolio companies find more customers.</p>
<p>The results of SYN's customer focus are phenomenal. According to Jay Leek, SYN typically represents a material portion of new ARR in the first 12 to 24 months after they invest in a company. That's...<em>a lot</em> of revenue gain for early stage companies during a critical period of growth.</p>
<p>Why and how this revenue growth happens is important. Most security products are sold through top-down, CISO-led sales. As a result, sales are large with a high annual contract value (ACV).</p>
<p>I have <a href="https://strategyofsecurity.com/p/hashicorps-ipo-bottom-up-adoption-and-layering">previously written about</a> the emerging model of bottom-up, product-led growth in cybersecurity companies (HashiCorp, in this example). While a bottom-up growth model is possible, it's also a nascent and emerging sales model that's incredibly difficult and time-consuming to pull off.</p>
<p>If a company doesn't already have an intentional bottom-up growth strategy with the groundwork and traction to make it possible, the only other option for growth is the traditional top-down model. That's <em>totally fine</em> — most security software gets sold this way. It's also the reason having SYN on the cap table makes a ton of sense.</p>
<p>The "how" part of SYN's customer focus happens in a couple different ways. Direct introductions to CISOs is the obvious one. That's where the value of having a strong and healthy CISO network makes a <em>huuuuuuuge</em> difference. A warm introduction that directly addresses known challenges a CISO is having makes for a much easier sale.</p>
<p>The less obvious (but equally valuable) contribution is the SYN team putting their CISO-practitioner hats back on. They use their experience to help companies understand customer problems, align messaging and value propositions, and get more deals done.</p>
<p>As a founder, having people with extensive CISO experience on your side is hugely valuable for understanding what customers want, prioritizing features, crafting marketing messages, making sales, and more.</p>
<h3 id="leadership-team">Leadership Team</h3>
<p>If all goes well, the value SYN's team creates for CISOs and founders comes back around to its partners and LPs in the form of returns. That's the thesis SYN and ClearSky Security were built on, and it's proving out nicely so far.</p>
<p>The three-way value creation model helps a lot when making investment decisions. Growing a large CISO network and keeping a pulse on their objectives helps the investment team at SYN know what's relevant and top of mind for CISOs. When an investment opportunity aligns directly with a CISO priority they've heard first-hand, the decision to invest (and the probability of a successful return) becomes a lot more clear.</p>
<p>Operational experience as CISO practitioners also makes a huge difference. As CISOs, Jay and Patrick have deployed half a billion dollars in security technologies. When you've lived the pain of running a security organization and implementing products, your judgment about when a product is useful or not becomes quite discerning. It also helps founders of the companies they invest in to avoid the perils and pitfalls you can only learn by doing.</p>
<p>SYN's executive team, venture partners, and investment team are equally as impressive. The benefit of having two CISO practitioners as founding partners is that other experienced practitioners want to work with them. SYN's leadership team is packed full of iconic cybersecurity executives, a few of which include:</p>
<ul>
<li>
<p><a href="https://www.linkedin.com/in/art-coviello-jr-366b97114/?ref=content.strategyofsecurity.com">Art Coviello</a>, Former Executive Chairman and CEO at RSA, Board Member at Synchrony Financial (NYSE: SYF), Tenable (NASDAQ: TENB), Mandiant (NASDAQ: MNDT), Cybereason</p>
</li>
<li>
<p><a href="https://www.linkedin.com/in/ryanpermeh/?ref=content.strategyofsecurity.com">Ryan Permeh</a>, Co-Founder and former Chief Scientist at Cylance, former Chief Scientist at McAfee</p>
</li>
<li>
<p><a href="https://www.linkedin.com/in/burnsdan/?ref=content.strategyofsecurity.com">Dan Burns</a>, Co-founder and former CEO at Optiv</p>
</li>
<li>
<p><a href="https://www.mandiant.com/company/leadership/john-watters?ref=content.strategyofsecurity.com">John Watters</a>, President and COO at Mandiant</p>
</li>
<li>
<p><a href="https://www.linkedin.com/in/pradeepaswani/?ref=content.strategyofsecurity.com">Pradeep Aswani</a>, Entrepreneur and investor with multiple exits (Cloud Harmonics, Securematics, VPN Dynamics, HPN, OneSecure)</p>
</li>
<li>
<p><a href="https://www.linkedin.com/in/adrian-peters-4736592/?ref=content.strategyofsecurity.com">Adrian Peters</a>, CISO at Vista Equity Partners</p>
</li>
</ul>
<p>Another unexpected outcome of having operational expertise, a world-class senior leadership team, and a network of CISOs is that <em>other</em> venture capital firms want to include SYN in their cybersecurity company investment rounds. Including SYN is a no-brainer when they bring so much more than just capital.</p>
<p>Lastly, the SYN team is clearly committed to the model they've spent decades creating. When talking with Jay Leek, the commitment was obvious. I heard "we're in this for the long-term" several times throughout the discussion.</p>
<p>Why do they have this level of commitment and conviction? The founders and operating partners are all security people to the core. Security isn't some adopted industry they're investing in alongside other sectors. Security is part of who they are — something they've built their careers around. They reached the highest possible levels as practitioners. I'd bet they will reach the highest possible levels as investors, too.</p>
<p>Now that we've covered the inner workings of SYN's value creation cycle and stakeholders, let's take a deeper dive into how the model has evolved over time.</p>
<h2 id="evolution-blackstone-clearsky-security-and-syn-ventures">Evolution: Blackstone, ClearSky Security, and SYN Ventures</h2>
<p>The evolution of what we're seeing today with SYN Ventures is an important part of the overall story. If you look at SYN in isolation without connecting a few dots, you might brush it off as a brand new fund still figuring things out. That would be a mistake.</p>
<p>SYN Ventures itself is just under two years old, but its roots are much, much deeper. Don't think of SYN as the new venture capital firm on the block — think of it as the best iteration yet of a model that's already been working for years.</p>
<p>Jay Leek has been investing in cybersecurity companies since 2012, starting during his time at Blackstone. He met Patrick in 2014 while leading an investment round in Cylance (Patrick was the lead independent director on the board). They started investing together when ClearSky Security was founded in early 2017. The path from Blackstone to ClearSky Security led to their current iteration with SYN Ventures.</p>
<p>Connecting the dots along this path is important, both qualitatively and quantitatively. Qualitatively, ClearSky Security was the first and only fund with two former Fortune 500 CISOs as full-time venture partners. This was still the case when SYN Ventures Fund I was raised in 2021. As of Fund II, SYN is still the only CISO-founded venture capital fund. Other venture capital funds have added former Fortune 500 CISOs to their venture teams, but SYN remains the only fund with two.</p>
<p>Quantitatively, things get even more interesting when we add PitchBook data into the mix. Together, ClearSky Security and SYN Ventures are the most active investors (by total number of investments) in cybersecurity over the past five years.</p>
<p>They have made a combined total of 46 investments in cybersecurity companies, including 17 from SYN Ventures Fund I. That's more cybersecurity investments than any other venture capital firm, including the largest agglomerator firms with billions in capital.</p>
<p>Investments are great, but exits are what matters. According to PitchBook, ClearSky Security's cybersecurity portfolio has had 17 exits in the past five years. A few of the exits include <a href="https://strategyofsecurity.com/p/the-mirage-of-mandiant/">Mandiant (Google)</a>, Cylance (BlackBerry), Accurics (Tenable), CloudKnox (Microsoft), and <a href="https://strategyofsecurity.com/p/crowdstrike-and-the-bundling-of-cybersecurity">Preempt (CrowdStrike)</a>.</p>
<p>An important caveat: I didn't include Blackstone data in the count of exits. Broadly speaking, adding the data would put the SYN team close to the top among all venture capital firms for number of cybersecurity exits during this time.</p>
<p>When measuring the success of an investor, these are really, really important data points. The data amounts to this: the founders of SYN Ventures are the most active investors by volume with among the highest number of exits by quantity.</p>
<p>We're still early in the story of cybersecurity sector specialist firms. However, we're far enough along to start seeing a few indications of results. There aren't many firms who have as strong of a record as SYN on both sides of the investment and exit equation.</p>
<p>How does the SYN team create such successful results? Next, we'll look further into how they construct their portfolio and choose companies to invest in.</p>
<h2 id="portfolio-construction-the-top-two-percent">Portfolio Construction: The Top Two Percent</h2>
<p>Let's get straight to the punch line: SYN gets to invest in the top cybersecurity startups in the world. That's the opportunity they have as a group of long-time practitioners and investors with an extensive network within cybersecurity. They see a lot of companies and have the judgment and experience to know how to selectively pick the best ones.</p>
<p>Putting data behind this selectivity, SYN invests in less than 2% of the companies they meet. As with all venture capital firms, a lot of factors play into the overall investment rate — things like timing, valuation, co-investors, and more always play a role in investment decisions.</p>
<p>On top of that, though, the team's expertise as cybersecurity practitioners plays a major role. When you're looking at an investment decision through the lens of a senior cybersecurity leader, the pitches just sound <em>different</em>. Things like the problem being solved, value, differentiators, tech, team, and more are a lot more relatable when they're based on direct experience. It's what allows the non-obvious winners to get identified.</p>
<p>This discerning level of judgment is also a huge advantage for founders who work with SYN: if they choose to invest in a company, you know they believe in what you're doing and are going to do everything they can to help your company win.</p>
<p>The tangible result of SYN's approach to portfolio construction is an excellent set of <a href="https://www.synventures.com/portfolio-companies/?ref=content.strategyofsecurity.com">portfolio companies</a>. As expected, a majority of companies the portfolio from Fund I are seed and Series A companies. A few early stage examples include <a href="https://www.halcyon.ai/?ref=content.strategyofsecurity.com">Halcyon</a>, <a href="https://www.revelstoke.io/?ref=content.strategyofsecurity.com">Revelstoke</a>, and <a href="https://www.sevcosecurity.com/?ref=content.strategyofsecurity.com">Sevco Security</a>. SYN's portfolio also includes Transmit Security, a company I covered while discussing <a href="https://strategyofsecurity.com/p/cybersecuritys-2022-ipo-pipeline-part-2/">cybersecurity's IPO pipeline</a>.</p>
<p>Bigger picture, the benefit of sector specialization is focus. I've spent a lot of time explaining how huge the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/">cybersecurity ecosystem</a> truly is. However, the day-to-day deal flow for new cybersecurity investment opportunities is surprisingly manageable.</p>
<p>According to PitchBook data, there have been 1,912 total investments in cybersecurity companies across all stages in the past five years. That's an average of 380 deals per year during this period. Total investments vary by year, with an uptick in recent years. 2021 alone had 942 investments.</p>
<p>That's not to say specializing in cybersecurity investments is easy, but it's possible. A high level of fluency in cybersecurity like the team at SYN has makes it much more possible. They can cover a ton of ground as a relatively small firm because they're focused.</p>
<p>In addition to being sector-focused, most of their investments are typically in Series A rounds (with an occasional seed round or Series B). Specializing in early stage capital is another layer of filtering that keeps their target set of companies focused.</p>
<p>There are plenty of great companies, founders, and qualified investment opportunities in cybersecurity alone. The challenges we face as an industry aren't getting any easier. We need to keep innovating and keep building new and better solutions to the problems we face. Expect SYN Ventures to be leading the way.</p>
<h2 id="future-syn-ventures-fund-ii-specialists-and-beyond">Future: SYN Ventures Fund II, Specialists, and Beyond</h2>
<p>The future for SYN Ventures is deceptively simple: keep doing what's working. I say "deceptively simple" because it's <em>super complex</em> to build the highly specialized firm you see today — as we've just methodically explored.</p>
<p>Even with $300 million in new capital for SYN Ventures Fund II, the plan is to continue executing the same value creation model and approach to portfolio construction. The team expects to continue investing in less than 2% of the companies they meet — a healthy number that has been consistent for the entire evolution of their investments.</p>
<p>I expect Fund II is where we will start seeing SYN's three-way value creation cycle start to pay off. The current iteration of the model is just over a year old, even though many of the underlying relationships span a much longer period. The additional level of intention and detail about the process should make a huge difference with both investment decisions and the acceleration of growth SYN can bring to companies they invest in.</p>
<p>Bigger picture, challenging periods like the current economic environment are going to put the agglomerator and specialist models to the test. SYN Ventures is a fascinating case study for the future of venture capital, both within cybersecurity and tech in general. We're approaching a crux with the model for venture capital:</p>
<ul>
<li>
<p>Will large agglomerator funds become the norm?</p>
</li>
<li>
<p>Is focused sector and/or stage specialization a better model?</p>
</li>
<li>
<p>Can both models productively co-exist?</p>
</li>
</ul>
<p>In bull markets, it's hard to tell who the real winners are. A lot of companies and their investors look good when cybersecurity M&amp;A volume and deal size is at a record level (according to <a href="https://momentumcyber.com/cybersecurity-almanac-2022/?ref=content.strategyofsecurity.com">Momentum Cyber</a>, 2021 saw a record of 286 transactions for $77.5 billion in aggregate disclosed value, including 14 deals valued over $1 billion).</p>
<p>In the near-term, I expect large agglomerator funds could be impacted more by economic challenges than specialist funds, especially in cybersecurity. Why? Agglomerator funds rely on large exits to generate returns because of their size. Many of the largest returns happen when portfolio companies IPO.</p>
<p>Unfortunately, cybersecurity is facing a dilemma with current market conditions colliding with a previously healthy <a href="https://strategyofsecurity.com/p/cybersecuritys-2022-ipo-pipeline-part-1/">IPO</a> <a href="https://strategyofsecurity.com/p/cybersecuritys-2022-ipo-pipeline-part-2/">pipeline</a>. We're a victim of our own success — a lot of great cybersecurity companies have been built in the past decade. Now was supposed to be the time for a sustained run of IPOs and large strategic exits. Instead, we're in a holding pattern of uncertainty.</p>
<p>This uncertainty works against agglomerator funds more than it does against specialist funds. Based on <a href="https://momentumcyber.com/docs/Yearly/2022_Cybersecurity_Almanac_Public_Edition.pdf?ref=content.strategyofsecurity.com">Momentum Cyber research</a>, 54.2% of security companies sold for less than 100 million, and only 24.2% sold for more than 300 million in the past five years. In general, exits of that frequency and size are more aligned with the focus and expected returns of specialist funds.</p>
<p>All of this feels like a roller coaster at times — both entertaining and gut-wrenching. We'll get through it over time. I expect the most consistent, focused, and capable companies and investors will be in the best position on the other side. SYN Ventures is exactly that, and they're playing the long game. It's an exciting story to follow as Fund II and beyond unfold.</p>
<hr><p><em>Thank you to Jay Leek, Patrick Heim, and Chris Behrens for giving me an inside tour of SYN Ventures and reviewing drafts of this article.</em></p>]]></content:encoded>
            <category>Venture Capital</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/06/Logo_-SYN-Ventures.png"/>
        </item>
        <item>
            <title><![CDATA[Momentum Cyber RSA Conference 2022 Recap]]></title>
            <link>https://strategyofsecurity.com/momentum-cyber-rsa-conference-2022-recap/</link>
            <guid>62b6244b3c8631003dff78fb</guid>
            <pubDate>Mon, 27 Jun 2022 13:05:00 GMT</pubDate>
            <description><![CDATA[Recapping the trends and highlights from RSA Conference 2022 with Momentum Cyber.]]></description>
            <content:encoded><![CDATA[<p>I'm back to publishing and happy to share a couple new collaborations I've been working on this month. I'll be back again later in the week with another deep dive article.</p><h2 id="momentum-cyber-rsa-conference-2022-recap">Momentum Cyber RSA Conference 2022 Recap</h2><p>The Momentum Cyber RSA Conference 2022 Recap was released on Friday. It's a recap of trends and highlights from a few of the great sessions and events from the week. </p><p>I was a contributor for this year's coverage, the first time the firm has done a special report on the conference. </p><p>I'm also excited to share that I've been working with the Momentum Cyber team as a Senior Advisor. This report is the first of many more to come!</p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://www.linkedin.com/pulse/momentum-cyber-rsa-conference-2022-recap-dino-boukouris/?trackingId=GD4%2Bt20hQSe7k%2BS6TrxVZg%3D%3D&ref=content.strategyofsecurity.com"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Momentum Cyber | RSA Conference 2022 Recap</div><div class="kg-bookmark-description">In case you missed it, we just released Momentum Cyber’s RSA Conference 2022 Recap. We had an incredible time seeing everyone in San Francisco at this year’s RSA Conference.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://static-exp2.licdn.com/sc/h/al2o9zrvru7aqj8e1x2rzsrca" alt=""><span class="kg-bookmark-author">LinkedIn</span><span class="kg-bookmark-publisher">Dino Boukouris</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://media-exp2.licdn.com/dms/image/D4E12AQFu6HRs3eisxg/article-cover_image-shrink_720_1280/0/1655962280431?e&#x3D;1661385600&amp;v&#x3D;beta&amp;t&#x3D;x4laf0o73Ig9-e9ITK4NoJtgKcEylihCwYxl6TQ9Ef8" alt=""></div></a></figure><h2 id="twitter-spaces-cloud-securitycurrent-landscape-future-implications-for-investors">Twitter Spaces: Cloud Security - Current Landscape &amp; Future Implications for Investors</h2><p>I joined <a href="https://twitter.com/investianalyst/?ref=content.strategyofsecurity.com">Francis Odum</a> and the team at <a href="https://www.convequity.com/?ref=content.strategyofsecurity.com">Convequity</a> for a (nearly two hour!) discussion on Twitter Spaces about a ton of cybersecurity topics.</p><p>We covered current public market developments, strategic drivers for cybersecurity as an industry, cloud security trends, and more.</p><p>Here's a link to the replay:</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">We’ll be discussing the vibrant cloud security market with <a href="https://twitter.com/InvestiAnalyst?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">@InvestiAnalyst</a> and how the current landscape will affect capital raising and investing.<br><br> <a href="https://t.co/ZpHNecOS0M?ref=content.strategyofsecurity.com">https://t.co/ZpHNecOS0M</a></p>&mdash; Convequity (@convequity) <a href="https://twitter.com/convequity/status/1538734639367475200?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">June 20, 2022</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure>]]></content:encoded>
            <category>Events</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/06/Momentum-Cyber.png"/>
        </item>
        <item>
            <title><![CDATA[BalkanID and the Evolution of Access Governance]]></title>
            <link>https://strategyofsecurity.com/balkanid-and-the-evolution-of-access-governance/</link>
            <guid>628fa6a310a26f003d2f8054</guid>
            <pubDate>Tue, 31 May 2022 12:05:00 GMT</pubDate>
            <description><![CDATA[A deeper look into BalkanID's product launch and the dawn of a new era for access governance.]]></description>
            <content:encoded><![CDATA[<p>A new era of access governance is upon us, and BalkanID is one of the companies who is making it happen. On May 12, 2022, BalkanID emerged from stealth, <a href="https://www.balkan.id/post/balkanid-unveils-ai-powered-identity-governance-and-administration-solution-for-saas-and-public-cloud-environments?ref=content.strategyofsecurity.com">announcing</a> its new <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#identity-governance-and-administration-iga">Identity Governance and Administration (IGA)</a> platform and $5.75M in seed funding.</p>
<p>It's an interesting time in this part of the cybersecurity ecosystem. IGA has been relatively stable within the five years following <a href="https://investors.sailpoint.com/news/2017/16-11-2017?ref=content.strategyofsecurity.com">SailPoint's 2017 IPO</a>. Since then, SailPoint has commanded the market with relatively few attempts at competition.</p>
<p>That's starting to change in 2022. A slew of financing and M&amp;A activity in IGA signals new competition and potential reshaping of the IGA market and beyond:</p>
<ul>
<li>
<p>SailPoint was recently <a href="https://strategyofsecurity.com/p/bravo-thoma-bravo/">acquired by Thoma Bravo</a>.</p>
</li>
<li>
<p>Outside of the traditional IGA space, CrowdStrike and SentinelOne <a href="https://strategyofsecurity.com/p/earnings-crowdstrike-and-sentinelone-2022-annual-earnings-recap/">both made acquisitions</a> in the adjacent Identity Protection market.</p>
</li>
<li>
<p>BalkanID emerged from stealth and announced its seed round.</p>
</li>
<li>
<p>Pathlock <a href="https://pathlock.com/merger/?ref=content.strategyofsecurity.com">raised a $200 million growth round</a> and immediately used it to acquire two companies and merge with two others.</p>
</li>
</ul>
<p><em>Game on!</em> With all of this activity and the launch of BalkanID, a brand new startup, it's a good time to take a look into IGA and sort out exactly what's happening here.</p>
<p>Today, we're going to narrow our focus even more and take a deep dive into access governance through the lens of BalkanID. To me, this approach feels like seeing the problem space and market through a fresh set of eyes. A few topics we will cover include:</p>
<ul>
<li>
<p><strong>The Grind of Access Governance:</strong> What's hard about access governance today and where we currently stand as an industry.</p>
</li>
<li>
<p><strong>Revisiting Access Governance:</strong> Why access governance needs a revisit, and how BalkanID is going about it.</p>
</li>
<li>
<p><strong>Moving From Regulation-Driven to Security-Driven Access Governance:</strong> How changing incentives can change an organization's approach to access governance.</p>
</li>
<li>
<p><strong>Access Governance Is Going AI-First:</strong> The need for augmentation in gccess governance, and why this market is ready for an AI-first company.</p>
</li>
<li>
<p><strong>The Future of Access Governance and BalkanID:</strong> A long-term view about where the market is headed and how BalkanID fits in.</p>
</li>
</ul>
<p>It's time for a fresh look at one of the most foundational (and painful) topics in cybersecurity. Let's get going.</p>
<h2 id="the-grind-of-access-governance">The Grind of Access Governance</h2>
<p>First, let's just call a spade a spade: access governance is a <em>grind.</em> Executing access reviews quarter-over-quarter for years on end is incredibly tedious — a Sisyphean task, if there ever was one.</p>
<p>In the era of regulatory-driven compliance, periodic user access reviews have been the primary mechanism for carrying out access governance. Access reviews work like this:</p>
<ul>
<li>
<p>Companies perform risk assessments of applications and infrastructure, along with the entitlements within them, to identify in-scope systems and high risk access.</p>
</li>
<li>
<p>Every quarter (or annually...some pre-defined time interval), access review campaigns are kicked off. Multiple reviewers spring into action (or get dragged into it by their compliance teams) and spend hours reviewing, approving, modifying, or denying access to in-scope systems.</p>
</li>
<li>
<p>Once completed, auditors verify the results to make sure the decisions made by the reviewers are accurate and basic mistakes aren't made — things like disabling access for terminated employees or giving the CFO administrative access to production.</p>
</li>
</ul>
<p>IGA platforms help ease the burden for larger enterprises that have the means to implement and use them. Entitlement data is automatically synced, and access reviews happen via pre-defined workflows. Less fortunate companies are relegated to spreadsheets, manual processes, and Jira tickets — another layer of tedium on top of an already monotonous job.</p>
<p>Regardless of the approach a company takes, a knowledgable human reviewing and approving or denying access is both a laborious and necessary part of the process. Judgment is required to know whether the access someone has is appropriate or not.</p>
<p>From an ecosystem perspective, access governance is an under-served problem space in cybersecurity. Yes, SailPoint is a nice product and successful company. Many other companies have also been offering access governance products for years. These products do the job for compliance. However, let's take a step back here and ask ourselves the hard question: <em>are they really improving security?</em></p>
<p>If we're being brutally honest with ourselves, the answer is no. A <a href="https://www.paloaltonetworks.com/prisma/unit42-cloud-threat-research-volume-six?ref=content.strategyofsecurity.com">recent report</a> by the esteemed Unit42 at Palo Alto Networks found that 99% of cloud users, roles, services, and resources had excessive permissions. Ultimately, this and other identity-related factors led to misconfigured identities causing 65% of cloud security incidents. Other reports like <a href="https://www.verizon.com/dbir?ref=content.strategyofsecurity.com">Verizon's Data Breach Investigations Report</a> have reached similar conclusions.</p>
<p>To be clear, that observation is <em>nothing against</em> SailPoint or any other access governance product on the market today. Access control is just a devastatingly difficult problem to manage that far exceeds the capabilities of most humans who manage it.</p>
<p>If people <em>have</em> to be involved in access governance, how do we make it more enjoyable and effective for them to carry out the task? We'll get to that in the next section.</p>
<h2 id="revisiting-access-governance">Revisiting Access Governance</h2>
<p>As BalkanID CEO Subbu Rama said when I spoke with him, <em>"access governance needs a revisit."</em> I wholeheartedly agree, as evidenced by the few hundred words I just spent commiserating about the current state.</p>
<p>Convincing someone that access governance needs a revisit isn't that difficult or interesting, though — especially anyone who is routinely on the receiving end of an access review. The more interesting part is <em>how</em> to go about revisiting access governance. That's what we're focused on in this section.</p>
<p>There are three important distinctions to make about exactly what BalkanID does and the customers they focus on:</p>
<ul>
<li>
<p>The product is focused on the identity and access <em>governance</em> side of the equation, not <em>management</em> (yet).</p>
</li>
<li>
<p>Integrated applications for access reviews are focused on commonly used SaaS applications and cloud platforms, not on-premise access (this is still supported via API integrations or CSV uploads, though).</p>
</li>
<li>
<p>At this stage of the company, their ideal customer is mid-market companies with 250 employees or more.</p>
</li>
</ul>
<p>These may seem like odd choices. However, a narrow(er) focus on product, integrations, and customers is important — especially for an early stage company.</p>
<p>Why? Access governance isn't actually narrow at all. A startup and its product could become very large doing this alone, especially at enterprise scale. To solve the problem (and build a big company in the process), a startup needs to start with a logical subset of market and features and expand from there.</p>
<p>The answer for how to revisit access governance is not <em>"people need to work harder and do a better job at access reviews."</em> Rubber-stamping definitely happens, but let's be empathetic and focus our blame on the problem, not the people.</p>
<p>The problem is that managing and reviewing access is too hard. There is too much data and information for any reasonable person to handle. That's where better tools come in — they need to augment humans and make the job easier. Executing this grandiose vision at a tactical product level is the key to progress in this area of the cybersecurity ecosystem. It's also an opportunity to unlock a deceptively large market.</p>
<p>I've been exploring the topic of access governance for a long time. Nearly a decade ago, I was the anonymous subject of a <a href="https://techcrunch.com/2012/12/02/how-to-get-people-to-do-things-they-dont-want-to-do/?ref=content.strategyofsecurity.com">TechCrunch article</a> written by <a href="https://nirandfar.com/?ref=content.strategyofsecurity.com">Nir Eyal</a>. Nir is an expert on behavioral design and habit-forming technologies. The article was based on a conversation we had about how to incentivize people to do things they don't want to do.</p>
<p>When posing my dilemma to Nir, the specific example I gave was... you guessed it: access reviews. The entire article is worth a read because it details his recommendations step-by-step. In case you're short on time, we'll walk through the main points here and connect the dots with what BalkanID is doing.</p>
<p>At an abstract level, tasks like access reviews (and anything under the umbrella of access governance, really) are an act of convincing others to do uninteresting tasks. In our case, access reviews are infrequent and involve work done outside normal responsibilities. The article makes three specific recommendations to improve results for this type of task.</p>
<p>First, stage tasks into conquerable chunks. <a href="https://en.wikipedia.org/wiki/Progressive_disclosure?ref=content.strategyofsecurity.com">Progressive disclosure</a> is the fancy, formal term for this. Traditional access reviews often bury reviewers with spreadsheets that are thousands of lines long. BalkanID is far more dynamic. It's incredibly simple to kick off a focused access review on the fly based on a powerful set of filters.</p>
<p>Second, demonstrate progress. People want to know when the pain will end, and they want it to hurt less the next time. BalkanID uses a combination of expert systems and artificial intelligence to incrementally train the system each time an access review is completed. The next time around, everything becomes smarter and more accurate: identifying outliers, flagging high risk access, identifying account ownership, and more.</p>
<p>Finally, reinforce good behaviors with autonomy and rewards. Part of this recommendation is an organizational change. BalkanID isn't going to hand out bonuses or happy hours — that's up to you. However, it does give users the autonomy to explore access, export data for special purpose projects, and slice and dice reporting however you like. The product is more like a business intelligence platform than a security tool.</p>
<p>Although the recommendations <em>seem</em> simple, putting them into action is a significant responsibility. As the article concludes:</p>
<blockquote>
<p>It is the job of the person inflicting the pain to do their utmost to ease it. Not doing so is intellectually lazy... Considering how the receiver could more easily comply with the request is at the heart of inspiring action.</p>
</blockquote>
<p>Thoughtful design is a core part of the user experience for BalkanID. There is a distinct and obvious difference between products designed for the way things <em>should work</em> versus how things <em>actually</em> work. BalkanID is clearly building towards the latter — an access governance product designed for the way people want to use it.</p>
<h2 id="moving-from-regulation-driven-to-security-driven-access-governance">Moving From Regulation-Driven to Security-Driven Access Governance</h2>
<p>In addition to the micro-level psychological and product nuances we just discussed, an important macro-level shift is underway. The move from regulation-driven to security-driven access governance is changing the strategic drivers, incentives, and approach in this part of the ecosystem.</p>
<p><a href="https://twitter.com/nipungupta?ref=content.strategyofsecurity.com">Nipun Gupta</a> recently posed an important question about the role of regulations as the driver of security outcomes:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Such an important yet unique point of view - while regulations were considered a driver once, have they become an inhibitor in achieving practical cyber security outcomes? <br><br>What do you think? <a href="https://t.co/8YyUESpeeE?ref=content.strategyofsecurity.com">https://t.co/8YyUESpeeE</a></p>— Nipun Gupta (@nipungupta) <a href="https://twitter.com/nipungupta/status/1524121353045094400?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">May 10, 2022</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>While the overall answer is nuanced, regulations have reached a point where they are inhibiting the actual security outcomes we want to achieve with access governance.</p>
<p>Few companies would voluntarily do manual access reviews if it wasn't mandated by one or more regulations or compliance requirements. Going from nothing to something is a good thing, but it's also far from an ideal state.</p>
<p>The true outcome we want from access governance is to make sure people have exactly the amount of access they need and nothing more. Put formally, entitlement sprawl is the problem, and least privilege is the objective.</p>
<p>Periodic access reviews are the mechanism we've historically used for (trying to) address the problem and meet the objective. However, there is a huge gap between simply completing an access review and doing it <em>well.</em> Here's the reality:</p>
<ul>
<li>
<p>The way it <em>actually</em> works: Look at in-scope systems, make sure terminated employees don't still have access, double-check administrative roles, move on.</p>
</li>
<li>
<p>The way it <em>should</em> work: reviewers look across all enterprise systems for deviations and excessive access based on a person's day-to-day job responsibilities, reducing unneeded access and refining application roles where needed to achieve least privilege.</p>
</li>
</ul>
<p>Access reviews are just a means to an end. If the objective isn't being achieved, it's time to change the means.</p>
<p>That's exactly what is happening. Forward-thinking CISOs have realized compliance-driven access reviews aren't reducing their overall exposure and risks created by excessive access. Compliance hasn't caught up yet, so access reviews still need to be done. However, companies are proactively taking action.</p>
<p>Identity protection is an emerging area of the cybersecurity ecosystem — a direct result of companies proactively seeking out and remediating access-related risks. CrowdStrike and SentinelOne have both made major identity protection acquisitions within the past year. I analyzed these moves in detail when <a href="https://strategyofsecurity.com/p/earnings-crowdstrike-and-sentinelone-2022-annual-earnings-recap">recapping annual earnings</a> for both companies:</p>
<blockquote>
<p>Bigger picture, CrowdStrike and SentinelOne may have finally figured out how to incorporate useful identity analytics into a product portfolio (and their customers' security programs). This has been an elusive need in the industry.</p>
</blockquote>
<p>SentinelOne CEO Tomer Weingarten nicely summarized the outcome both companies are seeking with their identity protection products:</p>
<blockquote>
<p>Attivo, as part of SentinelOne, will help organizations reduce their attack surface not only at the device level but now at the human identity level, too.</p>
</blockquote>
<p>A similar objective as access governance, but much more proactive. Organizations aren't going to wait around for quarterly access reviews of regulated systems to <em>...hopefully-maybe-fingers-crossed...</em> clean up excessive access. They're going to hunt it down and fix it. That's what reducing the attack surface at the human identity level means.</p>
<p>When analyzing the acquisitions by CrowdStrike and SentinelOne, I made an observation about identity protection being a missed opportunity for traditional Identity and Access Management (IAM) companies:</p>
<blockquote>
<p>Identity protection seems like it could have been a logical product extension for <a href="https://strategyofsecurity.com/p/earnings-identity-and-access-management-2021-annual-earnings-recap/">Identity and Access Management (IAM) companies</a>. Companies like SailPoint have kinda-sorta been <a href="https://www.sailpoint.com/press-releases/sailpoint-lays-vision-next-frontier-identity-identityai/?ref=content.strategyofsecurity.com">working on identity analytics products</a> for a while. For whatever reason, the products didn't stick with customers yet — too early, perhaps?</p>
</blockquote>
<p>We're still in the early innings of identity protection, though. A miss by later-stage companies is an opportunity for BalkanID to correct and capitalize on. That's exactly what Subbu Rama is seeing with early customers. While access reviews are an obvious and primary use case, some customers have been more interested in features that allow them to freely discover and eliminate excessive access.</p>
<p>Discovering entitlement sprawl goes well beyond compliance. It used to be something security professionals knew and never wanted to talk about. Now, it's a necessary part of security, not just an annoying compliance exercise we do every quarter. BalkanID is giving us the tools we need to be compliant while also digging in to do the difficult, security-driven work.</p>
<h2 id="access-governance-is-going-ai-first">Access Governance Is Going AI-First</h2>
<p>Now that we've covered both micro-level techniques and macro-level trends for access governance, it's time to tie everything together and talk about <em>how</em> companies like BalkanID can make all of this possible.</p>
<p>In my article about <a href="https://www.humanlayersecurity.com/blog/the-rise-of-security-augmentation/?ref=content.strategyofsecurity.com">The Rise of Security Augmentation</a> for Human Layer Security, I proposed a few criteria that make tasks a good fit for augmentation:</p>
<blockquote>
<p>Tasks that are both high risk and high urgency should be augmented using a combination of human intelligence and machines. This is the area where both speed and quality matter. Any gains in speed from machines or judgment from humans can make a big difference.</p>
</blockquote>
<p>Visually, various tasks can be plotted within this framework to help determine the type of approach we should use:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/05/Human-Layer-Security2022-03-Cornelia-Li-The-Rise-of-Security-Augmentation-Chart-3.jpeg" class="kg-image" alt="" loading="lazy" width="1003" height="626" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/05/Human-Layer-Security2022-03-Cornelia-Li-The-Rise-of-Security-Augmentation-Chart-3.jpeg 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/05/Human-Layer-Security2022-03-Cornelia-Li-The-Rise-of-Security-Augmentation-Chart-3.jpeg 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/05/Human-Layer-Security2022-03-Cornelia-Li-The-Rise-of-Security-Augmentation-Chart-3.jpeg 1003w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Human Layer Security</span></figcaption></figure><p>Access governance is an obvious candidate for augmentation. Excessive access is high risk — as we discussed earlier, it causes most cloud security incidents. The work to reduce excessive access has become high urgency.</p>
<p>We need to augment humans and increase the speed and quality by which they can find and remediate excessive access. Subbu Rama shared a great thought exercise to explain the challenge of effective access governance <em>without</em> augmentation:</p>
<blockquote>
<p>Let's say we have 1,000 employees in a company and 10 SaaS applications. This is very small, but even with 10, you're now looking at 10,000 entitlements. Obviously, you cannot review all of them.</p>
</blockquote>
<p>This is exactly the problem with access governance at scale. The math starts working against us quickly. It doesn't take long for the task to become unmanageable.</p>
<p>People need help. That's where AI-driven augmentation comes into play. For example, BalkanID uses AI to prioritize the access a reviewer truly needs to look at and highlight potential outliers. There are many other examples just like this one. The potential use cases for augmentation can go on and on.</p>
<p>For the next generation of access governance products, the objective is to drastically increase the level of augmentation and iteratively move towards automation as products, processes, and data mature. Bigger picture, the way we'll get there is as philosophical as it is technical: <em>we need AI-first companies in Identity Governance and Administration (IGA).</em></p>
<p>This isn't marketing or hyperbole. Artificial Intelligence has reached a point where it can (and <em>should</em>) be applied to problems like access governance. Companies takling this problem space today have the advantage of building their products on top of AI infrastructure from cloud providers from day one. They don't need to <em>build</em> AI — they need to <em>apply</em> AI to solve specific challenges in this domain.</p>
<p>Starting as an AI-first company from inception is a meaningfully different approach to building a product than the previous generation of IGA products. The product turns out differently when it's built with AI front and center instead of being added on later — sometimes ten years later.</p>
<p>This is exactly what Subbu Rama is doing with BalkanID. Right now, it's an early stage company. Near-term, this means an intense focus on using expert systems to configure and train the AI-based models behind the BalkanID platform. It's impractical to turn everything over to a deep learning model and expect it to work. Instead, they're going through the rigorous process of calibrating the system to minimize false positives and false negatives.</p>
<p>Baby steps matter. Early AI-based features are small but important wins on the long-term road towards the advancement of access governance. To truly reach the outcomes we seek, we need to balance short-term utility and incremental progress with the long-term commitment and investment required to build more sophisticated AI products.</p>
<h2 id="the-future-of-access-governance-and-balkanid">The Future of Access Governance and BalkanID</h2>
<p>Despite my optimism about the augmented future of access governance, a dose of pragmatism is needed here: we're on a long road towards realizing the ultimate vision. And that's okay.</p>
<p>In the case of BalkanID, patience and long-term commitment might even be a competitive advantage. The company's founders are all experienced entrepreneurs and executives with pragmatic expectations about the timing and path it's going to take to execute the vision. They've had successful exits and leadership roles in the past. This time, it's about doing the work to make lasting change and building a large company in the process.</p>
<p>I worry about any company who enters the market and says it's going to revolutionize access governance overnight. Nearly 20 years after the company was founded, SailPoint is <em>still</em> converting new customers from legacy IGA solutions and moving their own customers from the on-premise product to cloud. Extra capital from Thoma Bravo might help, but we're on a long, slow path regardless of how much capital gets infused.</p>
<p>What's in store for the overall Identity Governance and Administration (IGA) market in the next few years? SailPoint is going to be busy consolidating the existing market. BalkanID is heading up the new wave of companies that's coming next. I'm excited to follow their journey and growth as the market shakes out and evolves.</p>
]]></content:encoded>
            <category>Startups</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/05/Logo_-BalkanID.png"/>
        </item>
        <item>
            <title><![CDATA[An Intro to Consolidation and Aggregation in Cybersecurity]]></title>
            <link>https://strategyofsecurity.com/an-intro-to-consolidation-and-aggregation-in-cybersecurity/</link>
            <guid>627bf1b22e416f004de95142</guid>
            <pubDate>Wed, 11 May 2022 18:08:03 GMT</pubDate>
            <description><![CDATA[Exploring the industry-defining concepts of consolidation and Aggregation Theory within cybersecurity.]]></description>
            <content:encoded><![CDATA[<p>Industry consolidation and <a href="https://stratechery.com/2015/aggregation-theory/?ref=content.strategyofsecurity.com">Aggregation Theory</a> are invisible forces that redefine entire markets. To the untrained eye, the changes they cause look shocking and unexpected. They're not (quite) as shocking if you know what to look for.</p>
<p>Most of the discussion we see about aggregation is at the tech industry level. Stratechery alone has written <a href="https://stratechery.com/concept/aggregation-theory/?ref=content.strategyofsecurity.com">over a dozen articles</a> about aggregators like Facebook, Google, Netflix, Airbnb, and others.</p>
<p>Within cybersecurity, we barely see any discussion at all about Aggregation Theory and how it's impacting the companies within our ecosystem. We do talk about consolidation a bit more, especially in the context of traditional mergers and acquisitions. However, the impact of both topics cannot be overstated. At a macro level, these are essential business concepts to understand.</p>
<p>Concepts like these are squarely at the intersection of strategy and cybersecurity — so, right up my alley. The goal of this article is to interpret and relate these concepts directly to cybersecurity. They need to be more approachable and relatable before they can be widely understood.</p>
<p>This article is an introduction to an ongoing series of discussions about the strategic impact of consolidation and aggregation in cybersecurity. It could have easily been a 10,000 word piece. There's a lot to say and many interesting examples to explore.</p>
<p>Today, we're going to cover:</p>
<ul>
<li>
<p>The relationship and differences between consolidation and aggregation</p>
</li>
<li>
<p>How industry consolidation works, including examples in cybersecurity</p>
</li>
<li>
<p>What Aggregation Theory is and how it's likely to impact the cybersecurity ecosystem</p>
</li>
</ul>
<p>These are intellectually complex (and sometimes mind-bending) topics. I've done my best to balance providing background with cybersecurity-specific examples and discussion. Don't worry if this article takes you some time to read and digest — it took me a long time to write it, too. Let's get to it.</p>
<h2 id="the-relationship-between-consolidation-and-aggregation">The Relationship Between Consolidation and Aggregation</h2>
<p>At an industry level, consolidation and aggregation are two of the major strategic forces that determine how companies and market segments shift over time —&nbsp;whether that's combining, separating, or creating something entirely new.</p>
<p>One of the primary concepts in business strategy (and industry analysis, specifically) is the idea of industry lifecycle stages. Consolidation tends to occur as industries reach later lifecycle stages, so it's worth digging into this idea a bit more.</p>
<p>Every industry follows a pattern, regardless of domain or size. The lifecycle of an industry is sort of like gravity in business — something we should basically accept as science and never attempt to defy. If you find someone (or yourself) thinking that an industry doesn't fit this pattern, you need to be suspicious.</p>
<p>The whole concept of an industry lifecycle can be summarized in a single chart:</p>
<figure class="kg-card kg-image-card kg-width-wide"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/05/Industry-Lifecycle-v1.png" class="kg-image" alt="Industry lifecycle chart." loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/05/Industry-Lifecycle-v1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/05/Industry-Lifecycle-v1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/05/Industry-Lifecycle-v1.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/05/Industry-Lifecycle-v1.png 1921w" sizes="(min-width: 1200px) 1200px"></figure><p>Any industry segment (or company within a segment) can be plotted along the curve. Based on where the plot is, we can expect a generally predictable set of events to happen. The model isn't exact — it's just not reasonable to expect a model to predict the future — but it's incredibly powerful for pointing us in the right direction to connect the dots ourselves.</p>
<p>Specific types of events happen at each lifecycle stage:</p>
<ul>
<li>
<p><strong>Embryonic:</strong> Every new industry starts with a small, fragmented set of companies that are high risk bet. Basically everything is uncertain, including the viability of companies in the new industry. For example, do you know if companies building identity wallets are going to work out? I sure don't.</p>
</li>
<li>
<p><strong>Growth:</strong> As the early-stage companies gain traction and grow, demand and profits start to increase. This is where Product-Market Fit (PMF) happens in tech. The pace is fast, but it's a good place to be as an industry. Companies like Snyk are at this stage right now.</p>
</li>
<li>
<p><strong>Shake out:</strong> Competition increases because the idea has been validated by early stage companies. Growth slows, and competition becomes intense.</p>
</li>
<li>
<p><strong>Mature:</strong> Once industries mature, achieving even single digit year-over-year growth is challenging. However, established companies in successful industries earn repeatable revenue and profits. Consolidation occurs between competitors because joining forces is one of the few ways left to gain market share. It's happening with legacy enterprise security companies like McAfee, Symantec, etc.</p>
</li>
<li>
<p><strong>Decline:</strong> All industries will eventually decline, often after seemingly unrelated technology shifts change the existing business model completely. Industry decline is the territory of newspapers, Kodak, and Blockbuster. We actually haven't experienced it much in cybersecurity yet.</p>
</li>
</ul>
<p>Cybersecurity is no exception —&nbsp;every part of the ecosystem follows industry lifecycle stages just like the rest of the business world.</p>
<p>This is where the idea of <a href="https://strategyofsecurity.com/p/mapping-the-cybersecurity-ecosystem/">cybersecurity being an ecosystem</a> matters. You can analyze cybersecurity as a whole using the industry lifecycle model, but it's a lot more useful to look at specific market segments within cybersecurity instead.</p>
<p>As the quick examples above illustrated, different segments can be at different points of the industry lifecycle, even if they're both part of the cybersecurity ecosystem. We'll discuss some more examples later.</p>
<p>Aggregation Theory is more complex to understand. The theory was developed by Stratechery author Ben Thompson in 2015 and builds on a few  earlier concepts from Clayton Christensen and others. It's now one of the foundational ideas in modern tech strategy.</p>
<p>Here's a concise definition <a href="https://stratechery.com/2017/defining-aggregators/?ref=content.strategyofsecurity.com">straight from Ben Thompson</a>:</p>
<blockquote>
<p>Aggregation Theory describes how platforms (i.e. aggregators) come to dominate the industries in which they compete in a systematic and predictable way.</p>
</blockquote>
<p>The fundamental shift described by Aggregation Theory is a change in the nature of distribution:</p>
<blockquote>
<p>...value has shifted away from companies that control the distribution of scarce resources to those that control demand for abundant ones...</p>
</blockquote>
<p>In the pre-internet era, distribution looked like this:</p>
<figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/05/Aggregation-Theory_-Pre-Internet-v1.png" class="kg-image" alt="Pre-Internet era distribution model." loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/05/Aggregation-Theory_-Pre-Internet-v1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/05/Aggregation-Theory_-Pre-Internet-v1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/05/Aggregation-Theory_-Pre-Internet-v1.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/05/Aggregation-Theory_-Pre-Internet-v1.png 1921w" sizes="(min-width: 1200px) 1200px"><figcaption><span style="white-space: pre-wrap;">Source: Stratechery</span></figcaption></figure><p>With aggregation, the new paradigm looks like this:</p><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/05/Aggregation-Theory_-Aggregated-v1.png" class="kg-image" alt="Aggregation Theory distribution model." loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/05/Aggregation-Theory_-Aggregated-v1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/05/Aggregation-Theory_-Aggregated-v1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/05/Aggregation-Theory_-Aggregated-v1.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/05/Aggregation-Theory_-Aggregated-v1.png 1921w" sizes="(min-width: 1200px) 1200px"><figcaption><span style="white-space: pre-wrap;">Source: Stratechery</span></figcaption></figure><p>The evolution in distribution from control of scarce resources to demand for abundant ones explains many examples of innovation we see today — everything from newspapers and media to hotels and transportation. There is plenty of analysis about aggregation in tech (here's <a href="https://stratechery.com/2015/airbnb-and-the-internet-revolution/?ref=content.strategyofsecurity.com">Stratechery on Airbnb</a>, for example). Nobody talks about Aggregation Theory and cybersecurity, though. It's time to change that, and we'll start later in this article.</p>
<p>Like consolidation, aggregation is a trait that <em>can</em> happen to some companies and industries as they move along the industry lifecyle. It doesn't <em>always</em> happen — in fact, very few companies are true aggregators. However, if a company becomes an aggregator, it's essentially an unstoppable force.</p>
<p>Before we move into specific discussions about consolidation and aggregation, we need to finish by summarizing the relationship between the two concepts. The important difference is this: you can have consolidation without aggregation, and aggregation without consolidation.</p>
<p>Consolidation happens much more frequently than aggregation, and it occurs in more straightforward ways — mostly a flurry of mergers and acquisitions. Aggregation rarely happens, but it has the potential to change everything when it does.</p>
<p>Now that we have the definitions and nuances about consolidation and aggregation defined, it's time to talk about the impact of each in cybersecurity.</p>
<h2 id="consolidation-is-happening-in-cybersecurity">Consolidation Is Happening in Cybersecurity...</h2>
<p>I have discussed the topic of consolidation in a few previous articles, mostly focused on specific companies (like <a href="https://strategyofsecurity.com/p/crowdstrike-and-the-bundling-of-cybersecurity">CrowdStrike</a>) or industry segments (like <a href="https://strategyofsecurity.com/p/themes-from-momentum-cybers-2022-cybersecurity-almanac/">professional services</a>). However, I haven't taken a step back yet to discuss <em>why</em> all of this consolidation is happening. That's the goal for this section.</p>
<p>Ironically, Aggregation Theory is a great way to explain the macro-level drivers behind consolidation. When a company is <em>not</em> an aggregator (remember, most aren't!), their growth slows as they move further along the maturity curve of the traditional industry lifecycle. From <a href="https://stratechery.com/2017/defining-aggregators/?ref=content.strategyofsecurity.com">Stratechery</a>:</p>
<blockquote>
<p>...non-aggregator and non-platform companies face increasing customer acquisition costs as their user base grows. That is because initial customers are often a perfect product-market fit; however, as that fit decreases, the surplus value from the product decreases as well and quickly turns negative.</p>
</blockquote>
<p>Inevitably, this is exactly what happens (or will happen) to most market segments within cybersecurity: growth eventually slows as a companies in the segment start reaching the top end of their Target Addressable Market (TAM). When growth slows, guess what happens? Yep — consolidation.</p>
<p>There is plenty of real world data to back this up. When <a href="https://strategyofsecurity.com/p/themes-from-momentum-cybers-2022-cybersecurity-almanac/">analyzing the findings</a> of Momentum Cyber's 2022 Cybersecurity Almanac, I summarized the likely outcome for companies growing revenue at less than 20% per year:</p>
<blockquote>
<p>Any public cybersecurity company in Momentum Cyber's "low growth" category is fair game for an acquisition or takeover.<br>
<br>
That's the feast or famine world we're living in right now. When public markets value revenue growth above all else, companies have to deliver and produce growth or get acquired and refactored until they can.</p>
</blockquote>
<p>With the recent downturn in public markets, preferences may shift towards profitability and EBITDA over growth. For the purposes of this discussion, what matters is that public or private companies who aren't doing well at whatever investors want — whether that's growth, profitability, or something else — are candidates for consolidation.</p>
<p>When I wrote the Momentum Cyber article in February 2022, these were the numbers for "low growth" companies involved in consolidation discussions:</p>
<blockquote>
<p>Three of the 13 remaining companies in the 2021 "low growth" category (excluding Mimecast, NortonLifeLock, and Avast) are already in M&amp;A talks. That's 23% of the low growth companies, consistent with last year's rate. And there's still a lot of time left in 2022.</p>
</blockquote>
<p>Since then, <a href="https://strategyofsecurity.com/p/the-mirage-of-mandiant/">Mandiant was acquired</a> by Google, <a href="https://www.crn.com/news/channel-programs/kaseya-to-acquire-datto-for-6-2b?ref=content.strategyofsecurity.com">Datto was acquired</a> by Kaseya and <a href="https://strategyofsecurity.com/p/bravo-thoma-bravo">SailPoint was acquired</a> by Thoma Bravo. That's a lot of consolidation in a short period of time. At a macro level, the consolidation happened because each of these companies operates in either the "shake out" or "mature" stage of their respective industry lifecycles.</p>
<p>A little over two months have passed since February, but there's <em>still</em> a lot of time left in 2022. If public markets continue to struggle and private equity funds remain well capitalized, we're going to see a lot more consolidation. Public cybersecurity companies will be taken private, and companies in the <a href="https://strategyofsecurity.com/p/cybersecuritys-2022-ipo-pipeline-part-1/">IPO</a> <a href="https://strategyofsecurity.com/p/cybersecuritys-2022-ipo-pipeline-part-2/">pipeline</a> will exit to private equity or get consolidated into larger tech companies.</p>
<p>Professional services is another classic example of consolidation within mature industry segments. One of the main observations I discussed about Momentum Cyber's 2022 Cybersecurity Almanac was the high volume of M&amp;A activity within cybersecurity professional services:</p>
<blockquote>
<p>Activity is high because mature industries consolidate. Transaction volume is low because services have less leverage than software. Professional services is a mature, low-leverage industry within an otherwise growing and high-leverage cybersecurity ecosystem.</p>
</blockquote>
<p>Explained visually, this is where most cybersecurity professional services companies sit on the industry lifecycle:</p>
<figure class="kg-card kg-image-card kg-width-wide"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/05/Industry-Lifecycle---Professional-Services.png" class="kg-image" alt="Industry lifecycle for cybersecurity professional services." loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/05/Industry-Lifecycle---Professional-Services.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/05/Industry-Lifecycle---Professional-Services.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/05/Industry-Lifecycle---Professional-Services.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/05/Industry-Lifecycle---Professional-Services.png 1921w" sizes="(min-width: 1200px) 1200px"></figure><p>Cybersecurity professional services almost exactly meets the definition of a mature industry segment: little to no growth, consolidation, and high barriers to entry. It's important to remember this is an average across the entire industry. The characteristics of a mature industry will generally hold at an aggregate level, but there are often one-off outliers.</p>
<p>Exceptions start to happen when you change the scope of the industry segment you're looking at. Narrower (or niche) industry segments for specific types of fast-growing professional services see rapid growth and lower barriers to entry.</p>
<p>I run an independent consulting business and certainly didn't feel the barriers to entry were high, but I'm also not competing against Big Four firms for multi-million dollar enterprise cybersecurity projects. That's where strategy comes in — outcomes depend a lot on how you define and approach opportunities in an industry segment.</p>
<p>Zooming back out to the cybersecurity ecosystem level, professional services is somewhat of a negative outlier compared to other parts of the ecosystem. I described it like this:</p>
<blockquote>
<p>The M&amp;A numbers for professional services stand out within the ecosystem because earlier stage sectors don't consolidate as frequently. They're focused on organic growth and making the overall pie bigger. Almost every other sector of the cybersecurity ecosystem is still in the growth stage (or earlier).</p>
</blockquote>
<p>It may have been imprecise to say that almost every other sector is in the growth stage, but it's still fair to say that a lot of them are. This macro-level distinction matters when we're applying the industry lifecycle to the entire cybersecurity ecosystem.</p>
<p>On average, the cybersecurity ecosystem is somewhere between the "growth" and "shake out" stages of the industry lifecycle. That explains a lot — why we're seeing lots of investments, new startups, high valuations, and all the other positive things that come along with being on a high growth trajectory.</p>
<p>Jeremiah Grossman had an interesting observation about consolidation that I wanted to briefly address before moving on to the topic of aggregation. Here's the direct quote from Twitter:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Despite what many say, the InfoSec market never goes through “consolidation." It functions more like a hydra. When a company gobbles up a start-up, 2 more pop-up.</p>— Jeremiah Grossman (@jeremiahg) <a href="https://twitter.com/jeremiahg/status/1520115024848572416?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">April 29, 2022</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>This is interesting because he's right. There are all kinds of examples in cybersecurity — one being the set of authentication companies like <a href="https://stytch.com/?ref=content.strategyofsecurity.com">Stytch</a>, <a href="https://www.hypr.com/?ref=content.strategyofsecurity.com">Hypr</a>, and more that gained momentum (and valuation) after <a href="https://strategyofsecurity.com/p/okta-auth0-q2-2021-results/">Auth0 was acquired by Okta</a>.</p>
<p>Grossman's observation was somewhat absolute (as Twitter does...) but still directionally accurate. In reality, what happens is more nuanced. Consolidation does happen, but it's quickly followed by an emergent set of companies (essentially a new iteration of an industry segment) that solve a similar problem better — or wants to, in hopes of achieving a similar or better outcome as the company that was acquired.</p>
<p>The important takeaway is that dynamic and growth-oriented ecosystems like cybersecurity make things like this possible. When you're operating in an industry that's early in the overall lifecycle, it's possible to have both good exits and opportunities for new companies to fill the void.</p>
<p>That's a fortunate position to be in — especially compared to, say, starting a printed newspaper in 2022. It's advantageous to be building with macro-level tailwinds than going against the grain in a mature or declining industry.</p>
<h2 id="but-aggregation-is-happening-to-cybersecurity">...But Aggregation Is Happening to Cybersecurity</h2>
<p>Consolidation and industry lifecycles are a challenging topic already, but now it's time to <em>really</em> stretch the mind. Aggregation Theory is one of the most powerful concepts in tech and business strategy that relatively few people understand — and even fewer within cybersecurity.</p>
<p>Right now, we're somewhere in the middle of aggregation in cybersecurity. Distribution power is still disaggregated, but many of the ingredients for aggregation exist.</p>
<p>There isn't a pure aggregator in cybersecurity — certainly not in the way of Google, Facebook, Netflix, or any of the tech aggregators that Stratechery talks about. Most cybersecurity companies are subject to this constraint (from Stratechery):</p>
<blockquote>
<p>Any business that creates its customer value in-house is not an aggregator because eventually its customer acquisition costs will limit its growth potential.</p>
</blockquote>
<p>Cybersecurity companies create their customer value in-house. They build products or offer services that are sold to customers (usually businesses). In most cases, there aren't two sets of parties to aggregate. It's a direct supplier to customer relationship. Some companies have a fair amount of control over the customer relationship — particularly those with bottoms-up adoption models — but there isn't serious modularization of suppliers.</p>
<p>For example, cybersecurity professional services companies sell services primarily based on relationships. A buyer at a company wants to hire consultants for a project, so they send out an RFP to a few firms or call someone they know who works at one.</p>
<p>Large cybersecurity consulting firms are powerful in the legacy distribution-based model because they own high-level customer relationships. Having relationships and the scale to navigate enterprise procurement processes is a challenging distribution problem to solve. Controlling this part of the distribution allows firms to sell an outsized amount of services.</p>
<p>In this legacy model, creating a service offering isn't the hard part — it's owning the distribution channel to <em>sell</em> the services that's valuable:</p>
<figure class="kg-card kg-image-card kg-width-wide"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/05/Aggregation-Theory_-Pre-Internet---Professional-Services.png" class="kg-image" alt="Legacy distribution model for professional services in cybersecurity." loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/05/Aggregation-Theory_-Pre-Internet---Professional-Services.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/05/Aggregation-Theory_-Pre-Internet---Professional-Services.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/05/Aggregation-Theory_-Pre-Internet---Professional-Services.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/05/Aggregation-Theory_-Pre-Internet---Professional-Services.png 1921w" sizes="(min-width: 1200px) 1200px"></figure><p>Aggregation Theory turns models like this upside down. When aggregators enter the picture, legacy distribution models get reformed. Aggregators own the customer relationship and commoditize suppliers:</p><figure class="kg-card kg-image-card kg-width-wide"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/05/Aggregation-Theory_-Aggregated-Professional-Services-v1.png" class="kg-image" alt="Aggregation Theory model for cybersecurity professional services." loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/05/Aggregation-Theory_-Aggregated-Professional-Services-v1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/05/Aggregation-Theory_-Aggregated-Professional-Services-v1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/05/Aggregation-Theory_-Aggregated-Professional-Services-v1.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/05/Aggregation-Theory_-Aggregated-Professional-Services-v1.png 1921w" sizes="(min-width: 1200px) 1200px"></figure><p>For example, AWS is aggregating professional services within its marketplace. If an AWS customer wants to hire a Managed Security Service Provider (MSSP), they  can browse a list of <a href="https://aws.amazon.com/mssp/partner-solutions/?partner-solutions-cards.sort-by=item.additionalFields.partnerNameLower&partner-solutions-cards.sort-order=asc&awsf.partner-solutions-filter-partner-type-storage=*all&awsf.partner-solutions-filter-partner-location-storage=*all&ref=content.strategyofsecurity.com">AWS Managed Security Service Providers</a> and hire one directly from the marketplace — no relationships, procurement processes, or contract negotiations required.</p>
<p><a href="https://www.hackerone.com/?ref=content.strategyofsecurity.com">HackerOne</a> is another good example of aggregation at a (currently) smaller scale. The platform aggregates demand for application security and pentesting services from businesses with supply from independent security researchers and ethical hackers. HackerOne modularized suppliers and aggregated demand for pentesting services — a classic example of aggregation.</p>
<p>More importantly, macro-level aggregation happening <em>outside</em> of the cybersecurity ecosystem will have a significant impact on multiple parts of the ecosystem. Aggregation is happing at the infrastructure layer (cloud computing, a layer above cybersecurity). Aggregators like AWS, Google Cloud, etc. are modularizing suppliers and owning relationships with customers (companies of all sizes, in this case — not consumers directly, as with many of the traditional Aggregation Theory examples).</p>
<p>The impact is that cloud providers are starting to modularize cybersecurity companies. In recent earnings discussions, companies like CrowdStrike, CyberArk, and SailPoint, have all talked (optimistically) about their marketplace growth and ramping up sales efforts to grow this channel.</p>
<p>That's fine, however, it's important to recognize what's happening here. Cybersecurity companies aren't the ones <em>doing</em> the aggregating; they are <em>being</em> aggregated. Aggregators (cloud providers) are modularizing suppliers (cybersecurity product companies) and using control of customer demand (businesses using their cloud services) to control distribution of products and services (via marketplaces).</p>
<p>Sometimes, these redefined relationships cross a certain threshold of success or strategic fit, and the cloud provider just builds or acquires a company. This is partially what <a href="https://strategyofsecurity.com/p/the-mirage-of-mandiant/">happened with Mandiant</a> and why it made sense for Google Cloud to acquire them. This trend is likely to continue whenever an aggregator recognizes that integration of a supplier is more valuable than commoditization.</p>
<h2 id="what-to-expect-in-the-future">What to Expect in the Future</h2>
<p>Concepts like the industry lifecycle, consolidation, and Aggregation Theory aren't going to tell us <em>specifically</em> what will happen in the future, but they do provide a useful framework for what's going to happen.</p>
<p>For me, that's actually comforting. Understanding business strategy concepts like these de-mystifies major events that happen in the cybersecurity ecosystem. Instead of feeling like we're part of a bizarre and twisted game, we can understand the rules and start to play within them.</p>
<p>Metaphorically, think of these concepts like a children's coloring book. We know what the shape is going to look like — the book gives us the outline. It's up to the child to choose the exact colors and design that happen within the coloring book (or whether they stay inside or outside of the lines!).</p>
<p>That's what these concepts do for business strategy. They give us the outline and tell us what the industry is eventually going to look like. Similar to the child creating the art, it's up to us (participants within the industry) to determine exactly what's going to happen within the lines.</p>
]]></content:encoded>
            <category>Concepts</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/05/Aggregation-Theory_-Aggregated-Heading.png"/>
        </item>
        <item>
            <title><![CDATA[What Developers Need to Know About the Strategy of Security]]></title>
            <link>https://strategyofsecurity.com/what-developers-need-to-know-about-the-strategy-of-security/</link>
            <guid>6267ff7e5e18d6003db8eccd</guid>
            <pubDate>Tue, 03 May 2022 12:24:09 GMT</pubDate>
            <description><![CDATA[A wide view of strategic trends across application security, their impact, and ideas for making the most of the changes we're facing.]]></description>
            <content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>Application security is changing in dramatic ways. Change is accelerating so quickly that the current state is almost unrecognizable to someone who started developing software just a decade ago.</p>
<p>Rapid change can be a tough pill to swallow for developers. Anyone who writes code continuously faces change on multiple fronts: new technologies and frameworks, programming languages, tools, processes, and more. It's hard to keep up with core software development topics, let alone (arguably) adjacent topics like application security.</p>
<p>When looking at major trends in application security, one thing is clear to me: there is a lot more good news than bad news. That's not to understate the bad news — there is a lot of it. You know that. But there's another side to the story.</p>
<p>Challenges create opportunities. That's exactly what is happening in application security if we zoom out and look big picture. Strategy-minded software developers are <em>exceptional</em> at solving problems and taking advantage of opportunities. We're going to discuss a bunch of them today.</p>
<p>In this article, a few trends we'll cover include:</p>
<ul>
<li>
<p>DevSecOps and the convergence of application security responsibilities on development teams</p>
</li>
<li>
<p>Changes in attack patterns inside and outside of your code</p>
</li>
<li>
<p>Developer-friendly application security testing</p>
</li>
<li>
<p>The rise of software supply chain security into the spotlight</p>
</li>
<li>
<p>The biggest risk people don't talk about: secrets management</p>
</li>
<li>
<p>The importance of securing data, not just code</p>
</li>
<li>
<p>Transformative progress in authentication and authorization</p>
</li>
<li>
<p>Reliance and impact of third parties on security</p>
</li>
<li>
<p>Changing user expectations around security</p>
</li>
</ul>
<p>This is a wide-ranging article that covers nearly every area of the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#application-security">application security</a> landscape. Since we're going wide here, this article is structured a bit differently than a typical company-focused analysis. Our goal for today is to cover a lot of ground while offering some practical ideas to explore.</p>
<p>Let's get to it.</p>
<h2 id="convergence-is-making-developers-responsible-for-more-than-development">Convergence is making developers responsible for more than development.</h2>
<h5 id="impact">Impact</h5>
<p>The convergence of development, security, and operations are shifting everything straight onto the plate of developers. Traditionally, software development has been all about writing, testing, and deploying code. Now, DevSecOps (and more importantly, the processes and tools behind it) are shifting more responsibilities and control to developers. Developers are still in charge of code, but now get to claim responsibility for infrastructure, security, and more.</p>
<p>On the surface, an increase in responsibilities sounds like a bad thing. It can be, but the reason why it's happen matters. When you look at the trend more closely, it's happening because improvements in tools <em>enabled</em> the shift.</p>
<p>Tools are getting better to help make this burden manageable — perhaps even advantageous. In the case of security, many new products are composable. They give developers a set of primitives and workflows to build security <em>experiences</em> instead of implementing one-size-fits-all products.</p>
<p>One good example is <a href="https://withpersona.com/?ref=content.strategyofsecurity.com">Persona</a>, a set of building blocks that lets developers build specific identity verification workflows for customers. Another is <a href="https://panther.com/?ref=content.strategyofsecurity.com">Panther</a>, which lets developers build a highly customized SIEM based on a set of log management and alerting primitives.</p>
<p>Forward-thinking security companies are going to continue building tools that are developer-friendly. Expect more of this in the future.</p>
<h5 id="ideas">Ideas</h5>
<p>The convergence of development and security is going to continue. Embrace it. The trend will accelerate as new paradigms (and products) gain adoption.</p>
<p>As the famous Eleanor Roosevelt quote goes, <em>&quot;with freedom comes responsibility.&quot;</em> The traditional mindset for security has often been to buy a product that (theoretically) solves a set of security problems. Convergence and composability turns that around.</p>
<p>Now, we get a nice set of tools that <em>we are responsible</em> for using to build solutions for our unique security problems. That's a good shift, but a big shift that many people aren't ready for.</p>
<p>Finally, be development teams should be intentional about adoption and use of processes and tools. Don’t let them be imposed by security teams. Instead, work together on objectives everyone agrees on. This trend brings a window of opportunity to redefine the relationship between development and security (and to pick world-class tools), so make the most of it.</p>
<h2 id="attacks-are-happening-outside-of-your-applications">Attacks are happening outside of your applications...</h2>
<h5 id="impact">Impact</h5>
<p>Attackers are after your customers and money. Exploiting applications is only one of many ways to get there. Unfortunately, attackers are always on the lookout for new and creative ways to carry out their nefarious motives. Attacking your applications is a tried-and-true approach, but recent high profile breaches have involved adjacent areas of software engineering.</p>
<p>For example, attacks on the DevOps pipeline have caused major breaches, including <a href="https://krebsonsecurity.com/2021/01/solarwinds-what-hit-us-could-hit-others/?ref=content.strategyofsecurity.com">SolarWinds</a>. The InfoSec community has rightfully placed a lot of emphasis on securing code. However, examples like SolarWinds have shown us that other parts of our engineering processes are also targets.</p>
<p>Attacks coming from all angles also have an operational impact, even if a breach is avoided. According to data from <a href="https://verizon.com/dbir/?ref=content.strategyofsecurity.com">Verizon's 2021 Data Breach Investigation Report (DBIR)</a>, Denial of Service (DoS) attacks cause a disproportionate amount of incidents (but not many breaches). Unfortunately, we now need to anticipate a steady stream (and sometimes a huge spikes) of attacks that follow this pattern.</p>
<h5 id="ideas">Ideas</h5>
<p>Broaden your mental model of security beyond code. Attackers are looking for any ways to exploit your company that they can find. We have to adjust our own mindset and include areas outside of code in our threat models.</p>
<p>Use services like DoS mitigation and bot management. These attacks can’t be eliminated, but their impact can be reduced. Services like Cloudflare routinely <a href="https://blog.cloudflare.com/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/?ref=content.strategyofsecurity.com">mitigate large attacks</a>. The nominal cost of adding this layer of protection to our apps is well worth the investment.</p>
<p>Include your DevOps pipeline in threat modeling activities. Tools like CI/CD, artifact repositories, and other parts of the pipeline are now targets that need to be secured just like our code and infrastructure.</p>
<h2 id="%E2%80%A6but-basic-web-application-attacks-still-cause-261-of-breaches">…but basic web application attacks still cause 26.1% of breaches.</h2>
<h5 id="impact">Impact</h5>
<p>Web application attacks are the second most frequent attack pattern identified in the Verizon DBIR report (social engineering was first, causing a full 33.6% of breaches). Attackers are looking beyond applications, but our applications are still under attack. And they're still causing breaches at an alarmingly high rate.</p>
<p>An upward trend in credential stuffing is a newer development for specific types of attack patterns. According to the Verizon DBIR, credential stuffing (~80%) causes far more incidents than vulnerability exploitation (~20%). Many people don't expect that ratio — especially given how much visibility and education there is around vulnerability exploitation.</p>
<p>From a process and governance standpoint, vulnerability management programs are converging with application security and risk management. These domains used to be viewed separately, with vulnerability management focusing on patching and risk management focusing on audits and compliance. Companies are now taking a risk-based approach to vulnerability management and managing application security vulnerabilities within their overall programs.</p>
<h5 id="ideas">Ideas</h5>
<p>Move beyond manual testing and one-off static code scanning. In today's iterative, fast-moving style of software development, a point-in-time scan or manual review isn't able to keep up with how fast an application's code is changing. Ideally, secure your code as it’s written. As we'll discuss next, major improvements in tools have made an iterative and developer-friendly approach possible.</p>
<p>Use services to detect and defend against credential stuffing attacks. This attack pattern is still an attack on our application, even if it's a different approach than more traditional vulnerability exploitation. We have to expect a constant flow of credential stuffing attacks on production applications, including the occasional spike in attempts when a fresh batch of credentials gets exposed in a breach.</p>
<p>Take a prioritized and risk-based approach to remediating vulnerabilities. As much as we'd like to close all vulnerabilities, it's currently impractical for most companies to do this in practice. A risk-based approach makes remediation more manageable.</p>
<h2 id="application-security-testing-is-finally-becoming-developer-friendly">Application security testing is (finally) becoming developer-friendly.</h2>
<h5 id="impact">Impact</h5>
<p>Organizations (and products) are finally starting to cater security to developers’ needs. For any experienced software developer, this has been a long, long time in the making. The painful memories of application security intake forms, delayed releases, and last-minute vulnerability remediation haven't faded away quite yet, but a lot of progress has been made.</p>
<p>The big idea is to move application security testing forward in the development process and iteratively run scans as code is developed and committed. The term &quot;shift left&quot; gets overused, but the foundational idea is nice. Just like you'd write automated tests and get real-time feedback, you can run automated security tests.</p>
<p>Companies like <a href="https://www.veracode.com/?ref=content.strategyofsecurity.com">Veracode</a> and <a href="https://snyk.io/?ref=content.strategyofsecurity.com">Snyk</a> have been leading the way, and both companies are likely to be rewarded with IPOs in the next five years. Their success (and huge developer fan base) validates the idea that software development can increase speed and security at the same time — these objectives are not diametrically opposed.</p>
<h5 id="ideas">Ideas</h5>
<p>Forward-thinking engineering teams obsess over simplifying the process of writing secure code. As Snyk founder Guy Podjarny recently discussed in a <a href="https://www.humanlayersecurity.com/blog/qa-with-guy-podjarny/?ref=content.strategyofsecurity.com">Human Layer Security podcast</a>, <em>&quot;you have to care about something more than it burdens you.&quot;</em> This quote concisely defines the value of products like Snyk. When we make security easier for developers, they're more likely to embrace it.</p>
<p>Podjarny also discusses the idea of decentralizing application security. The legacy paradigm was for information security teams to fully own application security testing. Naturally, this created a bottleneck as <a href="https://a16z.com/2011/08/20/why-software-is-eating-the-world/?ref=content.strategyofsecurity.com">software continued eating the world</a> and companies wrote more and more code. Modern application security tools make decentralization possible and help turn security into a shared responsibility between engineering and security teams.</p>
<p>Finally, invest in modern application security platforms. Progress in this area is enabled by tools. They're surprisingly affordable to adopt, especially considering the impact they can make on your company's security posture.</p>
<h2 id="software-supply-chain-security-isnt-under-the-radar-anymore">Software supply chain security isn't under the radar anymore.</h2>
<h5 id="impact">Impact</h5>
<p>Log4j (Log4Shell), NPM libraries (colors/faker), and other high profile vulnerabilities brought software supply chain security straight into the spotlight in 2021. Even the President of the United States is talking about it (and <a href="https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity?ref=content.strategyofsecurity.com">taking action</a>).</p>
<p>In hindsight, the emergence of this trend should have been obvious. We have relied on open source packages for years. The relative degree of calm and stability in the security of the software supply chain wasn't going to last forever — it was only a matter of time before packages became a more frequently used attack vector.</p>
<p>Help is on the way. A new generation of early stage startups has raised $10.6M in the past two quarters, mostly at seed stage funding. It will take some time for us to wrap our collective minds around the lessons learned from the 2021 vulnerabilities and what we need to do differently. However, the pace of innovation and progress is going to move quickly.</p>
<h5 id="ideas">Ideas</h5>
<p>First, we have to deal with immediate lessons learned in the near-term: prioritize finding and remediating vulnerable packages in your apps. This is another place where tools like Snyk or Github Dependabot can help. Automate the search for vulnerable packages as much as possible, then work on making remediation more efficient and automated.</p>
<p>Watch for emerging companies in this space. As I said earlier, help is on the way. <a href="https://www.chainguard.dev/?ref=content.strategyofsecurity.com">Chainguard</a> is one example of a recently-funded company that is building an innovative product with an experienced team.</p>
<p>Finally, explore emerging approaches like <a href="https://slsa.dev/?ref=content.strategyofsecurity.com">SLSA</a> and <a href="https://www.sigstore.dev/?ref=content.strategyofsecurity.com">Sigstore</a>. These projects are going to take some time to evolve and become directly actionable. However, it's worth investing a little attention to about the latest ideas so that you're prepared when they reach mainstream adoption.</p>
<h2 id="managing-secrets-is-the-biggest-risk-people-arent-talking-about">Managing secrets is the biggest risk people aren't talking about.</h2>
<h5 id="impact">Impact</h5>
<p>For all the talk (and <a href="strategyofsecurity.com/1passwords-blue-ocean-strategy/">grievances</a>) about passwords, we spend very little time talking about managing other kinds of secrets. Things like API keys, certificates, and other non-password forms of access control escape the spotlight. They're just &quot;things developers use&quot; to a lot of people.</p>
<p>In a 2021 <a href="https://blog.1password.com/risks-of-mismanaging-corporate-secrets/?ref=content.strategyofsecurity.com">1Password survey</a>, 80% of IT/DevOps organizations admitted to not managing their secrets well. That's...not great. It's also a more pervasive problem than you'd think. In the same survey, 65% of companies reported having over 500 secrets, and 18% have more than they can count.</p>
<p>Having over 500 secrets (or more — who really knows, right?!) that aren't managed well is obviously a bad situation. Secrets can grant powerful access to a lot of sensitive information, as we saw recently with the token-based <a href="https://www.bleepingcomputer.com/news/security/github-notifies-owners-of-private-repos-stolen-using-oauth-tokens/?ref=content.strategyofsecurity.com">attack on GitHub accounts</a>. There is already better visibility and momentum behind protecting secrets. Attacks like these make the idea of protecting secrets even more visible.</p>
<h5 id="ideas">Ideas</h5>
<p>Make good hygiene around secrets part of your engineering culture. If we don't talk about protecting and managing secrets, we can't expect people to keep them secure. Secrets need to be part of your security discussions and actions.</p>
<p>Part of the solution is using a a secrets management service. There are several good ones now, including products like <a href="https://www.conjur.org/?ref=content.strategyofsecurity.com">CyberArk Conjur</a>, <a href="https://www.hashicorp.com/products/vault?ref=content.strategyofsecurity.com">HashiCorp Vault</a>, and <a href="https://1password.com/products/secrets/?ref=content.strategyofsecurity.com">1Password Secrets Automation</a>. GitHub also builds basic secrets management right into Actions workflows.</p>
<p>Finally, effective discovery of secrets before implementation of a product is a worthwhile project. You can't protect the secrets you don't know about, and finding them is tricker than you'd think. Secrets get embedded in source code or stored in config files all the time. The best approach is to make discovery a project, come clean about what you find, and protect your secrets the right way going forward.</p>
<h2 id="securing-data-and-securing-code-are-equally-important">Securing data and securing code are equally important.</h2>
<h5 id="impact">Impact</h5>
<p>Many common attack patterns bypass the application and go straight to data stores. More than ever, we have to think about securing access to data outside of an application itself. According to the Verizon DBIR, attackers are most often after credentials (for privilege escalation), personal data, bank data, and confidential internal data.</p>
<p>Privacy regulations have also created consequences for mistakes. This raises the bar for protecting data and making sure it's only accessible by the people who need access. It's not worth putting development teams at risk by giving them excessive access to production data if it can be avoided.</p>
<p>When designing applications today, you need to factor data security  into your architecture. How you protect the sensitive data is part of the overall solution — <a href="https://iapp.org/resources/article/privacy-by-design-the-7-foundational-principles/?ref=content.strategyofsecurity.com">privacy by design</a>. Designing an application is hard enough already, but data protection is definitely part of the thought process now.</p>
<h5 id="ideas">Ideas</h5>
<p>Be part of the solution for securing data. Don't leave the responsibility to infrastructure and security teams. It's still important for development teams to write secure code, but not at the expense of ignoring data security entirely.</p>
<p>Explore emerging approaches and products that allow developers and data scientists to work with sensitive data securely. JumpWire and Sarus are two companies from Y Combinator's recent <a href="https://strategyofsecurity.com/p/y-combinators-winter-2022-cybersecurity-privacy-and-trust-startups/">W22 batch</a> who are working on this problem. There was also a great <a href="https://www.notboring.co/p/evervault-encrypt-everything??ref=content.strategyofsecurity.com">Not Boring article</a> on Evervault, another interesting company building encryption infrastructure. We're a long way away from de facto standards, but I'm hopeful about progress.</p>
<h2 id="were-in-a-golden-era-for-authentication-and-authorization">We're in a golden era for authentication and authorization.</h2>
<h5 id="impact">Impact</h5>
<p>Seriously. The options available to developers today for authentication and authorization are <em>amazing</em>. And they're getting better by the day. Companies like <a href="https://fusionauth.io/?ref=content.strategyofsecurity.com">FusionAuth</a>, <a href="https://www.transmitsecurity.com/?ref=content.strategyofsecurity.com">Transmit Security</a>, <a href="https://stytch.com/?ref=content.strategyofsecurity.com">Stytch</a>, and others have built world-class, developer-friendly authentication products that are breathtakingly simple to use.</p>
<p>Users are also becoming more familiar with new authentication factors. We're still a long time away from full-blown passwordless adoption, but upgrades like magic links are starting to become more natural for non-security people. This is a good trend because mainstream adoption allows us better options than passwords alone.</p>
<p>Finally, external authorization is becoming a viable option with the new generation of products. This trend is still a long shot — color me skeptical about applications fully externalizing authorization (especially existing ones). However, another round of companies is building products that could make the job easier.</p>
<h5 id="ideas">Ideas</h5>
<p>It's been said before, but I'll say it again: don't roll your own authentication. There are all kinds of legitimate reasons why your application could be attacked and breached. Building your own auth is taking an unnecessary risk — it's essentially an anti-pattern in 2022. Use an external service or a well supported open source package like <a href="https://github.com/heartcombo/devise?ref=content.strategyofsecurity.com">Devise</a> (for the Ruby on Rails community).</p>
<p>Give users the option of passwordless or Multi-Factor Authentication (MFA) when authenticating to your application. Using external authentication platforms makes it a lot easier to do this. The added security benefit for your users is well worth the minimal effort required to implement it.</p>
<p>Finally, explore whether external authorization makes sense, but do it with care. Handing over your authorization to a third party is a lot riskier than using standards-based authentication from a third party. However, it's better than making a mistake with building your own authorization.</p>
<h2 id="security-posture-is-highly-dependent-on-third-parties">Security posture is highly dependent on third parties.</h2>
<h5 id="impact">Impact</h5>
<p>In the SaaS and cloud-based world we live in, our security relies on third parties more than ever before. We host our applications on large cloud providers. We rely on services for everything from UI frameworks to chat to analytics and more. I literally just recommended using a third party for auth. You get the idea — we're all intertwined now. Our security depends on each other.</p>
<p>Of course, the size and scale of risk and potential impact varies by service. Vulnerabilities in cloud services have macro-level risks and impact across the entire tech industry. Services like Mailchimp are somewhere in the middle. They have a lot of customers, but in the <a href="https://techcrunch.com/2022/04/04/mailchimp-internal-tool-breach/?ref=content.strategyofsecurity.com">recent example</a>, only a few were exploited.</p>
<p>Other point solutions are smaller in scope. Some have potential customer impact (e.g. downtime of a chat service) and others only impact employees. Mileage varies.</p>
<p>We still own significant responsibility for security, even though it’s partially out of our control. It's important to be aware of how far this trend has gone and how dependent many of us are on third parties now. By acknowledging this reality, we can make sure we take the right steps to protect ourselves.</p>
<h5 id="ideas">Ideas</h5>
<p>Know exactly which third party services your apps are using. This is a similar idea to protecting secrets — you can't do anything about securing third party services if you're not aware of them.</p>
<p>Make security part of your buying process for third party services. It's a lot easier to evaluate security before you're using a service than after it's deeply embedded in your application. Or worse, after the third party service has been breached and you're dealing with the consequences.</p>
<p>Finally, it's important to know that third party assurance reports (like SOC2) are useful, but do your own homework. It's unrealistic to expect that auditors will catch every security problem. For many third party services, there are also unique circumstances about your use cases that can go beyond the scope of the audit.</p>
<h2 id="for-many-users-security-is-a-feature-now">For many users, security is a feature now.</h2>
<h5 id="impact">Impact</h5>
<p>Trust and safety are quickly becoming and important part of product design. Repeated news headlines about data breaches, election security, social media, etc. have elevated security, privacy, trust, and fraud into the public eye.</p>
<p>Expectations are higher if an application involves user-generated content, money, or sensitive data. The experience of dealing with bad things that happen in your application — or outright preventing them from happening — is very important for a lot of people.</p>
<h5 id="ideas">Ideas</h5>
<p>Implement trust and safety processes, even if they’re basic. Something is better than nothing. However, you should be prepared to build significantly more robust features if your customers have higher expectations.</p>
<p>Stretch your companies’ boundaries for transparency around security and privacy. Companies like <a href="https://trustpage.com/?ref=content.strategyofsecurity.com">Trustpage</a> and <a href="https://www.cndr.io/?ref=content.strategyofsecurity.com">Cinder</a> are building a new class of products for trust and transparency. When done well, this approach is a strategic advantage that can differentiate your company and products.</p>
<!--kg-card-end: markdown-->]]></content:encoded>
            <category>Application Security</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/05/What-Devs-Need-to-Know.png"/>
        </item>
        <item>
            <title><![CDATA[Bravo, Thoma Bravo]]></title>
            <link>https://strategyofsecurity.com/bravo-thoma-bravo/</link>
            <guid>625e1223823a82003dba08fa</guid>
            <pubDate>Mon, 25 Apr 2022 17:56:30 GMT</pubDate>
            <description><![CDATA[A deeper look into Thoma Bravo, the audacious private equity firm that's reshaping the cybersecurity ecosystem.]]></description>
            <content:encoded><![CDATA[<p>Another week, another multi-billion dollar acquisition in cybersecurity. You may have seen the news: SailPoint <a href="https://www.sailpoint.com/press-releases/sailpoint-to-be-acquired-by-thoma-bravo-for-6-9-billion/?ref=content.strategyofsecurity.com">announced it's being acquired</a> by Thoma Bravo (<a href="https://www.bizjournals.com/austin/blog/techflash/2014/08/sailpoint-technologies-to-sell-majority-stake-to.html?ref=content.strategyofsecurity.com">for a second time</a>) for $6.9 billion on April 11, 2022.</p>
<p>Or maybe you didn't. Multi-billion dollar cybersecurity transactions happen all the time now. Trust me, this one is a big deal. Today, we're going to talk about why.</p>
<p>The news about SailPoint is important, but they're not <em>the</em> story here. The interesting part about the story is bigger than one company or one acquisition — it's about Thoma Bravo.</p>
<p>I haven't written an entire article focused on a private equity firm yet. Now is the time. Thoma Bravo's influence within cybersecurity is too important <em>not</em> to write about.</p>
<p>One of the five themes I went into detail about in <a href="https://strategyofsecurity.com/p/themes-from-momentum-cybers-2022-cybersecurity-almanac/">Themes From Momentum Cyber's 2022 Cybersecurity Almanac</a> was private equity's dramatically increased involvement in the cybersecurity ecosystem:</p>
<blockquote>
<p>Private equity firms are going to continue upping the dosage of rocket fuel in cybersecurity as long as the promise and opportunity for large returns continues. As the data from Momentum Cyber shows, we're likely looking at a multi-year trend here. The effects will take a decade or more to play out.</p>
</blockquote>
<p>Implicitly, you could have taken this statement as a prediction that Thoma Bravo was going to make some big M&amp;A moves in 2022 and beyond. A prediction like this isn't that speculative or improbable. Thoma Bravo has been making deals for years. The scale and frequency of their deals are just now reaching a point where a lot more people take notice.</p>
<p>Along with Vista Equity Partners and a handful of other firms, Thoma Bravo is one of the most active private equity firms in cybersecurity, both in terms of deal volume and size. An upward trend in cybersecurity's private equity activity is inextricably tied to Thoma Bravo. So, it's worth spending time to understand the firm in more detail.</p>
<p>The interesting part about private equity trends in cybersecurity is speculating exactly which moves the firms are going to make. Thoma Bravo acquiring SailPoint was not something I was expecting to happen:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">I didn't see the SailPoint acquisition by Thoma Bravo coming.<br><br>SailPoint is a financially solid company — especially compared to other recent cybersecurity and SaaS acquisitions by PE.<br><br>This is a power play for faster growth, not a turnaround.</p>— Cole Grolmus (@colegrolmus) <a href="https://twitter.com/colegrolmus/status/1513579635103182854?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">April 11, 2022</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>I should have been expecting it, though. Recent history already shows a clear trend of mega-deals, many involving Thoma Bravo. Two examples:</p>
<ul>
<li>
<p>Thoma Bravo <a href="https://techcrunch.com/2021/04/26/thoma-bravo-buys-cybersecurity-vendor-proofpoin-for-12-3b-in-cash/?ref=content.strategyofsecurity.com">already acquired Proofpoint</a> for $12.3 billion in April 2021. SailPoint wasn't even their largest cybersecurity acquisition by a long shot.</p>
</li>
<li>
<p>A group of private equity firms <a href="https://techcrunch.com/2021/11/08/investor-consortium-to-acquire-mcafee-for-14-billion/?ref=content.strategyofsecurity.com">acquired McAfee's consumer business</a> for $14 billion. That's the current leader for largest cybersecurity acquisition of all time. Go figure: Thoma Bravo was <a href="https://www.thomabravo.com/press-releases/thoma-bravo-takes-minority-investment-in-mcafee?ref=content.strategyofsecurity.com">already a minority investor</a> back in 2017.</p>
</li>
</ul>
<p>The lesson here: we should <em>all</em> expect that acquisitions like this one can happen at any time. The acquisitions of SailPoint, Proofpoint, and others clearly demonstrate that any cybersecurity company under $10 billion in market cap or valuation is up for grabs. Several private equity firms have no trouble raising that much money for acquisitions if needed.</p>
<p>Shifting focus to Thoma Bravo, you have to admire their courage and audacity for going even bigger with their current portfolio and recent moves. This is exactly what we're going to unpack today. Topics include:</p>
<ul>
<li>
<p><strong>The Story of Thoma Bravo:</strong> Interesting highlights from the history of Thoma Bravo and its founders.</p>
</li>
<li>
<p><strong>A New Strategy for Private Equity:</strong> The innovative strategy for Thoma Bravo's approach to deals and how it plays out in practice.</p>
</li>
<li>
<p><strong>Reshaping Cybersecurity, a Timeline:</strong> Thoma Bravo's cybersecurity investments, acquisitions, and impact over time.</p>
</li>
<li>
<p><strong>Possibilities for SailPoint:</strong> A specific look into the SailPoint deal and possibilities going forward.</p>
</li>
<li>
<p><strong>Thoma Bravo's Audacious Future:</strong> Where all of this could be headed for Thoma Bravo.</p>
</li>
</ul>
<p>Let's start with an epic tale of failure, fortitude, and fortune.</p>
<h2 id="the-story-of-thoma-bravo">The Story of Thoma Bravo</h2>
<p>Thoma Bravo is one of the most innovative companies in the cybersecurity ecosystem. I am fully aware how heretical it sounds to call a private equity firm "innovative." Hear me out.</p>
<p>When we think of innovative companies, our mental model is tech and products built by iconic founders and their rocket ship startups. That's accurate, and there are hundreds of examples to back it up. Cybersecurity alone has plenty of examples: CrowdStrike, Cloudflare, Okta, Ping Identity, and more.</p>
<p>Private equity firms traditionally get bucketed in a distant category far away from innovation along with their consulting and investment banking peers. The stereotype is often fair, but not in the case of Thoma Bravo. Thoma Bravo changed the model and scale of private equity from traditional ways of the past to the modern version you see today.</p>
<p>The modern incarnation of Thoma Bravo has been over 40 years in the making. It's actually a great story — one of the best business stories I've ever heard. A 2019 <a href="https://www.forbes.com/sites/antoinegara/2019/10/02/meet-wall-streets-best-dealmaker-new-billionaire-orlando-bravo/?sh=7d14990242ec&ref=content.strategyofsecurity.com">Forbes article</a> about Orlando Bravo captures the story incredibly well, so we're just going to do the abridged (read: spoiler) version here.</p>
<p>The tale of Thoma Bravo starts with the firm's original founders, Stanley Golder and Carl Thoma, pioneering the "buy-and-build" investment strategy in the 1980s. The Forbes article describes it like this:</p>
<blockquote>
<p>Thoma is a tall and mild-mannered Oklahoman whose parents were ranchers. Thoma and his partners practiced a friendlier version of the buyouts popularized by Michael Milken, preferring to buy small businesses and expand them using acquisitions.</p>
</blockquote>
<p>The plot twist happens when Carl Thoma hires Orlando Bravo, a fresh MBA and JD graduate from Stanford:</p>
<blockquote>
<p>Upon graduation in 1998, Bravo wasn’t offered a position there or at TPG, and he spent months cold-calling for a job. After about a hundred calls, Bravo’s résumé caught the eye of Carl Thoma, a founding partner of the Chicago-based private equity firm Golder, Thoma, Cressey, Rauner (now known as GTCR), and they hit it off.</p>
</blockquote>
<p>You read that correctly: Orlando Bravo, now one of the wealthiest people on the planet, had to make over a hundred calls to find a job. <em>"The smartest investment Chicago private-equity pioneer Carl Thoma ever made could well be when he hired Orlando Bravo,"</em> says a (paywalled) <a href="https://www.chicagobusiness.com/article/20140524/ISSUE01/305249982/orlando-bravo-puts-private-equity-s-thoma-bravo-on-high-tech-map?ref=content.strategyofsecurity.com">Crain's Chicago Business article</a> in the understatement of the century.</p>
<p>As they say, the rest is history...sort of. Orlando Bravo's first few deals didn't go so well. From Forbes:</p>
<blockquote>
<p>Bravo’s first few deals, struck before he turned 30, were disasters. He backed two website design startups, NerveWire and Eclipse Networks, just as the dot-com bubble popped.<br>
<br>
The two lost most of the $100 million Bravo invested. “I learned I didn’t want to invest in risky things ever again,” Bravo says. “It was too painful to live through.”</p>
</blockquote>
<p>By "risky things," he meant to stop doing what we now call early stage venture capital investments:</p>
<blockquote>
<p>He realized his mistake was in backing startup entrepreneurs, an inherently risky move, when for the same money he could buy established companies selling niche software to loyal customers. With Thoma’s blessing, Bravo pivoted and became an expert on these arcane firms.</p>
</blockquote>
<p>The "buy boring software businesses" plan started working right away, and Orlando Bravo made partner at the firm (preciously TCEP) in 2001 at age 30. Not a bad rebound from losing millions of dollars of the firm's money in his 20s.</p>
<p>The firm was expanding by 2005, foreshadowing a series of early hires who are now the face of Thoma Bravo:</p>
<blockquote>
<p>By 2005, Bravo and Thoma had recruited three employees, Scott Crabill, Holden Spaht and Seth Boro, to focus on software applications, cybersecurity and Web infrastructure. All remain with the firm today as managing partners.</p>
</blockquote>
<p>Orlando Bravo's impact on the firm was so profound that they re-incorporated the current iteration of the firm in 2008 to focus exclusively on software. That's why Orlando Bravo is a co-founder.</p>
<p>Beyond being a co-founder, Orlando Bravo is also a prodigy — just not in the usual way people in cybersecurity and tech think about prodigies. Most of the (well-deserved) credit goes to startup founders. Every once in a while, someone comes along in a different part of the cybersecurity ecosystem and changes everything. That's exactly what happened with Orlando Bravo and private equity.</p>
<p>As it turns out, having specific knowledge in a niche topic like software company operations and growth is a massively valuable thing to be good at. This probably did seem niche back in the early 2000s. Add in the magic of compounding growth, and you get Orlando Bravo circa 2022. In his own words:</p>
<blockquote>
<p>The economics of software were just so powerful. It was like no other industry I had ever researched. It was just very obvious.</p>
</blockquote>
<p>The innovation started with Carl Thoma's buy-and-build investment strategy. It continued with Orlando Bravo's specialization in software. Thoma Bravo's next innovation is scale. That's the topic we're headed to next.</p>
<h2 id="a-new-strategy-for-private-equity">A New Strategy for Private Equity</h2>
<p>Before we get into the specifics about Thoma Bravo's strategy, we need to take a quick step back and talk about the relationship between private equity and the cybersecurity ecosystem.</p>
<p>The influence and impact of private equity firms within the ecosystem isn't well understood. People often see private equity firms as mysterious (and sometimes evil). I understand the reservations and concerns, but (in general), the fear and apprehension is more about uncertainty than legitimate cause for concern. Getting over this uncertainty starts with understanding what private equity firms do and the outcomes they seek.</p>
<p>The most concise way to describe the role of private equity is an explanation I've given in the past:</p>
<blockquote>
<p>Here's the model: A private equity firm buys a cybersecurity company as the centerpiece, then acquires other complimentary companies to round out the platform. It's easier and faster for PE firms to make the complimentary purchases because they already have the capital and relationships to make the deals happen.</p>
</blockquote>
<p>For private equity firms, a successful investment outcome is either:</p>
<ul>
<li>
<p>Taking the company public (in many cases, a previously public company being taken public again in its refined form).</p>
</li>
<li>
<p>Selling the company to another company or investor for a profit.</p>
</li>
</ul>
<p>The objective is easy to understand, yet incredibly hard to execute. Building an industry leading company is a difficult accomplishment in any shape or form — whether that's starting a business from scratch, turning around an unprofitable company, or maximizing the potential of a company that's already doing well.</p>
<p>Private equity firms get involved when companies are unprofitable, or when they see potential growth and value that isn't happening yet. The best private equity firms pore over the details about a company's operations, financials, market, and strategy to create profitable businesses.</p>
<p>Thoma Bravo's buy-and-build strategy is distinctly different from traditional private equity firm strategies. When most people think of private equity, they think of <a href="https://knowledge.wharton.upenn.edu/article/true-turnaround-specialists-are-poised-to-survive-in-todays-challenging-private-equity-market/?ref=content.strategyofsecurity.com">turnaround specialists</a>: people who swoop in to save distressed businesses, lay off employees, work everyone else to the bone, and either save the business or sell it off in pieces.</p>
<p>Many private equity firms do specialize in turnarounds, but that's not the business Thoma Bravo is in. Their buy-and-build strategy is completely different on a philosophical level.</p>
<p>The core of Thoma Bravo's buy-and-build strategy is creating collaborative partnerships with good-but-not-yet-great performing companies. In their own words: <em>"We are a passionate group of individuals who share one mission: to buy great software companies, spend time with them operationally and make them the best at what they do."</em></p>
<p>In an ironic twist of fate (we'll get to that at the end), Elon Musk's <a href="https://twitter.com/TomMackenzieTV/status/1514547642545680385?s=20&t=lBbTaYaD3scBVtNAFaYwNg&ref=content.strategyofsecurity.com">recent quote</a> about buying Twitter actually summarizes Thoma Bravo's strategy nicely: <em>"[COMPANY] has extraordinary potential. I will unlock it."</em> Thoma Bravo is all about unlocking potential.</p>
<p>This strategy has a number of differences from turnarounds when put into practice, including two very important ones:</p>
<ul>
<li>
<p>Companies Thoma Bravo acquires or invests in are already doing well. The Forbes article describes typical criteria as <em>"at least $150 million in sales from repeat customers"</em> and specialized markets.</p>
</li>
<li>
<p>They work with existing management teams instead of replacing them. For turnarounds, management is usually the first to go. From a recent <a href="https://www.joincolossus.com/episodes/88585306/bravo-the-art-of-software-buyouts?tab=transcript&ref=content.strategyofsecurity.com">Colossus podcast</a>: <em>"We work with existing management... We adapt ourselves to their culture. That is very meaningful to us."</em></p>
</li>
</ul>
<p>These strategic differences completely change the profile of companies Thoma Bravo acquires and the entire dynamic of their relationship with them. The objective is to maximize wealth, not to avoid ruin.</p>
<p>Thoma Bravo's specialization in software is another distinct difference that's closely related to the buy-and-build strategy. Here's the summary from Forbes:</p>
<blockquote>
<p>His secret? He invests only in well-established software companies, especially those with clearly discernible moats.</p>
</blockquote>
<p>There's a backstory behind this that dates back to Bravo's mistakes as a young investor. Again, from Forbes:</p>
<blockquote>
<p>He figured out nearly two decades ago that software and private equity were an incredible combination. Since then, Bravo has never invested elsewhere, instead honing his strategy and technique deal after deal.<br>
<br>
He hunts for companies with novel software products...[and] looks to triple their size with better operations. By the time he strikes, he’s already mapped out an acquisition or turnaround strategy.</p>
</blockquote>
<p>This quote is insightful because it surfaces two important nuances about how Thoma Bravo executes its strategy:</p>
<ul>
<li>
<p>They start with a business strategy that's mutually agreed upon with a target company's existing management team before an acquisition takes place. There is no <em>"we'll buy this company now and figure it out later."</em></p>
</li>
<li>
<p>Once the acquisition takes place, they're deeply involved with a company's operations. A CEO of an acquired company described it like this: <em>"Orlando would help not only at the highest level with strategy but also when we got grunt work done."</em></p>
</li>
</ul>
<p>There is a phenomenal quote from Orlando Bravo in the Forbes article that captures the essence of this philosophy:</p>
<blockquote>
<p>My passion...is to move beyond the strategic, long-term pontification, and into the operational and tactical moves that make you move forward today. Economies go down, companies miss their numbers, trade stops, product issues happen and people quit. [The question is] do you have a creative approach to problem solving?<br>
<br>
Some people are stuck . . . and some people love putting the pieces together. I just feel like every operational problem can be solved. There’s always a solution.</p>
</blockquote>
<p>The combination of strategy and execution is what makes Thoma Bravo so successful and prolific. Their fingerprints are everywhere in the cybersecurity ecosystem, even if they're still invisible to many people working in the industry.</p>
<p>Next, we'll take a look at exactly how big of an impact Thoma Bravo has had on reshaping cybersecurity.</p>
<h2 id="reshaping-cybersecurity-a-timeline">Reshaping Cybersecurity, a Timeline</h2>
<p>Thoma Bravo has done more to reshape cybersecurity than (arguably) any other private equity firm. A total of 24 cybersecurity companies have passed through Thoma Bravo's portfolio, including 14 active investments today (SailPoint will become the 15th when the acquisition closes).</p>
<p>To illustrate the point about how active Thoma Bravo has been, here are all of the firm's cybersecurity-related <a href="https://docs.google.com/spreadsheets/d/1PzYBB41kbRP2yIsNdc2a9Rgm-ApOK1XqQUw5ZRpQJow/edit?usp=sharing&ref=content.strategyofsecurity.com">flagship deals</a>, sorted by the year Thoma Bravo entered the company:</p>
<figure class="kg-card kg-image-card kg-width-wide"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/04/Thoma-Bravo-Cybersecurity-Investments.png" class="kg-image" alt="Table of Thoma Bravo's cybersecurity investments." loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/04/Thoma-Bravo-Cybersecurity-Investments.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/04/Thoma-Bravo-Cybersecurity-Investments.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/04/Thoma-Bravo-Cybersecurity-Investments.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/04/Thoma-Bravo-Cybersecurity-Investments.png 1920w" sizes="(min-width: 1200px) 1200px"></figure><p><em>Note: This data is somewhat incomplete and inaccurate. It was compiled based on publicly available information, which has limited data about transaction prices. It's intended to be illustrative, not authoritative.</em></p>
<p>We're missing a lot of detail since much of the transaction data is undisclosed. However, there is enough information to give you an idea of the frequency, size, and outcomes that Thoma Bravo is creating. TL;DR – they've been busy, and their portfolio companies are doing quite well.</p>
<p>This is already a long list of transactions, and it doesn't even include smaller add-on acquisitions for companies that are folded into the flagships. We can't go through every single company without making this a 10,000 word article, so we'll cover a few of the highlights instead.</p>
<h4 id="mcafee">McAfee</h4>
<p>In what should be no surprise by now, Thoma Bravo was a beneficiary in the largest cybersecurity deal ever — McAfee's <a href="https://techcrunch.com/2021/11/08/investor-consortium-to-acquire-mcafee-for-14-billion/?ref=content.strategyofsecurity.com">$14 billion</a> consumer and <a href="https://techcrunch.com/2021/03/08/mcafee-sells-enterprise-biz-to-symphony-technology-group-for-4b/?ref=content.strategyofsecurity.com">$4 billion</a> enterprise acquisitions by two separate groups of investors in 2021.</p>
<p>Thoma Bravo took a <a href="https://www.thomabravo.com/press-releases/thoma-bravo-takes-minority-investment-in-mcafee?ref=content.strategyofsecurity.com">minority investment stake</a> in McAfee back in 2017 and helped guide the company through its transformation and multiple exits (along with multiple acquirers). The result you see today is <a href="https://www.mcafee.com/?ref=content.strategyofsecurity.com">McAfee's consumer business</a> and <a href="https://www.trellix.com/en-us/index.html?ref=content.strategyofsecurity.com">Trellix</a>, the combination of McAfee's enterprise business and FireEye.</p>
<h4 id="proofpoint">Proofpoint</h4>
<p>Proofpoint is the largest direct acquisition Thoma Bravo has done. They <a href="https://www.thomabravo.com/press-releases/thoma-bravo-completes-acquisition-of-proofpoint?ref=content.strategyofsecurity.com">acquired the then-public company</a> in mid-2021 for $12.3 billion and took it private.</p>
<p>Executing their strategy for Proofpoint is a massive, multi-year project — especially alongside other large investments like SailPoint. This is an area to pay attention to.</p>
<h4 id="delinea">Delinea</h4>
<p>Delinea is the result of multiple Thoma Bravo deals involving Centrify, a <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#privileged-access-management-pam">Privileged Access Management (PAM)</a> focused company. Thoma Bravo acquired Centrify in 2018, <a href="https://www.thomabravo.com/press-releases/centrify-announces-focus-on-privileged-access-management-spins-out-idaas-business-as-idaptive?ref=content.strategyofsecurity.com">spun out</a> its <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#access-management">Access Management</a> business as Idaptive, and <a href="https://www.cyberark.com/press/cyberark-acquires-identity-as-a-service-leader-idaptive/?ref=content.strategyofsecurity.com">sold it to CyberArk</a> for $70 million in 2020.</p>
<p>Centrify was <a href="https://www.centrify.com/about-us/news/press-releases/2021/tpg-agrees-acquire-majority-stake-centrify-thoma-bravo/?ref=content.strategyofsecurity.com">sold to TPG Capital</a> in 2021 and <a href="https://www.centrify.com/about-us/news/press-releases/2021/thycotic-centrify-merge/?ref=content.strategyofsecurity.com">merged with Thycotic</a> to become Delinea. This involved a lot of activity and significantly reshaped both the PAM and Access Management markets.</p>
<h4 id="veracode">Veracode</h4>
<p>Veracode, a consistent market leader in <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#application-security">Application Security</a>, was acquired by Thoma Bravo for $950 million in 2019. The company performed exceptionally well under Thoma Bravo.</p>
<p>It <a href="https://www.thomabravo.com/press-releases/veracode-announces-significant-growth-investment-from-ta-associates?ref=content.strategyofsecurity.com">recently announced</a> a large growth investment round from TA Associates that values Veracode at $2.5 billion just three years later. Thoma Bravo will retain a minority stake after the investment closes.</p>
<p>Veracode is one of the best examples so far of the results a partnership with Thoma Bravo can bring. The company was already a market leader before it was acquired by Thoma Bravo, and the acquisition resulted in incredible execution and growth by Veracode's leadership team.</p>
<h4 id="barracuda">Barracuda</h4>
<p>Thoma Bravo acquired Barracuda Networks as a public company in 2017 and took it private in a <a href="https://www.thomabravo.com/press-releases/barracuda-agrees-to-be-acquired-by-thoma-bravo-for-1.6-billion?ref=content.strategyofsecurity.com">$1.6 billion transaction</a>. This was a large-scale deal at the time — over $300 million larger than Thoma Bravo's 2011 acquisition of Blue Coat for $1.3 billion.</p>
<p>On a whirlwind day of April 12, 2022 — a day after Thoma Bravo announced it was acquiring SailPoint — they <a href="https://www.thomabravo.com/press-releases/kkr-to-acquire-barracuda-networks?ref=content.strategyofsecurity.com">sold Barracuda to KKR</a> for a rumored $4 billion.</p>
<p>Barracuda's revenue had grown to over $500 million at the time of this transaction. That's larger than many public cybersecurity companies today.</p>
<h4 id="sailpoint">SailPoint</h4>
<p>As mentioned earlier, the recent news about Thoma Bravo acquiring SailPoint is the firm's second time owning the company. Thoma Bravo's first go around with SailPoint was a 2014 acquisition from venture capital funds.</p>
<p>An exit came just three years later, with Thoma Bravo taking SailPoint public in 2017. This was definitely a successful exit for all as SailPoint performed well during its time as a public company.</p>
<p>There is a lot more to dive into with Thoma Bravo's second acquisition of SailPoint. That's where we're headed next.</p>
<h2 id="thoma-bravos-audacious-future">Thoma Bravo's Audacious Future</h2>
<p>In my <a href="https://strategyofsecurity.com/p/themes-from-momentum-cybers-2022-cybersecurity-almanac/">analysis</a> of Momentum Cyber's 2022 Cybersecurity Almanac, I made an observation about how wild things are in cybersecurity right now:</p>
<blockquote>
<p>First, let's just call a spade a spade: 2021 was a wild year in cybersecurity. Several of the financial numbers in the report are mind-bending. The cyber attacks are even worse. It's madness, and the madness is multiplying.</p>
</blockquote>
<p>On the private equity side, Thoma Bravo is leading the charge of accelerating change. The obvious trend in the chart of Thoma Bravo's investment history (shown earlier) is that their transactions keep getting bigger and bolder. The buy-side examples of Proofpoint and SailPoint and the sell-side examples of McAfee and Barracuda make this point abundantly clear.</p>
<p>Outside of cybersecurity, it was speculated that Thoma Bravo has <a href="https://pitchbook.com/newsletter/thoma-bravo-considers-twitter-bid?ref=content.strategyofsecurity.com">interest in buying Twitter</a>. You know, <em>that Twitter</em> — the same company Elon Musk also wants to buy. Even though it looks like this deal isn't going to happen for Thoma Bravo, the punch line still matters: you don't compete directly with Elon Musk unless you're comfortable making audacious moves.</p>
<p>Thoma Bravo <a href="https://www.thomabravo.com/press-releases/thoma-bravo-completes-22.8-billion-fundraise?ref=content.strategyofsecurity.com">raised three funds</a> totaling $22.8 billion at the end of 2020. They're rumored to be <a href="https://www.wsj.com/articles/thoma-bravo-plots-next-fund-in-red-hot-market-for-tech-deals-11625783128?ref=content.strategyofsecurity.com">raising again</a> (paywalled, sorry) already. Forbes described the plan nicely:</p>
<blockquote>
<p>...Bravo is eyeing $10 billion-plus deals and expects to begin buying entire divisions from today’s technology giants.</p>
</blockquote>
<p>We've already seen the $10 billion-plus deals start to happen. They're going to continue as long as Thoma Bravo keeps up this level of success. Orlando Bravo described the opportunity in front of his firm to Forbes:</p>
<blockquote>
<p>There are bigger and better companies to fix than there were ten years ago.</p>
</blockquote>
<p>An important piece of context here is that Orlando Bravo was already a billionaire <em>before</em> the 2019 fund, joining the 2019 Forbes 400 that same year. Neither Bravo nor the firm that bears his name have much of anything left to prove.</p>
<p>This could be the exact reason for the audacity you're seeing today. Metaphorically, Thoma Bravo is playing with house money. The irony in saying the pressure is off for a private equity firm making deals at this scale is not lost on me. However, Thoma Bravo has a formula and track record that justify the success they've had and the audacious moves you're seeing today.</p>
<p>Time will tell how their current portfolio plays out and what future moves will be made. Until then, it's going to be interesting to watch the story unfold. Bravo, Thoma Bravo 👏</p>
]]></content:encoded>
            <category>M&amp;A</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/04/Logo_-Thoma-Bravo.png"/>
        </item>
        <item>
            <title><![CDATA[Cybersecurity Ecosystem Mapping Updates: April 2022]]></title>
            <link>https://strategyofsecurity.com/cybersecurity-ecosystem-mapping-updates-april-2022/</link>
            <guid>625d93db823a82003dba07d6</guid>
            <pubDate>Mon, 18 Apr 2022 17:26:45 GMT</pubDate>
            <description><![CDATA[Reflection, future plans, and a large set of updates to the original cybersecurity ecosystem mapping.]]></description>
            <content:encoded><![CDATA[<p>The cybersecurity ecosystem mapping project I <a href="https://strategyofsecurity.com/p/mapping-the-cybersecurity-ecosystem/">launched in September 2021</a> has been (by far) the most popular article on Strategy of Security so far. There was something extra special about the project that resonated with thousands of people.</p>
<p>In the months since the original mapping was published, many people have told me it was how they first found out about this publication. For others who have joined later, this could be the first time you've seen the mapping outside of passing references I've made in other articles. Regardless of your starting point, I view the ecosystem mapping project as a foundational activity for my work.</p>
<p>Today's article is different type of piece than I've been writing recently. Instead of looking outward at cybersecurity companies or topics, I'm looking inward at the cybersecurity mapping project. We'll cover a few topics this week:</p>
<ul>
<li>
<p><strong>Reflection and analysis:</strong> A bit of reflection and analysis on the cybersecurity mapping project with highlights and interesting observations.</p>
</li>
<li>
<p><strong>Mapping updates:</strong> The main objective — I made some significant updates to the ecosystem mapping. This article summarizes all of them, along with some additional commentary.</p>
</li>
<li>
<p><strong>Future plans:</strong> I have a few different ideas about the direction this project could go in the future. It's too early to share them all yet, but I would love your input on how the project has been useful to you.</p>
</li>
</ul>
<p>It feels like these updates to the mapping are long overdue. Needless to say, an updated version has been building for months. I'm excited to finally bring it to you.</p>
<p>If you want to skip straight to the updated version of the mapping, you can find it at the link below. The URL is the same, but the page has now been updated with everything we're about to discuss in this article.</p>
<figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Cybersecurity Ecosystem – Strategy of Security</div><div class="kg-bookmark-description">A mapping of the cybersecurity ecosystem. The mapping includes visuals, definitions, and examples of each part.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://strategyofsecurity.com/p/favicon.png" alt=""><span class="kg-bookmark-author">Strategy of Security</span><span class="kg-bookmark-publisher">Cole Grolmus</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/04/Cybersecurity-Ecosystem-Mapping-v2-2.png" alt="" onerror="this.style.display = 'none'"></div></a></figure><h2 id="reflection-and-analysis">Reflection and Analysis</h2>
<p>To say I'm surprised about how popular the cybersecurity ecosystem mapping project has been is a huge understatement. I thought it would be a useful reference but never expected it to be shared so widely or viewed so frequently for months on end.</p>
<p>My plan was to publish the initial version of the model, use it myself, and see where it broke in practice. That definitely happened — a lot more often than I expected. I thought I did a relatively comprehensive job in the first version, but I was surprised at how many omissions or <em>"this doesn't make sense"</em> moments I had after publishing it.</p>
<p>What I take away from my mistakes is that understanding and defining the cybersecurity ecosystem is hard. I have worked in cybersecurity for basically all of my working years, and I still missed basic things when building this mapping. Looking back, I have just accepted this is going to happen. The mapping gets better and more accurate with every new iteration.</p>
<p>Bigger picture, I still don't understand exactly why people are so interested in the topic of cybersecurity industry mappings. I've developed a few working theories as I've talked to people, looked at the data, and explored the ecosystem in more depth after the article was published.</p>
<p>In general, I think mappings like this one are useful because cybersecurity is so vast. It's a legitimately confusing field, and that's...<em>unnerving</em> to people. We're all on our own version of a search for understanding about what's happening and how we fit in. The combination of uncertainty and our desire to find our own place is why industry mappings are useful.</p>
<p>There also seems to be a lot of value in defining the industry at a granular level. I <em>think</em> a lot of the mapping's value comes from the taxonomy, both depth and breadth. Sometimes this doesn't matter — a general grouping of companies by domain is fine. In other cases (like venture capital), the nuanced differences matter a lot.</p>
<p>Finally, there seems to be a lot of value in the cybersecurity ecosystem visual itself. I spent a lot of time designing this, and I'm happy with how it turned out. It's definitely a busy visual with a lot of improvements that could be made. However, it's proven to be useful for many people in ways I couldn't have imagined.</p>
<p>I expect that I will continue to learn more and evolve my thinking and understanding over time. It's been a useful project for me personally as I've stretched the boundaries of my understanding about the ecosystem I work in.</p>
<h2 id="cybersecurity-ecosystem-mapping-updates">Cybersecurity Ecosystem Mapping Updates</h2>
<p>Now, on to the important part — the updates. The punch line is that I made a lot of updates. This wasn't a total overhaul, but far more updates than the few minor changes I've made in the seven months since it launched. In <a href="https://semver.org/?ref=content.strategyofsecurity.com">Semantic Versioning</a> terms, it's like a minor update to v1.1.0.</p>
<p>All of the updates are summarized in alphabetical order to keep things organized. Some updates are more major than others (especially in Digital Identity and Privacy). I've tried to call out major updates while also keeping track of notable but minor updates.</p>
<h4 id="angel-and-seed-investors">Angel and Seed Investors</h4>
<p>I added seed stage investors to the Investors category to make the distinction between early and later stage venture capital.</p>
<p>The seed rounds cybersecurity startups are raising keep getting larger. Operators and other less traditional types of investors have entered the picture as valuable investors at this stage. Angels and seed investors are clearly important enough to have their own place on the mapping.</p>
<h4 id="cloud-security">Cloud Security</h4>
<p>Cloud security is still a moving target and rapidly evolving part of the ecosystem. However, segments of this market have relatively agreed upon definitions now. The mapping was updated to reflect the ones I feel are accurate.</p>
<p>I updated the naming of Cloud Workload Protection Platforms (CWPP) and Cloud Security Posture Management (CSPM) to reflect current industry naming conventions for these emerging markets. I also updated the example companies within them, mostly to map companies in the original version to more accurate categories.</p>
<p>Cloud Infrastructure Entitlements Management (CIEM) was added as a new category. This technically could map to Authorization instead, but I included it in Cloud Security since the focus of this category is specifically on access within cloud platforms.</p>
<p>I expect the markets and mappings in this category to keep evolving at a faster pace than other parts of the market. The pace of change is a good thing — both because the pace of innovation is needed, and because our mutual understanding of the market and companies within it keeps improving.</p>
<h4 id="devsecops">DevSecOps</h4>
<p>I added DevSecOps as a category under Application Security. This seemed like an obvious miss in the original version. However, the term is so broad that it encompasses several areas of application security. It's actually hard to map companies/products directly into it.</p>
<p>Rather than forcing company mappings to work, I focused on the methodology itself and included links to resources in the mapping. Many of the products listed under other Application Security categories are a great fit for DevSecOps, but they didn't make sense to me for a direct mapping.</p>
<p>I might change my mind about this, but in general, there is no doubt that DevSecOps needs to be in the mapping.</p>
<h4 id="digital-identity">Digital Identity</h4>
<p>The category formerly known as Access Control in my original mapping saw some major updates in this new version. It's totally revamped now.</p>
<p>Looking back on the original mapping, many of the categories felt academic and by-the-book. It was accurate but felt...<em>out of touch</em> with some of the awesome things that are happing in this part of the cybersecurity ecosystem.</p>
<p>The recently released <a href="https://liminal.co/liminal-landscape-honeycomb/?ref=content.strategyofsecurity.com">Liminal Landscape</a> had a major influence on this set of updates. Liminal's approach and methodology for defining the market are fantastic. Their landscape is a highly recommended read if you're spending time thinking about this part of the ecosystem.</p>
<p>In addition to the top-level name change to Digital Identity (much cooler), I made updates to several category definitions and company examples to modernize them.</p>
<p>I also added Password Managers, which was a huge miss from the first version — especially after I <a href="https://strategyofsecurity.com/p/1passwords-blue-ocean-strategy">wrote nearly 7,000 words</a> about a password manager in a single article.</p>
<h4 id="file-integrity-monitoring">File Integrity Monitoring</h4>
<p>I renamed File Integrity Protection to File Integrity Monitoring to be consistent with current vendor terminology.</p>
<p>I also moved this category from Privacy to Endpoint Security. The market is more focused on the endpoint security aspects of file monitoring (e.g. malware and intrusion detection) than privacy, so this felt like a better fit.</p>
<p>Finally, I added CrowdStrike as an example company because of their recent File Integrity Monitoring product acquisition.</p>
<h4 id="intelligence">Intelligence</h4>
<p>My original definition of "intelligence" was a bit fuzzy, so I defined it more clearly in this set of updates.</p>
<p>I created a general category for Intelligence, moved Threat Intelligence under it, and added OSINT. OSINT is its own domain, and an important one in cybersecurity.</p>
<h4 id="investment-banking">Investment Banking</h4>
<p>I added Investment Banking under Investors. This wasn't included in the original mapping. That was a miss because investment banking plays a huge role in M&amp;A within cybersecurity and tech at large.</p>
<p>For example, firms like <a href="https://strategyofsecurity.com/p/themes-from-momentum-cybers-2022-cybersecurity-almanac/">Momentum Cyber</a> focus exclusively on cybersecurity transactions. Cybersecurity is also a significant part of the deal portfolio for other firms.</p>
<h4 id="messaging-security">Messaging Security</h4>
<p>Messaging Security has been a relatively busy area of the ecosystem recently. Cloudflare <a href="https://www.cloudflare.com/press-releases/2022/cloudflare-to-acquire-area-1-security/?ref=content.strategyofsecurity.com">acquired Area 1 Security</a> in February, and startups like Tessian are continuing to impress.</p>
<p>I moved Messaging Security under Network Security and added Tessian as an example company.</p>
<h4 id="privacy">Privacy</h4>
<p>Privacy received the largest number of updates aside from revamping Digital Identity.</p>
<p>Privacy tech has become its own distinct market separate from Data Protection. As a result, I separated Privacy and Data Protection, moving Data Protection into a secondary category under Privacy.</p>
<p>Privacy has a maturing set of enterprise-focused products for privacy program management and enterprise privacy management. The International Association of Privacy Professionals (IAPP) helped a lot here with a <a href="https://iapp.org/media/pdf/resource_center/2021TechVendorReport.pdf?ref=content.strategyofsecurity.com">full report</a> on privacy tech vendors. The revisions bring the ecosystem mapping into closer alignment with the IAPP definitions.</p>
<h4 id="secure-web-browsers">Secure Web Browsers</h4>
<p>I added new category for Secure Web Browsers to Endpoint Security. There has been lots of recent funding and innovation in this area after the original ecosystem mapping was published. Startups like <a href="https://www.island.io/?ref=content.strategyofsecurity.com">Island</a> made a grand entrance and put this market on the map. It's an interesting one to watch going forward.</p>
<h4 id="security-architecture">Security Architecture</h4>
<p>Security Architecture was another glaring omission from the original mapping. I had a hard time defining this one because specific instances of security architecture — most notably Zero Trust Architecture (ZTA) — get <a href="https://strategyofsecurity.com/p/decoding-zero-trust-marketing/">talked about so much</a> that they feel like their own category.</p>
<p>If we take a step back from the buzz, topics like ZTA, SASE, SDP, and the like are all different examples of security architecture. When I looked at it that way, the definition of Security Architecture as a category made sense.</p>
<p>As a result, I added it to Governance, Risk, and Compliance. The mapping to GRC might not be the appropriate long term fit, but didn't feel like Security Architecture was defined enough to be a top-level category yet. Regardless of placement, Security Architecture is an influential category in the cybersecurity ecosystem.</p>
<h4 id="spyware-and-stalkerware">Spyware and Stalkerware</h4>
<p>Unfortunately, use of spyware and stalkerware is an <a href="https://techcrunch.com/2021/10/11/google-pulls-stalkerware-ads-that-promoted-phone-spying-apps/?ref=content.strategyofsecurity.com">emerging issue</a> within cybersecurity that merits its own category in the Cyber Crime portion of the ecosystem mapping.</p>
<p>This might be the most controversial update in that there is a fine line between commercial "parental control" software and legitimate malware. What matters is how it's used.</p>
<p>Technically, this software could be used for legitimate (albeit questionably legitimate, IMO) purposes. However, it can also be misused. Grouping this category and set of example companies under cyber crime isn't an indictment of the companies, per se — it's an observation about their potential for misuse in the hands of bad actors. I'm sure I'll get PR emails about this.</p>
<p>Organizations and companies are also emerging to mitigate threats posed by spyware and stalkerware. I intentionally didn't put them in the same grouping. A couple examples are <a href="https://stopstalkerware.org/?ref=content.strategyofsecurity.com">Coalition Against Stalkerware</a> and <a href="https://www.mallocprivacy.com/?ref=content.strategyofsecurity.com">Malloc</a> from <a href="https://strategyofsecurity.com/p/yc-s21-cybersecurity-startups/">Y Combinator's S21 batch</a>.</p>
<h4 id="software-supply-chain-security">Software Supply Chain Security</h4>
<p>Software supply chain security has been one of the hottest, if not <em>the</em> hottest, topics since my original mapping came out. It was brought into focus with President Joe Biden's executive order on <a href="https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity?ref=content.strategyofsecurity.com">Improving the Nation's Cybersecurity</a>. Guidance <a href="https://www.nist.gov/itl/executive-order-improving-nations-cybersecurity/software-supply-chain-security?ref=content.strategyofsecurity.com">from NIST</a> quickly followed.</p>
<p>I had originally included Supply Chain Security as a category within Phisical Security. In this update, I thought it would be best to focus on software supply chain security because this is now a specific market within cybersecurity that's well understood. Broader supply chain security in a physical sense is still important; it's just adjacent to cybersecurity.</p>
<p>To match the current thinking and terminology, I eliminated Supply Chain Security from Physical Security and created a new category for Software Supply Chain Security under Application Security. The updated mapping also includes a fresh set of newly-funded startups as example companies.</p>
<h4 id="trust-and-safety">Trust and Safety</h4>
<p>I added new category for Trust and Safety under Fraud and Transaction Security. This is an emerging category of tools that's closely related to cybersecurity. Cinder from Y Combinator's W22 batch is a good example that I've <a href="https://strategyofsecurity.com/p/y-combinators-winter-2022-cybersecurity-privacy-and-trust-startups/">covered recently</a>.</p>
<h4 id="zero-trust-network-access-ztna">Zero Trust Network Access (ZTNA)</h4>
<p>Finally, Zero Trust Network Access (ZTNA) is a new category under Network Security. This category has a <a href="https://www.gartner.com/en/information-technology/glossary/zero-trust-network-access-ztna-?ref=content.strategyofsecurity.com">formal definition from Gartner</a>, which is plenty of validation to include it here. Companies like Appgate, Zscaler, and Palo Alto Networks all have strong offerings in this category and have been added as example companies.</p>
<h2 id="future-updates-and-evolution">Future Updates and Evolution</h2>
<p>The good part about the ecosystem mapping project having some traction and feedback is that I now have options for where to take it next...and all of them are awesome. I'm not ready to make any major announcements yet, but know that I've been thinking a lot about how to take this project to the next level.</p>
<p>One specific update I'm committed to is making frequent, iterative updates instead of major updates like this one. If I spot a trend, error, or a great new company, I'm just going to make the change instead of accruing a bunch of updates to make later.</p>
<p>With this update, I'm launching a <a href="https://github.com/strategyofsecurity/cybersecurity-ecosystem?ref=content.strategyofsecurity.com">public GitHub repo</a> with the Markdown under version control. For now, this includes the written portion of the mapping with category definitions and example companies. Any changes I make to the mapping will show up in the repo and get updated on the Strategy of Security site.</p>
<p>You're welcome to submit pull requests if you have changes you'd like to review and incorporate. I reserve the right to decide which ones I incorporate, but I'm definitely open to input that improves the quality of the project.</p>
<p>I have also <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6OThkNGQ5ZjUtMmMyMC00NDI1LWFiYzMtNGMxZmMwNGFkMmEw?ref=content.strategyofsecurity.com">created a survey</a> to collect feedback about how you're using the visual and data (or how you'd <em>like</em> to use it). Any feedback I have collected so far has been anecdotal, so this is an attempt to be more scientific about it.</p>
<p>One final note: a piece of feedback that stuck with me came from talking with an investor shortly after the original mapping launched. They told me, <em>"it sounds like this project was 20 years in the making."</em></p>
<p>I hadn't thought of it that way, but they're exactly right. It took me over a month to literally build the visual and data for the mapping, but the process of understanding the ecosystem has taken decades.</p>
<p>This observation is also telling about the future of the project: I'm still working on my understanding. This process could continue for the <em>next</em> 20 years. That's an exciting thought for me, and I'm looking forward to seeing where this project goes over time.</p>
]]></content:encoded>
            <category>Ecosystem</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/04/Cybersecurity-Ecosystem-Mapping-v2.png"/>
        </item>
        <item>
            <title><![CDATA[Decoding Zero Trust Marketing With Appgate's Chief Marketing Officer]]></title>
            <link>https://strategyofsecurity.com/decoding-zero-trust-marketing/</link>
            <guid>615b6f08cff496003d17df84</guid>
            <pubDate>Mon, 11 Apr 2022 20:41:32 GMT</pubDate>
            <description><![CDATA[A discussion with Julie Preiss, Appgate's Chief Marketing Officer, about a "Zero BS" approach for Zero Trust marketing.]]></description>
            <content:encoded><![CDATA[<p>There is too much BS marketing about Zero Trust. That's one of the only things  people agree about when it comes to this topic. The exact amount of BS is hard to quantify, but we all know it when we see it.</p>
<p>It's easy to get jaded by an overabundance of marketing and throw out the baby with the bath water, so to speak. That's a shame. Obnoxious marketing sours people towards Zero Trust.</p>
<p>It's also easy to get lost in the translation between Zero Trust as a concept to practical implementation. This tweet summarizes the conundrum nicely:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">I’ve had occasion to talk to quite a few infosec people lately, and surprisingly we can all agree on two things about Zero Trust:<br><br>1) Nobody knows what it is<br><br>2) We all want it</p>— apenwarr (@apenwarr) <a href="https://twitter.com/apenwarr/status/1503734894404718594?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">March 15, 2022</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>For months, I've been on a mission to decode Zero Trust marketing. I wanted to know what it is and why we all should want it. That's a big undertaking. This article is the start of my attempt to do so.</p>
<p>My first objective was to cut through the BS to understand the idea of Zero Trust Architecture at a foundational level. Then, I built upon this understanding to start explaining what good and bad Zero Trust marketing means.</p>
<p>This exploration led me all over the place in the world of Zero Trust:</p>
<ul>
<li>
<p>Stephen Paul Marsh's <a href="https://dspace.stir.ac.uk/handle/1893/2010?ref=content.strategyofsecurity.com#.YksFzN9Olqs">original Ph.D. thesis</a> that underpins the idea of Zero Trust.</p>
</li>
<li>
<p>Forrester's groundbreaking research on <a href="https://www.forrester.com/blogs/the-definition-of-modern-zero-trust/?ref=content.strategyofsecurity.com">Zero Trust Architecture</a>, including analysts like John Kindervag, Chase Cunningham, David Holmes, and Jess Burn.</p>
</li>
<li>
<p>NIST <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf?ref=content.strategyofsecurity.com">Special Publication 800-207: Zero Trust Architecture</a> — a foundational read for understanding what Zero Trust is and is not.</p>
</li>
</ul>
<p>...and many, many more articles.</p>
<p>My journey to understand the marketing side of Zero Trust led me to a fascinating discussion with <a href="https://www.linkedin.com/in/juliepreiss/?ref=content.strategyofsecurity.com">Julie Preiss</a>, the Chief Marketing Officer at <a href="https://www.appgate.com/?ref=content.strategyofsecurity.com">Appgate</a>.</p>
<p>Appgate is one of the leading Zero Trust companies, consistently ranked among the leaders in the category by analysts like Forrester and Gartner. It's also a rising star as a first-year public cybersecurity company, <a href="https://www.appgate.com/news-press/appgate-announces-fourth-quarter-and-full-year-2021-financial-results?ref=content.strategyofsecurity.com">recently reporting</a> 38% year-over-year Annual Recurring Revenue (ARR) growth for the 2021 fiscal year.</p>
<p>Julie has been the CMO at Appgate since 2020. She helped the company grow into a public company by 2021. Julie has over two decades of experience as a technology and cybersecurity marketing leader.</p>
<p>As a person who has seen the exponential rise of Zero Trust since the very beginning, she has a unique and insightful point of view on where the movement is at today. There are very few people in the world with a better understanding of Zero Trust marketing.</p>
<p>This article includes significant portions of the wide-ranging discussion I had with Julie. It's intentionally heavy on quotes. When learning from someone as insightful as Julie, you want to hear exactly what she has to say without much intervention from me.</p>
<p>Specific topics we'll cover in this article include:</p>
<ul>
<li>
<p>Why people get confused about Zero Trust</p>
</li>
<li>
<p>How to approach Zero Trust marketing</p>
</li>
<li>
<p>How to market Zero Trust products accurately</p>
</li>
<li>
<p>What the future holds for Zero Trust</p>
</li>
</ul>
<p>The article has something for everyone — both marketers and InfoSec professionals. I'm excited to share this discussion with you.</p>
<h2 id="why-people-get-confused-about-zero-trust">Why People Get Confused About Zero Trust</h2>
<p>Zero Trust is an incredibly confusing topic, partly because it breaks the paradigm we've become used to seeing as InfoSec professionals. Zero Trust isn't prescriptive — it's principled. Security frameworks and regulations are often prescriptive: <em>"do X, Y, Z and you'll meet the requirements."</em> Zero Trust principles provide guidance but leave <em>a lot</em> of room for interpretation.</p>
<p>There isn't one best way to do Zero Trust. The ambiguity creates confusion. Leaving room for interpretation is generally a good thing. However, it also allows people and companies to latch on to a broad set of ideas about Zero Trust and make connections that are questionable at best. It's a recipe for misconceptions and confusion.</p>
<p>As a Chief Marketing Officer, Julie has a lot of conversations with customers. In our discussion, she highlighted several areas of confusion she typically sees about Zero Trust and how to clear it up. That's what we'll cover in this section.</p>
<h4 id="zero-trust-is-a-whole-ecosystem-of-products-not-one-product">Zero Trust is a whole ecosystem of products, not one product.</h4>
<p>We're used to seeing cybersecurity companies build products that solve a problem. Need Single Sign-On? Get Ping Identity. Endpoint Protection? CrowdStrike has got you. DDoS protection? Everyone uses Cloudflare!</p>
<p>This isn't the case at all with Zero Trust. The product-solves-a-problem paradigm breaks. Julie describes the misunderstanding like this:</p>
<blockquote>
<p>Zero Trust is huge. People think, <em>"I can buy one product and that's my Zero Trust."</em> It's not. It's a whole ecosystem of products.<br>
<br>
Do your due diligence and find out who can really deliver on the seven different pillars of Zero Trust.</p>
</blockquote>
<p>Any company who says their product has everything needed to implement Zero Trust is lying. You need multiple technologies. I know you don't want more products or more vendors, but don't fall into this trap.</p>
<p>The advantage of flexibility within the Zero Trust framework is choice. You can select the technologies that fit your environment and strategy. Julie explained how in more detail:</p>
<blockquote>
<p>There's some really good documentation out there now, especially by NIST, around implementing Zero Trust.<br>
<br>
They don't tell you to go buy X, Y, or Z products — which they shouldn't. They say, <em>"here are the things you need to do to get your organization architected to support a Zero Trust strategy."</em> Then, they lay out a framework for the various pieces of the puzzle.<br>
<br>
Find the things that fit the puzzle in your environment. The guidance doesn't force specific solutions on you, or any type of technology.</p>
</blockquote>
<p>Choice can be confusing, but it's a good thing. Once you become comfortable with the strategy behind Zero Trust, you can implement the ideas in a way that works for you.</p>
<h4 id="you-dont-have-to-rip-and-replace-everything">You don't have to rip and replace everything.</h4>
<p>With a concept as new as Zero Trust, it's easy to assume you need to implement it from scratch and build a whole new network. It's a far out concept that seems like it would work for...<em>those fancy new tech companies out in California.</em></p>
<p>Today is your lucky day. Julie is the bearer of good news for everyone worried about erasing their network and starting over:</p>
<blockquote>
<p>The truth is, you should be able to modernize over time. You don't have to rip and replace everything or start from scratch.<br>
<br>
Nobody could do that. And it wouldn't be effective if that was the plan.</p>
</blockquote>
<p>There you have it. You, too, can implement Zero Trust — starting with the infrastructure you have right now. The rationale makes a lot of sense. Julie talks with lots of customers, so she was able to explain exactly why:</p>
<blockquote>
<p>Think about how long organizations have been building their current security architecture. They've sunk so much cost into the technology they've already invested in.<br>
<br>
You're not going to find anybody who is just going to blow it all up and go, <em>"Oh, we're going to start from scratch and build Zero Trust"</em> — unless you're a brand new organization and you have the luxury to do it.<br>
<br>
You're going to have to go back and retrofit and tweak and insert and integrate new technologies to get yourself on the path to Zero Trust.</p>
</blockquote>
<h4 id="you-can-implement-zero-trust-in-bite-sized-chunks">You can implement Zero Trust in bite sized chunks.</h4>
<p>One of the big ideas behind implementing a Zero Trust Architecture is that it can be implemented in small, iterative pieces. Admittedly, this was my biggest misunderstanding about Zero Trust before looking into it deeper.</p>
<p>Julie explained the advice she typically gives to Appgate customers for approaching their Zero Trust implementations:</p>
<blockquote>
<p>You can do it in bite sized chunks. You don't have to take on the mindset of, <em>"we're going to modernize and move to a Zero Trust Architecture."</em> That would be incredibly overwhelming.<br>
<br>
Some companies may take years to get there. There's a misperception that you have to try to boil the ocean with it all at once.<br>
<br>
The truth is, you can assess your risk and start with the projects that are going to make the biggest impact to help you reduce your risk — first, second, third, fourth, fifth, and roll it out over time.</p>
</blockquote>
<p>John Kindervag, one of the pioneers of Zero Trust in his time at Forrester, talked about an incremental approach in some of his earliest talks about Zero Trust.</p>
<p>You will find the exact same advice in NIST Special Publication 800-207: Zero Trust Architecture — a go-to resource on implementing Zero Trust:</p>
<blockquote>
<p>Organizations should seek to incrementally implement zero trust principles, process changes, and technology solutions that protect their data assets and business functions by use case. Most enterprise infrastructures will operate in a hybrid zero trust/perimeter-based mode while continuing to invest in IT modernization initiatives and improve organization business processes.</p>
</blockquote>
<p>This is comforting advice for anyone feeling uneasy about the size, scope, and magnitude of implementing Zero Trust. It's common to get stuck in analysis paralysis because of misconceptions about a "big bang" implementation approach.</p>
<p>Julie sees this problem all the time. She offered an alternative solution that makes implementing Zero Trust feel a lot more manageable:</p>
<blockquote>
<p>What keeps people from moving forward with Zero Trust is analysis paralysis. If you try to solve for it all at once, it will be completely overwhelming.<br>
<br>
If you focus on solving a specific gap, then map a solution to it, and start chipping away at it from there, it becomes more manageable. It seems like less of a mountain to climb. Just get started. Start somewhere. Start with the most common thing.<br>
<br>
The most common thing people start with is replacing or augmenting their VPNs. VPNs are usually the weakest link for any organization. This certainly blew up during COVID because of all the remote work. VPNs weren't built to handle the situation that happened.<br>
<br>
Find your first use case, find your first thing that you can do to get started on the journey. But get started — don't get left behind. Get started.</p>
</blockquote>
<p>The iterative approach to implementing Zero Trust that Julie and others suggest is interesting. It reminds me of Agile in software development. People wouldn't normally apply this paradigm to networking. We don't typically think about implementing a network iteratively — iteration is for software, or so our antiquated thinking goes.</p>
<p>Building a Zero Trust Architecture iteratively is a barrier to overcome because approaching infrastructure in an iterative way feels unfamiliar. However, it's a huge opportunity to quickly demonstrate progress for Zero Trust initiatives.</p>
<h4 id="articulating-the-business-value-of-zero-trust-requires-a-different-approach">Articulating the business value of Zero Trust requires a different approach.</h4>
<p>Oh, right <em>...funding</em>. Implementing Zero Trust at your company is not a science experiment. You need funding. In Julie's experience, building a business case for Zero Trust is trickier than it sounds:</p>
<blockquote>
<p>A lot of security practitioners don't know how to articulate the value of Zero Trust internally, so they have a hard time getting budget for it.</p>
</blockquote>
<p>There's not a line item budget for Zero Trust. People understand what a firewall is and what it does. So, it's probably less education on your part to explain that. Something like Zero Trust takes a different approach.</p>
<p>Companies benefit from Zero Trust in two ways. First and foremost is your security. But also, if you implement Zero Trust properly, there are operational and cost savings over time. You are getting rid of outdated things or automating things that used to be manual.</p>
<p>Challenges in building a business case for Zero Trust are sneaky. They're caused by <em>other people's</em> limited understanding about Zero Trust. It's hard enough to understand the value of Zero Trust on your own. And guess what? Once you do, you then have to explain the value to the people who are going to be funding your projects. Double whammy.</p>
<p>This situation is a second order effect of sunk costs. Unless a company is brand new, it already has a network in place. People in charge of budgets will rightfully ask, <em>"why don't we just upgrade our network?"</em> or <em>"do we need to upgrade our network?"</em></p>
<p>Security doesn't have many comparable instances where teams are implementing completely new strategies or paradigms. Typically, we're replacing and cycling through existing models, or we're implementing technologies that are clearly solving one narrow problem. Zero Trust is a broad strategy that involves multiple technologies.</p>
<p>Knowing how to articulate the business value of a completely new concept like Zero Trust takes some work. It's worthwhile once the case has been made and funding is secured.</p>
<h2 id="how-to-approach-zero-trust-marketing">How to Approach Zero Trust Marketing</h2>
<p>As a marketing leader, one of the most difficult yet important parts of a Zero Trust marketing strategy is how to approach your company's messaging. Ultimately, the approach is a strategic choice that drives tactical decisions and actions.</p>
<p>The consequences of this strategic choice are the difference between good and bad Zero Trust marketing. Julie pointed out how the term can start to lose its meaning if it's is used without intent:</p>
<blockquote>
<p>Everybody throws the term around, and like any term, it kind of starts to become more of a buzzword. It sounds like it's a marketing philosophy as opposed to an actual thing.</p>
</blockquote>
<p>That's not what we want for Zero Trust. It's still an emerging trend. We're not in a winner-take-all situation yet — there's still a long way to go before Zero Trust is well understood and widely implemented.</p>
<p>Everyone is going to be better off if we can educate each other about how Zero Trust is supposed to work and monitor bad marketing and sales behavior when it happens.</p>
<p>In this section, we're going to talk about how marketers can approach their Zero Trust strategy and create messaging they can be proud of.</p>
<h4 id="talk-about-what-zero-trust-is-before-talking-about-how-your-company-fits-into-the-equation">Talk about what Zero Trust is before talking about how your company fits into the equation.</h4>
<p>Early on, Appgate took a specific, education-first approach towards its marketing strategy:</p>
<blockquote>
<p>One thing that we decided from the beginning, and I think we've consistently done is to educate people about what Zero Trust is, and why should you care?<br>
<br>
Our strategy has been to really talk straight about what Zero Trust is before we ever tell you how we fit into the equation.</p>
</blockquote>
<p>Spending time educating people about the topic of Zero Trust might <em>seem</em> like a waste of time, but education is an essential part of building awareness and understanding. If the InfoSec professionals who are making purchasing decisions and implementing products don't understand the foundational concepts of Zero Trust, it's a recipe for failure.</p>
<p>Julie believes it's important for potential customers to understand the strategy behind Zero Trust before making any decisions about technology:</p>
<blockquote>
<p>We want people to understand what it is, why it's important to modernize their security strategy using Zero Trust, and then figure out, how do I get started, and what are the technology pieces of the puzzle?<br>
<br>
They have to understand and embrace the strategy first, and a lot of our work has been around educating about the strategy.</p>
</blockquote>
<p>Companies can (and do, far too often) lead with their product when talking to potential customers about Zero Trust. This approach can work, but it runs the risk of falling apart at implementation if the product doesn't fit into a well thought out Zero Trust strategy for the company implementing it.</p>
<p>Leading with education is a collaborative approach. Educating — or better yet — co-developing a Zero Trust strategy with potential customers significantly increases the chances a product will successfully fit into a coherent and thoughtful architecture and implementation plan.</p>
<h4 id="be-a-straightforward-advocate-of-zero-trust">Be a straightforward advocate of Zero Trust.</h4>
<p>There's a difference between using the hype of Zero Trust to sell your product versus a genuine advocacy of Zero Trust strategy. Attaching your marketing to a trend without having conviction <em>about</em> the trend doesn't feel right. And customers can tell.</p>
<p>Julie suggested a far better approach when I asked her what she's most proud of in Appgate's marketing:</p>
<blockquote>
<p>I really am most proud about the fact that we have taken a thought leadership approach to our advocacy of the strategy of Zero Trust.<br>
<br>
Our goal at the end of the day is to help organizations be more secure. If you can help educate them towards that, it's a win for everybody.</p>
</blockquote>
<p>If you believe in the idea of Zero Trust, advocate for it. That's how you build conviction about the problem you're solving and how your company and product fit into the solution. When you have conviction and your messaging reflects your beliefs, you've built a Zero Trust marketing strategy you can be proud of.</p>
<p>Education and advocacy do come with some (worthwhile) risks. Julie explained the tradeoff this way:</p>
<blockquote>
<p>Obviously, we want you to become an Appgate customer. But if you're a better educated security consumer, that's a win, because at the end of the day, your company is going to be more secure. So, we try to just be a straightforward advocate for Zero Trust.</p>
</blockquote>
<p>I totally agree with this mindset. The risk with advocacy is that you could be the company who educates a potential customer, and then they end up buying another product. Helping to educate someone about how to make their company more secure is somewhat of a consolation prize — especially when you've got sales targets to meet.</p>
<p>However, people remember who their teachers are. Even if they decide to make a different purchasing decision, the education sticks with them. If you're playing the long game (as Julie does), education and advocacy put your company in a position to have another opportunity in the future when people move into new roles or refresh their technology. You're not going to win every deal, so give yourself an opportunity to win the next one.</p>
<h2 id="how-to-market-zero-trust-products-accurately">How to Market Zero Trust Products Accurately</h2>
<p>There has been spirited discussion recently about cybersecurity firms "hijacking" the term Zero Trust. This line of thinking goes as far as saying the term Zero Trust has essentially become meaningless because it's so overused.</p>
<p>Discussions like this catch a lot of attention because they portray an absolute point of view. There is definitely some truth to Zero Trust being misrepresented and used inaccurately — but like most topics, the nuances matter.</p>
<p>In this section, we'll explore the problems of misuse and discuss some suggestions for marketing Zero Trust products accurately.</p>
<h4 id="throwing-the-baby-out-with-the-bathwater-isnt-a-helpful-suggestion">Throwing the baby out with the bathwater isn't a helpful suggestion.</h4>
<p>First, let's address the hot topic: has Zero Trust lost its meaning? As an InfoSec professional, it can definitely be frustrating and disheartening to see a term be overused. Many of us don't like mainstream hype. Daniel Miessler <a href="https://danielmiessler.com/blog/the-irony-of-infosecs-reaction-to-crytpo-nfts-and-web3/?ref=content.strategyofsecurity.com">described this well</a> in his article about InfoSec’s Reaction to Crypto, NFTs, and Web3:</p>
<blockquote>
<p>...they’re also anti-establishment and anti-hype. Or at least, mainstream hype. Kind of like people who only like underground bands until they get popular. While it’s underground they’ll hype it all day, but once too many people like it they go find something else.</p>
</blockquote>
<p>The advice Daniel's article gives about Crypto, NFTs, and Web3 translates almost verbatim to Zero Trust, too. In summary, his message is that we should be curious and experiment with new things, even if there is unhealthy hype.</p>
<p>Julie's suggestion is to take a step back from the negativity and separate the hype from the actual strategy and framework:</p>
<blockquote>
<p>The throwing the baby out with the bathwater approach, to go, <em>"oh well, Zero Trust is a big buzzword now, people shouldn't buy into the hype,"</em> that is not a helpful suggestion.<br>
<br>
The strategy and the framework are very sound. Start vetting technologies that will best fit into how you're building out your Zero Trust infrastructure.<br>
<br>
It really deserves to be looked at and evaluated. Then figure out how you can adopt it in your environment.</p>
</blockquote>
<p>She's absolutely right. Far too often, we see ideas and companies that become "trendy" get dismissed because of their newfound popularity. Forrester Senior Research Analyst David Holmes agrees. From a <a href="https://www.forrester.com/blogs/the-definition-of-modern-zero-trust/?ref=content.strategyofsecurity.com">recent blog post</a> about defining Zero Trust:</p>
<blockquote>
<p>There is a journey from poor information security toward better information security and that progress along that spectrum is more valuable than the personal satisfaction some take in just decrying Zero Trust as marketing.</p>
</blockquote>
<p>Both ends of this spectrum are perilous. If you blindly buy into the marketing hype without understanding the foundational Zero Trust principles, you're bound to make mistakes. On the other end of the spectrum, outright dismissal of Zero Trust because of the marketing hype means you're missing out on a great approach for securing your environment.</p>
<p>A more strategic approach is somewhere in the middle. Take the time to understand the strategy and framework, then use your understanding to carefully build a strategy and select technologies that work for your company. That's harder to do than simply decrying Zero Trust as marketing, but it's worthwhile.</p>
<h4 id="be-honest-about-which-piece-of-the-zero-trust-equation-you-solve-for">Be honest about which piece of the Zero Trust equation you solve for.</h4>
<p>A significant driver of the sentiment InfoSec professionals feel towards Zero Trust is how accurately companies align their marketing and products to the definition of the term. The level of technical accuracy matters a lot.</p>
<p>I see it as a spectrum of full "by the book" accuracy to egregious exaggerations about what a product can do. Julie described the situation like this:</p>
<blockquote>
<p>Our belief is that if your technology firmly fits within one of the technology pillars within Zero Trust, and you actually deliver on what those definitions are, then you're part of the Zero Trust ecosystem. But your technology has to align; you can't just be adjacent.</p>
</blockquote>
<p>Representing how your product <em>accurately fits into the ecosystem</em> is the way to approach your marketing. Any egregious claims along the lines of <em>"our product solves Zero Trust completely"</em> are going to get called out by the community.</p>
<p>So, how do you accurately market your product? The answer lies within the definition of Zero Trust principles:</p>
<blockquote>
<p>Read the definitions, either Forrester, NIST, or CISA, about what these pillars of technology are, and what you're supposed to do to contribute to Zero Trust principles. You can map a product against them.<br>
<br>
Those are straightforward questions you can ask a company: does your product do X, Y, and Z? Pull it straight out of the definitions. It either does or it doesn't. It's pretty cut and dry. Misusing the term and misrepresenting your product is not doing anybody any good.</p>
</blockquote>
<p>At Appgate, Julie's marketing philosophy (and a new public campaign!) is <a href="https://ww3.appgate.com/cloud-and-cybersecurity-expo-2022?ref=content.strategyofsecurity.com">"Zero BS"</a> — a straightforward and accurate approach to the company's messaging:</p>
<blockquote>
<p>Zero BS. Let's get rid of the hype. Get down to the basics of what it does, how it fits into the Zero Trust framework, and how it will deliver on the benefits of Zero Trust. Just be straight about it. There's just absolutely no reason not to.</p>
</blockquote>
<p>One of the important takeaways from Julie's advice is that Zero Trust has its own ecosystem. If companies want to add value and be recognized as part of the ecosystem, they need to play by the rules. As people become more educated about Zero Trust, any "BS" is going to get detected quickly.</p>
<h4 id="zero-trust-is-too-serious-of-a-topic-to-not-be-accurate-about-it">Zero Trust is too serious of a topic to not be accurate about it.</h4>
<p>Exaggerated marketing in a topic like Zero Trust — and cybersecurity in general — has consequences. The stakes are higher. Julie put this into perspective:</p>
<blockquote>
<p>Be honest about what your product actually can do and what value it will deliver. Zero Trust is too serious of a topic to not be accurate about it. You're not just talking about a new pair of sneakers and whether they fit right. You're talking about protecting people's most valued information assets.</p>
</blockquote>
<p>Protecting people's most valued information assets is a heavy responsibility that needs to be taken seriously. There's no room for BS. Not in a topic like this.</p>
<p>There are significant downside risks with the current Zero Trust hype cycle. If Zero Trust does become the metaphorical baby that the industry throws out with the bathwater, we're wasting a pretty good idea. Nobody wants to see that happen, but it's a real possibility.</p>
<p>However, Julie believes companies who do build great products and play by the rules will likely find adoption:</p>
<blockquote>
<p>If you do truly have a Zero Trust solution, and it's a good one, there's going to be a fit for it somewhere. So be as accurate as you possibly can in representing, here's what it is, here's what it does, and here's how it benefits you and delivers on the principles of Zero Trust.</p>
</blockquote>
<p>That's the upside of the current Zero Trust hype cycle: all boats rise with the tide, so to speak. If we stay focused on the benefits and work within the framework, Zero Trust product companies and customers will both benefit.</p>
<h4 id="the-more-conversation-about-zero-trust-the-better">The more conversation about Zero Trust, the better.</h4>
<p>For emerging trends like Zero Trust, it takes an exhaustive amount of conversation and education to bring the entire industry up to speed. That's why Julie says the amount of conversation around Zero Trust is a positive thing:</p>
<blockquote>
<p>The more conversation about Zero Trust, the better, so that people understand it. If you're an enterprise and you are looking to modernize your security strategy, you need to look at Zero Trust.</p>
</blockquote>
<p>This insight is prophetic — the type of long-term view that only an experienced marketing leader would think of.</p>
<p>Yes, it's frustrating and confusing that people are talking about Zero Trust so much today. However, if you take the long-term view that conversations today lead to better understanding and adoption tomorrow, any annoyances caused by the current hype start to feel worthwhile.</p>
<h2 id="what-the-future-holds-for-zero-trust">What the Future Holds for Zero Trust</h2>
<p>With a mega-trend like Zero Trust, it's important to understand and think carefully about how it could evolve and grow in the future. Trends like this impact industries, companies, and careers in profound ways.</p>
<p>We'll finish this article by exploring why Zero Trust is likely to stick around and what could happen when it gains mainstream adoption.</p>
<h4 id="even-if-the-hype-cycle-for-zero-trust-fades-the-underlying-strategy-is-sound">Even if the hype cycle for Zero Trust fades, the underlying strategy is sound.</h4>
<p>A common reaction skeptics have about Zero Trust is that it's a fad. As this line of thinking goes, people get over fads quickly, and Zero Trust will go away once the current hype cycle fades.</p>
<p>I have long been suspicious of this prediction because it seems oversimplified. Sure, Zero Trust has a lot of hype — but it also has a lot of <em>substance.</em> That's often the difference between fads and enduring success.</p>
<p>I knew Julie would be a great person to ask about this. Her thoughts were on point:</p>
<blockquote>
<p>In early 2010, or just prior, everybody was ad nauseam using "cloud" to where it became a buzzword. Now, it is commonplace, a highly understood technology, and everybody uses it.<br>
<br>
I feel like Zero Trust is a little bit on that trajectory. Even if the term itself was to get altered or replaced in some way, the strategy behind it is sound and proven. Companies that can deliver effective solutions that map to it will be in a solid position.</p>
</blockquote>
<p>What you should take away is the strategy behind Zero Trust will stick around, even if the marketing used to describe it changes. That means you should take a long-term view about how Zero Trust is going to impact both your company and your career.</p>
<h4 id="zero-trust-could-be-on-a-trajectory-similar-to-cloud-computing">Zero Trust could be on a trajectory similar to cloud computing.</h4>
<p>If we accept that Zero Trust is going to be around long term, what does that mean for the future? Julie thinks we're headed towards a tipping point of widespread understanding and adoption:</p>
<blockquote>
<p>I think about when I realized cloud had reached the tipping point of becoming commonplace. Your grandmother at home is seeing commercials about the cloud! It became so widespread.<br>
<br>
Even if you don't understand all about it from a technical perspective, you understand at some level. You don't have to understand the nitty gritty to get the gist of it.<br>
<br>
I think Zero Trust is following a little bit along that track. It started out as truly a conversation amongst practitioners and technologists. Now, it's getting talked about pretty broadly.</p>
</blockquote>
<p>The cloud analogy is a really interesting parallel to the excitement we're seeing around Zero Trust today. The potential for a similar trajectory is obvious: everybody talked about cloud, and then it became commonplace. Today, when we're talking about infrastructure, cloud is essentially the default assumption. You don't even need to say your infrastructure is running on a cloud provider — it's understood.</p>
<p>This could also be the story of Zero Trust. We're all talking about Zero Trust now. Despite the attention, it's important to remember that we're still on the leading edge of the adoption curve. And exponential growth happens fast once it gets going. In the near future, Zero Trust very likely will be the way infrastructure and security at every company gets built.</p>
<hr><p><em>Thank you to Julie Preiss and Janice Clayton at Appgate for sharing their time and expertise to make this article possible.</em></p><hr>
<!--kg-card-begin: html-->
<p>Thanks for reading! How did you like this article?</p>
<p>
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6MzY4ZDZiMWMtZDM4NS00NjMxLWI1NTctNWVhNjAyNDVjYzI1?r=loved&ref=content.strategyofsecurity.com">Loved</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6MzY4ZDZiMWMtZDM4NS00NjMxLWI1NTctNWVhNjAyNDVjYzI1?r=great&ref=content.strategyofsecurity.com">Great</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6MzY4ZDZiMWMtZDM4NS00NjMxLWI1NTctNWVhNjAyNDVjYzI1?r=good&ref=content.strategyofsecurity.com">Good</a> •  
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6MzY4ZDZiMWMtZDM4NS00NjMxLWI1NTctNWVhNjAyNDVjYzI1?r=meh&ref=content.strategyofsecurity.com">Meh</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6MzY4ZDZiMWMtZDM4NS00NjMxLWI1NTctNWVhNjAyNDVjYzI1?r=bad&ref=content.strategyofsecurity.com">Bad</a>
</p>
<!--kg-card-end: html-->
]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/04/Decoding-Zero-Trust-Marketing.png"/>
        </item>
        <item>
            <title><![CDATA[Y Combinator's Winter 2022 Cybersecurity, Privacy, and Trust Startups]]></title>
            <link>https://strategyofsecurity.com/y-combinators-winter-2022-cybersecurity-privacy-and-trust-startups/</link>
            <guid>624a53300625f1003d5646c3</guid>
            <pubDate>Mon, 04 Apr 2022 12:05:00 GMT</pubDate>
            <description><![CDATA[Analyzing opportunities and challenges for the 12 cybersecurity, privacy, and trust startups in Y Combinator's Winter 2022 batch.]]></description>
            <content:encoded><![CDATA[<p>Y Combinator hosted its Winter 2022 Demo Day last week from March 29-20. This batch included the largest number of cybersecurity, privacy, and trust companies in the history of Y Combinator.</p>
<p>Twelve companies within these domains were among the 393 companies in the W22 batch:</p>
<ul>
<li>
<p><strong>Agency:</strong> Managed security and privacy for individuals and growing companies.</p>
</li>
<li>
<p><strong>Bunkyr:</strong> Account recovery without seed phrases or backup codes.</p>
</li>
<li>
<p><strong>Cinder:</strong> Operating system for trust and safety.</p>
</li>
<li>
<p><strong>Firezone:</strong> Open-source alternative to corporate VPNs.</p>
</li>
<li>
<p><strong>JumpWire:</strong> Data security for every API and database.</p>
</li>
<li>
<p><strong>Netmaker:</strong> Automated WireGuard networks for distributed systems and Kubernetes.</p>
</li>
<li>
<p><strong>Palitronica:</strong> Solutions to defend critical infrastructure and key resources.</p>
</li>
<li>
<p><strong>Reality Defender:</strong> Enterprise deepfake detection.</p>
</li>
<li>
<p><strong>Rownd:</strong> Instant user accounts and authentication.</p>
</li>
<li>
<p><strong>Sarus:</strong> Protect access to personal data for analytics or machine learning.</p>
</li>
<li>
<p><strong>Strac:</strong> Safely exchange sensitive data with customers and partners.</p>
</li>
<li>
<p><strong>Vista:</strong> Enable role-based access across customer groups.</p>
</li>
</ul>
<p>This article takes a deeper look at all 12 companies, their opportunities, and their challenges going forward. Twelve companies is <em>a lot</em> for one batch — nearly twice as many as the seven companies I covered in the <a href="https://strategyofsecurity.com/p/yc-s21-cybersecurity-startups/">S21 batch</a> (a nostalgic article, too — the first one I ever wrote on this site).</p>
<p>Unsurprisingly, this is a long article. Each company is a standalone section, so feel free to skip around or read about the ones you're most interested in. There is some cross-referencing between similar companies, but the commentary about each company generally makes sense on its own.</p>
<p>Now, on to the companies.</p>
<h2 id="agency">Agency</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://getagency.com/?ref=content.strategyofsecurity.com">Agency's</a> is best explained in the company's own words:</p>
<blockquote>
<p>"Agency performs enterprise-level cybersecurity for individuals at the highest risk of cyberattacks because of their job, employer, or industry."</p>
</blockquote>
<p>In tangible terms, they provide a managed bundle of products and services for cybersecurity and privacy. For security-focused people like us, the bundle is excellent: antivirus/EDR, password manager, dark web monitoring, personal information removal, cyber insurance, and security monitoring services.</p>
<p>Agency provides many of the services that companies get from Managed Detection and Response (MDR) and Managed Security Services Provider (MSSP) services, but for individuals and growing companies.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Agency is bundling multiple parts of the cybersecurity ecosystem. They provide a productized service for individuals and smaller companies. Their offering maps to:</p>
<ul>
<li>
<p><a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#endpoint-detection-and-response">Endpoint Detection and Response (EDR)</a></p>
</li>
<li>
<p><a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#monitoring-and-operations">Monitoring and Operations</a></p>
</li>
<li>
<p><a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#cyber-insurance">Cyber Insurance</a></p>
</li>
<li>
<p><a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#managed-services">Managed Services</a></p>
</li>
</ul>
<p>The unique twist is that these area of the cybersecurity ecosystem are historically enterprise-grade products and services. Making them accessible to individuals and small companies is incredibly appealing. I expect they'll continue adding more products and services to the bundle over time to make the value even more compelling than it already is.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Inertia is likely the biggest challenge Agency faces today. Average consumers either don't know they should have a bundle like Agency, or they aren't willing to pay $20+/month ($240+ annually) for it.</p>
<p>People earlier on the adoption curve (people like you, if you're reading this) understand the importance of security at both an individual and company level — and have the means to pay for it. As we learned when exploring <a href="https://strategyofsecurity.com/p/1passwords-blue-ocean-strategy">1Password's adoption curve</a>, the consumer and B2B market of early adopters (enthusiasts and visionairies) is more than enough to build a large company.</p>
<p>Preferences and switching costs are also a potential challenge. Some people already have parts of the bundle and may not want to give up the services they're already using. Agency has a growing list of partnerships, though (1Password is included as part of the subscription, for example). I don't see this duplication of services as a major challenge. The value of the bundle is still incredible, even with some duplication.</p>
<p>Finally — and perhaps more of an opportunity than a challenge — Agency needs to crack the code on enterprise sales and get companies to provide Agency to employees as a perk. We already know enterprises can be a great channel (<a href="https://business.calm.com/?ref=content.strategyofsecurity.com">Calm for Business</a>, as one example). Companies buying Agency for employees is a clear win-win: a great perk to provide, and a nice growth channel for Agency.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Agency is a useful solution to a tough problem in a sneaky large market. The "individuals at the highest risk of cyberattacks" part of their company description is a lot bigger than you might think.</p>
<p>In the past year alone, we've had <a href="https://www.theguardian.com/news/2021/aug/02/pegasus-spyware-found-on-journalists-phones-french-intelligence-confirms?ref=content.strategyofsecurity.com">journalists targeted by nation-states</a>, a <a href="https://twitter.com/RachelTobac/status/1504116311202283522?s=20&t=fXuz_BT3wmo2aeoognJwJg&ref=content.strategyofsecurity.com">billionaire hacking experiment</a>, and more. I would definitely put people like you and me in that classification as well.</p>
<p>Agency is one of my favorite companies from this batch. I backed that statement up with my money — I like this company so much that I bought a plan for myself. You should, too (they're not paying me to say that).</p>
<p>Getting all these services for $20 month (with an individual plan) feels like I'm getting far more value than I'm paying for. It's a <em>"how do they give me all of this profitably?"</em> type of reaction, in the best possible way. I have wanted a service like this for a long time, and I'm excited it's finally here.</p>
<p>Strategically, what they're doing is right in line with my previous <a href="https://strategyofsecurity.com/p/crowdstrike-and-the-bundling-of-cybersecurity">thoughts on bundling</a> and blue ocean strategies. They're building a new type of business model and using scale to provide differentiated value to a new-ish type of customer. As we've seen with 1Password and a handful of other companies in cybersecurity, that's a recipe for success.</p>
<h2 id="bunkyr">Bunkyr</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://bunkyr.com/?ref=content.strategyofsecurity.com">Bunkyr</a> is a full-blown account recovery platform delivered to developers through an API. For security-focused products, the traditional approach is to issue recovery keys when accounts get created. Users are responsible for storing them...<em>somewhere</em>.</p>
<p>Bunkyr addresses the nebulous <em>somewhere</em> issue by providing a white-label service developers can integrate into their apps. It gives users an account recovery workflow to securely recover their accounts (and data, more importantly) without the need to store recovery keys or follow any less secure processes.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>I would broadly map Bunkyr into a combination of <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#access-control">Access Control</a> and <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#encryption">Encryption</a>. They're creating a new category by breaking off a specific (and gnarly) piece of authentication and authorization.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>As the saying goes, old habits die hard. Making developers aware a solution like Bunkyr exists and convincing them to use it instead of plain ol' recovery tokens is a challenge the company will have to solve.</p>
<p>Some products (and the developers who build them) don't value account recovery highly enough to seek out an advanced solution like Bunkyr. We're still teaching developers not to roll their own auth:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Shout it from the rooftops.<br><br>Would you build a database for your app?<br><br>If not, why are you building auth for your app? <a href="https://t.co/7HC5rmJBG4?ref=content.strategyofsecurity.com">https://t.co/7HC5rmJBG4</a></p>— Dan Moore (@mooreds) <a href="https://twitter.com/mooreds/status/1448699518975811596?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">October 14, 2021</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>...let alone not building a seemingly obscure feature like account recovery tokens and workflows.</p>
<p>That said, there are likely enough (and increasingly more) companies and products who <em>do</em> care about account recovery — the new generation of user-friendly cryptocurrency wallets, for example. No company was going to solve this problem on their own, but there are plenty who would be happy to use Bunkyr as a simple API integration once they know about the product.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Account recovery might seem like an obscure problem until you realize that 20% of minted Bitcoin — roughly $172 <em>billion</em> (!!!) at today's BTC price — <a href="https://decrypt.co/37171/lost-bitcoin-3-7-million-bitcoin-are-probably-gone-forever?ref=content.strategyofsecurity.com">has been lost forever</a>, largely due to this exact problem. And Bitcoin is just one of many instances of the problem.</p>
<p>Companies <em>could</em> build their own account recovery solutions, as they have in the past with account recovery keys. But there's no point. Just plug into Bunkyr's API, and the problem is solved.</p>
<p>Advanced security is becoming both an important feature and a central part of the value proposition for an entire class of new products. Bunkyr could be the right solution at the right time for this problem domain.</p>
<h2 id="cinder">Cinder</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://cndr.io/?ref=content.strategyofsecurity.com">Cinder</a> is a platform that powers trust and safety teams — typically companies with social products or user-generated content. It's a purpose-built set of workflows that helps these teams manage reviews and decisions for abusive content, fraud, and threats in their platforms.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Cinder is interesting because it's purely a trust and safety platform, not a cybersecurity platform. I'm broadening the traditional definition of cybersecurity and privacy to include trust and safety as a topic within the ecosystem; however, it's a different set of users and buyers within a company.</p>
<p>My <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/">original cybersecurity ecosystem mapping</a> didn't include trust and safety, content moderation, censorship, or any related topics. In hindsight, this feels like an omission. I'm planning to fix it in the next version.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Finding customers at the right level of traction and scale to require more advanced trust and safety operations is potentially tricky. Small companies with seed funding or earlier are usually still seeking traction. This doesn't leave much room to focus on problems outside of growth — trust and safety being one such problem.</p>
<p>There is also a lot of variety in this space. Trust and safety threats and problems vary by company and by industry, as do the processes for solving them. Cinder offers customizable workflows for this exact reason, but managing the variety is a potentially difficult product management challenge.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Problems with abusive content, fraud, and threats <em>were</em> a nascent problem that only existed in the world of large social media companies. Or so we thought. We've now entered an era of misinformation, abuse, and outright information warfare that causes <a href="https://strategyofsecurity.com/p/rhetoric-reality-and-riots/">massive societal problems</a> and elevates the discussion about trust and safety into the public spotlight.</p>
<p>Large social media companies like <a href="https://about.facebook.com/actions/promoting-safety-and-expression/?ref=content.strategyofsecurity.com">Facebook</a> (where Cinder's founders came from) and <a href="https://twitter.com/twittersafety?ref=content.strategyofsecurity.com">Twitter</a> already have dedicated trust and safety teams. The problems in this domain are far from solved, but these companies are leading the way forward. For companies who aren't at the scale of Facebook or Twitter yet, the problems of trust and safety remain somewhat nascent and unaddressed.</p>
<p>When writing about <a href="https://strategyofsecurity.com/p/observations-about-the-cybersecurity-ecosystem-in-2021/">my observations</a> from mapping the cybersecurity ecosystem, I wrote that problems in trust and safety (I referred to them as privacy, censorship, and content moderation) need to be solved by qualified people from large tech companies:</p>
<blockquote>
<p>Unfortunately, some of the most pressing problems in privacy, censorship, and content moderation can only be solved by large tech companies like Facebook and Twitter. They have large, specialized teams of their own and don't need to spend much time looking externally for solutions, even if they should.<br>
<br>
A potential exception is qualified people from large tech companies (with an understanding of the problems they face) who leave and build a company. Without good regulation to guide the market, the people with the best chance of creating a positive impact are likely the ones who understand the problems and nuances from the inside.</p>
</blockquote>
<p>That's exactly what happened with the co-founders of Cinder. Qualified people from Facebook's trust and safety team left to build a company. They understand the problems and nuances from the inside, which means they can productize and help teach everyone else the leading practices for trust and safety. This gives Cinder a huge advantage in winning this market.</p>
<h2 id="firezone">Firezone</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://firez.one/?ref=content.strategyofsecurity.com">Firezone</a> is an open source Virtual Private Network (VPN) server and firewall. It's built on Wireguard, a shiny new VPN protocol that's faster and more secure than the old school ones your company is probably using today (especially if you work in an enterprise).</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Firezone fits quite nicely into the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#virtual-private-networks-vpn">Virtual Private Networks (VPN)</a> segment of the cybersecurity ecosystem.</p>
<p>One slight nuance is that Fireguard is meant for teams and includes lots of business-focused features. This differs from consumer-focused VPNs like NordVPN or ProtonVPN. The concept of a VPN is the same for both consumers and businesses, but the products and management features differ depending on the type of customer.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>The market for VPNs is mature and crowded. In the internet era, VPNs are as old as time. There are a <em>lot</em> of companies who make VPN software (over 200, according to a quick search on company data). In crowded markets, standing out from competitors is hard.</p>
<p>Inertia could play a factor in their success. Most businesses already have VPNs, and some are going to be content with "good enough" speed and security — or barely consider it at all. In cases like this, getting companies to switch usually requires an exponentially better product or another significant differentiator to break the inertia.</p>
<p>There is a (surprising?) amount of innovation in network architecture. Emerging paradigms like, Zero Trust, Secure Access Service Edge (SASE), and software-defined perimeter (SDP) aim to replace VPNs with more granular levels of control. These trends are still being sorted out, and companies are early in the adoption cycle. However, if the trends catch on, the role of VPNs could be diminished.</p>
<p>Finally, WireGuard is an open source protocol. That means anyone can build a VPN product on top of it, as many companies have. Plenty of companies have done well at building from open source software (YC's own GitLab is one great example), so it can definitely be done — it's just an additional challenge to overcome.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>The COVID-19 pandemic essentially made every company a remote company. If companies didn't have a VPN before March 2020, or if their existing VPN was too slow, insecure, or scaled poorly, they were in trouble.</p>
<p>Two years later, it's clear that remote and hybrid work are going to stick around in some shape or form, even as the pandemic subsides. This mega-trend elevates the priority of VPNs significantly — they're basically mission critical now.</p>
<p>If Firezone can build an awesome product with blazing fast speed and exceptional security, companies will adopt it. As a startup, they can also move fast and expand their products to address emerging network architecture trends and become the de facto open source company for everything related to network access.</p>
<h2 id="jumpwire">JumpWire</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://jumpwire.ai/?ref=content.strategyofsecurity.com">JumpWire</a> protects sensitive data in applications and APIs. The product proxies requests from users and applications to dynamically (and virtually) encrypt sensitive data fields. This overview diagram is super helpful:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/04/jumpwire_overview.png" class="kg-image" alt="Jumpwire proxy diagram." loading="lazy" width="2000" height="1310" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/04/jumpwire_overview.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/04/jumpwire_overview.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/04/jumpwire_overview.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w2400/2022/04/jumpwire_overview.png 2400w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Source: JumpWire (jumpwire.ai)</em></i></figcaption></figure><p>Instead of using database-level encryption to encrypt specific fields (or entire tables or databases) in a database, JumpWire does the encryption on the fly. It also helps customers find their sensitive data in the first place.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>I would generally classify JumpWire into <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#database-security">Database Security</a> and <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#api-security">API Security</a>. The product is also similar to a few products within the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#privacy-by-design">Privacy By Design</a> category, which includes data anonymization and developer-focused privacy tools.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Adoption, by far. Changing developer behavior is hard. In <em>Observations About the Cybersecurity Ecosystem in 2021</em>, I said this about developer adoption for privacy-focused developer tools:</p>
<blockquote>
<p>Privacy-focused developer tools and the concept of Privacy By Design have a better chance of adoption in the near-term. As discussed earlier, DevSecOps is gaining traction quickly. Privacy-focused dev tools are very closely related and are already making their way into the workflows of forward thinking dev teams.</p>
</blockquote>
<p>There are lots of emerging solutions in this space, so it's a race to become the de facto approach and tool for solving the problem of data security.</p>
<p>There are also a couple technical challenges that customers will ask about (I'm sure they have already thought of these):</p>
<ul>
<li>
<p><strong>Performance:</strong> JumpWire proxies database and API requests, so how does the proxying and on-the-fly data classification and encryption impact performance?</p>
</li>
<li>
<p><strong>Availability:</strong> How do we keep our [insert application or service accessing data through JumpWire] available if JumpWire goes down? What is the operational impact?</p>
</li>
<li>
<p><strong>Security architecture:</strong> What controls need to be in place to prevent users or applications from connecting directly to the database/API and bypassing the JumpWire proxy?</p>
</li>
</ul>
<p>All of the technical challenges are minor — they're implementation details that are easily overcome. Adoption is a tricker problem to solve.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>JumpWire is a nice solution for a converging set of problems and opportunities. Data loss/leakage is a serious problem, as demonstrated by many recent data breaches. Privacy regulations add a layer of obligation and concequence on top of this. Security-minded developers are also becoming more aware of the need to protect the data their applications consume.</p>
<p>There definitely isn't a "one best way" to implement field-level data security yet. Products like <a href="https://www.skyflow.com/?ref=content.strategyofsecurity.com">Skyflow</a> take the approach of securing your data in their own vault and exposing it via API. JumpWire essentially takes the opposite approach and inserts the product in front of any API or database you want to use.</p>
<p>JumpWire could become the go-to option if they gain favor with developers and build a product that makes it easy and fast for them to do the right thing with their sensitive data.</p>
<h2 id="netmaker">Netmaker</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.netmaker.org/?ref=content.strategyofsecurity.com">Netmaker</a> is an open source virtual networking platform for building networks between distributed systems. It's built on Wireguard, which makes the connection speed faster than other secure networking protocols.</p>
<p>The company gives a helpful mental model to describe what they do: <em>"Think of Netmaker like your VPC for distributed systems."</em></p>
<p>If Netmaker sounds familiar to Firezone, you're right on track. Netmaker and Firezone are both VPNs built on the Wireguard protocol. The difference is that Netmaker is focused on building secure virtual connections between cloud networks and workloads, while Firezone is focused on business users and endpoints.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Netmaker could technically be classified as a <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#virtual-private-networks-vpn">Virtual Private Networks (VPN)</a>; however, it's more accurate to map the company under <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#secure-networking">Secure Networking</a>.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Similar to Firezone, there are a lot of product and protocol options for businesses to set up secure network connections. A lot of them are slow, hard to configure, and generally a pain — but they eventually work.</p>
<p>Netmaker needs to gain traction with infrastructure engineers, SREs, and similar people who care deeply about the nuanced problems of network engineering and security. The <a href="https://github.com/gravitl/netmaker?ref=content.strategyofsecurity.com">GitHub repo</a> for their open source project has 3.5k starts — clearly evidence of initial traction with their users.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Netmaker's real value is simplifying multi-cloud network connections and making them more performant. Early stage companies are usually able to keep their infrastructure within a single cloud, but growing startups and enterprises quickly run into this set of multi-cloud problems. It's a larger market than you might think.</p>
<p>Unlike consumer VPNs, the rise of remote work isn't a driver here. However, continued (and exponential) adoption of cloud computing is. Netmaker will be successful if it becomes the de facto option for building secure network connections in distributed cloud systems.</p>
<h2 id="palitronica">Palitronica</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://palitronica.com/?ref=content.strategyofsecurity.com">Palitronica</a> builds products that protect criticial infrastructure (Operational Technology, or OT) and hardware supply chain components from cybersecurity attacks.</p>
<p>The company currently makes two products, Palisade and Anvil, that protect devices at runtime and provide hardware assurance over manufactured devices and semiconductors.</p>
<p>OT security came into focus in 2021 with the high profile Colonial Pipeline ransomware attack. Hardware security has been, and continues to be, a glaring area of concern for many companies and nation-states. Palitronica is stepping in to help protect these important physical assets.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Palitronica is part of the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#physical-security">Physical Security</a> domain of cybersecurity. Their current products map closely to <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#operational-technology-ot-security">Operational Technology (OT) Security</a>.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Hardware security is an advanced domain within cybersecurity, which can unfortunately make products like Palitronica hard to understand for many cybersecurity professionals. Awareness is definitely a challenge, but it only matters that the people who are truly buyers understand what the product does and the value it brings.</p>
<p>Many of Palitronica's <a href="https://www.palitronica.com/news/palitronica-selected-to-advance-aerospace-cyber-mission-assurance?ref=content.strategyofsecurity.com">early customers</a> are government agencies, which are notoriously slow moving and technology averse. Long sales cycles and slow adoption are an inherent challenge of working with the public sector. However, they've already demonstrated several nice wins for an early stage company.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Palitronica feels like it has a Palantir-esque mystique — a company with advanced technology solving an important societal problem. Even if hardware security isn't well understood by most people in the world, it's still a serious problem that has a high probability of getting worse.</p>
<p>The company is founded by domain experts with decades of experience in academic research around embedded systems at the University of Waterloo. It's a competent team who understands how to solve the difficult problems the industry faces.</p>
<p>Palitronica is the type of company that can be more than just big if their product truly is a significant advancement that gains adoption by governments and device manufacturers.</p>
<h2 id="reality-defender">Reality Defender</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.realitydefender.ai/?ref=content.strategyofsecurity.com">Reality Defender</a> is a platform that helps companies, governments, and journalists detect fake media content (aka deepfakes). The company originated as a project incubated by Microsoft and the AI Foundation. It's now a standalone company with products that make deepfake scanning available via a web interface and API.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Deepfake detection is an emerging subcategory within Artificial Intelligence that I didn't include in my original cybersecurity ecosystem mapping. This should be included in a future version as companies are now starting to emerge with products to help address the problem.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>People are skeptical, if not outright terrified, of deepfake detection technologies because of how their models are trained (and numerous other ethical issues around AI in general). The discussion around Reality Defender's <a href="https://news.ycombinator.com/item?id=30766050&ref=content.strategyofsecurity.com">Hacker News launch</a> was long, spirited, and sometimes unpleasant.</p>
<p>The HN community raised several good points that are challenges Reality Defender will need to overcome:</p>
<ul>
<li>
<p>Deepfake detection can theoretically improve the quality of deepfakes if bad actors treat it like a game.</p>
</li>
<li>
<p>Retrospective, pattern-based techniques for deepfake detection are inherently always behind the latest and greatest deepfake generation techniques. It's a cat-and-mouse game.</p>
</li>
<li>
<p>AI models used for deepfake detection are only as good as the datasets used to train them. Unfortunately, many of those datasets contain inadvertent (or explicit) bias — especially towards gender and ethnicity — which subsequently bias the results of the model.</p>
</li>
<li>
<p>Even if the tech works reliably, users can still misuse it if their intentions are questionable.</p>
</li>
</ul>
<p>These challenges (and more) are all very real, but combatting deepfakes is also an important problem. Reality Defender feels like a team who can make significant advancements towards addressing them.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>The problems created by deepfakes — and fake content in general —&nbsp;are getting exponentially worse (in volume) and more complex to combat. It's hard to overstate the potential magnitude of this set of challenges.</p>
<p>The Reality Defender team drew an interesting parallel in their Launch HN overview that made the importance of their solution click for me:</p>
<blockquote>
<p>As with computer viruses, deepfakes will continue evolving to circumvent current security measures. New deepfake detection techniques must be as iterative as the generation methods.</p>
</blockquote>
<p>Put differently (my words, not theirs), deepfakes are like viruses for the human mind. Psychological operations are bad — basically at a level of bad that can disrupt the stability of entire nation-states and international relations. We need the best possible tech humankind can invent to counter these types of attacks.</p>
<p>On a more down-to-earth and practical basis, deepfakes are behind a lot of the fraud that occurs within the financial system. Unsurprisingly, many of Reality Defender's early customers are financial institutions.</p>
<p>Reality Defender is in a good position because they have very tangible, quantifiable, and important problems that can be addressed right away (things like fraud) while they continue to make progress towards massive global issues like psyops and information warfare.</p>
<h2 id="rownd">Rownd</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.real/?ref=content.strategyofsecurity.com">Rownd</a> helps companies onboard new users faster and keep them authenticated across multiple sites. It replaces an application's back end user store or third party authentication platforms like Auth0.</p>
<p>Developers can use the product by embedding a code snippet, then decide how deep they want to take the integration from there. The product is mostly white-label and ranges from a visible component for sign-in to full integration with your own form code.</p>
<p>In more technical terms, Rownd proactively onboards users by creating anonymous accounts for any visitor to your site. They create an "unclaimed" account for the user and enrich it with additional information, if available (e.g. from a newsletter, CRM, or other service).</p>
<p>Once the user decides to register, they simply claim the account that was already there for them and use it for continued authentication and authorization as they use the product. Think of it like proactive onboarding.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Rownd is technically an <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#authentication">authentication</a> product; however, that classification is nuanced. TL;DR: it's more of an onboarding product that happens to do authentication.</p>
<p>I thought Rownd's CEO, Robert Thelen, did a nice job of explaining this nuance in one of his replies to the Hacker News discussion:</p>
<blockquote>
<p>We create accounts that span apps and websites - and we happen protect them.<br>
<br>
We want to kill the login page. We want first time users to be able to enjoy an app or website first and then, when they fall in love with the product, then you ask for validation/authentication.<br>
<br>
Authentication is more of a check box for us, what you do with the data is our product.</p>
</blockquote>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Rownd's current challenge seems to be helping potential users quickly  understand what the product does and why it's valuable. One of the main themes of the discussion from their <a href="https://news.ycombinator.com/item?id=30615352&ref=content.strategyofsecurity.com">Hacker News launch</a> was people trying to figure out those exact questions.</p>
<p>I'm a good case study: I know a lot about identity and access management (and have written about it several times here), and it still took me ~15 minutes to finally understand what Rownd is doing and how it works. Most potential customers aren't going to spare them that much time.</p>
<p>Part of this challenge (and opportunity, perhaps) is that static login pages are such an entrenched paradigm of internet use that they're part of everyone's mental model about onboarding. Killing the static login page breaks this mental model, and people are left wondering what would replace it.</p>
<p>Belaboring this point is being nit-picky — Rownd will figure out its marketing. They already made several updates quickly based on HN feedback, so props to them for learning and moving fast. This probably isn't a long term challenge.</p>
<p>Bigger picture, the authentication market is brutally competitive, as I've said many times before. There are well-established companies that are already public, a set of late-stage startups ready to IPO, and another set of well-funded early stage startups. This competition is great for customers because it creates innovation, but it's hard for individual companies who may or may not win the market.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>The path to becoming a large company in this market is somewhat established already. Auth0 <a href="https://strategyofsecurity.com/p/okta-auth0-q2-2021-results/">did it</a>, and companies like Transmit Security aren't far behind. No company's path is ever the same, but we have an idea about what it takes to be successful here.</p>
<p>Rownd's growth trajectory and TAM is similar to other high growth passwordless authentication companies — they need to gain developer adoption, attract other high growth companies as customers, and increase volume together as their customers grow.</p>
<p>The idea of proactive onboarding is fairly revolutionary. It's a "why didn't anyone think of this before?" type of an idea. Progressive profiling is already an emerging trend in onboarding, and Rownd takes this idea a step further.</p>
<p>If Rownd can gain the favor of developers — and more importantly — the users of their products, they can become a big company. Killing the login page is a lofty but worthy goal to tackle.</p>
<h2 id="sarus">Sarus</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.sarus.tech/?ref=content.strategyofsecurity.com">Sarus</a> lets data scientists access work with sensitive data in a private way. The product proxies queries from users to dynamically (and virtually) return private results (or synthetic data samples of small datasets) without requiring the end user to see or access the private data.</p>
<p>If this description sounds a lot like JumpWire, you're right. Sarus and JumpWire are conceptually similar but serve different use cases. JumpWire encrypts sensitive data that's accessed by applications. Sarus keeps sensitive data private (using a fancy technique called differential privacy) while still returning large, aggregated result sets for data scientists.</p>
<p>Functionally, the products are similar, but Sarus has a much more specific use case. I wouldn't even call them competitors.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Similar to JumpWire, I would broadly classify Sarus into <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#database-security">Database Security</a>. The product also maps to the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#privacy-by-design">Privacy By Design</a> category, which includes data anonymization and developer-focused privacy tools.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Based on the discussion around their <a href="https://news.ycombinator.com/item?id=30698215&ref=content.strategyofsecurity.com">Hacker News launch</a>, people definitely had questions, but the questions were mostly well-intentioned.</p>
<p>There was some feedback about clarifying how the product works, which isn't surprising. This is a different situation than Rownd — Sarus is solving an uncommon problem in a very different way. People seem interested in giving them the time to explain why and how.</p>
<p>The good and bad part about the users and problem Sarus is addressing is that it's specific (or niche, perhaps). You could take that negatively and say it limits their growth potential. However, in the case of an early stage startup, I see it as a good thing. Sarus seems to know exactly what the product does and who it's for.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Data privacy for data scientists may seem like a relatively niche market, but it's not. Nearly every high growth startup, enterprise, academic institution, and government agency now stores and analyzes petabytes of sensitive data.</p>
<p>Allowing data scientists to do their work while simultaneously keeping data secure is actually an interesting predicament. The Sarus founders described it like this in their Hacker News launch:</p>
<blockquote>
<p>It’s a rightful objective to protect data but it should not have to hamstring all innovation. For most data science or analytics objectives, the analyst has no interest in the information of a given individual. They look for patterns that are valid across the dataset. Access to user-level information is just an unfortunate way to get there.</p>
</blockquote>
<p>"Access to user-level information is just an unfortunate way to get there" is a great line. Prose aside, it's an insightful example of why Sarus can potentially be one of the first big engineering-focused privacy tools.</p>
<p>In adjacent use cases, engineers actually need to access the data but can't, so privacy is a pain. In the case of Sarus, data scientists don't even need or want to access the data — there just wasn't a way to let them do their work otherwise. Until now. That's why Sarus can be huge.</p>
<h2 id="strac">Strac</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.strac.io/?ref=content.strategyofsecurity.com">Strac</a> detects and masks sensitive data exchanged by your company and third party services. In today's integration-first SaaS world, this type of data exchange actually happens a lot. Bad things happen when your sensitive data is all over the place — and especially in random third party services where you might not expect it to be.</p>
<p>A particularly acute example was the [24]7.ai <a href="https://www.prnewswire.com/news-releases/247ai-issues-statement-on-information-security-300624659.html?ref=content.strategyofsecurity.com">data breach</a> that affected multiple Fortune 100 companies. [24]7.ai is a customer support chat service that ended up collecting PII and credit card data from customers to resolve support issues. They got breached, and it created a <a href="https://www.databreaches.net/delta-airlines-sues-247-ai-over-2017-data-breach/?ref=content.strategyofsecurity.com">super messy situation</a> for their large customers.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>The closest mapping in my existing cybersecurity ecosystem mapping is <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#data-lossleakage-prevention">Data Loss/Leakage Prevention</a>, but this feels inaccurate. Strac is like a secure file transfer system built for modern, API-based data exchanges instead of old-school file transfers.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Strac's near-term challenge seems to be product focus. This could just be my intuition, but it looks like the product is going in a few different directions.</p>
<p>The core set of features are around securely exchanging data with third party services. There is also a data redaction API — which is also helpful, but feels like an adjacent product.</p>
<p>This is the nature of startups. The product will get figured out when specific use cases clearly start gaining traction.</p>
<p>Longer term, the challenge is awareness. Companies integrate third party applications quickly and without consideration for security. An additional security layer like Strac increases friction in an otherwise simple integration process. The value of inserting Strac into the mix needs to be clear, especially for security engineering teams.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>Protecting data exchanged with third party services is a huge win. It's not realistic to expect business teams to avoid third party integrations at all costs. The next best thing is to let them get the value they need without unnecessarily exchanging sensitive data.</p>
<p>Integrations with third party services are growing exponentially to the point of being a mega-trend. Companies like Zapier (a YC company, incidentally) are entirely built around the idea of simplifying integrations between third party services. This trend is definitely not going away, so let's make it secure.</p>
<p>That's exactly where Strac comes in. If they can become the go-to solution for enabling secure integrations between services, they're going to be a big company.</p>
<h2 id="vista">Vista</h2>
<h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.govista.io/?ref=content.strategyofsecurity.com">Vista</a> is a platform for centrally managing authorization for your applications. Instead of building custom authorization (roles, permissions, etc.), just integrate Vista, and they'll take care of it for you.</p>
<p>The core of the platform is an API. It also includes React components and other handy tools to make integration and implementation easier.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Vista fits into the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#authorization">Authorization</a> category, although I didn't create a specific sub-category for external authorization platforms in the first version ecosystem mapping.</p>
<h5 id="what-are-their-challenges">What are their challenges?</h5>
<p>Like other developer-focused tools in this YC batch and beyond, the main driver of growth is gaining developer adoption. Vista is squarely in the mold of a developer-first, bottom-up adoption product. They have to win over developers to be successful.</p>
<p>From a developer's perspective, there are risks in partnering with a startup — and especially for something as core as authorization. If you've built authorization in your app using any third party service and the company shuts down, you're in trouble.</p>
<p>External authorization carries a different level of risk than security products that aren't as deeply embedded into a product. The opposite is also a benefit for Vista, though: if customers choose to use Vista for authorization, stickiness and retention is high. Once Vista is integrated and working, there's no reason to switch.</p>
<p>The current wave of companies building external authorization products is also competitive. Sequoia-backed <a href="https://www.osohq.com/?ref=content.strategyofsecurity.com">Oso</a> is in this market, and Auth0 released a developer preview of their <a href="https://auth0.com/developers/lab/fine-grained-authorization?ref=content.strategyofsecurity.com">Fine Grained Authorization</a> product in late 2021. No company has won the market yet, but the competition is heating up.</p>
<h5 id="why-could-this-be-a-big-company">Why could this be a big company?</h5>
<p>There have been many attempts at building an external authorization platform over the past decade, and no company has even come close to winning the market. You could interpret that as a vote against any company in the market; however, the reality is that someone is bound to win it...<em>eventually</em>.</p>
<p>Managing authorization has been a problem developers have faced for as long as applications have existed. Authorization is still a pain to build today. What does get built isn't always great, either — excessive permissions are one of the major contributing factors in data breaches.</p>
<p>A de facto standard for external authorization needs to happen, and now could be the time. Integrating with third party services for non-core product functionality is now widely accepted. Companies have also come to terms with externalizing authentication. Authorization is a much bigger level of commitment, but it's now in the realm of possibility. Whoever wins this market is going to be a big company — probably the next Auth0.</p>
<hr>
<!--kg-card-begin: html-->
<p>Thanks for reading! How did you like this article?</p>
<p>
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6NGQ2YzViZDgtYTEzYi00OWQ1LWJhZTctNDg2MTk2YWEzNmQ5?r=loved&ref=content.strategyofsecurity.com">Loved</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6NGQ2YzViZDgtYTEzYi00OWQ1LWJhZTctNDg2MTk2YWEzNmQ5?r=great&ref=content.strategyofsecurity.com">Great</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6NGQ2YzViZDgtYTEzYi00OWQ1LWJhZTctNDg2MTk2YWEzNmQ5?r=good&ref=content.strategyofsecurity.com">Good</a> •  
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6NGQ2YzViZDgtYTEzYi00OWQ1LWJhZTctNDg2MTk2YWEzNmQ5?r=meh&ref=content.strategyofsecurity.com">Meh</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6NGQ2YzViZDgtYTEzYi00OWQ1LWJhZTctNDg2MTk2YWEzNmQ5?r=bad&ref=content.strategyofsecurity.com">Bad</a>
</p>
<!--kg-card-end: html-->
]]></content:encoded>
            <category>Startups</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/04/Y-Combinator.png"/>
        </item>
        <item>
            <title><![CDATA[Earnings: CrowdStrike and SentinelOne 2022 Annual Earnings Recap]]></title>
            <link>https://strategyofsecurity.com/earnings-crowdstrike-and-sentinelone-2022-annual-earnings-recap/</link>
            <guid>623ca18a314eda004d524fd0</guid>
            <pubDate>Mon, 28 Mar 2022 12:05:00 GMT</pubDate>
            <description><![CDATA[A recap of annual earnings and strategy for CrowdStrike and SentinelOne, two hypergrowth companies in the Endpoint Detection and Response market.]]></description>
            <content:encoded><![CDATA[<p>CrowdStrike and SentinelOne reported their Q4 results and FY22 annual earnings within a week of each other (March 9th and March 15th, respectively). Both companies are leaders in next generation Endpoint Detection and Response (EDR). They're also darlings of the stock market.</p>
<p>Since SentinelOne joined the growing list of <a href="https://strategyofsecurity.com/p/cybersecurity-is-going-public/">public cybersecurity companies</a> in mid-2021, their performance has been inextricably linked to CrowdStrike (for better or worse). On one hand, their stock price has probably received a healthy boost because CrowdStrike has performed so well as a public company in the 2.5 years since its IPO. On the other, SentinelOne is a (slightly) younger company, founded two years after CrowdStrike in 2013.</p>
<p>I have already <a href="https://strategyofsecurity.com/p/crowdstrike-and-the-bundling-of-cybersecurity/">written about CrowdStrike</a> in detail at the time of their FY22 Q3 earnings. This article extends many of the foundational ideas that were relevant at the time of their Q3 earnings and revisits several ongoing topics. It's also the first time I've covered SentinelOne in detail — a company I wish I would have been able to start covering sooner.</p>
<p>Rather than covering both companies sequentially (as I've done in past earnings articles), I'm going to try discussing both in parallel. The topics we should be looking at are highly relevant for both companies. It's very interesting to look at them across the board instead of going company-by-company.</p>
<p>In this article, we're going to cover:</p>
<ul>
<li>
<p><strong>Financials:</strong> An overview of FY22 financials, which both exhibit classic signs of hypergrowth.</p>
</li>
<li>
<p><strong>Layering Strategy:</strong> The drivers behind growth and product strategy start with bundling and layering.</p>
</li>
<li>
<p><strong>Partnerships and Marketplaces:</strong> Partnerships are an important growth driver for both companies, and marketplaces are an emerging channel.</p>
</li>
<li>
<p><strong>Competition:</strong> EDR is a competitive market with some friendly (?!) shade that gets thrown from time to time.</p>
</li>
</ul>
<p>First, let's talk about hypergrowth.</p>
<h2 id="classic-hypergrowth-financials">Classic Hypergrowth Financials</h2>
<p>CrowdStrike and SentinelOne are both <a href="https://www.drift.com/blog/what-is-hypergrowth/?ref=content.strategyofsecurity.com">hypergrowth companies</a> in terms of Annual Recurring Revenue (ARR). Both companies are growing rapidly across several important financial metrics.</p>
<p>Unsurprisingly, their valuations are enormous: $51.2 billion for CrowdStrike, and $10.39 billion for SentinelOne as of the time this article was written. Valuations go up and down with the market, but both companies are consistently among the highest valued cybersecurity companies.</p>
<p>We'll start this earnings analysis by covering a few of the most important metrics before moving on to other product and strategy-related topics.</p>
<h3 id="fy22-revenue">FY22 Revenue</h3>
<p>CrowdStrike's revenue grew 66% year-over-year to $1.35 billion. That makes CrowdStrike one of the largest pure cybersecurity companies in public markets — almost exactly the same as Okta ($1.3 billion), and nearly 7x higher than SentinelOne.</p>
<p>SentinelOne's FY22 annual revenue was $204.8 million, a 120% increase from FY21. Don't let the comparison to CrowdStrike fool you, though. People quickly forget that SentinelOne just went public on June 30, 2021. They're growing <em>very quickly</em> (120% revenue growth in Q4), and compounding growth adds up.</p>
<h3 id="annual-recurring-revenue-arr">Annual Recurring Revenue (ARR)</h3>
<p>CrowdStrike and SentinelOne both earn most of their revenue from software subscriptions, so ARR is one of the most important metrics for measuring their growth. CrowdStrike's ARR grew 65% to $1.73 billion. SentinelOne's full annual results aren't out yet, but their ARR grew 123% year-over-year in Q4.</p>
<p>Some analysts didn't like the deceleration in ARR growth for CrowdStrike. ARR growth has declined ~10% in total across the past four quarters. It has also declined 27% in the past three years, from 92% in FY20 to 65% in FY22. Let's be real here, though: 65% annual ARR growth is still <em>a lot</em>.</p>
<h3 id="total-customers">Total Customers</h3>
<p>Both companies have a lot of customers and are adding thousands more every quarter. CrowdStrike's customer count increased 65% to 16,325 in FY22. Growth included 1,600 new customers in Q4 alone.</p>
<p>SentinelOne reported 6,700 total customers at the end of FY22, growing by 70% with the addition of over 3,000 new customers. This was actually a ~10% deceleration from the prior year. EDR is a competitive market, which was likely the cause.</p>
<p>CrowdStrike is seeing a lot of success with larger enterprises. They also had a <a href="https://www.crowdstrike.com/press-releases/cisa-selects-crowdstrike-to-protect-the-nations-critical-endpoints-and-workloads/?ref=content.strategyofsecurity.com">signature win</a> in FY22 with the U.S. government's Cybersecurity and Infrastructure Security Agency (CISA) to protect federal agencies.</p>
<h3 id="operating-margins">Operating Margins</h3>
<p>Part of being a hypergrowth company is making investments in growth. The consequence is heavy operating losses. CrowdStrike and SentinelOne are no exception.</p>
<p>CrowdStrike's loss from operations was $142.5 million in FY22 — well within the Rule of 30, but still high. Their leadership team has been unabashedly consistent about continuing to invest in growth. This earnings call was no exception. From CFO Burt Podbere:</p>
<blockquote>
<p>...the guide really reflects what we really want to do this year, which is aggressively invest in the business. We've got this opportunity in front of us. We think there's a tremendous amount of demand. There's a tremendous big opportunity for us, and we're going for it.</p>
</blockquote>
<p>SentinelOne's loss from operations was actually higher — $267.2 million for FY22. That's an operating margin of -130%, meaning the company spent $1.30 for every $1 they earned. Losses of this magnitude might seem wild, but it's somewhat reasonable in an IPO year for a company growing at the rate SentinelOne is. From CFO David Bernhardt:</p>
<blockquote>
<p>Our non-GAAP operating margin was negative 66% compared to negative 104% a year ago, a huge improvement of 38 percentage points. And we achieved these impressive results while investing for growth throughout the year, including the IPO, new product launches and doubling of our workforce.</p>
</blockquote>
<p>SentinelOne's operating margins are improving in a hurry if FY23 projections hold. Again from David Bernhardt:</p>
<blockquote>
<p>For non-GAAP operating margin, we expect negative 84% to 86% in Q1 and negative 55% to 60% for the full year. Both of these represent meaningful year-over-year improvements. At the midpoint, we expect Q1 operating margin to improve over 40 percentage points and full year operating margin to improve over 25 percentage points.</p>
</blockquote>
<p>As long as both companies continue growing at this rate, most investors and analysts are going to be able to stomach the losses.</p>
<h3 id="fy23-earnings-guidance">FY23 Earnings Guidance</h3>
<p>CrowdStrike is expecting to break $2 billion in revenue during FY23. They projected 47-49% revenue growth to finish the year around $2.1 billion. As you'd expect for a smaller company, SentinelOne is projecting approximately 80% revenue growth to $366-370 million in FY22.</p>
<p>Even if growth slows slightly (as it did for CrowdStrike), both companies are outpacing the growth of most other public cybersecurity companies. The probability of either company being acquired by a private equity firm or large tech company is very low.</p>
<p>Sustainable hypergrowth is a good thing, and the leaders at both companies appear confident they've achieved it. Tactically, what makes this level of hypergrowth possible? Let'd discuss a few of the enablers next.</p>
<h2 id="layering-beyond-endpoint-detection-and-response">Layering Beyond Endpoint Detection and Response</h2>
<p>The major strategic theme for both CrowdStrike and SentinelOne is the expansion and diversification of their core EDR products into a broader platform of adjacent modules.</p>
<p>I wrote about the concept of bundling and unbundling in <em>CrowdStrike and the Bundling of Cybersecurity</em>. A related concept is layering, which I discussed when <a href="https://strategyofsecurity.com/p/hashicorps-ipo-bottom-up-adoption-and-layering/">talking about HashiCorp's IPO</a>. Both concepts absolutely describe what is happening today for CrowdStrike and SentinelOne.</p>
<p>Bundling is the consolidation of products in a way that's appealing to customers. I previously described the customer demand in cybersecurity like this:</p>
<blockquote>
<p>However, the change is underway. Customers want bundling. Take a look through InfoSec Twitter or LinkedIn on any given day, and you're bound to find someone ranting ad nauseam about topics like vendor fatigue, agent bloat, or the explosion of acronyms in the industry. These are all symptoms of the upstream customer desire for bundling.</p>
</blockquote>
<p>InfoSec experts would love nothing more than to have a single security agent running on every endpoint. That's exactly what CrowdStrike CEO George Kurtz wants to do:</p>
<blockquote>
<p>...it goes to our strategy of consolidating agents and getting rid of other technologies that are costly and complex and weigh the system down.</p>
</blockquote>
<p>Layering is a complimentary strategy that also aligns closely with growth. The big idea behind layering is that companies need to continue adding products to their core offering (at a certain point, well after product-market fit) to offset slowing growth rates from market saturation.</p>
<p>Andreessen-Horowitz Managing Partner <a href="https://twitter.com/jeff_jordan?ref=content.strategyofsecurity.com">Jeff Jordan</a> <a href="https://a16z.com/2012/01/18/a-recipe-for-growth-adding-layers-to-the-cake-2/?ref=content.strategyofsecurity.com">described</a> the concept of layering like this:</p>
<blockquote>
<p>I came to call this process of layering in new innovations on top of the core business “adding layers to the cake”. Much of the natural effort in the organization is spent on chasing optimization of the core business. This makes sense, as small improvements in a big business can have a meaningful impact. But there is huge potential leverage to adding layers of new, complementary businesses on top of the core (aka “cake”).</p>
</blockquote>
<p>Once you have these two concepts in your mind, it's easy to recognize them all over the place in the earnings discussions with George Kurtz and SentinelOne CEO Tomer Weingarten. George Kurtz straight up declared CrowdStrike to be a hypergrowth platform company:</p>
<blockquote>
<p>You have heard me say that CrowdStrike is more than just an endpoint provider. The success of our platform strategy is reflected in the hyper growth we are deriving from many of our modules as well as our strong module adoption metrics, which have consistently increased quarter-after-quarter.</p>
</blockquote>
<p>...and Tomer Weingarten talked about the idea of layering on top of SentinelOne's core endpoint security product:</p>
<blockquote>
<p>Throughout the year, we significantly expanded our platform offerings. Our endpoint solution remains the primary driver of our business, which is being complemented by emerging growth vectors, including cloud, IoT and data.</p>
</blockquote>
<p>Both examples are layering in action: establish a core product (endpoint security — the "cake") and add layers of new, complimentary businesses (IT hygeine, vulnerability management, cloud, IoT, etc.).</p>
<p>The companies aren't adding layers in exactly the same way, but they are clearly following each other's moves. One example happened earlier this month. SentinelOne announced the <a href="https://investors.sentinelone.com/press-releases/news-details/2022/SentinelOne-to-Acquire-Attivo-Networks-Bringing-Identity-to-XDR/default.aspx?ref=content.strategyofsecurity.com">acquisition of Attivo</a> on March 15, 2022, mirroring CrowdStrike's late 2020 <a href="https://www.crowdstrike.com/press-releases/crowdstrike-acquires-preempt-security/?ref=content.strategyofsecurity.com">acquisition of Preempt</a>. The acquisitions add identity protection capabilities to both platforms.</p>
<p>The platforms aren't a 1:1 match of each other (CrowdStrike now has 22 total modules). However, the similarities in product strategy across data/log management, identity protection, and XDR are easy to see.</p>
<p>With the concepts of bundling and layering now established, let's look deeper into a few specific areas.</p>
<h3 id="data-and-log-management">Data and Log Management</h3>
<p>Aside from behavioral-based endpoint protection, cloud-based data capabilities are one of the main differentiators for CrowdStrike and SentinelOne. Both companies made significant investments into this area in February 2021 — essentially a big splash to kick off their respective FY22 fiscal years. SentinelOne acquired Scalyr, and CrowdStrike announced their <a href="https://www.crowdstrike.com/press-releases/crowdstrike-to-acquire-humio/?ref=content.strategyofsecurity.com">acquisition of Humio</a> nine days later.</p>
<p>Fast forwarding through the remainder of 2021, Humio and Scalyr (now <a href="https://www.dataset.com/?ref=content.strategyofsecurity.com">branded DataSet</a>) are core components for both product and growth strategy at their respective companies. Here's a growth example from CrowdStrike via George Kurtz:</p>
<blockquote>
<p>Our success with Humio this quarter included securing a seven-figure deal with a financial services customer, whose existing log management solutions have become budget prohibitive given the exponential growth of data being captured by their dev ops team.</p>
</blockquote>
<p>...and a product example from SentinelOne via Tomer Weingarten:</p>
<blockquote>
<p>Building upon the acquisition of Scalyr, we launched DataSet in February of this year, a revolutionary live enterprise data platform for data queries, analytics, insights and data retention. DataSet expands our capabilities beyond cybersecurity use cases. It's a cloud-native, flexible enterprise data platform built for petabyte scale. Not only DataSet is the back end for our Singularity XDR platform. The technology is already being used by hundreds of enterprises, analyzing trillions of real-time events.</p>
</blockquote>
<p>The commitment to making large scale data management and analysis a core part of both platforms is clear. Each company made a lot of progress in FY22.</p>
<p>However, the scope of both products remains somewhat unclear. Both CEOs discussed non-security use cases on their respective earnings calls. George Kurtz talked about Humio wins beyond security:</p>
<blockquote>
<p>We talked about some of the big wins with Humio. Some of them are not even security related. They're simply observability. The beauty of that technology is the ability to get data from just about any source and answer any question at scale.</p>
</blockquote>
<p>Likewise, Tomer Weingarten discussed use of DataSet as a foundation for data beyond security:</p>
<blockquote>
<p>...when you're talking about the DataSet brand, we're really more addressing the known security use cases.<br>
<br>
...<br>
<br>
DataSet is really focused on addressing all use cases above and beyond security.<br>
<br>
...<br>
<br>
DataSet is our ability to now go and expand on the foundation that Scalyr was built upon and really tailor not into just logging environment and production environment but also even business data, where we see some of our existing customers are ingesting unstructured data from every source, not only production, not only logging, and are deriving insights from the data that they put into the platform.</p>
</blockquote>
<p>Analysts on the Q4 earnings calls (and prior) seemed to be confused about using the products for non-security use cases and selling to buyers other than the CISO. There was also confusion about the relationship between the data platforms and XDR.</p>
<p>Part of the confusion is because, pre-acquisition, Humio and Scalyr were both used for a broad set of data analytics use cases. Cybersecurity was <em>one</em> use case, albeit compelling enough to drive the acquisitions of both startups by CrowdStrike and SentinelOne.</p>
<p>I expect the messaging around use cases will be refined this year as the path forward for both products becomes more clear. Any confusion is mostly driven by semantics. Both products were good acquisitions. They've clearly become an essential part of their respective platforms going forward.</p>
<h3 id="identity-protection">Identity Protection</h3>
<p>As briefly mentioned earlier in this section, CrowdStrike and SentinelOne are now both the proud owners of identity protection companies (Preempt and Attivo, respectively). Before we go too far into the impact of these acquisitions, there's a distinction that needs to be made: <em>what exactly do identity protection products do, anyway?</em></p>
<p>The first point to be abundantly clear about: identity protection is <em>not</em> the same as SailPoint, CyberArk, Okta, or any of your favorite companies from the broader <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#access-control">access control</a> part of the cybersecurity ecosystem. This isn't CyberArk acquiring a <a href="https://strategyofsecurity.com/p/cyberark-and-the-new-paradigm-for-privileged-access/">cloud authentication product</a> to compete with cloud authentication companies. CrowdStrike and SentinelOne are <em>not</em> competing head on with any of these companies.</p>
<p>Identity protection is about detecting and protecting against threats and attacks <em>related to</em> identity. It's essentially fulfilling the promise of identity analytics that hasn't quite been figured out by other companies yet.</p>
<p>George Kurtz had a nice explanation of the business problem on CrowdStrike's earnings call:</p>
<blockquote>
<p>Last year, 62% of attacks we observed were malware-less with most of these involving compromised identities. We expect that both e-criminals and nation-state adversaries alike will continue to exploit vulnerabilities across endpoints and cloud environments and ramp up tradecraft around the use of identity and stolen credentials to bypass legacy defenses.</p>
</blockquote>
<p>Ironically, this approach of malware-less attacks involving compromised identities <a href="https://www.okta.com/blog/2022/03/oktas-investigation-of-the-january-2022-compromise/?ref=content.strategyofsecurity.com">appears to have caused</a> the security incident with Okta last week. That's not to make an example of Okta — just one of many illustrations why the need for identity protection products is important and potentially helpful in mitigating these types of attacks.</p>
<p>Fresh off the acquisition, Tomer Weingarten described how Attivo will expand SentinelOne's platform:</p>
<blockquote>
<p>Attivo, as part of SentinelOne, will help organizations reduce their attack surface not only at the device level but now at the human identity level, too.</p>
</blockquote>
<p>Bigger picture, CrowdStrike and SentinelOne may have finally figured out how to incorporate useful identity analytics into a product portfolio (and their customers' security programs). This has been an elusive need in the industry.</p>
<p>Identity protection seems like it could have been a logical product extension for <a href="https://strategyofsecurity.com/p/earnings-identity-and-access-management-2021-annual-earnings-recap/">Identity and Access Management (IAM) companies</a>. Companies like SailPoint have kinda-sorta been <a href="https://www.sailpoint.com/press-releases/sailpoint-lays-vision-next-frontier-identity-identityai/?ref=content.strategyofsecurity.com">working on identity analytics products</a> for a while. For whatever reason, the products didn't stick with customers yet — too early, perhaps?</p>
<p>The distinction about identity analytics/protection belonging within the access control domain isn't as black-and-white as it may seem. Data about identity-related threats also makes a lot of sense in an EDR/XDR platform — it's the centralized place for enterprise threat detection, after all.</p>
<p>Regardless, it will be interesting to see how the identity protection products grow and expand now that Preempt and Attivo have found new homes within CrowdStrike and SentinelOne.</p>
<h3 id="extended-detection-and-response-xdr">eXtended Detection and Response (XDR)</h3>
<p>We can't discuss EDR without XDR, right?! Tomer Weingarten did a great job explaining why this topic is worth talking about:</p>
<blockquote>
<p>If we look at the evolution of cybersecurity technologies for a moment, it's clear that legacy AV represents the past, EDR is the present and XDR is the future. While the majority of enterprises still utilize legacy AV solutions, we have undoubtedly entered the XDR era.</p>
</blockquote>
<p>Both companies view XDR as the culmination for how their respective bundling and layering strategies fit together. For example, Tomer Weingarten specifically mentioned how both identity protection and data/log management fit into their product strategy for XDR:</p>
<blockquote>
<p><strong>Identity Protection:</strong> User-centric identity protection is highly complementary and value-add for our XDR platform and customers.<br>
<br>
<strong>Data/Log Management:</strong> DataSet is the back end for our Singularity XDR platform.</p>
</blockquote>
<p>CrowdStrike and SentinelOne are both leading candidates to capture the market in the XDR era, however it eventually pans out. George Kurtz certainly thinks so:</p>
<blockquote>
<p>We just launched [XDR]. We're working with a lot of customers. We're adding more integrations around that. But we're really excited about that and we believe that's really a technology that will subsume the SIEM market, and we think we're in a perfect pole position to be able to capture it.</p>
</blockquote>
<p>This market (and the products in it) are still being sorted out. It's clearly a top priority for both CrowdStrike and SentinelOne, though.</p>
<p>The similarities in both companies' product strategies are evident, but the comparisons don't stop there. Partnerships are a top priority for the growth strategy of both companies. We'll briefly discuss this topic next.</p>
<h2 id="partnerships-all-the-way-down">Partnerships All The Way Down</h2>
<p>CrowdStrike and SentinelOne are both partner-first companies. Why? This quote from Tomer Weingarten pretty much sums it up:</p>
<blockquote>
<p>I think the growth environment on the partner side is really unbounded.</p>
</blockquote>
<p>For both companies, "partnerships" is a relatively broad umbrella that includes multiple different channels within it. CrowdStrike and SentinelOne are partners with much larger companies (AWS, for example) and much smaller companies. CrowdStrike also has an ecosystem of its own with the <a href="https://store.crowdstrike.com/?ref=content.strategyofsecurity.com">Crowdstrike Store</a>. It's partnerships all the way down.</p>
<p>The even better news is that partnerships are going well for both companies. Let's look into this success a bit more closely.</p>
<h3 id="partnerships">Partnerships</h3>
<p>Philosophically, both companies are built around partnerships as one of the primary drivers of growth and adoption for products. George Kurtz described CrowdStrike's long-term partnership strategy on the earnings call:</p>
<blockquote>
<p>When you think about our partner opportunities and CrowdStrike, first, we're a partner-first company. That's the way I built it. We haven't wavered from that.</p>
</blockquote>
<p>The strategy is working out nicely for both companies. Tomer Weingarten summarized SentinelOne's success with partnerships like this:</p>
<blockquote>
<p>Our partner ecosystem continues to magnify our market presence, significantly extending our reach and efficiency. Our strategic technology and services partners have grown to over 20% of our business. This includes MSSPs, MDRs and IR firms. These partnerships are accretive to our overall growth rate with significant business expansion opportunities yet to be unlocked.</p>
</blockquote>
<p>Partnerships representing 20% of the business is no small feat. It's a similar story for CrowdStrike. They directly generated $92 million in revenue from professional services in FY22 — that's a lot for a product company.</p>
<p>However, they're consistently clear about viewing professional services as an opportunity to sell software. From George Kurtz on the earnings call:</p>
<blockquote>
<p>Our professional services organization is a strong lead generation engine for the Falcon platform. Among organizations who first become a customer after February 1, 2020, and for each $1 spent by those customers on their initial engagement for our incident response or proactive services. As of January 31, 2022, we derived an average of $5.71 in ARR for those subscription contracts, up from $5.51 reported last year.</p>
</blockquote>
<p>CrowdStrike's 10-K filing checks out with Kurtz's statement:</p>
<blockquote>
<p>"We view our professional services business primarily as an<br>
opportunity to cross-sell subscriptions to our Falcon platform and cloud modules."</p>
</blockquote>
<p>Growing via partnerships is mutually beneficial. Partners get to provide services to companies who use the products, and the products get brought into clients of partners. However, the topic of competition or cooperation is a continuous source of tension in partnerships.</p>
<p>George Kurtz put the concerns to rest (for now) with CrowdStrike partners:</p>
<blockquote>
<p>We've taken the right approach to not compete with partners, to augment what they're trying to do. And what we've seen in the managed service world is that the managed service providers are looking for the best endpoint platform that they can plug in and offer other services.</p>
</blockquote>
<p>...as did Tomer Weingarten with SentinelOne partners:</p>
<blockquote>
<p>I can't stress enough that we don't compete with our partners. We work with over 100 of the world's leading IR firms, enabling us to address a majority of the IR market worldwide. These partnerships create hundreds of high-value and fast-moving opportunities every quarter. This is significantly more coverage than any single vendor could hope to gain on its own.</p>
</blockquote>
<p><a href="https://www.crowdstrike.com/services/?ref=content.strategyofsecurity.com">CrowdStrike</a> and <a href="https://www.sentinelone.com/global-services/services-overview/?ref=content.strategyofsecurity.com">SentinelOne</a> both offer professional services, including some that could potentially be viewed as competitive with partners. However, these "we don't compete with partners" statements make it relatively explicit that both companies are happy to defer to partners for services when needed.</p>
<h3 id="marketplaces">Marketplaces</h3>
<p>Marketplaces are an emerging trend in partnerships throughout cybersecurity, and especially for CrowdStrike and SentinelOne. As I mentioned in the intro for this section, marketplace partnerships go both ways. Each company has partnerships with larger and smaller partners.</p>
<p>In his opening remarks on the earnings call, George Kurtz specifically highlighted CrowdStrike's partnership success with AWS, a much larger partner:</p>
<blockquote>
<p>One partner I'd like to highlight is AWS. In fiscal 2022, ending ARR transacted through the AWS marketplace grew more than 100% year-over-year.<br>
<br>
CrowdStrike ended the year as one of the top ISV partners by transaction volume on the AWS Marketplace, with partner source deals growing strongly throughout the year. We believe this speaks to the success of our partnership with the world's largest public cloud provider and highlights the value we can provide to both partners and customers alike.</p>
</blockquote>
<p>SentinelOne didn't make any specific comments about the AWS marketplace or others, but they do have a <a href="https://aws.amazon.com/marketplace/pp/prodview-ziyfsci3zugzq?ref=content.strategyofsecurity.com">listing</a> there. However, they did specifically mention Managed Security Service Provider (MSSP) partnerships, including one with the <a href="https://www.pax8.com/en-us/?ref=content.strategyofsecurity.com">Pax8 cloud marketplace</a>. These partnerships have had similar results:</p>
<blockquote>
<p>Looking at just a few of our top MSSP partners like Enable and Pax8, they represent millions of endpoints now secured by SentinelOne.</p>
</blockquote>
<p>CrowdStrike is also having success with its own store. George Kurtz shared some financial details to back it up:</p>
<blockquote>
<p>Q4 was also a record quarter for our partner ecosystem. In total, for fiscal year 2022, we gained significant leverage from our partner ecosystem. During the year, partner stores ending ARR grew 83% year-over-year with our MSSP business growing more than 200%.</p>
</blockquote>
<p>There is precedent here. The <a href="https://www.okta.com/integrations/?ref=content.strategyofsecurity.com">Okta Integration Network</a>, for example, is a huge contributor to the company's success. CrowdStrike may not need the same level of success with their own store, but this kind of growth for partners definitely encourages more companies to create listings.</p>
<p>Partnerships of all types will continue to play a major role in the futures of both companies. It's a competitive market. They need as much help as they can get from partners to grow and maintain relationships with customers.</p>
<h2 id="throwin-shade">Throwin' Shade</h2>
<p>Ending on a somewhat humorous note — these companies love to throw shade at each other. It happens on basically every earnings call. The nature of the jabs usually has something to do with technical limitations or other issues in the product. This quarter was no exception.</p>
<p>George Kurtz started the jousting with this customer story:</p>
<blockquote>
<p>...this organization had chosen a next-gen competitor to protect a server environment. But after six months, they were still struggling to deploy the other vendors' products in its server environment. They were plagued by forced reboots, significant memory usage and unmet product road map promises...<br>
<br>
Side-by-side, we showcased our differentiation on a broad scale and a real production environment...This customer terminated the other vendors contract and is now deploying Falcon to protect their services globally.</p>
</blockquote>
<p>Tomer Weingarten had his own story a few days later on SentinelOne's earnings call:</p>
<blockquote>
<p>Their existing next-gen EDR vendor failed to quickly deploy and left critical Mac and Linux attack surfaces unprotected. They terminated their existing 3-year subscription mid-flight and turned to SentinelOne. Singularity XDR deployed instantly across the whole enterprise...</p>
</blockquote>
<p>I could be wrong here. It's certainly possible they could be talking about other next-gen EDR companies. Such is the nature of shade — it's hard to see through subtle, veiled insults.</p>
<p>Regardless, it's clear this is a competitive market segment where the competition is a little more chippy than other parts of the cybersecurity ecosystem. We'll check back in on both of these companies later in the year as the competition for EDR, XDR, and beyond rages on.</p>
<hr>
<!--kg-card-begin: html-->
<p>Thanks for reading! How did you like this article?</p>
<p>
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6ZTdkMzgwNDMtMDczNC00NTM5LWE3ZDQtY2NlNmVmOTU5ZjJh?r=loved&ref=content.strategyofsecurity.com">Loved</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6ZTdkMzgwNDMtMDczNC00NTM5LWE3ZDQtY2NlNmVmOTU5ZjJh?r=great&ref=content.strategyofsecurity.com">Great</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6ZTdkMzgwNDMtMDczNC00NTM5LWE3ZDQtY2NlNmVmOTU5ZjJh?r=good&ref=content.strategyofsecurity.com">Good</a> •  
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6ZTdkMzgwNDMtMDczNC00NTM5LWE3ZDQtY2NlNmVmOTU5ZjJh?r=meh&ref=content.strategyofsecurity.com">Meh</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6ZTdkMzgwNDMtMDczNC00NTM5LWE3ZDQtY2NlNmVmOTU5ZjJh?r=bad&ref=content.strategyofsecurity.com">Bad</a>
</p>
<!--kg-card-end: html-->
]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/CrowdStrike-and-SentinelOne.png"/>
        </item>
        <item>
            <title><![CDATA[The Mirage of Mandiant]]></title>
            <link>https://strategyofsecurity.com/the-mirage-of-mandiant/</link>
            <guid>623536e80a8cfa003db3022e</guid>
            <pubDate>Mon, 21 Mar 2022 12:05:00 GMT</pubDate>
            <description><![CDATA[Mandiant's run as an independent company has come and gone, but an exciting future lies ahead within Google Cloud.]]></description>
            <content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>New Mandiant, we hardly knew ye. Only 155 days after the company sold FireEye and <a href="https://www.mandiant.com/company/press-release/mandiant-confirms-name-change-fireeye-inc-mandiant-inc?ref=content.strategyofsecurity.com">re-branded to Mandiant</a>, they're being <a href="https://www.mandiant.com/company/press-release/mgc?ref=content.strategyofsecurity.com">acquired by Google</a> for $5.4 billion.</p>
<p>The acquisition has been a widely discussed topic within the information security community since it was announced. Mandiant is one of the most visible and respected companies in the cybersecurity ecosystem. News like this hits differently.</p>
<p>Big picture, an acquisition changes the equation for Mandiant in a different way than going private and remaining an independent company. There is more uncertainty about what the future holds for Mandiant as we know it and how the company fits within the vast Alphabet (Google) empire. People have a lot of questions and concerns about what's going to happen next.</p>
<p>Admittedly, I have had a lot of the same questions running through my mind since the news broke. I have covered Mandiant a lot in the short amount of time I've been writing this publication — possibly more than any other company, although I'm not keeping score.</p>
<p>I decided to take my time and think through a rational analysis rather than rushing to offer a quick opinion. Now that I've done this, I feel a lot more positive and optimistic about the combined future of Mandiant and Google. The new Mandiant may have been a mirage, but I'm hopeful the best parts of their vision can still be carried out — and maybe even improved and accelerated — under Google.</p>
<p>To summarize my general line of thinking: I don't believe there was a singular reason behind this acquisition. With large, complex deals like this, there are usually a multitude of reasons. Human nature tries to boil complex subjects down to a simple explanation. Rather than making that mistake here, we're going to explore the nuances.</p>
<p>In this article, we're going to logically step through:</p>
<ul>
<li>
<p>What happened with Mandiant</p>
</li>
<li>
<p>How the significance of Mandiant changes at the scale of Google</p>
</li>
<li>
<p>Why Mandiant isn't headed for Google's graveyard</p>
</li>
<li>
<p>What the acquisition means for Mandiant and Alphabet</p>
</li>
<li>
<p>What the acquisition means for the cybersecurity ecosystem</p>
</li>
</ul>
<p>First, a couple important caveats:</p>
<ul>
<li>
<p>This analysis was done completely through publicly available information. I didn't speak with anyone at Mandiant or Google directly. It's analysis, not reporting.</p>
</li>
<li>
<p>A lot of this article is my own speculation, which is bound to be wrong. There is still value in speculation — just take it with a grain of salt.</p>
</li>
</ul>
<p>Also, semantics:</p>
<ul>
<li>
<p>When using &quot;Alphabet,&quot; I'm referring to the top-level company that owns Google.</p>
</li>
<li>
<p>When using &quot;Google,&quot; I'm referring to the business unit within Alphabet that Google Cloud is a part of.</p>
</li>
<li>
<p>I mention &quot;Google Cloud&quot; or &quot;Google Cloud Platform&quot; specifically when referring to the business unit and cloud service.</p>
</li>
</ul>
<p>Caveats aside, let's start breaking down what's happening here.</p>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h2 id="what-happened-with-mandiant">What Happened With Mandiant?</h2>
<p>There is a lot to unpack with this acquisition, so I'm going to summarize what happened in the relatively recent period of time as concisely as possible. This article is about the impact and the future, so I only want to focus on the parts of the past that provide relevant context about what led to the acquisition. If you're interested in a deeper analysis of Mandiant and FireEye, I wrote about it in <a href="https://strategyofsecurity.com/p/mandiant-and-the-future-of-cybersecurity-professional-services/">Mandiant and the Future of Cybersecurity Services</a>.</p>
<p>In a word, the problem with Mandiant as an independent company was profitability. This blunt assessment isn't meant to sound like cold-blooded capitalism. It's more of an objective observation and, in hindsight, a lesson to learn from.</p>
<p>Looking at Mandiant's operating income (a good way to measure profitability from regular operations) for the past decade is telling. The company had substantial operating losses every year during this period — an average of $297.3 million per year.</p>
<p>Most of this data includes FireEye, but the divestiture didn't make a huge difference. Mandiant still wasn't profitable in the quarters after the sale, and their leadership team was clear that investors should not expect profitability until at least 2023. Unfortunately, they had a pattern of losses that investors couldn't stomach.</p>
<p>Anecdotally, Mandiant created far more value than it captured. I made this observation in my October 2021 article about Mandiant's post-FireEye strategy:</p>
<blockquote>
<p>Identifying the <a href="https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf?ref=content.strategyofsecurity.com">Chinese APT-1 espionage unit</a> and the <a href="https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html?ref=content.strategyofsecurity.com">SolarWinds breach</a> are two of the most significant accomplishments in modern cybersecurity history. This is exactly Mandiant's dilemma: the company hasn't been able to <a href="https://personalmba.com/value-capture/?ref=content.strategyofsecurity.com">capture enough of the value</a> they've created through research and innovation.</p>
</blockquote>
<p>Highly visible accomplishments like these — plus the day-to-day engagement Mandiant has with the information security community — are the reasons people in the community get emotional about the work Mandiant does. We feel attachment with the brand, regardless of whether we work directly with them or not.</p>
<p>At the time of Mandiant's re-launch in late 2021, I was super excited about the idea of <a href="https://strategyofsecurity.com/p/mandiant-and-the-future-of-cybersecurity-professional-services/">building productized services at scale</a> and the impact Mandiant's strategy could have on professional services in cybersecurity. I wanted the new Mandiant to work.</p>
<p>Admittedly, this was an optimistic take on how their strategy <em>could</em> work. Their success was improbable. Deep down, I knew that — more than I was comfortable writing about at the time. For the strategy to work, I knew that Mandiant needed to start showing results quickly:</p>
<blockquote>
<p>Mandiant's productized services model has to start showing results quickly. If it doesn't, investors are going to view Mandiant as just another professional services firm with underperforming profitability.</p>
</blockquote>
<p>In a follow-up article that included <a href="https://strategyofsecurity.com/p/earnings-february-2022-recap/">Mandiant's FY21 earnings</a>, I expanded on the timeline for their transformation and how they could buy more time by changing perception:</p>
<blockquote>
<p>...as a public company, they're in a vulnerable position until their balance between profitability and growth gets fixed.<br>
<br>
The fixing starts with perception. This iteration of Mandiant isn't the Mandiant of old. Here's one example: do you still think Mandiant is in the professional services business? Think again. From Kevin Mandia:<br>
<br>
<em>&quot;We're not a services company. We don't wake up every day and go, let's maximize services.&quot;</em><br>
<br>
Mandia's dismissal of perceptions that Mandiant is a professional services business couldn't have been more clear. The shift in perception is important from a strategy perspective, and also for managing investor expectations.</p>
</blockquote>
<p>These now sound like famous last words — ominously published less than two weeks before Mandiant was acquired by Alphabet. However, there are still <em>a lot</em> of reasons to be optimistic.</p>
<p>The acquisition creates a new set of opportunities that weren't available to Mandiant as a public company under the microscope and scrutiny of investors. At a macro level, the main opportunity is for Mandiant to execute their strategy (or Google's modified version of it) within the towering shadow of Alphabet's financial empire. Let's talk more about that.</p>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h2 id="significance-changes-at-scale">Significance Changes at Scale</h2>
<p>For Mandiant, the best medicine for curing over a decade of losses is the financial stability Alphabet can provide. Financially, this acquisition is <em>completely insignificant</em> for Alphabet. This insignificance is a very good thing for Mandiant.</p>
<p>An important caveat: I say &quot;insignificant&quot; purely from a financial perspective. Mandiant is an incredibly important and meaningful company for both Google and the cybersecurity ecosystem. There is a ton of qualitative, non-financial significance in this transaction — we'll get to that later. First, we need to set the stage with the financial part of the deal. Which...is insignificant. Here's why.</p>
<p>Alphabet is one of the most reliable and profitable companies in the world. They earned over $200 billion in annual revenue for the first time in FY21 — $257 billion at a 41% year-over-year growth rate (!!!), to be exact. Their operating income for FY21 was $78.7 billion. By comparison, Mandiant's total FY21 revenue was $483.5 million. In other words, Mandiant's total revenue is less than 1% of Alphabet's operating profit alone.</p>
<p>Alphabet operates on a completely different size and scale than Mandiant did as a public company. The sheer magnitude of Alphabet obfuscates any near-term profitability struggles that Mandiant has. To give you an idea of what I mean, consider this (from <a href="https://www.theverge.com/2022/2/1/22912196/google-alphabet-200-billion-annual-revenue-youtube-pixel-search?ref=content.strategyofsecurity.com">The Verge</a>):</p>
<blockquote>
<p>The company doesn’t typically break out numbers for devices like its Pixel phones, Nest smart home products, or the Android operating system, instead including them in “Google other” under “Google Services.”</p>
</blockquote>
<p>You read that correctly. A large segment of Google's mobile operation — you know, the one with the largest mobile operating system <a href="https://gs.statcounter.com/os-market-share/mobile/worldwide?ref=content.strategyofsecurity.com">market share</a> in the world — isn't large enough to merit a detailed breakdown in Alphabet's earnings releases. That's partly due to some creativity in how business units are financially bundled within Google, but the broader point stands: Alphabet can afford to make investments in growth, and nobody will bat an eye.</p>
<p>Alphabet's Google Cloud business does get mentioned in earnings releases. It actually operates at a loss — $890 million on $5.54 billion in revenue for FY21. Nobody cares about the loss because of how wildly profitable the rest of Alphabet is. And guess what? Nobody is <em>going to</em> care about the loss once Mandiant joins the Google Cloud umbrella sometime in 2022.</p>
<p>Sure, Alphabet paying $5.4 billion for Mandiant sounds like a lot...until you realize they had $140 billion of cash in the bank at the time of the acquisition. $5.4 billion is a measly 3.8% of Alphabet's cash.</p>
<p>An analogy for comparison: this acquisition is like you spending $3,800 on a nice TV when you have $100,000 in cash sitting in your savings account. This analogy is actually oversimplified — it's that, plus having a $750k salary, a house and cars that are fully paid off, college savings for your kids, and maxed out retirement accounts. You get the point. Alphabet bought something they can afford.</p>
<p>Why does financial stability and the relative insignificance that comes with scale matter for Mandiant? Time. They need time to build the product and services vision without quarterly scrutiny from investors. I made this quasi-prediction when writing about Mandiant's post-FireEye strategy:</p>
<blockquote>
<p>I wouldn't be surprised to see Mandiant take the company private so they can step out of the public spotlight and scrutiny like other large cybersecurity consulting firms. Going private could give them the time and capital they need to build a productized services strategy at scale.</p>
</blockquote>
<p>Going private was one viable option for buying time. I didn't mention it in the earlier article, but being acquired by a large company like Alphabet was another viable option. This acquisition gives Mandiant a similar set of options — including time <em>and</em> capital — albeit with the very real tradeoff of independence.</p>
<p>Forgoing independence to operate under the control of Alphabet's management team has consequences across every aspect of Mandiant's business. These consequences can be both good and bad. Next, we're going to explore the implications across Mandiant's products and services.</p>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h2 id="the-myth-of-googles-graveyard">The Myth of Google's Graveyard</h2>
<p>Right on cue, the skeptics started talking about how Mandiant is (eventually) going to end up in Google's <a href="https://killedbygoogle.com/?ref=content.strategyofsecurity.com">notorious product graveyard</a> after the news was announced. There are a lot of valid questions surrounding the acquisition, but this isn't one of them. Mandiant is absolutely not headed for Google's product graveyard.</p>
<p>Debunking this myth requires some evidence, so let's start with the data. Here is a sorted list of the largest companies <a href="https://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Alphabet?ref=content.strategyofsecurity.com">Alphabet has acquired</a>, cut off roughly at the $500 million mark:</p>
<!--kg-card-end: markdown--><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/google-large-acquisitions.png" class="kg-image" alt="Large company acquisitions by Alphabet." loading="lazy" width="2000" height="820" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/03/google-large-acquisitions.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/03/google-large-acquisitions.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/03/google-large-acquisitions.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w2400/2022/03/google-large-acquisitions.png 2400w" sizes="(min-width: 720px) 720px"><figcaption><em>Source: Wikipedia</em></figcaption></figure><!--kg-card-begin: markdown--><p>All of the companies on this list are still part of Alphabet's product portfolio in some shape or form — some in very significant ways. As with all acquisitions, mileage varies on returns. YouTube, for example, was an obvious steal at $1.65 billion. Even though others may not be breakout successes, no company on this list was a complete dud that went straight to the graveyard.</p>
<p>Mandiant is the second largest acquisition Alphabet has ever made — well behind Motorola Mobility and well ahead of Nest and AdSense. As a headline, Mandiant being Alphabet's second largest acquisition ever <em>seems</em> significant. Alphabet doesn't make many large acquisitions, though. Especially not for a company with as much revenue and cash in the bank as they have.</p>
<p>By comparison, Oracle has paid over $5 billion for <a href="https://en.wikipedia.org/wiki/List_of_acquisitions_by_Oracle?ref=content.strategyofsecurity.com">six companies</a>, including <a href="https://www.oracle.com/corporate/acquisitions/cerner/?ref=content.strategyofsecurity.com">$28.3 billion for Cerner alone</a> in December 2021. And, as we discussed in <a href="https://strategyofsecurity.com/p/themes-from-momentum-cybers-2022-cybersecurity-almanac/">Themes From Momentum Cyber's 2022 Cybersecurity Almanac</a>, private equity firms are making multi-billion dollar acquisitions of cybersecurity companies at an impressive rate.</p>
<p>So, why don't Alphabet's high value acquisitions end up in the graveyard? There is a big difference between &quot;toy apps we bought for peanuts to experiment with&quot; and &quot;serious company we paid hundreds of millions or billions for.&quot; Mandiant is a proven business with world class capabilities in multiple areas. Their situation is not the same as a social app Google cooked up internally or an acqui-hire they spent a few million on.</p>
<p>Alphabet employs some of the smartest people on the planet. They are absolutely not going to make a multi-billion dollar acquisition without a plan for making it successful. We should expect Alphabet to make the same level of commitment for Mandiant.</p>
<p>However, there is still a lot of gray area between &quot;Alphabet isn't going to kill Mandiant&quot; and &quot;Mandiant will continue to operate unchanged.&quot; We should definitely be expecting changes, some of which could be significant. We'll explore some of those possible changes next.</p>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h2 id="what-this-means-for-mandiant">What This Means for Mandiant</h2>
<p>The transition to the new reality of Mandiant living under the Google Cloud umbrella is going to take some time. We may not see any obvious changes for a while, but now is a good time to make some educated guesses. We'll start with Mandiant.</p>
<h5 id="professional-services">Professional Services</h5>
<p>Perhaps the biggest open question about Alphabet's acquisition of Mandiant is what will happen with their well-known professional services business. It's a valid question with the potential for significant impact depending on what Alphabet decides to do.</p>
<p>Hacker News commenter <a href="https://news.ycombinator.com/user?id=ocdtrekkie&ref=content.strategyofsecurity.com">ocdtrekkie</a> had a nice, punchy summary of the dilemma in a <a href="https://news.ycombinator.com/item?id=30598841&ref=content.strategyofsecurity.com">discussion</a> about the acquisition:</p>
<blockquote>
<p>...it's very unlikely Google wants to be in the incident response consulting space: Google entirely hates any line of business that can't be automated into a smooth profit paste. Flying security professionals out to clients isn't in their DNA.</p>
</blockquote>
<p>Alphabet, and Google in particular, is definitively a product company. They have minimal professional services revenue — it's not even a line item in their 10-K. The only mention of professional services in the filing is about Alphabet's expenses for hiring external consultants.</p>
<p>Alphabet's definition of &quot;services&quot; is literally the exact opposite of what Mandiant does. At Alphabet, the word &quot;services&quot; means &quot;products.&quot; Google Services is one of two major business segments (ironically, Google Cloud is the other one). Their Google Services segment holds all the core products we traditionally associate with Google: Android, Chrome, Gmail, Maps, Photos, YouTube, etc.</p>
<p>Google's idea of &quot;services = products&quot; seems to align well with Kevin Mandia's recent <em>&quot;we're not a services company&quot;</em> declaration...except that professional services makes up roughly half of Mandiant's annual revenue. It's even more nuanced than that, though — mainly because the other half of Mandiant's business <em>also</em> includes services sold via subscriptions. Mandiant is a professional services business that's actively trying not to be. And Google would be glad to help with that.</p>
<p>Now that the ideological divide is clear, what happens with Mandiant's professional services? Multiple actions are likely to be taken with varying levels of impact to Mandiant's existing business model. Google is going to do what benefits Google — that's part of the tradeoff for being acquired.</p>
<p>In the long run, subscription-based services revenue is likely to be much more appealing to Google than one-off, non-recurring professional services projects. I wouldn't be surprised if Google ends Mandiant's consulting business entirely. That statement may sound heretical, but it's definitely in the realm of possibility.</p>
<p>Within the recurring, subscription-based services, Mandiant's Threat Intelligence and Managed/Automated Defense services should both be highly appealing to Google and its Google Cloud customers. Especially the world-famous threat intelligence services.</p>
<p>Threat intelligence aligns a lot better with the DNA of Google than you might expect. Remember <a href="https://about.google/intl/ALL_in/?ref=content.strategyofsecurity.com">Google's mission</a>:</p>
<blockquote>
<p>Our mission is to organize the world’s information and make it universally accessible and useful.</p>
</blockquote>
<p>At an abstract level, threat intelligence <em>is</em> information. And great threat intelligence is <em>highly valuable</em> information. It's also notoriously difficult to organize and make universally accessible and useful — exactly the part Google specializes in.</p>
<p>The distinction is important but nuanced. Google isn't just a pure tech company — they're an information company at the core. Search is tech that gives you results. YouTube is tech that gives you videos. Gmail is tech that gives you emails. Maps is tech that gives you directions. Flights is tech that gives you flight details. AdSense is tech that shows people ads...and so on.</p>
<p>This differs from pure tech like, say, a database platform (MongoDB, for example). MongoDB builds the tech, but they don't care what information you use their database to store and retrieve. Google does, at least for its core products (services?!). Every product has an objective.</p>
<p>The same concept applies for threat intelligence. Combined with tech, it gives customers information about cybersecurity threats. Mandiant is the best at sourcing this information. Google is the best at providing it. The combination is potentially a winning strategy.</p>
<p>Operating Mandiant's threat intelligence unit under the Google Cloud umbrella can potentially solve many of the difficult challenges Mandiant had with sustaining this expensive capability. I previously described the challenges like this:</p>
<blockquote>
<p>Mandiant's threat intelligence unit is a heavy duty operation. This commentary starts to give you an idea about why their R&amp;D spending is so high — it's not cheap to deploy hundreds of highly paid threat analysts globally, rapidly analyze their findings, and disseminate them to thousands of customers. Mandiant is making one of the largest attempts ever at executing a productized services strategy. Something like this can be done by governments in the public sector, but they're not bound by profits like Mandiant is in the private sector.</p>
</blockquote>
<p>The last line is particularly interesting, partly because a company like Alphabet is an obvious exception. It's accurate to say that governments aren't bound by profits like public companies are. However, highly profitable companies like Alphabet can also defy gravity: their scale and profitability allows them to make investments in loss leaders like global threat intelligence, and nobody questions them.</p>
<p>The return on investment part gets interesting at cloud scale. Alphabet doesn't release specific figures about the number of Google Cloud customers. However, we do know it generates $5.54 billion in annual revenue, growing at a ~45% clip. That's the type of scale that makes it sustainable to invest in threat intelligence.</p>
<p>Information products (like threat intelligence) have essentially zero marginal costs of replication. Selling the information to more customers distributes the cost of research to produce it. In the case of Google Cloud, selling threat intelligence to the however-many-thousands of customers Google Cloud has as part of their cloud subscription is <em>super</em> appealing.</p>
<h5 id="mandiant-advantage-platform">Mandiant Advantage Platform</h5>
<p>Mandiant Advantage is the technology platform that powers Kevin Mandia's big idea for productized services. The platform was assembled primarily through smaller acquisitions to compliment homegrown products. Much of the new Mandiant's recent work (and R&amp;D spend) was integrating the acquired technology and building new features and products on top of it.</p>
<p>The time and effort Mandiant invested in building and integrating the platform <em>may</em> have factored in to Alphabet's acquisition rationale, but probably not in a significant way. Alphabet — a world class tech company — didn't acquire Mandiant for their tech. What happens with Mandiant Advantage is a big question mark.</p>
<p>Alphabet is fully capable of building products. They already have built several <a href="https://cloud.google.com/products/security-and-identity?ref=content.strategyofsecurity.com">security products</a> within Google Cloud. And they just <a href="https://cloud.google.com/blog/products/identity-security/raising-the-bar-in-security-operations?ref=content.strategyofsecurity.com">acquired Siemplify</a> for its security orchestration, automation and response (SOAR) features.</p>
<p>There isn't a ton of overlap between Google Cloud's existing security products and Mandiant Advantage — which Google obviously thought about before the acquisition. So, there's a reasonable chance the technology behind Mandiant advantage could become a permanent part of Google Cloud.</p>
<p>However, Mandiant Advantage as-is will probably go away and be folded into the existing portfolio of security products in Google Cloud (sans Mandiant branding). Most people aren't going to sweat the downside. Mandiant Advantage is new, and people are endeared towards Mandiant for different reasons.</p>
<p>The upside is much better: the big idea behind Mandiant Advantage (using technology to augment and scale human threat analysts) now has the entirety of Google Cloud's products at its disposal. Integrating and maximizing Mandiant's use of all the products will take time. Gaining customer adoption will, too. However, this is potentially a massive step forward in both tech and customer adoption — albeit in a different, Google-flavored form.</p>
<p>Addressing the elephant in the room: it's definitely not out of the question that Google decides to throw out the entire Mandiant Advantage platform or rebuild it over time. That's the advantage Google has as a product division and the disadvantage Mandiant has by selling their company. Immediate disassembly or disposal of Mandiant advantage seems unlikely, though.</p>
<p>Whatever Google Cloud leadership decides to do from a product perspective, I don't think it matters in terms of the overall productized services offering. Mandiant's core competencies of incident response and threat intelligence services were built long before the company attempted to productize them with Mandiant Advantage. That is to say, the competency depends more on people than technology. Mandiant's technology was a secondary part of the acquisition — icing on the cake, so to speak.</p>
<p>Longer term, the upside is that Google can potentially help realize Kevin Mandia's productized services vision faster. Tech was the limiting factor in Mandiant's strategy as an independent company. The vision for what they wanted to build with Mandiant Advantage is awesome, but it's also somewhat unprecedented. It's going to take a lot of time and energy to build. Better to undertake the journey with a world-class product company like Google.</p>
<h5 id="public-research-and-threat-intelligence">Public Research and Threat Intelligence</h5>
<p>A topic the information security community is particularly interested in is whether Mandiant's public research and threat intelligence information sharing is going to continue.</p>
<p>As discussed earlier, Mandiant has gained a lot of its fame from publishing freely available research about high profile threats and attacks. Taking that away from the community is a huge disservice — hence the concerns.</p>
<p>It's hard to say for certain, but I expect their public research will continue in some shape or form after the acquisition. It may happen under the Google brand, though — mainly because of the attention groundbreaking research receives. The same viral effect that carried Mandiant to prominence is also a nice uplift for Google Cloud as it seeks to increase credibility in security (and yet another intangible reason why this deal was worth $5.4 billion).</p>
<p>At a mission level, Google's <a href="https://about.google/google-in-america/?ref=content.strategyofsecurity.com">about website</a> literally places cybersecurity alongside increasing economic opportunity as a strategic priority for the company:</p>
<!--kg-card-end: markdown--><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/google-cybersecurity-mission.png" class="kg-image" alt="Google is focused on creating economic opportunity and strengthening cybersecurity for all Americans." loading="lazy" width="1600" height="1192" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/03/google-cybersecurity-mission.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/03/google-cybersecurity-mission.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/google-cybersecurity-mission.png 1600w" sizes="(min-width: 720px) 720px"></figure><!--kg-card-begin: markdown--><p>As Google does, this vision is obviously grandiose. You don't say something like this unless you mean it, though. Acquiring Mandiant is a bold statement to <em>prove</em> that you mean it.</p>
<p>Google also has a relatively good track record of its own for publishing security research and contributing to the community. They recently summarized their contributions nicely in a recent <a href="https://blog.google/technology/safety-security/why-were-committing-10-billion-to-advance-cybersecurity/?ref=content.strategyofsecurity.com">press release</a>:</p>
<blockquote>
<p>We’ve published over 160 academic research papers on <a href="https://research.google.com/pubs/SecurityPrivacyandAbusePrevention.html?ref=content.strategyofsecurity.com">computer security, privacy, and abuse prevention</a>, and we warn other software companies of weaknesses in their systems. And dedicated teams like our <a href="https://blog.google/threat-analysis-group/?ref=content.strategyofsecurity.com">Threat Analysis Group</a> work to counter government-backed hacking and attacks against Google and our users, making the internet safer for everyone.</p>
</blockquote>
<p>In the same press release, the company also announced $10 billion in cybersecurity program investments:</p>
<blockquote>
<p>That’s why today, we are announcing that we will invest $10 billion over the next five years to strengthen cybersecurity, including expanding zero-trust programs, helping secure the software supply chain, and enhancing open-source security.</p>
</blockquote>
<p>The nature of the investments was vague, but you shouldn't take this as &quot;Mandiant was $5 billion out of that $10 billion.&quot; The $10 billion is likely for investments above and beyond Google's core business and products — generally for the betterment of the community, not Google directly.</p>
<p>It's hard to say exactly how Mandiant's public contributions will change after the acquisition closes, but it seems safe to assume they will continue. The intent behind Google's contribution to cybersecurity is definitely there, along with some tangible evidence of action to back it up.</p>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h2 id="what-this-means-for-alphabet">What This Means for Alphabet</h2>
<p>Acquiring Mandiant is a big deal for Alphabet, despite how much I minimized the financial impact of the acquisition. Much of the value Mandiant brings is either intangible or a second-order effect.</p>
<p>Alphabet gains a large (and hard to quantify) amount of goodwill that comes from Mandiant's brand and credibility alone. Reputation matters, but they also gain Mandiant's core technical competencies — a valuable addition to the Google Cloud Platform.</p>
<p>Acquiring Mandiant also keeps Alphabet's competitors from gaining the same advantages. Unlike other technology-focused acquisitions, Mandiant is one of one — there isn't really another company with the same combination of skills and brand.</p>
<p>Beyond these high-level benefits, there are a few specific areas of impact for Alphabet that are worth diving into deeper.</p>
<h5 id="antitrust-implications">Antitrust Implications</h5>
<p>First, it's not completely certain this deal is actually going to close. There is already speculation and <a href="https://www.economicliberties.us/press-release/googles-acquisition-of-mandiant-will-only-serve-to-choke-off-necessary-cybersecurity-innovation/?ref=content.strategyofsecurity.com">demands</a> for the transaction to be struck down because of antitrust. Alphabet is already facing significant <a href="https://www.marketwatch.com/story/google-enters-2022-battling-antitrust-actions-on-multiple-fronts-with-more-likely-to-come-11640643570?ref=content.strategyofsecurity.com">antitrust scrutiny</a> from regulators. Tech regulation in general is <a href="https://stratechery.com/2021/regulators-and-reality/?ref=content.strategyofsecurity.com">en vogue</a> with governments across the globe.</p>
<p>Even with the point I made earlier about this deal being financially insignificant, most regulators aren't going to read past the &quot;Alphabet's second biggest acquisition ever&quot; headline. The Mandiant acquisition is just another drop in the overflowing bucket of evidence antitrust regulators are compiling against Alphabet.</p>
<p>If this deal gets delayed or struck down, the cause won't be Mandiant in isolation. The cause will be the aggregated set of concerns with Alphabet — primarily its advertising business.</p>
<p>Antitrust is a fluid topic, and I'm certainly not an antitrust lawyer. However, it <em>seems</em> unlikely this acquisition is going to be blocked. Despite the likely drama and rhetoric, reasonableness should enter the picture at some point in the process. The case against this being an antitrust concern is relatively strong:</p>
<ul>
<li>
<p>Google Cloud is the third largest cloud provider, far from a monopoly in isolation from the remainder of Alphabet.</p>
</li>
<li>
<p>Mandiant is a leader in cybersecurity professional services, particularly incident response and breach investigations. However, their competitive position isn't a monopoly.</p>
</li>
<li>
<p>Mandiant's technology assets (the Mandiant Advantage platform) exist in an extremely competitive market, namely XDR.</p>
</li>
<li>
<p>Amazon AWS and Microsoft Azure both have competitive security offerings, as do hundreds of private companies within the broader cybersecurity ecosystem.</p>
</li>
<li>
<p>The size of this transaction is small and makes an immaterial impact on Alphabet's revenue.</p>
</li>
</ul>
<p>We'll see how the antitrust situation plays out as the deal moves through the closing process in the coming weeks and months.</p>
<h5 id="google-cloud-risk-protection-program">Google Cloud Risk Protection Program</h5>
<p>In March 2021, Google Cloud <a href="https://cloud.google.com/blog/products/identity-security/google-cloud-risk-protection-program-now-in-preview?ref=content.strategyofsecurity.com">announced</a> their new Risk Protection Program — a wildly innovative model (relatively speaking) for managing and distributing security risks for customers. This program reshapes the paradigm for cloud risk management in a way that only a select few companies like Alphabet could achieve.</p>
<p>Here's the big idea:</p>
<ul>
<li>
<p>Customers who use Google Cloud and enroll in the Risk Protection Program can get a purpose-built cyber insurance program for everything they run in Google Cloud.</p>
</li>
<li>
<p>In exchange, Google takes shared responsibility for securing the customer's cloud environment and optimizing security and compliance over time.</p>
</li>
<li>
<p>Security posture gets measured and reported to the insurance providers, who then have better data (and more comfort) to model risk as they underwrite policies.</p>
</li>
</ul>
<p>This model solves a lot of problems:</p>
<ul>
<li>
<p>Some major insurers have <a href="https://www.reuters.com/markets/europe/insurers-run-ransomware-cover-losses-mount-2021-11-19/?ref=content.strategyofsecurity.com">stopped offering cyber insurance</a> because it's too risky. Having data about a company's security posture (and Google's expertise for improving it) makes the risk more palatable.</p>
</li>
<li>
<p>Companies want to move to the cloud but defer, partly because cloud security is hard and <a href="https://www.zdnet.com/article/report-finds-skills-gap-in-cloud-security-storage-it-intensified-by-pandemic/?ref=content.strategyofsecurity.com">skills are scarce</a>. Getting help from Google to secure cloud workloads is super appealing.</p>
</li>
<li>
<p>Alphabet wants to increase Google Cloud market share. The Risk Protection Program incentivizes customers to move as many workloads as possible on to Google Cloud. Anything outside of Google Cloud isn't covered under the insurance policy.</p>
</li>
</ul>
<p>Mandiant fits into this equation nicely. If Google is on the hook for keeping customers in the Risk Protection Program secure, it sure helps to have people like Mandiant around to do it.</p>
<p>If there is any room for Mandiant's consulting business to stick around under the Google Cloud umbrella, this is it. The Risk Protection Program is only in &quot;preview&quot; mode right now, so the number of customers using it is presumably limited. If the model catches on and reaches general availability, Mandiant's former consulting practice will have a lot of work to stay busy with.</p>
<h5 id="market-share-for-google-cloud">Market Share for Google Cloud</h5>
<p>For Alphabet, one of the primary success criteria for this deal is <em>&quot;does it make our Google Cloud revenue go up?&quot;</em>. The revenue Mandiant earns directly is secondary compared to its overall contribution to the Google Cloud bottom line.</p>
<p>Compound growth gets wild in situations like Google Cloud. $5.5 billion in revenue isn't astonishing, but a ~45% growth rate is. Mix in the cash infusion from Alphabet's other profitable businesses, and you've got rocket fuel for growth.</p>
<p>The part where Mandiant comes in is helping Google Cloud maintain or increase the growth rate. That's where the indirect contribution part comes in — adding Mandiant's ~$400 million in annual revenue to Google Cloud's bottom line doesn't matter as much as the uplift Mandiant gives everything else in Google Cloud.</p>
<p>Here's a quick thought experiment to demonstrate the point: if Google Cloud continues growing at 45% annually, its revenue in 2025 would be $24.3 billion. That's a $7.5 billion increase from 2024 and an $18.8 billion increase from the $5.5 billion in revenue reported for 2021. Accelerating the growth rate by just 5% (to 50% year-over-year) creates an even more dramatic effect: $27.8 billion in revenue by 2025, a $22.3 billion increase from 2021.</p>
<p>This example is a lot of finance speak, but it gives you an idea about why growth rates and maintaining or accelerating compound growth matters. Spending $5.4 billion on Mandiant looks pretty appealing if it helps you increase revenue by $18-20 billion in five years, and even more in the long term.</p>
<p>Tactically, security is a major factor in capturing the remainder of the cloud computing market. Any on-premise workloads that can easily be moved to cloud already have. The low-hanging fruit is essentially gone. And it's probably staying on whatever cloud it's on now. The workloads that are still on-premise have reasons for not moving — security being one of them.</p>
<p>The best way for Google Cloud to grow its revenue isn't to take existing customers away from other cloud providers. It's to win more of the remaining workloads that remain on-premise. Alphabet CEO Sundar Pichai views security (and Mandiant, by proxy) as a key to unlocking it. From Alphabet's Q2 2021 earnings call:</p>
<blockquote>
<p>[Security] is definitely an area where we are seeing a lot of conversations, a lot of interest. It's our strongest product portfolio, and we are continuing to enhance our solutions, be it integrating Chronicle, BeyondCorp and all the product components we have there. So a definite source of strength and you'll continue to see us invest here.</p>
</blockquote>
<p>Acquiring Mandiant is one such investment. Expect to see more as Alphabet makes this vision a reality and a growth driver for Google Cloud.</p>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h2 id="what-this-means-for-the-cybersecurity-ecosystem">What This Means for the Cybersecurity Ecosystem</h2>
<p>There is a lot to grok with the direct impact to Mandiant and Alphabet alone, but we're not done quite yet. The acquisition creates ripples in the rest of the cybersecurity ecosystem. Let's finish by looking at a few of them.</p>
<h5 id="incident-response-services">Incident Response Services</h5>
<p>First, the big micro-level question: what happens to the market for incident response services now that Alphabet is acquiring Mandiant? It's unclear if or to what extent Mandiant is going to continue providing professional services under Google Cloud, especially long term.</p>
<p>Mandiant has been the market leader for incident response services for more than a decade. The acquisition creates a potentially significant disruption (or opportunity, depending on where you sit) in the market.</p>
<p>I wrote this when previously writing about Mandiant's transformation after selling FireEye:</p>
<blockquote>
<p>Their transformation is high risk, high reward. If the transition doesn't work out, their failure is going to create a giant opening for opportunistic service providers to disrupt Mandiant's dominance in breach responses and threat intelligence.</p>
</blockquote>
<p>This prediction is more relevant than ever, especially in breach response. The window of opportunity is now wide open for professional services firms to fill the void that (I fear) Mandiant will inevitably leave behind.</p>
<p>It's possible that incident response services are becoming commoditized. Competitors have been building out service offerings for years. Mandiant is well known for incident response, but they're not the only show in town.</p>
<p>Regardless of how big or small of a void Mandiant leaves in the incident response market, there won't be one single firm that replaces them. The more likely outcome is multiple firms (large and small) divide up market share. New market leaders may emerge, but there probably won't be another Mandiant.</p>
<h5 id="professional-services-and-public-markets">Professional Services and Public Markets</h5>
<p>Losing Mandiant as a publicly traded cybersecurity professional services company is a pretty strong vote against the viability of such companies in public markets. The somewhat grim conclusion might be this: professional services companies in cybersecurity don't make for good public companies.</p>
<p>SecureWorks is now the only cybersecurity professional services company traded on U.S. stock exchanges. Everyone else, from big to small, is private. I detailed some of the reasons why when breaking down challenges for traditional professional services firms:</p>
<blockquote>
<p>Cybersecurity professional services firms are traditionally private for several reasons. A big one is their business model. Unlike SaaS companies, professional services firms have minimal recurring revenue. They have to manage their sales pipeline and grind out new project wins continuously. Reputation and scale matter, but future stability and growth have an element of inherent instability.</p>
</blockquote>
<p>It's not out of the question that another cybersecurity-focused professional services firm could go public. Consolidation of professional services companies is a major theme in the industry, which I wrote about in detail while <a href="https://strategyofsecurity.com/p/themes-from-momentum-cybers-2022-cybersecurity-almanac/">analyzing</a> Momentum Cyber's 2022 Cybersecurity Almanac.</p>
<p>If other candidates emerge to go public, they're either going to come from consolidation or a subscription-based business model, a la <a href="https://arcticwolf.com/?ref=content.strategyofsecurity.com">Arctic Wolf's</a> Managed Detection and Response (MDR) solutions. Arctic Wolf is probably the closest quasi-services company in the IPO pipeline. Otherwise, I would expect to see the consolidation activity happening in transactions between private companies.</p>
<h5 id="consolidation-of-security-under-cloud-providers">Consolidation of Security Under Cloud Providers</h5>
<p>Finally, the big picture: it's very possible we could see a run of security company acquisitions by cloud providers.</p>
<p>Security is one of the biggest barriers remaining for any organizations who still maintain on-premise data centers. Cloud providers know that and have the capital to fix it. Alphabet has made their intentions clear. Amazon and Microsoft are on the same page about security, too.</p>
<p>Given the scale and growth rate of cloud providers, it's possible they could aggregate a meaningful portion of the cybersecurity ecosystem, with acceleration starting this year. As this acquisition demonstrates, nothing is off limits — not even public companies. Things get can get really interesting and wild in a hurry when the <a href="https://stratechery.com/concept/aggregation-theory/?ref=content.strategyofsecurity.com">aggregators start aggregating</a>.</p>
<p>In the story of Alphabet and Mandiant, the biggest lesson of all might be that aggregation is coming for the cybersecurity ecosystem. That's a topic for a <a href="https://strategyofsecurity.com/p/an-intro-to-consolidation-and-aggregation-in-cybersecurity/">future article</a>. For now, it's been interesting to think about the strategic implications of this acquisition and what it could mean going forward.</p>
<!--kg-card-end: markdown--><hr><!--kg-card-begin: html--><p>Thanks for reading! How did you like this article?</p>
<p>
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6MTVkODVmNzktZGU5Yi00MTg1LTlmYjUtNDdiMzNmODg2MDE4?r=loved&ref=content.strategyofsecurity.com">Loved</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6MTVkODVmNzktZGU5Yi00MTg1LTlmYjUtNDdiMzNmODg2MDE4?r=great&ref=content.strategyofsecurity.com">Great</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6MTVkODVmNzktZGU5Yi00MTg1LTlmYjUtNDdiMzNmODg2MDE4?r=good&ref=content.strategyofsecurity.com">Good</a> •  
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6MTVkODVmNzktZGU5Yi00MTg1LTlmYjUtNDdiMzNmODg2MDE4?r=meh&ref=content.strategyofsecurity.com">Meh</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6MTVkODVmNzktZGU5Yi00MTg1LTlmYjUtNDdiMzNmODg2MDE4?r=bad&ref=content.strategyofsecurity.com">Bad</a>
</p><!--kg-card-end: html-->]]></content:encoded>
            <category>M&amp;A</category>
            <category>#Companies</category>
            <category>#Mandiant</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/The-Mirage-of-Mandiant.png"/>
        </item>
        <item>
            <title><![CDATA[Earnings: Identity and Access Management 2021 Annual Earnings Recap]]></title>
            <link>https://strategyofsecurity.com/earnings-identity-and-access-management-2021-annual-earnings-recap/</link>
            <guid>6225472c2c4099003d175b09</guid>
            <pubDate>Mon, 07 Mar 2022 15:45:06 GMT</pubDate>
            <description><![CDATA[A recap of annual earnings and strategy for public Identity and Access Management (IAM) companies.]]></description>
            <content:encoded><![CDATA[<p><em>Note: I'm taking the week of March 7th (this week) off from writing. There will be no weekly article published the week of March 14th (next week). I'll be back with a new article the week of March 21st.</em></p>
<p>Four of the five public Identity and Access Management (IAM) companies reported annual earnings between February 24th and March 3rd. IAM is one of the most important segments of the cybersecurity ecosystem. This week is a great time to do a comprehensive update on all of them while earnings information is fresh.</p>
<p>I've covered CyberArk, ForgeRock, Okta, and SailPoint in past articles. This article is a recap and update on all four, plus additional commentary on Ping Identity.</p>
<p>Just an up-front warning — this is a long article. Covering five companies together in a part of the ecosystem I understand well resulted in more thoughts than I expected. I decided to publish it anyway instead of breaking it into parts since I'm not writing an article next week.</p>
<p>The analysis of each company can be read individually. There is some big-picture overlap that you'd only get by reading the whole article. However, there is plenty of value in reading about the companies one at a time.</p>
<p>One other comment before we get started — why is IAM so important to the cybersecurity ecosystem (and why is it worth almost 7,000 words to analyze it)? This quote from Okta CEO Todd McKinnon said it best:</p>
<blockquote>
<p>Because identity is so prevalent in all these [digital transformation] trends and to be successful to successfully get all this cloud technology to your employees, to re-imagine your customer experience and do all securely, you have to have an identity system...<br>
<br>
The reality of it is that not everyone knows this yet. If you talk to 10 CIOs maybe three of them would say, hey, this is the future. Identity is the central platform. Identity is one of my primary clouds. It's going to unleash all this potential for me and to keep me more competitive. Only about probably three out of 10 know this...<br>
<br>
And the good news is that more and more people every day are learning this and people that people that are making technology decisions and they realize that if you want to do Zero Trust, if you choice and technology, you need to do it with identity, and we have the leading identity platform.</p>
</blockquote>
<p>On to the updates.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/Logo_-CyberArk.png" class="kg-image" alt="CyberArk logo" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/03/Logo_-CyberArk.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/03/Logo_-CyberArk.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/03/Logo_-CyberArk.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/Logo_-CyberArk.png 1920w" sizes="(min-width: 720px) 720px"></figure><p>From CyberArk's earnings <a href="https://investors.cyberark.com/press-releases/press-release-details/2022/CyberArk-Announces-Record-Fourth-Quarter-and-Full-Year-2021-Results/default.aspx?ref=content.strategyofsecurity.com">press release</a>:</p>
<blockquote>
<p>• Record fourth quarter revenue of $151.3 million; Record full year revenue of $502.9 million<br>
<br>
• Subscription Bookings Mix of 71% in the fourth quarter; 66% for the full year 2021<br>
<br>
• Subscription Portion of Annual Recurring Revenue (ARR) of $183 million with Growth Accelerating to 146%<br>
<br>
• Total ARR of $393 million with Growth Accelerating to 44%<br>
<br>
• Subscription Transition Goals Now Expected to be Met in Second Quarter of 2022</p>
</blockquote>
<p>CyberArk has continued its reign as the leader of the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#privileged-access-management-pam">Privileged Access Management (PAM)</a> market and steady performer among public cybersecurity companies. 2021 was a solid year for CyberArk in multiple ways, including hitting $500 million in annual revenue for the first time.</p>
<p>The themes from the call were consistent with the ones we discussed back in Q3 2021 when I wrote about <a href="https://strategyofsecurity.com/p/cyberark-and-the-new-paradigm-for-privileged-access/">CyberArk and the New Paradigm for Privileged Access</a>. They have a few major things going on:</p>
<ul>
<li>
<p>Transitioning from a license-based to a subscription-based revenue model</p>
</li>
<li>
<p>Continuing to build and migrate customers from the on-premise PAM product to the Privilege Cloud SaaS solution</p>
</li>
<li>
<p>Diversifying product offerings with cloud single sign-on, endpoint privilege management, secrets management, and more</p>
</li>
<li>
<p>Investing in research and development of new product features for the core platform, including Secure Web Sessions and Dynamic Privileged Access</p>
</li>
</ul>
<h3 id="financials">Financials</h3>
<p>From a financial standpoint, CyberArk is a company that could fool you if you're looking at surface-level numbers but not deeper into their strategy. They're a solid, reliable company that's well respected throughout the cybersecurity industry.</p>
<p>One of the easiest places to get fooled is growth. CyberArk was squarely within Momentum Cyber's "low growth" category of public cybersecurity companies in 2021:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/2021-Low-Growth---CyberArk.png" class="kg-image" alt="CyberArk public company trading analysis." loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/03/2021-Low-Growth---CyberArk.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/03/2021-Low-Growth---CyberArk.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/03/2021-Low-Growth---CyberArk.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/2021-Low-Growth---CyberArk.png 1920w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2022), pg. 63</em></i></figcaption></figure><p>As much as I've harped on lower growth companies being at risk for acquisition, that's not going to be the case for CyberArk any time soon. What appears to be low growth is partially driven by the company's transition from annual licenses to a subscription-based revenue model.</p>
<p>Josh Siegel, CyberArk's CFO, discussed how this transition obfuscates growth in their Q4 2021 earnings call:</p>
<blockquote>
<p>Normalizing for the mix shift growth in the license portion of the business, our SaaS, self-hosted subscription and perpetual would have grown about 40% and demonstrates the underlying growth in the business. Taking the calculated revenue into consideration, total revenue growth would have accelerated to 28% year-on-year.</p>
</blockquote>
<p>There are a lot of accounting and revenue recognition mechanics that we're not going to dive into here. However, it's fair to say you can take the lower quarterly revenue growth percentages with a grain of salt. This needed to be done and will leave them (and customers) in a better position going forward with a modern subscription model.</p>
<p>The good news from the Q4 2021 earnings call is that this transition will be over sooner than expected. From CEO Udi Mokady:</p>
<blockquote>
<p>We now have more than 890 customers with over $100,000 in annual recurring revenue. Given our success in 2021, we are accelerating the transition exit and expect to reach about 85% of bookings from subscription in the second quarter of 2022 or in just six quarters, which is well ahead of our initial timeline outlined in February of 2021.</p>
</blockquote>
<p>The timeline and mechanics are little less clear-cut than it sounds. Over half of CyberArk's total subscription revenue is from recurring maintenance fees on annual licenses. While maintenance is technically subscription revenue, it's not the kind they want — maintenance is a relic of an annual licensing model.</p>
<p>CyberArk's goal is to expedite the decline of maintenance revenue and increase the percentage of true subscription-based revenue. The trend across the past two years is generally what we would want to see:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/CyberArk-Q4-2021-Subscription-Breakdown.png" class="kg-image" alt="CyberArk sequential increase in subscription ARR." loading="lazy" width="1330" height="750" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/03/CyberArk-Q4-2021-Subscription-Breakdown.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/03/CyberArk-Q4-2021-Subscription-Breakdown.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/CyberArk-Q4-2021-Subscription-Breakdown.png 1330w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Source: CyberArk Investor Relations Presentation (February 2022), Page 27</em></i></figcaption></figure><p>I added trend lines to their investor presentation for illustration. Maintenance revenue is holding flat (dark blue boxes under the red trend line). This will eventually start to decline as the transition to subscriptions completes.</p>
<p>Subscription revenue is increasing every quarter (light blue boxes under the green trend line). At the current pace, recurring revenue from pure subscriptions will overtake maintenance revenue in Q1 2022.</p>
<p>There was more exciting news about revenue, though. During the Q4 2021 earnings call, Josh Siegel made a relatively bold prediction about CyberArk's revenue growth:</p>
<blockquote>
<p>With our strong performance in 2021, we are on our way to meet $1 billion ARR target, which we now believe we can achieve already by June of 2025.</p>
</blockquote>
<p>The prediction is bold for a couple reasons. First, it's relatively rare to see revenue targets given multiple years out (3.5 years into the future, in this case). Second, CyberArk's current Annual Recurring Revenue (ARR) is $393 million. To reach $1 billion ARR, CyberArk will need to grow its ARR by 2.5x over the next 3.5 years. That seems aggressive but possible.</p>
<p>If CyberArk is going to reach the $1 billion ARR milestone by June 2025, what is their plan to get there? Udi Mokady outlined a few priorities on the earnings call:</p>
<blockquote>
<p>Our priorities heading into 2022 include: complete our subscription transition by the second quarter, invest in our global sales organization, including our partner ecosystem to drive growth, protect our ARR by investing in customer success, support and services, and invest in research and development to enhance our data security platform and drive innovation.</p>
</blockquote>
<p>We've talked about the subscription transition already. Let's quickly cover the other three priorities.</p>
<h3 id="marketplace-partnerships">Marketplace Partnerships</h3>
<p>Investing in the global sales organization and partnerships partially means reinforcing what CyberArk is already doing. They have had strong partnerships with Systems Integrators (SI) and other consulting firms for many years. That channel is already in good shape.</p>
<p>The new part is coming from marketplace partnerships — a channel that hasn't historically been used for larger enterprise purchases. Udi Mokady highlighted an example of their <a href="https://aws.amazon.com/marketplace/seller-profile?id=3c5e4900-f47b-47e0-86f1-2f6850c19fef&ref=content.strategyofsecurity.com">AWS marketplace</a> growth during the Q4 earnings call:</p>
<blockquote>
<p>On the Cloud Marketplace side, our business with AWS continued to gain traction in the fourth quarter and our pipeline quadrupled. Marketplaces are a productive, efficient, highly scalable, complementary new route to market for CyberArk.</p>
</blockquote>
<p>This will be an interesting trend to watch as it develops. Marketplaces are a new, bottom-up sales approach that companies like CyberArk typically haven't participated in or benefited from. The paradigm is starting to change as enterprises become more comfortable about buying software without dedicated sales reps.</p>
<p>It's also interesting because direct purchases from marketplaces could potentially squeeze CyberArk's SI partners out of the picture on some deals. SIs are an important sales channel for CyberArk, so a shift towards marketplaces will need to be managed with care.</p>
<h3 id="customer-success">Customer Success</h3>
<p>Investing in customer success to protect ARR is a relatively straightforward objective. CyberArk's market leadership position in PAM is so dominant that their primary goal is "don't mess it up" (my take, not theirs).</p>
<p>One easy way to mess it up is by not supporting customers at the level they expect. Subscription revenue (ARR) is like an annuity — recurring returns over a long period of time. The way to grow ARR (to $1 billion and beyond, in CyberArk's case) is to both sell more subscriptions and keep the ones you've got. That's what CyberArk is doing here.</p>
<h3 id="product-innovation">Product Innovation</h3>
<p>The final objective is the most interesting one. Investing in research and development to drive product innovation is what creates upside. Customer success keeps the bottom from falling out and creates opportunities for selling additional products outside of CyberArk's core PAM product. The plan only works, though, if the additional products are good.</p>
<p>There are already signs of this strategy working. CyberArk's entry into the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#authentication">cloud access management market</a> via acquisition has been more successful than I would have expected. Udi Mokady also highlighted the success of CyberArk's <a href="https://www.cyberark.com/products/endpoint-privilege-manager/?ref=content.strategyofsecurity.com">Endpoint Privilege Manager</a> product:</p>
<blockquote>
<p>In fact, EPM was a eight of our top 10 deals in the quarter.</p>
</blockquote>
<p>The combination of additional standalone products with new features like Secure Web Sessions and Dynamic Privileged Access for the core PAM product gives CyberArk multiple opportunities for revenue expansion at existing customers.</p>
<h3 id="competition-and-private-equity">Competition and Private Equity</h3>
<p>Udi Mokady had an interesting observation about the impact of private equity in the PAM market. From the earnings call:</p>
<blockquote>
<p>And in this space, we’re seeing that the PAM players have been continuously disrupted by PE and changing hands over the last couple years and really didn’t invest in R&amp;D, while SaaS market continued to invest in R&amp;D and innovation...</p>
</blockquote>
<p>I talked a lot about how private equity can shape markets in <a href="https://strategyofsecurity.com/p/themes-from-momentum-cybers-2022-cybersecurity-almanac/">Themes From Momentum Cyber's 2022 Cybersecurity Almanac</a>. PAM is a great example. Here's the most recent <a href="https://thycotic.com/company/blog/2021/07/21/thycotic-centrify-a-leader-2021-gartner-magic-quadrant-pam/?ref=content.strategyofsecurity.com">Gartner Magic Quadrant for Privileged Access Management</a>:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/Gartner-PAM-2021-Magic-Quadrant.png" class="kg-image" alt="Gartner Magic Quadrant for Privileged Access Management" loading="lazy" width="424" height="461"></figure><p>Within the Leaders quadrant, <a href="https://www.globenewswire.com/news-release/2021/06/01/2239769/0/en/BeyondTrust-Announces-Strategic-Investment-from-Clearlake-Capital.html?ref=content.strategyofsecurity.com">BeyondTrust</a>, <a href="https://www.crn.com/news/security/tpg-capital-to-buy-thycotic-for-1-4b-merge-it-with-rival-centrify-report?ref=content.strategyofsecurity.com">Centrify, and Thycotic</a> (red dots, emphasis mine) have all been involved in recent private equity transactions. One Identity is already owned by Quest Software. That's a <em>lot</em> of activity among CyberArk's direct competitors. CyberArk still needs to invest in R&amp;D, but it has a comfortable lead over its competition.</p>
<p>CyberArk is in a good position right now. In 2022, expect them to keep doing what they've always done: steadily plugging away at reliable growth and maintaining their happy customer base.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/Logo_-ForgeRock-1.png" class="kg-image" alt="ForgeRock logo" loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/03/Logo_-ForgeRock-1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/03/Logo_-ForgeRock-1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/03/Logo_-ForgeRock-1.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/Logo_-ForgeRock-1.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>From ForgeRock's earnings <a href="https://investors.forgerock.com/press-releases/detail/337/forgerock-announces-strong-fourth-quarter-and-full-year?ref=content.strategyofsecurity.com">press release</a>:</p>
<blockquote>
<p>• ARR accelerated to a record 35% year-over-year growth<br>
<br>
• Fiscal year 2021 revenue totaled $176.9 million and grew 39% year-over-year</p>
</blockquote>
<p>I haven't revisited ForgeRock since <a href="https://strategyofsecurity.com/p/forgerock-ipo/">writing in detail</a> about their IPO in September 2021. Even though 2021 was a partial year of publicly announced earnings for them, two quarters later is a good time to check in on their progress.</p>
<p>The biggest news with ForgeRock is continued growth of ARR and their planned entry into the fraud protection market in 2022.</p>
<h3 id="financials">Financials</h3>
<p>ForgeRock's total revenue growth was outstanding — a total of $176.9 million with 39% year-over-year growth. This puts them into the territory of "high growth" companies in Momentum Cyber's 2021 report:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/2021-High-Growth---ForgeRock.png" class="kg-image" alt="ForgeRock Public Company Trading Analysis" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/03/2021-High-Growth---ForgeRock.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/03/2021-High-Growth---ForgeRock.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/03/2021-High-Growth---ForgeRock.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/2021-High-Growth---ForgeRock.png 1920w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2022), pg. 61</em></i></figcaption></figure><p>However, the story of their growth is in somewhat of an opposite position compared to CyberArk and SailPoint. That's not to say ForgeRock's growth is deceptively high — just that underlying ARR growth might limit overall revenue growth in the future.</p>
<p>ForgeRock's ARR growth for 2021 was a healthy 35%. That's good — until you do the comparison to CyberArk (44%) and SailPoint (48%). ForgeRock's 35% ARR growth was well above Ping Identity's 21%. However, ARR growth for CyberArk and SailPoint could be artificially high right now given both companies' emphasis on subscriptions. ForgeRock is a newer company that has fewer customers to transition away from licenses to subscriptions.</p>
<p>On the earnings call, expectations are were set for "north of 30%" in 2022. It might seem reductive to be talking about 30% ARR growth as a bad thing, but ForgeRock is inevitably compared to the other companies in the market that are growing at over 40%.</p>
<h3 id="fraud-protection-market-entry">Fraud Protection Market Entry</h3>
<p>ForgeRock announced plans to release a fraud protection product into general availability during the first half of 2022. Fran Rosch alluded to this move during interviews around the time of their IPO. Now, they're making good on that promise.</p>
<p>Fran Rosch gave a more detailed explanation on the Q4 2021 earnings call:</p>
<blockquote>
<p>We are building on the success of our existing autonomous identity product, and we'll be introducing a new AI-driven fraud protection solution in the next several months. It provides a risk signals and scores for users in order to stop bad actors and fraud in real time at the identity perimeter.<br>
<br>
Core features will help to identify account takeover attempts, credential stuffing, suspicious IPs, possible travelers, man in the middle attacks, phishing and bots, while at the same time improving the experience of legitimate users.</p>
</blockquote>
<p>The core features described here are all logical extensions for an identity and access management platform. ForgeRock already had adaptive authentication features built into its access management product. It's not a stretch to start addressing these fraud-oriented use cases.</p>
<p>Bigger picture, this announcement is one example of a broader convergence between segments of the cybersecurity ecosystem and fraud. As customer interactions become more digital, technology is the entry point for more fraud attempts — especially in omnichannel businesses who operate in both the physical and digital worlds. This is an interesting trend to watch as we understand what the post-pandemic world might look like.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/Logo_-Okta.png" class="kg-image" alt="Okta logo" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/03/Logo_-Okta.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/03/Logo_-Okta.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/03/Logo_-Okta.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/Logo_-Okta.png 1920w" sizes="(min-width: 720px) 720px"></figure><p>From Okta's earnings <a href="https://investor.okta.com/news-releases/news-release-details/okta-announces-strong-fourth-quarter-and-fiscal-year-2022?ref=content.strategyofsecurity.com">press release</a>:</p>
<blockquote>
<p>• Q4 revenue grew 63% year-over-year; subscription revenue grew 64% year-over-year<br>
<br>
• Fiscal year 2022 revenue totaled $1.30 billion and grew 56% year-over-year; subscription revenue grew 57% year-over-year<br>
<br>
• Remaining performance obligations (RPO) grew 50% year-over-year to $2.69 billion; current remaining performance obligations (cRPO) grew 60% year-over-year to $1.35 billion</p>
</blockquote>
<p>Okta's fiscal year end is 1/31, so this was technically fiscal year was FY22 for them. I'm grouping them in with the 12/31 year end companies since the earnings period is effectively the 2021 calendar year.</p>
<p>The investor reaction to Okta's earnings release wasn't kind (we'll get into that more later), but it was still a good year for the company. CEO Todd McKinnon highlighted several accomplishments on the earnings call:</p>
<blockquote>
<p>There are so many highlights to the year. For example, we surpassed the $1 billion revenue mark, we added over 5,000 customers. We now have nearly 30% of the global 2,000 as customers.</p>
</blockquote>
<p>Reaching $1 billion in revenue is a phenomenal milestone. All four of the other companies in this article are at $500 million or less. Okta is one of the fastest growing public companies in all of cybersecurity — near the top of Momentum Cyber's "high growth" category:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/2021-High-Growth---Okta.png" class="kg-image" alt="Okta Public Company Trading Analysis" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/03/2021-High-Growth---Okta.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/03/2021-High-Growth---Okta.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/03/2021-High-Growth---Okta.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/2021-High-Growth---Okta.png 1920w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2022), pg. 61</em></i></figcaption></figure><p>Okta's continued revenue growth at twice the scale of other public companies in this market speaks volumes about the company — regardless of what investors and analysts think about near term results.</p>
<p>The controversy around Okta's FY22 financial results and FY23 outlook stole the spotlight, so we'll spend some time on that. Other than financials, the one of the most important topics for Okta in the upcoming year is the general availability (GA) launches of their Identity Governance and Privileged Access Management (PAM) products. There's a lot to unpack with both, so we'll focus on those two areas for this update on Okta.</p>
<h3 id="financials">Financials</h3>
<p>The story of Okta's FY22 financial results revolves around high growth and increasing losses. For better or worse, the increasing operating losses drew the ire of investors and analysts. Okta's stock was summarily punished, falling around 9% shortly after the earnings announcement.</p>
<p>The topic of increased operating losses was widely discussed on the earnings call. The response from Okta's leadership team was clear and unapologetic —&nbsp;they're going to continue investing capital in growth. From co-founder Frederic Kerrest:</p>
<blockquote>
<p>First and foremost, we've always had a bias towards growth. But we always look at efficiency and always managed on a rule of 40. And so the guidance you've seen today and the commentary earlier in the call, still reflects that we are definitely managing at a rule of 40, and we believe that's the right thing to do to go capture the opportunity...because it is a massive one in front of us. So, we feel that the time is right to go and grab as much market share as possible.</p>
</blockquote>
<p>The all-important "Rule of 40" came up several times as a guideline that Okta will invest within. Practically speaking, increased operating expenses means Okta will have higher expenses in both sales and marketing and research and development.</p>
<p>Similar to the money-making machine <a href="https://strategyofsecurity.com/p/earnings-february-2022-recap/">described by Cloudflare CEO Matthew Prince</a>, Okta's machine is working quite well. Investing in growth to the point of operating losses is a risk, of course, but they're seeing tangible revenue growth on the other end.</p>
<p>Year-over-year revenue growth of 56% (to $1.3 billion) and subscription revenue growth of 57% (to $1.25 billion) is the money-making machine at work. Okta's numbers can get somewhat distorted because of Auth0's meaningful contribution, but anyone questioning the growth of Okta's core product was silenced: total revenue for Okta standalone (e.g. excluding Auth0) grew 39%.</p>
<p>Their growth numbers are great, and their operating losses are intentional and within reason. I understand the investor and analyst concern, especially for people who don't already own the stock. However, the long-term takeaway here is still that Okta is one of the best public cybersecurity companies there is.</p>
<p>Moving beyond the near-term drama, the exciting part was Okta's long-term financial outlook. Like CyberArk, Okta had a bold prediction of its own about long-term revenue goals. From Okta's new CFO, Brett Tighe:</p>
<blockquote>
<p>Our long-term financial goals anchor on at least $4 billion of revenue in FY '26 with organic growth of at least 35% each year and 20% free cash flow margin in FY '26.</p>
</blockquote>
<p>This kind of sustained growth would be impressive, if achieved. It also looks past inorganic growth and the potential for Okta to acquire companies to help them reach these milestones faster. We may not see another Auth0-level acquisition, but all reasonable options seem to be on the table for Okta's leadership team to reach their growth goals.</p>
<h3 id="identity-governance-and-privileged-access-management-market-entry">Identity Governance and Privileged Access Management Market Entry</h3>
<p>Okta's entry into the Identity Governance (IGA) and Privileged Access Management (PAM) markets has had a relatively high level of anticipation from people in the industry. Collectively, it's a big move because Okta, SailPoint, and CyberArk essentially didn't compete with each other for most of their existence. The times they are a-changin'.</p>
<p>People generally have a high opinion and high expectations for Okta's products. This well-deserved goodwill is another reason why expectations are so high. Born-in-the-cloud IGA and PAM products are appealing to a lot of companies. Put me in the camp of people who think Okta is spot on with their strategy to enter these markets.</p>
<p>And then, there are investors who want returns. Additional revenue streams from IGA and PAM are viewed as potential market leaders in large markets. Success in one or both of these markets is justification for Okta's high valuation by the investment community.</p>
<p>Fair or not, some people felt the most recent earnings call rained on their parade. Okta Identity Governance is ahead of schedule but won't be available globally until the end of 2022. Okta Privileged Access Management is slightly behind schedule. Neither product is projected to contribute to Okta's revenue in FY23 (calendar year 2022).</p>
<p>Part of the timing considerations for both products is that Okta already has features in both spaces in their existing platform. Workflows and lifecycle management already exist within the IGA space. Server access administration already exists within the PAM space. Based on Todd McKinnon's comments, it seems like the delineation between existing features and the new IGA and PAM products requires careful consideration.</p>
<p>I don't view this as bad news, per se. It's more about managing expectations. No company — not even Okta — can launch a new IGA or PAM product into the ether and overtake SailPoint and CyberArk overnight. Both are strong, well-managed companies with good products.</p>
<p>The SaaS portion of both markets is definitely still up for grabs. That's part of the reason why Okta is investing the time and money to build IGA and PAM products — just like CyberArk and SailPoint are doing. However, Okta's market entry and overall success (or lack thereof) is going to be a multi-year process.</p>
<p>Todd McKinnon seems to feel the same way:</p>
<blockquote>
<p>I think about this long term. It provides a broader set of capabilities. As we build out on the workforce side, the entire suite, the PAM, IGA in broader workforce capabilities, access management and the other management, it's just going to become really overwhelming the value and it's going to lead to more, I think, big new lands as well.</p>
</blockquote>
<p>While the news on Okta's new products may have been disappointing for some, it's important to remember how big of an undertaking this is. Success is going to require some time and patience.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/Logo_-Ping-Identity.png" class="kg-image" alt="Ping Identity logo" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/03/Logo_-Ping-Identity.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/03/Logo_-Ping-Identity.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/03/Logo_-Ping-Identity.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/Logo_-Ping-Identity.png 1920w" sizes="(min-width: 720px) 720px"></figure><p>From <a href="https://www.yahoo.com/video/ping-identity-ping-reports-q4-001012677.html?ref=content.strategyofsecurity.com">Yahoo! Finance</a>:</p>
<blockquote>
<p>Ping Identity (PING) came out with a quarterly loss of $0.13 per share versus the Zacks Consensus Estimate of $0.02. This compares to earnings of $0.09 per share a year ago. These figures are adjusted for non-recurring items.<br>
<br>
This quarterly report represents an earnings surprise of -750%. A quarter ago, it was expected that this software company would post earnings of $0.04 per share when it actually produced earnings of $0.07, delivering a surprise of 75%.</p>
</blockquote>
<p>Ping Identity is another company I have been looking forward to covering. As with other companies I'm writing about for the first time, annual earnings announcements are a good place to jump in.</p>
<p>I would characterize 2021 as a mixed bag for Ping Identity. There is some good news and signs of progress with growth and product. The bad news is their increasing losses and fierce competition.</p>
<h3 id="financials">Financials</h3>
<p>Losses increased to $64.4 million, up significantly from $11.8 million in 2020 and $1.5 million in 2019. Losses from 2021 are 22% as a percentage of revenue. Annual Recurring Revenue (ARR) grew by 21% in 2021. Combined, this ratio is essentially at the boundary of the cherished "Rule of 40" for SaaS companies that we <a href="https://strategyofsecurity.com/p/earnings-february-2022-recap/">discussed last week</a>.</p>
<p>Ping Identity's revenue growth puts the company within within Momentum Cyber's "low growth" category of public cybersecurity companies in 2021:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/2021-Low-Growth---Ping-Identity.png" class="kg-image" alt="Ping Identity Public Company Trading Analysis" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/03/2021-Low-Growth---Ping-Identity.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/03/2021-Low-Growth---Ping-Identity.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/03/2021-Low-Growth---Ping-Identity.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/2021-Low-Growth---Ping-Identity.png 1920w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2022), pg. 63</em></i></figcaption></figure><p>As was the case with both CyberArk and SailPoint, traditional revenue growth is misleading because Ping Identity is also transitioning from a license-based revenue model to a subscription model. However, unlike CyberArk and SailPoint, there is more cause for concern.</p>
<p>The walls are starting to close in on Ping Identity as fast-growing startups gain traction. As a company, Ping Identity's valuation is currently hovering around $1.75 billion. Transmit Security, a startup in cybersecurity's IPO pipeline, was <a href="https://techcrunch.com/2021/06/22/transmit-security-raises-543m-series-a-to-kill-off-the-password/?ref=content.strategyofsecurity.com">valued at $2.2 billion</a> as of its last funding round. Stytch, a newer API-first passwordless authentication startup, was recently <a href="https://techcrunch.com/2021/11/18/stytch-api-passwordless-unicorn/?ref=content.strategyofsecurity.com">valued at over $1 billion</a> after raising their Series B. The list of strong competitors goes on: ForgeRock, FusionAuth, HYPR, and more.</p>
<p>Okta's $6.5 billion <a href="https://strategyofsecurity.com/p/okta-auth0-q2-2021-results/">acquisition of Auth0</a> is also telling. Okta theoretically could have acquired Ping Identity for less at Ping's current valuation (<em>Note: This is purely a thought exercise. I am not aware of any speculative or actual acquisition talks.</em>).</p>
<p>There are plenty of reasons why that would have made sense — gaining traction at large enterprises, eliminating a competitor, entry into large Fortune 100 accounts, etc. But Okta didn't do it, opting to pay a premium for Auth0 instead.</p>
<p>Why? The zeitgeist of developer-first, bottom-up adoption products is real in the identity and access management market. Companies like Auth0 and the aforementioned high growth startups all have nice, shiny, new products. Additionally, Okta is already good at the smaller enterprise accounts that Ping Identity is now entering.</p>
<p>The reasons why a (theoretical) acquisition didn't make sense are many of the same challenges that Ping Identity is working through as a company: Transitioning to cloud. Winning customer identity. Developing partnership channels. Selling down market to smaller enterprises. Investing in growth and product innovation.</p>
<p>Ping's response to all of these challenges feels...<em>late</em>. They're definitely not <em>too late</em> to address them. However, many of the challenges have been brewing for years. They have the potential to hurt Ping in the long run if they're not addressed quickly and effectively.</p>
<h3 id="saas-transition">SaaS Transition</h3>
<p>Like every other company in this article, save Okta (which was a cloud-first product), Ping Identity is in the middle of a product transition from their on-premise product to their cloud-based PingOne product (and hybrid cloud options). PingOne has been around for years — the transition just didn't have as much urgency since Ping's on-premise product was so successful.</p>
<p>Ping Identity's cloud transition is going to receive somewhat of an unfriendly welcome from existing competitors. Okta (with Auth0) is a much larger company that was born in the cloud. ForgeRock has already placed an enormous amount of effort in a cloud authentication product for the past year. CyberArk's cloud authentication product is doing well so far. In some ways, the cloud authentication market feels like it's already been won.</p>
<h3 id="customer-identity">Customer Identity</h3>
<p>A primary area for growth highlighted on Ping Identity's Q4 2021 earnings call was customer identity (CIAM). I <a href="https://strategyofsecurity.com/p/okta-auth0-q2-2021-results/">discussed the difference in scale</a> of revenue when Okta disclosed its CIAM revenue numbers immediately after acquiring Auth0:</p>
<blockquote>
<p>By comparison, the <em>total</em> annual recurring revenue for Ping Identity and ForgeRock are $279.6 million and $155 million, respectively. Revenue for both companies includes a mix of workforce and customer identity. Okta's CIAM revenue alone is at least $50m larger than its close competitors. Okta is leading the CIAM market, but the competition in this emerging market is far from over.</p>
</blockquote>
<p>Even though the numbers are out of date by a couple quarters, the observation is still accurate. Ping Identity's annual revenue for 2021 was just under $300 million — and CIAM revenue is roughly half of that. CIAM is still an emerging market. There's room for Ping Identity to grow. It looks unlikely that they will ever catch up and lead the CIAM market, though.</p>
<h3 id="partner-ecosystem">Partner Ecosystem</h3>
<p>One of the focus areas highlighted by Ping Identity's leadership team was investment in developing their partner ecosystem. For enterprise-focused companies, partner ecosystems can play a huge role in their success.</p>
<p>When covering ForgeRock's IPO, I <a href="https://strategyofsecurity.com/p/forgerock-ipo/">discussed the implications</a> of their over-reliance on partnerships to drive sales:</p>
<blockquote>
<p>An upward trend in leads originating from channel partners isn't necessarily a good thing. Yes, it drives pipeline and revenue growth. However, it also creates reliance and reduces the company's ability to drive revenue growth on its own.</p>
</blockquote>
<p>Ping Identity is almost exactly the opposite case. They have built their business over the past 20 years by driving sales themselves. CEO Andre Durand acknowledged as much during the earnings call:</p>
<blockquote>
<p>If you go back prior to two years ago, Ping had played half court on the channel speaking to it, but never committing to it for years.</p>
</blockquote>
<p>They've done an incredible job at sales for only "playing half court" — especially with winning large enterprise accounts. From their 10-K filing:</p>
<blockquote>
<p>Our customer base is comprised of over half of the Fortune 100. As of December 31, 2021, our customer base included the 9 largest U.S. banks (measured by assets), 7 of the 10 largest healthcare companies (measured by revenue), 5 of the 8 largest North American retailers (measured by revenue), 4 of the 6 largest global aerospace companies (measured by revenue) and the 4 largest European auto manufacturers (measured by revenue).</p>
</blockquote>
<p>Their strategy is clearly shifting, though. Again, from Andre Durand:</p>
<blockquote>
<p>And as the size and commitment and duration by large enterprises grew, there was a moment in time to which it became very clear that Ping’s ability to penetrate at the time Global 3000, much less Global 5000, that there was no way that we were going to do that alone...</p>
</blockquote>
<p>Ping Identity's partner channel commitment is now clear. It will be interesting to watch and see what kind of impact this has on both their growth and the professional services market in general.</p>
<h3 id="global-5000-accounts">Global 5000 Accounts</h3>
<p>There was discussion on the earnings call about Ping Identity starting to expand sales focus downstream from large Fortune 500 companies to what they called the Global 5000. These companies are still enterprises, just with revenue in the $500 million range.</p>
<p>Okta has had a lot of success with customers of this size. Increased focus on smaller enterprises turns up the heat even more on their competitive position with Okta.</p>
<p>Ping has a clear strategy for differentiation from Okta and Auth0. From Andre Durand:</p>
<blockquote>
<p>So we do focus on the different segment of the market...the large enterprises with centralized board level mandates to essentially clean up and consolidate siloed identity systems across business units to create a better user experience.<br>
<br>
Those tend to be top down led initiatives, not bottom up led initiatives. It's not meant to say that developers aren't extremely important in the decision making process, but the needs of the large enterprises to consolidate identity plays directly into our wheelhouse.</p>
</blockquote>
<p>This is an interesting observation about patterns of adoption. It makes sense why Ping would focus on top down initiatives given their history of success with large enterprises.</p>
<p>For as much as I've <a href="https://strategyofsecurity.com/p/hashicorps-ipo-bottom-up-adoption-and-layering/">beaten the drum</a> about bottom up adoption, there are absolutely still a lot of companies who need to do exactly what Andre Durand is describing. I expect companies with top down initiatives will eventually dwindle, but it's a need Ping can capitalize on for a while.</p>
<h3 id="product-innovation">Product Innovation</h3>
<p>Finally, there was a lot of excitement among Ping Identity's executive team about their acquisition of Singular Key and subsequent launch/rebrand to PingOne DaVinci. From Andre Durand:</p>
<blockquote>
<p>Recall in Q3, we acquired Singular Key to allow for no code integration of identity through more than 100 individual identity connectors. At our sales kickoff, I was pleased to announce the introduction and general availability of PingOne DaVinci as the embodiment of our new orchestration capability.<br>
<br>
DaVinci provides the blank canvas from which architects and developers can now create identity solutions with simple drag and drop ease. Little to no coding required.<br>
<br>
As a vendor agnostic tool, DaVinci allows organizations to integrate and orchestrate identity services from a wide range of vendors, not simply Ping.</p>
</blockquote>
<p>Building orchestration and workflow products is a common theme among companies in this market — ForgeRock has <a href="https://www.forgerock.com/platform/access-management/intelligent-access?ref=content.strategyofsecurity.com">Intelligent Access</a>, and both <a href="https://www.okta.com/platform/workflows/?ref=content.strategyofsecurity.com">Okta</a> and <a href="https://www.sailpoint.com/platform/workflows/?ref=content.strategyofsecurity.com">SailPoint</a> have products called Workflows.</p>
<p>Listening to the reaction of Andre Durand, you get the sense Ping is extra excited about this acquisition:</p>
<blockquote>
<p>When we've spoken about DaVinci becoming foundational to our platform, we really mean it...<br>
<br>
So it's extremely strong as an integration tool, not just for Ping but for customers leveraging Ping trying to integrate other legacy, or cloud technologies into an overall experience for their end users. The speed with which you can do that DaVinci is really pretty unbelievable.<br>
<br>
I don't think that we've seen for the sales engineers here at Ping, I don't think I've seen them more excited about any one technology in the history of the company in the last 20 years.</p>
</blockquote>
<p>Workflow products and features are going to be one of the major areas of innovation in this space over the next few years. It will be interesting to watch how the competition plays out now that all of the major IAM companies are in the game.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/Logo_-SailPoint.png" class="kg-image" alt="SailPoint logo" loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/03/Logo_-SailPoint.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/03/Logo_-SailPoint.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/03/Logo_-SailPoint.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/Logo_-SailPoint.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>From SailPoint's earnings <a href="https://investors.sailpoint.com/news/2022/02-28-2022-211536143?ref=content.strategyofsecurity.com">press release</a>:</p>
<blockquote>
<p>• Total ARR of $370.4 million, up 48% year-over-year<br>
<br>
• Fourth quarter and full year 2021 total revenue of $135.6 million and $439.0 million, up 31% and 20% year-over-year, respectively<br>
<br>
• Fourth quarter and full year 2021 subscription revenue of $78.8 million and $273.2 million, up 41% and 39% year-over-year, respectively</p>
</blockquote>
<p>Much like its PAM peer CyberArk, SailPoint is in control of the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#identity-governance-and-administration-iga">Identity Governance and Administration (IGA)</a> market. They are one of the most steady and reliable public cybersecurity companies. SailPoint is a long-term company playing a long-term game. This strategy absolutely shows in every part of their operation.</p>
<p>The two main themes are similar to when I <a href="https://strategyofsecurity.com/p/q3-2021-cybersecurity-earnings-strategies-for-services-saas-and-platforms/">covered SailPoint in Q3</a>:</p>
<ul>
<li>
<p>Transitioning from a license-based to a subscription-based revenue model</p>
</li>
<li>
<p>Continuing to build and migrate customers from the on-premise IdentityIQ product to the IdentityNow SaaS solution</p>
</li>
</ul>
<p>We'll also talk a bit about long-term product strategy and pricing because there were some interesting insights from the Q4 2021 earnings call.</p>
<h3 id="financials">Financials</h3>
<p>Like CyberArk, SailPoint is a company that could fool you based on pure revenue growth if you're not looking carefully. 2021 was an excellent year all around with $439 million in revenue, 20% revenue growth, and 48% ARR growth. These results are stellar. They're exactly what we want to see for a company transitioning to subscription revenue.</p>
<p>SailPoint was squarely within Momentum Cyber's "low growth" category of public cybersecurity companies in 2021:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/2021-Low-Growth---SailPoint.png" class="kg-image" alt="SailPoint Public Company Trading Analysis" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/03/2021-Low-Growth---SailPoint.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/03/2021-Low-Growth---SailPoint.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/03/2021-Low-Growth---SailPoint.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/2021-Low-Growth---SailPoint.png 1920w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2022), pg. 63</em></i></figcaption></figure><p>They're in exactly the same place as CyberArk — traditional revenue growth is being sandbagged a bit by the transition from annual licenses to a subscription-based revenue model. The risk of SailPoint being acquired or underperforming on growth is very, very low.</p>
<p>Continuing the inevitable comparisons to CyberArk, SailPoint's ARR mix is almost exactly what a transition to subscriptions should look like. Here's the ARR mix chart from SailPoint's <a href="https://investors.sailpoint.com/~/media/Files/S/SailPoint-IR/documents/q4-21-supplemental-disclosure-vfinal.pdf?ref=content.strategyofsecurity.com">Q4 2021 Supplemental Materials presentation</a>:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/SailPoint-Q4-2021-Subscription-Breakdown.png" class="kg-image" alt="SailPoint Total ARR Detail slide" loading="lazy" width="1330" height="750" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/03/SailPoint-Q4-2021-Subscription-Breakdown.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/03/SailPoint-Q4-2021-Subscription-Breakdown.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/SailPoint-Q4-2021-Subscription-Breakdown.png 1330w" sizes="(min-width: 720px) 720px"></figure><p>Again, I added trend lines to their investor presentation for illustration. Maintenance revenue is holding flat (dark blue boxes under the red trend line). This will eventually start to decline as the transition to subscriptions completes.</p>
<p>Subscription revenue is increasing every quarter (light blue boxes under the green trend line). In Q4 2021, recurring revenue from pure subscriptions overtook maintenance revenue. That gap will continue to widen going forward.</p>
<p>There were no bold predictions made about long-term revenue growth. However, SailPoint is on almost exactly the same trajectory as CyberArk's journey to $1 billion in ARR sometime in 2025.</p>
<h3 id="long-term-product-strategy">Long-term Product Strategy</h3>
<p>As I said earlier, SailPoint is a long-term company playing long-term games. One practical implication of this strategy is keeping customers happy enough to continue upgrading and investing in SailPoint's product instead of abandoning it for the next best competitor.</p>
<p>SailPoint has been the beneficiary of customers abandoning legacy IGA solutions. Mark McClain described this phenomenon on the earnings call:</p>
<blockquote>
<p>I think in many ways, we’re seeing, as I said earlier, about the legacy displacement, kind of a steady progression. I’ve said for a number of quarters, we would love to point you to a short-term inflection there, but we just continue to see a steady progression.</p>
</blockquote>
<p>In the Identity and Access Management market, keeping customers on your product is a <em>lot</em> harder to execute than it seems. It's almost impossibly difficult — very few companies have ever pulled it off. The historical paradigm has been customers adopting a product, becoming sour due to implementation and product difficulties, moving on to the next best product, and repeating the cycle all over again.</p>
<p>SailPoint's interim CFO, Cam McMartin, perfectly described their strategy for avoiding this fate on the earnings call:</p>
<blockquote>
<p>We like that expansion motion with our installed base because it basically signals..that the customers are happy with IdentityIQ and are investing in it as they continue to grow their identity security programs.<br>
<br>
...we recognize retaining those customers and keeping them actively using our solutions and growing their platforms speaks on a long-term basis to what we think will be the opportunity at some point in the future to migrate them to SaaS because they’re clearly comfortable with, confident in SailPoint as their identity security solution provider.</p>
</blockquote>
<p>This is basically the key to SailPoint's continued success. Very few products in this industry segment have maintained their leadership position through major technology and platform shifts. If SailPoint is able to do it for the shift from on-premise to SaaS, it will be an incredible accomplishment.</p>
<p>One of the ingredients that is enabling SailPoint to maintain long-term leadership in this market is focus. Mark McClain described this focus on the earnings call when responding to a question about market demands for consolidation of products:</p>
<blockquote>
<p>...the more you go down market, our contention has been that that’s where there’s more pressure for that integrated single vendor solution, where, frankly, the subcomponents may or may not be as deep and rich as the mid to large enterprise would require, and they’ll make that trade-off for a single vendor solution with maybe a little less depth and breadth of the solution.<br>
<br>
...we aren’t feeling significant pressure there to move off of our strategy of increasing the breadth of our solution and the core issues again, we’ve highlighted this.<br>
<br>
...at our scope and scale, they want us to integrate with their preferred vendors for those other solutions, but they aren’t necessarily pressuring us in our core markets to be consolidated to a single vendor solution.</p>
</blockquote>
<p>SailPoint is surprisingly comfortable with staying in their lane. Instead of chasing after bright and shiny objects in adjacent markets (like PAM and SSO), they just keep plugging away at building their core platform. Things are going to get interesting as Okta's new IGA product starts encroaching into SailPoint's territory in 2022 and beyond.</p>
<h3 id="pricing">Pricing</h3>
<p>Finally, a quick note on pricing because it's a quick and interesting case study about market leadership. When a company is a clear market leader — like SailPoint is for IGA — they can price their products at a premium and maintain their position against competitors.</p>
<p>So, exactly like what Mark McClain describes here:</p>
<blockquote>
<p>People recognize our strength in the market, we tend to command a premium price. We do get a lot of price pressure in the market. Honestly, we’ve talked about that before, but we’re I think able to hold that price point pretty well because of the perceived superiority of the solution.</p>
</blockquote>
<p>That's good for investors and "bad" for customers hoping to negotiate. I say "bad" loosely because product selection needs to consider more factors than price alone. You get what you pay for. SailPoint is the best product in this part of the market right now.</p>
<hr>
<!--kg-card-begin: html-->
<p>Thanks for reading! How did you like this article?</p>
<p>
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6ZDRmYjIwMGEtOWE5MS00MDRlLTlkYzEtYTJjNDkxZTIxZDk5?r=loved&ref=content.strategyofsecurity.com">Loved</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6ZDRmYjIwMGEtOWE5MS00MDRlLTlkYzEtYTJjNDkxZTIxZDk5?r=great&ref=content.strategyofsecurity.com">Great</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6ZDRmYjIwMGEtOWE5MS00MDRlLTlkYzEtYTJjNDkxZTIxZDk5?r=good&ref=content.strategyofsecurity.com">Good</a> •  
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6ZDRmYjIwMGEtOWE5MS00MDRlLTlkYzEtYTJjNDkxZTIxZDk5?r=meh&ref=content.strategyofsecurity.com">Meh</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6ZDRmYjIwMGEtOWE5MS00MDRlLTlkYzEtYTJjNDkxZTIxZDk5?r=bad&ref=content.strategyofsecurity.com">Bad</a>
</p>
<!--kg-card-end: html-->
]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/03/v1_-Cybersecurity-Earnings---FY-2022.png"/>
        </item>
        <item>
            <title><![CDATA[Earnings: February 2022 Recap]]></title>
            <link>https://strategyofsecurity.com/earnings-february-2022-recap/</link>
            <guid>621908bfa442a6004d259e51</guid>
            <pubDate>Mon, 28 Feb 2022 13:05:00 GMT</pubDate>
            <description><![CDATA[Recapping a busy month of annual earnings announcements and their impact on the cybersecurity ecosystem.]]></description>
            <content:encoded><![CDATA[<p>February is the busiest month of the year for annual earnings releases by public cybersecurity companies. Thirteen cybersecurity companies made their annual earnings announcements this month. We've got some catching up to do!</p>
<p>This article is a quick recap of four companies: Cloudflare, Fortinet, Mandiant, and Qualys. We're not going to have space to go super deep on all of them without ending up with a 10,000 word article. However, the depth is enough to pull out interesting insights about each company. We'll also cover some principles (like the "Rule of 40") that apply to the broader market.</p>
<p>The focus is a little more on financials than pure strategy. While I don't aspire to be a finance writer, it's an important part of understanding the business and strategy of cybersecurity. Going deeper into finance once in a while is good for all of us.</p>
<p>Why does the financial health of cybersecurity companies matter? As a practitioner (and definitely as an investor!), you want to work with companies who are financially healthy. That's not to say you definitely should avoid working with companies who aren't, but you need to understand the impact it's likely to have on you.</p>
<p>If a company is in good shape financially, they can invest in innovation, provide good service, and do all of the other beneficial things that come with positive momentum. On the flip side, companies who aren't risk acquisition, management changes, and the bad things that come from a lack of momentum.</p>
<p>Financial health — especially demonstrated over a longer period of time — is <em>usually</em> indicative of the quality and value a company provides. People vote with their money, and the <a href="https://en.wikipedia.org/wiki/Law_of_averages?ref=content.strategyofsecurity.com">law of averages</a> tends to normalize results over time. Good marketing, hype cycles, one-hit wonder products, and other tactics can boost short-term performance. This rarely lasts without a sustainable foundation.</p>
<p>The companies you want to buy from, partner with, build on top of — or any other business interest you might have — are the companies that can deliver reliable long-term financial performance and growth. That's the strategy we're after. It's the reason we spend time looking at earnings, growth, and overall financial performance here.</p>
<p>On to the earnings.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Logo_-Cloudflare.png" class="kg-image" alt="Cloudflare logo" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/Logo_-Cloudflare.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/Logo_-Cloudflare.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/Logo_-Cloudflare.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Logo_-Cloudflare.png 1920w" sizes="(min-width: 720px) 720px"></figure><p>From Cloudflare's earnings <a href="https://www.cloudflare.com/press-releases/2022/cloudflare-announces-fourth-quarter-and-fiscal-year-2021-financial-results/?ref=content.strategyofsecurity.com">press release</a>:</p>
<blockquote>
<p>• Fourth quarter revenue totaled $193.6 million, representing an increase of 54% year-over-year; fiscal year 2021 revenue totaled $656.4 million, representing an increase of 52% year-over-year<br>
<br>
• Record dollar-based net retention of 125%, representing an increase of 600 basis points year-over-year, driven by continued strength from large enterprise customers<br>
<br>
• Achieved record operating cash flow and positive free cash flow for the fourth quarter; operating cash flow was $40.6 million, or 21% of total revenue, and free cash flow was $8.6 million, or 4% of total revenue</p>
</blockquote>
<p>I haven't written about Cloudflare in a meaningful way yet. Their 2021 earnings release is a great place to start. Put briefly, these results are fantastic.</p>
<p>As I wrote about in <a href="https://strategyofsecurity.com/p/cybersecurity-is-going-public/">Cybersecurity is Going Public</a>, Cloudflare is what I called a "hybrid" cybersecurity company:</p>
<blockquote>
<p>Some companies are "hybrids" — a combination of two or more traditional industries. This type of company is debatably part of the cohort of public cybersecurity companies. Opinions vary, sometimes based on financial data, and sometimes based on perception and beliefs.</p>
</blockquote>
<p>They are a combination of networking and security with significant product offerings and percentages of revenue coming from both. Most industry analysts and investors classify Cloudflare as a cybersecurity company. And, as we'll discuss later, their recent actions validate this stance.</p>
<p>The Q4 and 2021 annual earnings call was upbeat from the beginning — CEO Matthew Prince even opened it up with a quote from <a href="https://www.imdb.com/title/tt0096928/?ref=content.strategyofsecurity.com">Bill and Ted's Excellent Adventure</a>. Ignoring the stock price fluctuations, the financial results all look great. Revenue growth of 52% year-over-year and gross margins of 79% are the two most impressive stats.</p>
<p>Don't worry about Cloudflare's losses and profitability. As long as they keep racking up 50%+ revenue growth year after year (as they have done for the last five), all is well.</p>
<p>The textbook way to explain why is the <a href="https://www.mckinsey.com/industries/technology-media-and-telecommunications/our-insights/saas-and-the-rule-of-40-keys-to-the-critical-value-creation-metric?ref=content.strategyofsecurity.com">"Rule of 40"</a>. The rule is a financially precise (and responsible) way of managing the tension between investments in growth and company profitability. TL;DR, the difference between growth and losses should be a maximum of 40%.</p>
<p>Matthew Prince explained this concept in a fun way during the earnings call:</p>
<blockquote>
<p>The story I told them was to imagine every year you saw your neighbor shoveling money into a machine. A year later, a lot more money came out. Year after year, the money kept piling up and getting shoveled back in.<br>
<br>
If, one year, you look at your window and didn’t see your neighbor shoveling all the money back into the machine you would worry, what’s wrong with the machine?<br>
<br>
To be clear, there is nothing wrong with our machine. We will continue to shovel money back in to drive innovation and reach new customers as long as we can achieve exceptional growth.</p>
</blockquote>
<p>Cloudflare's money-making machine is working perfectly. In 2021, their operating loss was 21.2% of total revenue. This investment generated a 54% increase in revenue.</p>
<p>The Rule of 40 guideline would say a ~20% increase in revenue is good (mirroring the ~20% operating loss for a 40% difference between the two). For Cloudflare, if the rule hypothetically states 20% growth is good, an actual result of 54% growth is spectacular.</p>
<p>Visually, the five year growth trend looks like this — the magic of compounding in action:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/cloudflare-five-year-cagr.png" class="kg-image" alt="Cloudflare's five year track record of delivering revenue growth." loading="lazy" width="1201" height="675" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/cloudflare-five-year-cagr.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/cloudflare-five-year-cagr.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/cloudflare-five-year-cagr.png 1201w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Cloudflare, Inc. 2021 Q4 Earnings Call Presentation</span></figcaption></figure><p>Cloudflare's long-term financial model is a perfect case study for what all of the newer public cybersecurity companies want to do:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/cloudflare-long-term-model.png" class="kg-image" alt="Cloudflare's long-term model for improving operating margins." loading="lazy" width="1198" height="447" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/cloudflare-long-term-model.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/cloudflare-long-term-model.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/cloudflare-long-term-model.png 1198w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Source: Cloudflare, Inc. 2021 Q4 Earnings Call Presentation</span></figcaption></figure><p>The imprecise timing of the "Long-Term Model" isn't important to understand the concept. The idea behind investing in long-term growth is:</p>
<ul>
<li>
<p>Expenses like Sales and Marketing and G&amp;A become a lower percentage of revenue over time as revenue growth compounds and the business scales.</p>
</li>
<li>
<p>Research and Development remains relatively stable because new home-grown products generate additional revenue.</p>
</li>
<li>
<p>Profitability (operating margin) goes up as revenue grows and expenses remain stable or decrease.</p>
</li>
</ul>
<p>That's how great companies get built. Most growth companies try to achieve this model. Not all of them reach it. Cloudflare is well on its way.</p>
<p>Outside of the earnings, Cloudflare is already off to a fast start in 2022. They are clearly widening their presence in security with <a href="https://www.cloudflare.com/press-releases/2022/cloudflare-acquires-vectrix/?ref=content.strategyofsecurity.com">two</a> <a href="https://www.cloudflare.com/press-releases/2022/cloudflare-to-acquire-area-1-security/?ref=content.strategyofsecurity.com">acquisitions</a> already in 2022. They're clearly committed to cybersecurity as a major driver of growth, which is why they're important to follow and understand.</p>
<p>I will be taking you a lot deeper into Cloudflare this year given the company's importance and impact on the cybersecurity ecossytem, so stay tuned.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Logo_-Fortinet.png" class="kg-image" alt="Fortinet logo" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/Logo_-Fortinet.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/Logo_-Fortinet.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/Logo_-Fortinet.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Logo_-Fortinet.png 1920w" sizes="(min-width: 720px) 720px"></figure><p>From <a href="https://www.nasdaq.com/articles/fortinet-ftnt-beats-q4-earnings-estimates-guides-strong?ref=content.strategyofsecurity.com">Nasdaq</a>:</p>
<blockquote>
<p>Fortinet Inc. FTNT delivered fourth-quarter 2021 non-GAAP earnings per share (EPS) of $1.23, beating the Zacks Consensus Estimate of $1.14.<br>
<br>
Moreover, revenues of $963.6 million topped the consensus mark of $962.8 million and increased 28.8% year over year.<br>
<br>
Strategic investments in developing powerful products and services, efforts to expand into the adjacent addressable markets and boost the firm’s global sales force aided Fortinet’s quarterly performance.<br>
<br>
FTNT stock has gained 89.2% in the last 12 months while the Security Market industry declined 29.7% over the same time frame.</p>
</blockquote>
<p>Fortinet is a steady and consistent cybersecurity industry leader that doesn't get the same level of hype as companies like Zscaler and CrowdStrike. It's easy to lose sight of this when the market focuses on short-term gains and the newest IPOs.</p>
<p>However, the results speak for themselves. Fortinet is currently the highest valued cybersecurity company based on market cap:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Largest-Cybersecurity-Companies-by-Market-Cap-1.png" class="kg-image" alt="Largest cybersecurity companies by market capitalization." loading="lazy" width="1920" height="650" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/Largest-Cybersecurity-Companies-by-Market-Cap-1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/Largest-Cybersecurity-Companies-by-Market-Cap-1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/Largest-Cybersecurity-Companies-by-Market-Cap-1.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Largest-Cybersecurity-Companies-by-Market-Cap-1.png 1920w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Source: CompaniesMarketCap.com – Largest IT security companies by market cap (February 22, 2022)</em></i></figcaption></figure><p>It's also one of a relatively small number of cybersecurity companies to increase its share price in the past year — up 81.79% as of last week:</p>
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/FTNT_2022-02-22_11-05-21.png" class="kg-image" alt="Fortinet one year stock performance." loading="lazy" width="1402" height="586" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/FTNT_2022-02-22_11-05-21.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/FTNT_2022-02-22_11-05-21.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/FTNT_2022-02-22_11-05-21.png 1402w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Source: Seeking Alpha (February 22, 2022)</em></i></figcaption></figure><p>By comparison, CrowdStrike, Okta, and SentinelOne are all down over 25% in the past year as public markets for tech companies have taken a hit.</p>
<p>One of the most impressive stats about Fortinet (and bigger picture than the current year's earnings) is the overall growth of the stock since its IPO. Richard Stiennon published a helpful <a href="https://www.linkedin.com/posts/stiennon_licreatoraccelerator-cybersecurity-stocks-activity-6901536705275645952-Hx_s/?ref=content.strategyofsecurity.com">analysis of returns since IPO</a> for cybersecurity companies last week. Fortinet has generated an annual return of 298.24% in its 11 years as a public company. In practical terms, $1,000 invested at the time of their IPO is worth $33,806 today. That's a fantastic return in a period just over 10 years.</p>
<p>From a strategy perspective, Fortinet has done an impressive job navigating the evolution in technology for their part of the ecosystem. Fortinet's original product (circa 2002) was a hardware firewall. Networking has changed a lot since then, especially looking at today's hype around Zero Trust and perimiterless security. Many companies haven't been as successful making the transition. So far, Fortinet has thrived.</p>
<p>To put "thrived" in perspective, let's talk about the consistency of Fortinet's profitability. They have been profitable every year since their IPO in 2009. That's 13 straight years, for those keeping score. A lot of companies can't string together 13 straight <em>quarters</em> of profitability, let alone <em>years</em>. In today's era of loss-fueled hypergrowth companies, Fortinet stands out for its textbook approach to profitability, operating margins, and steady growth.</p>
<p>Right on brand, their Q4 2021 financial results <a href="https://investor.fortinet.com/static-files/b60519f8-ec0c-4a6e-9475-9706fa165fb8?ref=content.strategyofsecurity.com">presentation</a> is impressively boring...in the best way possible. The company's financials are remarkably healthy. I read a lot of these investor presentations. The usual profile is a long set of entertaining slides about strategy and possibilities, followed by financials with heavy losses. There are exactly zero entertaining slides in Fortinet's deck — just straight up financial prowess.</p>
<p>Revenue growth was 29%. Growth has been over 20% for four consecutive years. That puts Fortinet squarely into Momentum Cyber's "high growth" category of cybersecurity companies. And remember, that growth happened at $3.3 billion in revenue in 2021. It's a lot harder to grow 20%+ at $3 billion than it is under $1 billion because the scale is much bigger.</p>
<p>For context, 29% revenue growth for Fortinet is an increase of $748 million dollars in revenue from 2020 to 2021. Zscaler's <em>total</em> revenue for its 2021 fiscal year (<a href="https://ir.zscaler.com/news-releases/news-release-details/zscaler-reports-fourth-quarter-and-fiscal-2021-financial-results?ref=content.strategyofsecurity.com">reported in September 2021</a>) was $673 million. So, Fortinet grew its existing business by more than the size of Zscaler's entire company this year. This example is somewhat contrived (and unfair to Zscaler) since Zscaler hasn't existed as long (the compounding growth hasn't caught up yet!). You get the idea, though — Fortinet is growing rapidly at a large scale.</p>
<p>Their margins are great for any business, let alone a hardware business. Gross margin was 77.5% and operating margin was 26.2%. Margins on their FortiGate hardware business are equally impressive: 77.3% combined for product and services revenue. You might expect lower margins for a business with heavy reliance on hardware products. That's not the case here.</p>
<p>As for Fortinet's strategy: don't believe any of the Zero Trust <a href="https://www.quora.com/What-is-a-maxi-in-cryptocurrency?ref=content.strategyofsecurity.com">maxis</a> who tell you hardware firewalls and networking are dead. Fortinet's product revenue grew 37% in 2021 — "product," meaning hardware revenue. That 37% growth also happened in the face of devastating global supply chain challenges for technology manufacturers. Fortinet is one of the only companies in the industry who could have pulled this off.</p>
<p>If you're into business strategy, Fortinet is a great company that more people should be excited about. Rote consistency of execution and financial performance doesn't get the headlines, but Fortinet is worth your attention.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Logo_-Mandiant.png" class="kg-image" alt="Mandiant logo" loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/Logo_-Mandiant.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/Logo_-Mandiant.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/Logo_-Mandiant.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Logo_-Mandiant.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>From Mandiant's earnings <a href="https://investors.mandiant.com/news/news-details/2022/Mandiant-Reports-Financial-Results-for-Fourth-Quarter-and-Full-Year-2021/default.aspx?ref=content.strategyofsecurity.com">press release</a>:</p>
<blockquote>
<p>• Revenue from continuing operations increased 21 percent from the fourth quarter of 2020<br>
<br>
• Annualized recurring revenue for continuing operations increased 23 percent from the end of the fourth quarter of 2020 to $279 million<br>
<br>
• Deferred revenue increased 44 percent from the end of the fourth quarter of 2020 to $410 million<br>
<br>
• Repurchased $200 million of common stock in the fourth quarter under Board-approved stock repurchase program</p>
</blockquote>
<p>However, Mandiant's 2021 earnings (which were good, btw!) were overshadowed by <a href="https://www.cybersecuritydive.com/news/mandiant-q4-earnings-microsoft/618540/?ref=content.strategyofsecurity.com">rumors of acquisition talks</a> with Microsoft. Excitement around the potential acquisition, not the earnings, caused an 18% spike in the stock price.</p>
<p>Founder and CEO Kevin Mandia declined to comment (naturally) on the rumored acquisition during the earnings. Stoking the flames in the middle of a deal is both a risky move and a good way to kill a deal. However, he later offered this perspective to <a href="https://www.crn.com/news/security/microsoft-eyes-mandiant-buy-in-threat-intelligence-megadeal-report?ref=content.strategyofsecurity.com">CRN</a>:</p>
<blockquote>
<p>"We run this company like it’s ours forever, and that’s what we’re going to do."</p>
</blockquote>
<p>Let's quickly rewind a few months to the announcement of Mandiant divesting FireEye. At the time, I was concerned about Mandiant potentially having a short timeline for transformation:</p>
<blockquote>
<p>Mandiant's productized services model has to start showing results quickly. If it doesn't, investors are going to view Mandiant as just another professional services firm with underperforming profitability.</p>
</blockquote>
<p>Unfortunately, the underperforming profitability looks like it will continue until at least 2023. Mandiant's full 2021 financial statements haven't been released yet, but operating margins for Q4 2021 were announced as negative 17% on the earnings call. Their operating margin forecast for 2022 was negative 13% to negative 15%.</p>
<p>Mandiant leadership has been open and honest about the timeline for continued losses — this news wasn't new as of the Q4 earnings call. They're doing all they can. However, as a public company, they're in a vulnerable position until their balance between profitability and growth gets fixed.</p>
<p>The fixing starts with perception. This iteration of Mandiant isn't the Mandiant of old. Here's one example: do you still think Mandiant is in the professional services business? Think again. From Kevin Mandia:</p>
<blockquote>
<p>"We're not a services company. We don't wake up every day and go, let's maximize services."</p>
</blockquote>
<p>Mandia's dismissal of perceptions that Mandiant is a professional services business couldn't have been more clear. The shift in perception is important from a strategy perspective, and also for managing investor expectations.</p>
<p>As we discussed with Cloudflare, software businesses get more forgiveness about operating losses from investors. CrowdStrike is one of many examples — annual operating losses averaging over $100 million for the past five years. Forgiveness happens because losses are caused by aggressive investments in growth, which (if achieved) pay off in large and sustained profits later (another example of the Cloudflare "Long-Term Model" concept). This is one of the reasons why the perception about what type of business Mandiant is matters.</p>
<p>Either Mandiant is fooling themselves, or they're deeply committed to productized services. I would bet on the latter. It's the more difficult and risky option, but it's also the best strategy for Mandiant to thrive as a standalone company.</p>
<p>Despite the acquisition rumors, I continue to hope that Mandiant gets the opportunity to build its future vision. I still feel the same way about this statement I made in <em>Mandiant and the Future of Cybersecurity Services</em>:</p>
<blockquote>
<p>Building a successful productized services business to address an important societal issue like cybersecurity attacks is an interesting problem to solve. In the process, Mandiant may also revolutionize the delivery model for professional services in the industry.</p>
</blockquote>
<p>Disrupting or losing Mandiant's threat intelligence and incident response services in 2022 would be an incredible disservice. We can't afford to lose one of our best assets while the private sector defends itself against unprecedented foreign cybersecurity threats.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Logo_-Qualys.png" class="kg-image" alt="Qualys logo" loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/Logo_-Qualys.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/Logo_-Qualys.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/Logo_-Qualys.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Logo_-Qualys.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>From <a href="https://www.nasdaq.com/articles/qualys-qlys-beats-q4-earnings-and-revenue-estimates?ref=content.strategyofsecurity.com">Nasdaq</a>:</p>
<blockquote>
<p>Qualys...posted revenues of $109.78 million for the quarter ended December 2021...This compares to year-ago revenues of $94.8 million. The company has topped consensus revenue estimates four times over the last four quarters.</p>
</blockquote>
<p>Q4 2021 was an interesting time for Qualys as a company who specializes in vulnerability management. When the vulnerabilities in Apache Log4j were discovered in December, companies of all sizes were scrambling to manage and patch their systems. Qualys was at the center of this flurry of activity.</p>
<p>CEO Sumedh Thakar addressed the topic on the Q4 earnings call:</p>
<blockquote>
<p>Recent high-profile ransomware attacks and critical vulnerabilities like Log4Shell have highlighted organizations need for a scalable vulnerability management solution like Qualys VMDR that not only accurately detects these vulnerabilities but also helps reduce exposure time with integrated asset discovery and remediation capabilities.</p>
</blockquote>
<p>His assessment isn't hyperbole — what he said is exactly right. Qualys proves its value when critical, systemic, and widely impactful vulnerabilities like Log4Shell happen. Smart companies always want to be as good as they can at patching and vulnerability remediation.</p>
<p>As we <a href="https://strategyofsecurity.com/p/q3-2021-cybersecurity-earnings-strategies-for-services-saas-and-platforms/">discussed in Q3</a>, consolidation of security tools was a key theme again — clearly a central part of Qualys's strategy to advance beyond their vulnerability management origins. I was skeptical of this strategy when discussing Qualys's Q3 results, but I became more optimistic that a bundling strategy is possible after looking <a href="https://strategyofsecurity.com/p/crowdstrike-and-the-bundling-of-cybersecurity/">deeper into CrowdStrike's strategy</a>.</p>
<p>Another interesting topic to highlight is Qualys's plan to shift sales from top-down to bottom-up. Sumedh Thakar described the vision for this transition on the earnings call:</p>
<blockquote>
<p>Our goal is to remove friction for customers while making product expansion simple and hassle-free. A customer, who may currently only use VMDR, should be able to adopt all of our other applications with the click of a button.</p>
</blockquote>
<p>This is interesting because you normally don't see bottom-up adoption done in reverse. Companies traditionally <a href="https://strategyofsecurity.com/p/hashicorps-ipo-bottom-up-adoption-and-layering/">start with bottom-up adoption</a> and add top-down enterprise sales over time as they reach larger customers. Qualys started with top-down adoption and is now trying to undo it, or at least create a better balance. The reasoning makes sense; we'll see if it works in practice.</p>
<p>On the earnings call, Qualys announced their new eXtended Detection and Response (XDR) product has now reached general availability. As Sumedh Thakar said, the market is still in the early innings. As I discussed previously when covering CrowdStrike's XDR strategy, companies entering the XDR market typically have existing Endpoint Detection and Response (EDR) or SIEM products. Qualys is coming out of left field (continuing the baseball metaphor) by entering the market from their position as a vulnerability management leader. The product does have some early traction, though, so it will be interesting to follow their entry into XDR in 2022.</p>
<p>Revenue grew 13% in 2021. The quarter-by-quarter trend was slightly upward with 16% growth in Q4. This level of growth isn't spectacular, especially compared to the likes of Cloudflare and CrowdStrike. They're firmly entrenched in the "low growth" category of <a href="https://strategyofsecurity.com/p/themes-from-momentum-cybers-2022-cybersecurity-almanac/">Momentum Cyber's industry analysis</a>.</p>
<p>However, Qualys has at least remained profitable as a company. Their situation would be looking dire if they were losing money and growing at only 13% (remember the Rule of 40 we discussed with Cloudflare?). Progress is being made, and there are some positive signs to be excited about. 2022 is going to be an important year for Qualys and their new management team.</p>
<h2 id="earnings-earnings-earnings">Earnings, Earnings, Earnings</h2>
<p>February is the busiest month of earnings announcements because it's when most 12/31 year end companies finalize their financial statements and file. However, there are still several important companies with 1/31 year ends (or later) coming up soon.</p>
<p>In March, I'm planning to cover a couple cohorts of companies who release earnings around the same time:</p>
<ul>
<li>
<p>Identity and Access Management (IAM) companies (Ping Identity, SailPoint, ForgeRock, and Okta) all announce annual earnings around the beginning of March.</p>
</li>
<li>
<p>Endpoint Detection and Response (EDR) companies CrowdStrike and SentinelOne release their annual earnings later in March.</p>
</li>
</ul>
<p>Both market segments are interesting to talk about. We'll spend some time on those before taking a break from earnings for a while.</p>
<p>Finally, if you have any specific questions about earnings for the companies discussed in this article (or others that I didn't), feel free to <a href="https://twitter.com/colegrolmus?ref=content.strategyofsecurity.com">DM me on Twitter</a>. I consumed a lot more information than I was able to cover in this article, so I'm always happy to talk about it.</p>
<hr>
<!--kg-card-begin: html-->
<p>Thanks for reading! How did you like this article?</p>
<p>
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6NWE2MzA4YTktZTc0YS00ZDFjLTk4NDctM2YwZDgyNDM1MTEx?r=loved&ref=content.strategyofsecurity.com">Loved</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6NWE2MzA4YTktZTc0YS00ZDFjLTk4NDctM2YwZDgyNDM1MTEx?r=great&ref=content.strategyofsecurity.com">Great</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6NWE2MzA4YTktZTc0YS00ZDFjLTk4NDctM2YwZDgyNDM1MTEx?r=good&ref=content.strategyofsecurity.com">Good</a> •  
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6NWE2MzA4YTktZTc0YS00ZDFjLTk4NDctM2YwZDgyNDM1MTEx?r=meh&ref=content.strategyofsecurity.com">Meh</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6NWE2MzA4YTktZTc0YS00ZDFjLTk4NDctM2YwZDgyNDM1MTEx?r=bad&ref=content.strategyofsecurity.com">Bad</a>
</p>
<!--kg-card-end: html-->
]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v1_-Cybersecurity-Earnings---FY-2021.png"/>
        </item>
        <item>
            <title><![CDATA[Themes From Momentum Cyber's 2022 Cybersecurity Almanac]]></title>
            <link>https://strategyofsecurity.com/themes-from-momentum-cybers-2022-cybersecurity-almanac/</link>
            <guid>621004ed61d19f0048ea7797</guid>
            <pubDate>Mon, 21 Feb 2022 13:05:00 GMT</pubDate>
            <description><![CDATA[Interesting themes about the business of cybersecurity from the best data in the industry.]]></description>
            <content:encoded><![CDATA[<p>90% of the data you will ever need to know about the cybersecurity industry can be found in one place: <a href="https://momentumcyber.com/cybersecurity-almanac-2022/?ref=content.strategyofsecurity.com">Momentum Cyber's annual Cybersecurity Almanac</a>. The (free!) public version is a tour de force from one of the best firms in cybersecurity.</p>
<p>The 2022 edition was just released on February 8th. For me, this means I drop anything I was planning to write about and immediately immerse myself in the report. It's that good.</p>
<p>The report has a lot of information — 130 pages, to be exact. That's a lot to consume, especially with the heavy data focus. Momentum Cyber's primary objective is to present highly relevant sets of data from the firm's proprietary cybersecurity data platform.</p>
<p>The best part about having a brand new treasure trove of industry data is that we get to go through it, pull out some interesting facts, remix them a bit, and talk about the most interesting themes. The purpose of this article is to dive deeper on a few interesting themes rather than summarizing the whole report.</p>
<p>You should definitely spend a few hours looking through the report if you're able to make the time. This article can help you get a head start, or serve as a companion to provide useful context while you're reading it.</p>
<p>We'll be going deeper on five specific themes:</p>
<ul>
<li>
<p><strong>Multiplying Madness:</strong> Understanding a wild year in cybersecurity and what to expect going forward.</p>
</li>
<li>
<p><strong>Private Equity's Rocket Fuel:</strong> The impact of private equity's dramatically increased involvement in the ecosystem.</p>
</li>
<li>
<p><strong>Venture Capital Mega-Rounds:</strong> Fundraising trends, a new paradigm of mega-rounds, and the importance of investor specialization.</p>
</li>
<li>
<p><strong>Consolidating Professional Services:</strong> Explaining counter-intuitive activity in a mature segment within the cybersecurity ecosystem.</p>
</li>
<li>
<p><strong>Grow Or Get Acquired:</strong> What happens to public cybersecurity companies when markets value growth over profitability.</p>
</li>
</ul>
<p>A couple callouts before getting started:</p>
<ul>
<li>
<p>Nearly all the charts and slides in this article are taken directly from <a href="https://momentumcyber.com/cybersecurity-almanac-2022/?ref=content.strategyofsecurity.com">Momentum Cyber's latest report</a>. All the credit and praise for producing such valuable information should be directed their way.</p>
</li>
<li>
<p>The structure of this article deviates from the structure of Momentum Cyber's report. The report itself is logically structured around the data. It lays out the facts clearly and intentionally. Our goal here is to explore themes. It's easier to do that by deviating from the structure of the report.</p>
</li>
</ul>
<p>Now, let's analyze some data.</p>
<h2 id="multiplying-madness">Multiplying Madness</h2>
<p>First, let's just call a spade a spade: 2021 was a wild year in cybersecurity. Several of the financial numbers in the report are mind-bending. The cyber attacks are even worse. It's madness, and the madness is multiplying.</p>
<p>A thought-provoking question that's relevant here is from Packy McCormick in his <a href="https://www.notboring.co/p/compounding-crazy?ref=content.strategyofsecurity.com">Compounding Crazy</a> article on Not Boring:</p>
<blockquote>
<p>Everything is moving so fast out there. What if it's just getting started?</p>
</blockquote>
<p>A central theme of the Not Boring article is that high valuations and a rapid rate of change create skepticism and snark. This vibe feels doubly true in the InfoSec world, where we're paid to be skeptics and find daily evidence to reinforce our frame of mind:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">InfoSec: not paranoid; professionally suspicious.</p>— Cinnamon Toast Chaos (@lucasfryer) <a href="https://twitter.com/lucasfryer/status/1493782909542563842?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">February 16, 2022</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>Well, guess what? The InfoSec profession and cybersecurity ecosystem are subject to the same forces as the rest of the world. Neither free markets nor criminals care about our skepticism and disbelief. As Packy predicts, <em>"the world will continue to get exponentially crazier."</em></p>
<p>Exponential growth is a theme throughout Momentum Cyber's report. If I had to capture it in one slide, it's this one:</p>
<figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Snapshot-of-2021.png" class="kg-image" alt="Momentum Cyber's snapshot of 2021." loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/Snapshot-of-2021.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/Snapshot-of-2021.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/Snapshot-of-2021.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Snapshot-of-2021.png 1920w" sizes="(min-width: 1200px) 1200px"><figcaption><span style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2022), pg. 25</span></figcaption></figure><p>Diving a bit deeper, here's an approximate list of the madness that happened last year. The list is roughly ordered on a scale of "more believable" to "mind-blowing." Most of the points are from the Momentum Cyber report with a few additions of my own:</p>
<ul>
<li>
<p>Five cybersecurity companies <a href="https://strategyofsecurity.com/p/cybersecurity-is-going-public/">went public</a> (<a href="https://strategyofsecurity.com/p/hashicorps-ipo-bottom-up-adoption-and-layering/">and more</a>, depending on how you count them).</p>
</li>
<li>
<p>Okta <a href="https://strategyofsecurity.com/p/okta-auth0-q2-2021-results/">acquired Auth0</a> for $6.5 billion, the largest transaction of the year that didn't involve a private equity firm.</p>
</li>
<li>
<p>Over 30 cybersecurity companies became unicorns (valuations over $1 billion).</p>
</li>
<li>
<p>More financial transactions were completed than ever before, with 1,042 financing deals and 286 M&amp;A deals.</p>
</li>
<li>
<p>82 companies raised individual financing rounds over $100 million, including Lacework's <a href="https://www.lacework.com/press-release/lacework-closes-seriesD-funding-round/?ref=content.strategyofsecurity.com">$1.3 billion Series D</a> in November 2021 that was the largest funding round in the history of cybersecurity.</p>
</li>
<li>
<p>Proofpoint <a href="https://techcrunch.com/2021/04/26/thoma-bravo-buys-cybersecurity-vendor-proofpoin-for-12-3b-in-cash/?ref=content.strategyofsecurity.com">was acquired</a> by private equity firm Thoma Bravo for $12.3 billion, the largest cybersecurity acquisition ever as of April 2021.</p>
</li>
<li>
<p>Avasat <a href="https://techcrunch.com/2021/08/11/nortonlifelock-avast-merger/?ref=content.strategyofsecurity.com">was then acquired</a> by NortonLifeLock for $8.6 billion, the third-largest cybersecurity acquisition ever as of August 2021.</p>
</li>
<li>
<p>Both transactions were quickly surpassed by a group of private equity firms, who acquired McAfee's consumer business for $14 billion. That's the current leader for largest cybersecurity acquisition of all time.</p>
</li>
<li>
<p>The U.S. military's Cyber Command unit made its <a href="https://www.cnn.com/2021/12/05/politics/us-cyber-command-disrupt-ransomware-operations/index.html?ref=content.strategyofsecurity.com">first public acknowledgement</a> of taking offensive actions.</p>
</li>
<li>
<p>A Chinese hacking group discovered <a href="https://blogs.microsoft.com/on-the-issues/2021/03/02/new-nation-state-cyberattacks/?ref=content.strategyofsecurity.com">vulnerabilities in Microsoft Exchange</a> that impacted 250,000 organizations globally. The situation was so dire that the <a href="https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-effort-disrupt-exploitation-microsoft-exchange?ref=content.strategyofsecurity.com">FBI just went ahead and fixed it</a> for people.</p>
</li>
<li>
<p>REvil infected multiple companies with the Kaseya ransomware and made a <a href="https://www.cbsnews.com/news/ransomware-attack-revil-hackers-demand-70-million/?ref=content.strategyofsecurity.com">demand for $70 million</a>, the biggest ransomware attack to date.</p>
</li>
<li>
<p>A <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228?ref=content.strategyofsecurity.com">serious vulnerability</a> was discovered with the Apache Log4j package, <a href="https://security.googleblog.com/2021/12/understanding-impact-of-apache-log4j.html?ref=content.strategyofsecurity.com">impacting 8% of Java artifacts</a> and millions of organizations worldwide.</p>
</li>
<li>
<p>An entire oil pipeline was taken ransom when DarkSide <a href="https://en.wikipedia.org/wiki/Colonial_Pipeline_ransomware_attack?ref=content.strategyofsecurity.com">compromised Colonial Pipeline</a>, causing a halt in operations, fuel shortages, flight delays, and multiple state of emergency declarations by U.S. government officials.</p>
</li>
</ul>
<p>2022 may have <em>already</em> topped the madness from 2021:</p>
<ul>
<li>
<p>Just 14 days into the new year, Ukraine suffered a <a href="https://www.npr.org/2022/01/14/1073001754/ukraine-cyber-attack-government-websites-russia?ref=content.strategyofsecurity.com">massive cyberattack</a> on government websites.</p>
</li>
<li>
<p>REvil ransomware gang members <a href="https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwji3dfTpoL2AhUoITQIHbTYBnIQFnoECAUQAQ&url=https%3A%2F%2Fwww.bbc.com%2Fnews%2Ftechnology-59998925&usg=AOvVaw0Rfs8gQtuWXbQ6hR6DL1IP">were arrested</a> around the same time.</p>
</li>
<li>
<p>Cybersecurity and the threat of further attacks continue to be an <a href="https://www.reuters.com/markets/europe/european-us-regulators-tell-banks-prepare-russian-cyberattack-threat-2022-02-09/?ref=content.strategyofsecurity.com">ongoing theme</a> in the tension between Russia, Ukraine, and other world leaders.</p>
</li>
<li>
<p>U.S. lawmakers <a href="https://www.bbc.com/news/world-us-canada-60351768?ref=content.strategyofsecurity.com">alleged</a> the CIA is conducting mass surveillance on citizens...again.</p>
</li>
</ul>
<p>Oh, and Securonix just <a href="https://www.reuters.com/technology/cyber-security-company-securonix-raises-1-bln-vista-led-round-2022-02-15/?ref=content.strategyofsecurity.com">raised a $1 billion round</a> from Vista Equity Partners last week. Barely a blip on the radar these days.</p>
<p>You knew about a lot of these events already. However, it's interesting to look at the list all at once and in ascending order of madness. Seeing everything within this context makes the madness obvious.</p>
<p>So, then, why is this madness happening to us? Accelerating change. This idea <a href="https://en.wikipedia.org/wiki/Accelerating_change?ref=content.strategyofsecurity.com">comes in many forms</a> from many intelligent people. The most famous variation is Ray Kurzweil's <a href="https://www.kurzweilai.net/the-law-of-accelerating-returns?ref=content.strategyofsecurity.com">Law of Accelerating Returns</a>.</p>
<p>Packy McCormick's article summarizes the law nicely:</p>
<blockquote>
<p>The Law of Accelerating Returns states that the rate of change of progress accelerates because humans can use the technology at their disposal to progress faster than previous generations could without the technology.</p>
</blockquote>
<p>In his essay on the topic, Ray Kurzweil explains the impact of the law in more specific terms:</p>
<blockquote>
<p>An analysis of the history of technology shows that technological change is exponential, contrary to the common-sense “intuitive linear” view. So we won’t experience 100 years of progress in the 21st century—it will be more like 20,000 years of progress (at today’s rate). The “returns,” such as chip speed and cost-effectiveness, also increase exponentially. There’s even exponential growth in the rate of exponential growth.</p>
</blockquote>
<p>The Law of Accelerating Returns is exciting for all the reasons I discussed in <a href="https://strategyofsecurity.com/p/what-is-security/">What is Security?</a> — namely, that development and progress lead to safety and security. It's simultaneously terrifying because humans can use the same technology to regress and create all kinds of chaos at an equally accelerated rate.</p>
<p>We'll cover a few examples of the practical impact of accelerating change within the cybersecurity ecosystem throughout the rest of this article. It's a mega-theme that explains specific instances of exponential growth and change.</p>
<h2 id="private-equitys-rocket-fuel">Private Equity's Rocket Fuel</h2>
<p>The rate of change accelerates when large amounts of cash are involved. That's the forte of private equity (PE) firms. Momentum Cyber's report makes the growth trend of PE involvement in cybersecurity abundantly clear. It's rocket fuel for an industry that's already growing quickly.</p>
<p>In 2022, the influence of PE firms in cybersecurity is everywhere. They make moves that are big enough to shape large portions of the ecosystem. Not even public companies with multi-billion dollar market caps are spared.</p>
<p>The Momentum Cyber report found that private equity involvement in cybersecurity M&amp;A is increasing across deal volume and count. A side-by-side comparison of M&amp;A activity over the past decade shows exactly how dramatic the increase of private equity involvement in cybersecurity has been:</p>
<figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/PE-Industry-Trend-1.png" class="kg-image" alt="M&amp;A activity by type of buyer, 2011 through 2021." loading="lazy" width="1920" height="650" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/PE-Industry-Trend-1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/PE-Industry-Trend-1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/PE-Industry-Trend-1.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/PE-Industry-Trend-1.png 1920w" sizes="(min-width: 1200px) 1200px"><figcaption><span style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2022), pg. 40</span></figcaption></figure><p>Digging into the math behind the charts: the total count of private equity deals has gone up 10x (~1,000%), and total dollars spent has gone up 15.5x (~1,500%). The significance of this increase and private equity's involvement can't be understated. It changes the size, scale, and speed of everything.</p>
<p>To help understand what's going on here, we should take a quick step back to clarify the roles of private equity (PE) and venture capital (VC). Private equity and venture capital firms share an important similarity: they both invest money in companies with the expectation of generating a large return. However, the nature and timing of their investments differs.</p>
<p>Venture capital firms typically invest in the early stages of a company. Investments can occur before a company finds traction (typically seed or pre-seed stage), or in later rounds after some traction has been achieved (Series A, Series B, etc.). VC investments are smaller (by comparison) and more speculative (e.g. higher risk).</p>
<p>Private equity firms invest in later stage companies. Investments occur in late stage rounds (Series C or beyond), and often in the final rounds before an IPO. Private equity firms also buy large ownership stakes in public companies and take them private. Thoma Bravo's $12.3 billion <a href="https://investors.proofpoint.com/investors/news-and-events/press-releases/press-release-details/2021/Thoma-Bravo-Completes-Acquisition-of-Proofpoint/default.aspx?ref=content.strategyofsecurity.com">acquisition of Proofpoint</a> in 2021 is one example. PE investments are larger and less speculative (e.g. lower risk).</p>
<p>In 2021, we saw interesting examples of both pre-IPO investments and acquisitions of public companies. First, let's cover the pre-IPO investments.</p>
<p>Private equity firms were part of multiple deals involving existing cybersecurity unicorns:</p>
<figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/PE-Pre-IPO-Investments-1.png" class="kg-image" alt="Private equity funding for pre-IPO cybersecurity unicorns." loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/PE-Pre-IPO-Investments-1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/PE-Pre-IPO-Investments-1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/PE-Pre-IPO-Investments-1.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/PE-Pre-IPO-Investments-1.png 1920w" sizes="(min-width: 1200px) 1200px"><figcaption><span style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2022), pg. 39</span></figcaption></figure><p>One major investment included Lacework's $1.3 billion Series D, the largest single investment round ever for a cybersecurity company. Other companies are within range of an IPO, including several I highlighted in my <a href="https://strategyofsecurity.com/p/cybersecuritys-2022-ipo-pipeline-part-1/">two</a> <a href="https://strategyofsecurity.com/p/cybersecuritys-2022-ipo-pipeline-part-2/">part</a> review of cybersecurity's IPO pipeline.</p>
<p>We should expect to see private equity firms involved in the largest late stage funding rounds. This will likely happen more often than it has in previous years.</p>
<p>As we'll explore in the next section, the size of financing deals has gone up significantly. Single rounds often exceed $100 million. Most VC firms aren't built to make large investments alone. Private equity necessarily has to be involved if we're going to do rounds at this scale.</p>
<p>Next, let's move on to the late stage and public company PE investments. PE firms were involved in multiple mega-deals involving widely known cybersecurity companies:</p>
<figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/PE-Public-Company-Acquisitions.png" class="kg-image" alt="Large cybersecurity private equity transactions." loading="lazy" width="1920" height="650" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/PE-Public-Company-Acquisitions.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/PE-Public-Company-Acquisitions.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/PE-Public-Company-Acquisitions.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/PE-Public-Company-Acquisitions.png 1920w" sizes="(min-width: 1200px) 1200px"><figcaption><span style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2022), pg. 39</span></figcaption></figure><p>These mega-deals varied in size, ranging from around $1 billion to over $14 billion. For late stage PE deals, serious money and expectations are involved.</p>
<p>PE firms don't invest billions of dollars to buy companies without a plan. They have a specific vision and timeline in mind for what the company is going to look like after they're done with it. These are a few specific examples from 2021:</p>
<figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/PE-Add-On-Paradigm.png" class="kg-image" alt="Private equity add-ons model." loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/PE-Add-On-Paradigm.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/PE-Add-On-Paradigm.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/PE-Add-On-Paradigm.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/PE-Add-On-Paradigm.png 1920w" sizes="(min-width: 1200px) 1200px"><figcaption><span style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2022), pg. 39</span></figcaption></figure><p>Many of these PE-backed projects are still a work in progress. We're not flipping houses on HGTV here — these mega-deals take time to get all the pieces in place and produce a valuable company on the other end.</p>
<p>Here's the model: A private equity firm buys a cybersecurity company as the centerpiece, then acquires other complimentary companies to round out the platform. It's easier and faster for PE firms to make the complimentary purchases because they already have the capital and relationships to make the deals happen.</p>
<p>This is an example of why private equity's role in cybersecurity is important. For a company to make moves like this on their own, they would likely need to raise additional capital each time they want to make an acquisition. It's a slow process, and tech moves quickly. The risk of missing out or mis-managing the execution of a deal is high.</p>
<p>Private equity firms are going to continue upping the dosage of rocket fuel in cybersecurity as long as the promise and opportunity for large returns continues. As the data from Momentum Cyber shows, we're likely looking at a multi-year trend here. The effects will take a decade or more to play out.</p>
<h2 id="venture-capital-mega-rounds">Venture Capital Mega-Rounds</h2>
<p>The Momentum Cyber report clearly shows that 2021 was the year of venture capital mega-rounds in cybersecurity. This slide shows an obvious growth trend in venture capital financing activity:</p>
<figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Cybersecurity-Financing-Activity-Trend.png" class="kg-image" alt="Cybersecurity financing activity trends from 2017 to 2021." loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/Cybersecurity-Financing-Activity-Trend.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/Cybersecurity-Financing-Activity-Trend.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/Cybersecurity-Financing-Activity-Trend.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Cybersecurity-Financing-Activity-Trend.png 1920w" sizes="(min-width: 1200px) 1200px"><figcaption><span style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2022), pg. 42</span></figcaption></figure><p>The most important numbers are a record $29.3 billion in total funding, the 136.2% year-over-year increase in total funding, and a 43.1% increase in total financing transactions. 2021 was a big jump in all of these categories.</p>
<p>The aggregated multi-year trend is impressive, but the funding amounts for individual companies is even more interesting to look at:</p>
<figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Well-Funded-Cybersecurity-Companies.png" class="kg-image" alt="Top fifteen well-funded private cybersecurity companies." loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/Well-Funded-Cybersecurity-Companies.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/Well-Funded-Cybersecurity-Companies.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/Well-Funded-Cybersecurity-Companies.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Well-Funded-Cybersecurity-Companies.png 1920w" sizes="(min-width: 1200px) 1200px"><figcaption><span style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2022), pg. 43</span></figcaption></figure><p>High growth cybersecurity startups are increasingly well-funded, with many of the largest deals in history happening in 2021. Lacework's $1.3 billion round was the largest ever. Transmit Security raised $543 million in a Series A. Snyk Raised a $530 million Series F. In total, 31 companies <a href="https://cybersecurityventures.com/30-cybersecurity-companies-raised-200m-in-2021/?ref=content.strategyofsecurity.com">raised individual rounds</a> of over $200 million.</p>
<p>For context, Shopify went public in 2015 after raising a total of $122.3 million across four rounds. Nearly all of that capital came from a $100 million Series C, their largest round by far.</p>
<p>There has also been an exponential increase in the number of companies reaching unicorn status. According to the Momentum Cyber data, only six companies reached unicorn status in 2019 and 2020. In 2021, 37 cybersecurity companies reached a unicorn valuation ($1 billion+) — a 6.2x increase.</p>
<p>Companies are also becoming unicorns at earlier stages of investment. In 2021, 12 companies were unicorns by their Series C round or earlier. Between 2017 and 2020, OneTrust was the only company to reach unicorn status by its Series C round. That's a massive shift in valuations.</p>
<p>On the flip side of the companies being funded, data about the most active investors in the ecosystem is also fascinating to look at:</p>
<figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Most-Active-Financial-Investors.png" class="kg-image" alt="Top fifteen most active venture capital investors in cybersecurity since 2017." loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/Most-Active-Financial-Investors.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/Most-Active-Financial-Investors.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/Most-Active-Financial-Investors.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Most-Active-Financial-Investors.png 1920w" sizes="(min-width: 1200px) 1200px"><figcaption><span style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2022), pg. 43</span></figcaption></figure><p>It's not surprising to see mega-firms like Insight, Accel, Sequoia, and a16z on the list. Pure-play cybersecurity investors making up 1/3 of the list is much more surprising.</p>
<p>One way to interpret this data is that the mix of investors in a cybersecurity company matters. When capital is easier to find, strategic founders put together the right mix of investors on their cap tables. As Momentum Cyber founder Dave DeWalt said in his introduction:</p>
<blockquote>
<p>Founders are looking for "real value-add" from their investors and specialization with an abundance of capital in the current market.</p>
</blockquote>
<p>This trend raises important questions for both investors and cybersecurity companies raising capital:</p>
<ul>
<li>
<p>Investors: what specific cybersecurity expertise and value can we bring? I've seen firms accomplish this in many ways. Sequoia's Customer Partnerships team is one good example.</p>
</li>
<li>
<p>Founders: how can I organize my cap table to include investors with industry-specific value? It's not an absolute necessity, but the trend of doing so is clear in earlier stage rounds.</p>
</li>
</ul>
<p>As with the other trends we're discussing here, expect both individual and total venture capital rounds to keep going up. We may also see interesting developments in the specialization of investors, both at the level of venture capital firms and solo funds. Cybersecurity is now big enough for focused investors, which brings interesting opportunities.</p>
<h2 id="consolidating-professional-services">Consolidating Professional Services</h2>
<p>One of the most counterintuitive themes from the report is the volume of M&amp;A activity from consulting firms. This is worth unpacking. It doesn't seem to make sense at first glance, but there's an interesting explanation for it.</p>
<p>First, let's define what "professional services" includes. Here's a snippet from my <a href="strategyofsecurity.com/cybersecurity-ecosystem/">cybersecurity ecosystem mapping</a> project that shows the components:</p>
<figure class="kg-card kg-image-card kg-width-wide"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Cybersecurity-Ecosystem_-Professional-Services.png" class="kg-image" alt="" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/Cybersecurity-Ecosystem_-Professional-Services.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/Cybersecurity-Ecosystem_-Professional-Services.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/Cybersecurity-Ecosystem_-Professional-Services.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Cybersecurity-Ecosystem_-Professional-Services.png 1920w" sizes="(min-width: 1200px) 1200px"></figure><p>This chart from the Momentum Cyber report is where the counterintuitive trend with professional services firms starts. Three of the top ten most active buyers in 2021 were pure consulting firms (highlights mine):</p>
<figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Most-Active-Strategic-Buyers.png" class="kg-image" alt="Most active strategic buyers in cybersecurity." loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/Most-Active-Strategic-Buyers.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/Most-Active-Strategic-Buyers.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/Most-Active-Strategic-Buyers.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Most-Active-Strategic-Buyers.png 1920w" sizes="(min-width: 1200px) 1200px"><figcaption><span style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2022), pg. 26</span></figcaption></figure><p>Accenture and Deloitte bought more companies than anyone in the industry? Really? We're used to private equity rocket fuel transactions or companies like Okta buying Auth0. These deals get all the attention, and boring old consulting firm M&amp;A flies under the radar.</p>
<p>This is where things get <em>really</em> confusing. In total, the amount of M&amp;A activity in professional services is dramatically higher than every other sector (highlighted below):</p>
<figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Financing-Activity-By-Sector.png" class="kg-image" alt="M&amp;A and financing activity by sector." loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/Financing-Activity-By-Sector.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/Financing-Activity-By-Sector.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/Financing-Activity-By-Sector.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Financing-Activity-By-Sector.png 1920w" sizes="(min-width: 1200px) 1200px"><figcaption><span style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2022), pg. 29</span></figcaption></figure><p><em>Note: in the chart, Security Consulting and MSSP both fall under the umbrella of professional services. They're combined in the numbers below for better analysis.</em></p>
<p>Yet, when we look at this chart of M&amp;A activity by dollar volume, professional services is significantly lower than other sectors:</p>
<figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Financing-Volume-By-Sector-1.png" class="kg-image" alt="" loading="lazy" width="1920" height="500" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/Financing-Volume-By-Sector-1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/Financing-Volume-By-Sector-1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/Financing-Volume-By-Sector-1.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Financing-Volume-By-Sector-1.png 1920w" sizes="(min-width: 1200px) 1200px"><figcaption><span style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2022), pg. 30</span></figcaption></figure><p>On one hand, the activity numbers look staggering:</p>
<ul>
<li>
<p>98 total M&amp;A transactions during 2021</p>
</li>
<li>
<p>239% (2.4x) increase in total professional services M&amp;A activity from 2020 to 2021</p>
</li>
<li>
<p>350% (3.5x) higher M&amp;A activity than Risk and Compliance, the next highest sector</p>
</li>
</ul>
<p>On the other hand, the dollars look ho-hum:</p>
<ul>
<li>
<p>$2.354 billion total dollar volume for professional services M&amp;A</p>
</li>
<li>
<p>$24 million average transaction value</p>
</li>
</ul>
<p>Why is this happening? Activity is high because mature industries consolidate. Transaction volume is low because services have less leverage than software. Professional services is a mature, low-leverage industry within an otherwise growing and high-leverage cybersecurity ecosystem.</p>
<p>Consulting is especially mature — many large firms were around decades before computers. Cybersecurity consulting practices emerged within these large firms much later. They were joined in the market by thousands of smaller boutique firms.</p>
<p>I previously wrote about the challenges professional services firms have with leverage in <a href="https://strategyofsecurity.com/p/mandiant-and-the-future-of-cybersecurity-professional-services/">Mandiant and the Future of Cybersecurity Services</a>:</p>
<blockquote>
<p>All the leverage in a traditional professional services business comes from labor, the <a href="https://www.navalmanack.com/almanack-of-naval-ravikant/find-a-position-of-leverage?ref=content.strategyofsecurity.com">oldest form of leverage</a> there is. People alone don't scale. They have marginal costs of replication — to get more done, you need to hire and pay more people.</p>
</blockquote>
<p>When leverage comes from labor, the best ways to increase it are scale and specialization. Mergers and acquisitions drive both. Large consulting firms acquire smaller ones because of specialization — new skills to layer into the existing practice. Firms also merge to create scale — more people with less overhead. That's why we're seeing high M&amp;A activity in the Momentum Cyber report.</p>
<p>The M&amp;A numbers for professional services stand out within the ecosystem because earlier stage sectors don't consolidate as frequently. They're focused on organic growth and making the overall pie bigger. Almost every other sector of the cybersecurity ecosystem is still in the growth stage (or earlier).</p>
<p>In growth stage companies, there are fewer transactions, but the transactions that happen are at much higher dollar amounts. High-leverage software businesses carry a premium.</p>
<p>As I've <a href="https://strategyofsecurity.com/p/observations-about-the-cybersecurity-ecosystem-in-2021/">written previously</a>, I also expect private equity firms to become more active participants in professional services deals:</p>
<blockquote>
<p>The pace of private equity firms acquiring, consolidating, and reselling boutique cybersecurity consulting firms will accelerate.</p>
</blockquote>
<p>Assuming market conditions hold, we should expect to see even more consolidation in professional services this year.</p>
<h2 id="grow-or-get-acquired">Grow Or Get Acquired</h2>
<p>One conclusion the Momentum Cyber's report makes crystal clear is that public markets today are focused on growth over profitability. Here's a comparison of two charts to visually illustrate the point:</p>
<figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Growth-Over-Profits.png" class="kg-image" alt="Comparison of growth vs. profitability for public cybersecurity companies." loading="lazy" width="1920" height="500" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/Growth-Over-Profits.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/Growth-Over-Profits.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/Growth-Over-Profits.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Growth-Over-Profits.png 1920w" sizes="(min-width: 1200px) 1200px"><figcaption><span style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2022), pg. 56-57</span></figcaption></figure><p>The left chart measures the relationship (correlation) between stock performance and revenue, regardless of profitability. The right chart measures the relationship between stock performance and profitability.</p>
<p>Correlation just means "how close are the dots to the line?" In the growth chart on the left, the dots are close to the line — stock performance is highly correlated to revenue. In the profitability chart on the right, the dots are not as close to the line, and some companies (SentinelOne, CrowdStrike, Okta) are significant outliers. Stock performance isn't as highly correlated to profitability.</p>
<p>What does the market's fixation on growth mean, then? In practical terms, it means any public cybersecurity company in Momentum Cyber's "low growth" category is fair game for an acquisition or takeover.</p>
<p>That's the feast or famine world we're living in right now. When public markets value revenue growth above all else, companies have to deliver and produce growth or get acquired and refactored until they can.</p>
<p>To demonstrate this point, let's rewind to Momentum Cyber's 2021 Cybersecurity Almanac, which analyzes data from the 2020 calendar year:</p>
<figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/2020-High-vs.-Low-Growth.png" class="kg-image" alt="" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/2020-High-vs.-Low-Growth.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/2020-High-vs.-Low-Growth.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/2020-High-vs.-Low-Growth.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/2020-High-vs.-Low-Growth.png 1920w" sizes="(min-width: 1200px) 1200px"><figcaption><span style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2021), pg. 61</span></figcaption></figure><p>Five of the companies in the "low growth" category at this time last year were acquired by private equity firms and either taken private or restructured (highlighted in the slide above). That's 25% of the low growth companies, which is...a lot.</p>
<p>Fast forwarding back to 2022, it already looks as though this trend will continue or increase. Here is the same chart from Momentum Cyber's 2022 Cybersecurity Almanac, which analyzes data from the 2021 calendar year:</p>
<figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/2021-High-vs.-Low-Growth.png" class="kg-image" alt="" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/2021-High-vs.-Low-Growth.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/2021-High-vs.-Low-Growth.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/2021-High-vs.-Low-Growth.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/2021-High-vs.-Low-Growth.png 1920w" sizes="(min-width: 1200px) 1200px"><figcaption><span style="white-space: pre-wrap;">Source: Momentum Cyber – Cybersecurity Almanac (2022), pg. 63</span></figcaption></figure><p>It's only mid-February, and multiple companies in the 2021 "low growth" category are rumored to be in M&amp;A discussions:</p>
<ul>
<li>
<p>VMWare <a href="https://www.crn.com/news/virtualization/vmware-rejects-unsolicited-stock-offer-by-private-equity-firm?ref=content.strategyofsecurity.com">received an unsolicited offer</a> from a private equity firm.</p>
</li>
<li>
<p>Mandiant was rumored to be in <a href="https://www.reuters.com/technology/microsoft-considers-deal-buy-cybersecurity-firm-mandiant-bloomberg-news-2022-02-08/?ref=content.strategyofsecurity.com">acquisition talks</a>.</p>
</li>
<li>
<p>Splunk received a <a href="https://www.wsj.com/articles/cisco-made-20-billion-plus-takeover-offer-for-splunk-11644622277?ref=content.strategyofsecurity.com">large takeover offer</a>.</p>
</li>
</ul>
<p>The Mimecast deal is already done — they <a href="https://www.crn.com/news/security/mimecast-to-be-acquired-by-pe-firm-permira-for-5-8b?ref=content.strategyofsecurity.com">will go private</a> when the transaction closes in Q1 2022. So is the <a href="https://www.spglobal.com/marketintelligence/en/news-insights/latest-news-headlines/nortonlifelock-expects-to-close-avast-deal-later-this-month-68736850?ref=content.strategyofsecurity.com">merger</a> between NortonLifeLock and Avast.</p>
<p>Three of the 13 remaining companies in the 2021 "low growth" category (excluding Mimecast, NortonLifeLock, and Avast) are already in M&amp;A talks. That's 23% of the low growth companies, consistent with last year's rate. And there's still a lot of time left in 2022.</p>
<p>Given private equity's increased involvement in cybersecurity, expect to see continued acquisitions within the low-growth segments. This is prime territory for private equity. It's also hard to account for what private equity firms are going to do with deals from previous years. New public companies are going to get created from deals made years ago.</p>
<h2 id="what-2022-holds">What 2022 Holds</h2>
<p>As we established at the start of this analysis, 2022 likely holds continued madness. That's madness across the board, both good and bad.</p>
<p>The trends we highlighted in Momentum Cyber's report will be even bigger next year. The attacks and breaches probably will, too. We've got a long way to go until all of this is sorted out.</p>
<p>In terms of specific themes, we should expect:</p>
<ul>
<li>
<p>Several of the later stage companies who have raised mega-rounds will go public.</p>
</li>
<li>
<p>Private equity firms will inject more capital into the ecosystem, buying up late stage and public cybersecurity companies in the process.</p>
</li>
<li>
<p>Venture capital rounds will get larger. Lacework's record $1.3 billion round won't stand.</p>
</li>
<li>
<p>Professional services firms will continue to consolidate, likely with the help of private equity firms.</p>
</li>
<li>
<p>Public companies who fail to satiate the growth expectations of investors will be merged or taken private.</p>
</li>
</ul>
<p>The release of Momentum Cyber's Cybersecurity Almanac is a great time to look back on the year that was. Diving deeper into the data is insightful, and I enjoyed doing it for this report. We'll continue to follow Momentum Cyber's quarterly market reviews to periodically check in on the data and developments throughout the year.</p>
<hr><p><em>Thank you to the Momentum Cyber team for producing this amazing report every year and sharing it with all of us. Your work and generosity are sincerely appreciated.</em></p>
<hr>
<!--kg-card-begin: html-->
<p>Thanks for reading! How did you like this article?</p>
<p>
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6YThiNzk1NjEtOTIzOC00ZjYzLWI0ZWYtNmMxYzBkNzViMWI3?r=loved&ref=content.strategyofsecurity.com">Loved</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6YThiNzk1NjEtOTIzOC00ZjYzLWI0ZWYtNmMxYzBkNzViMWI3?r=great&ref=content.strategyofsecurity.com">Great</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6YThiNzk1NjEtOTIzOC00ZjYzLWI0ZWYtNmMxYzBkNzViMWI3?r=good&ref=content.strategyofsecurity.com">Good</a> •  
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6YThiNzk1NjEtOTIzOC00ZjYzLWI0ZWYtNmMxYzBkNzViMWI3?r=meh&ref=content.strategyofsecurity.com">Meh</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6YThiNzk1NjEtOTIzOC00ZjYzLWI0ZWYtNmMxYzBkNzViMWI3?r=bad&ref=content.strategyofsecurity.com">Bad</a>
</p>
<!--kg-card-end: html-->
]]></content:encoded>
            <category>M&amp;A</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Momentum-Cyber.png"/>
        </item>
        <item>
            <title><![CDATA[What Is Security?]]></title>
            <link>https://strategyofsecurity.com/what-is-security/</link>
            <guid>61bb4b87f8269f004826d8c0</guid>
            <pubDate>Mon, 14 Feb 2022 13:05:00 GMT</pubDate>
            <description><![CDATA[Understanding the true meaning of security and its impact beyond the cybersecurity industry.]]></description>
            <content:encoded><![CDATA[<p>The work you do in cybersecurity is critically important to the future of humanity, but nobody ever tells you that. It's true, and you need to know why.</p>
<p>One of the great ironies of security is how misunderstood the concept and implications are. I have worked in cybersecurity since I was 16 and never thought to take a step back and understand what security really means.</p>
<p>This article is an attempt to do so for myself, and hopefully for you as well. Admittedly, it's a step outside of my intellectual comfort zone. I'm doing my best to relate several broad and emotionally heavy concepts back to the world of cybersecurity. I'm bound to get some things wrong, but the topic is important enough to try.</p>
<p>Safety and security are basic human needs, yet most people are only aware of this subconsciously. We take security for granted when we have it and react aggressively and impulsively when we don't.</p>
<p>The forces and dynamics that ultimately make us secure seem mystical and abstract. Security is a complex subject, but a we can gain clarity by making a few important dynamics about human nature explicit. We need to take a step back if we want to find the true meaning and purpose of our work in cybersecurity.</p>
<p>The real epiphany lies in exploring the meaning of security far below the surface-level definitions we're used to inside the modern industry. Understanding the timeless human needs and motivations behind security helps inform our strategy and actions for what to do about it in the current times.</p>
<h2 id="why-we-need-security">Why We Need Security</h2>
<p>The best way to start understanding our need for security is by looking at how security fits into an overall framework of human needs.</p>
<p>Two relevant ideas from psychology are Sigmund Freud's life instincts and Abraham Maslow's hierarchy of needs. We'll also use commentary from author Robert Greene to provide additional context on top of Freud and Maslow's principles.</p>
<p>In <a href="https://www.amazon.com/Beyond-Pleasure-Principle-Sigmund-Freud-ebook/dp/B0030HKYQK/ref=sr_1_1?crid=2R465UPCA7GH&keywords=Beyond+the+Pleasure+Principle&qid=1643993781&sprefix=beyond+the+pleasure+principle%2Caps%2C155&sr=8-1&ref=content.strategyofsecurity.com">Beyond the Pleasure Principle</a>, Freud defines two categories of human instincts: life drives, and death drives. The instinct for survival falls within life drives. We're self-motivated to preserve our own lives. In a secure and altruistic state, we're also motivated to preserve the lives of others and humanity at large.</p>
<p>Author Robert Greene poignantly describes this instinct for survival in <a href="https://www.amazon.com/gp/product/014311137X/ref=as_li_tl?ie=UTF8&tag=strategyofsec-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=014311137X&linkId=f9b7ec3da4e6d2e53ce3197e046af2ef&ref=content.strategyofsecurity.com">The Laws of Human Nature</a>:</p>
<blockquote>
<p>Unlike any other animal, we humans are aware of our own mortality, and that we could die at any moment. Consciously and unconsciously this thought haunts us throughout our lives. We are aware that our position in life is never secure—we can lose our job, our social status, and our money, often for reasons beyond our control.</p>
</blockquote>
<p>Security is an omnipresent and unshakable fixture in our minds. It's something we're seeking at all times and remain constantly vigilant about. At best, it's a low, unconscious hum in the background of our day-to-day lives. At worst, it's an all-consuming priority in an acute struggle for survival.</p>
<p>Conversely, we have aggressive behaviors driven by a tendency towards death and destruction —&nbsp;Freud's death drive. Human existence and society are a delicate balance between prosperity and aggression. The level of security we feel at any given moment can tip the scale one way or another.</p>
<p>Robert Greene identifies insecurity as the driver for our tendency towards aggression:</p>
<blockquote>
<p>Human aggression stems from an underlying insecurity, as opposed to simply an impulse to hurt or take from others.</p>
</blockquote>
<p>This idea is commonly misunderstood. It's easy to assume people do bad things because they want to hurt or steal from others. We see this misunderstanding all the time in cybersecurity. However, the real cause is a feeling of insecurity. That's an important distinction because it helps us cultivate a sense of empathy and understanding about what drives people to do harm and break the law.</p>
<p>We become aggressive when we believe our safety is being threatened. However, the threats our mind perceives can either be real or imagined. Robert Greene describes the feelings leading up to aggressive behavior like this:</p>
<blockquote>
<p>Before any impulse to take aggressive action, aggressors are unconsciously processing feelings of helplessness and anxiety. They often perceive threats that are not really there, or exaggerate them. They take action to preempt the perceived attack of another, or to grab for things in order to dominate a situation they feel may elude their control.</p>
</blockquote>
<p>Because of our intense desire for survival, our natural instincts rapidly over-correct towards aggression at even the slightest hint of a threat. To the reptilian part of our brains, no threat against our security is too small. What may appear exaggerated and overly aggressive to others seems completely normal to a person who feels threatened.</p>
<p>Maslow's hierarchy of needs adds a helpful layer of nuance on top of Freud's  more direct ideas of life and death drives. Safety and security fit into a complex tapestry of physical and emotional needs that drive our behaviors. The hierarchy looks like this:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Maslow-s-Hierarchy-v1.png" class="kg-image" alt="Maslow's Hierarchy of Needs" loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/Maslow-s-Hierarchy-v1.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/Maslow-s-Hierarchy-v1.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/Maslow-s-Hierarchy-v1.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Maslow-s-Hierarchy-v1.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>Needs generally have to be fulfilled in a specific order, starting at the bottom of the hierarchy. Safety falls into the foundational grouping of basic needs. For the purposes of our discussion, safety is a near direct translation for security.</p>
<p>Maslow was clear about the importance of safety in our lives, once <a href="https://web.archive.org/web/20170914183817/http://psychclassics.yorku.ca/Maslow/motivation.htm">describing</a> safety as our primary motivator in life: <em>"we may then fairly describe the whole organism as a safety-seeking mechanism."</em></p>
<p>He continued on to say that we can even value safety higher than basic physiological needs:</p>
<blockquote>
<p>Practically everything looks less important than safety, (even sometimes the physiological needs which being satisfied, are now underestimated). A man, in this state, if it is extreme enough and chronic enough, may be characterized as living almost for safety alone.</p>
</blockquote>
<p>That's the big idea about why security matters: there is little hope for peace (as individuals or societies) if we don't have our basic need of security met.</p>
<p>Bob Poston cleanly summarizes the outcome we seek as humans in a <a href="https://www.ast.org/pdf/308.pdf?ref=content.strategyofsecurity.com">journal article</a> about Maslow's hierarchy of needs:</p>
<blockquote>
<p>The goal of consistently meeting the need for safety is to have stability in one’s life.</p>
</blockquote>
<p>Safety is a foundational human drive. The objective is stability. Our entire lives revolve around it.</p>
<p>Unfortunately, reaching this level of security is far easier said than done. It's absurdly common to find insecurity in others and experience it ourselves. Why insecurity happens in the first place is worth a further look.</p>
<h2 id="why-insecurity-happens">Why Insecurity Happens</h2>
<p>Insecurity is a nuanced topic that is largely influenced by events outside our control. The events are often many levels of abstraction away from our day-to-day lives. This abstraction creates confusion and fear as our primal brains frantically search for stability.</p>
<p>On a micro level, events occur in our immediate vicinity — things like walking down the street or checking our email. On a macro level, geopolitical events affect the environment we live in and the actions of others — things like economic prosperity and conflicts between nation-states.</p>
<p>Macro-level trends and events are powerful. They can affect large groups of people, often beyond any individual nation-state. The central theme is that achieving a meaningful level of security requires economic development and growth.</p>
<p>Former U.S. Secretary of Defense Robert McNamara highlighted the importance of development in his book <a href="https://www.amazon.com/gp/product/B071D4DY2B/ref=as_li_tl?ie=UTF8&tag=strategyofsec-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=B071D4DY2B&linkId=d42ea69884c152895aa48f79be506765&ref=content.strategyofsecurity.com">The Essence of Security</a>:</p>
<blockquote>
<p>Security is development and without development there can be no security...development means economic, social and political progress. It means a reasonable standard of living, and reasonable in this context requires continual redefinition.</p>
</blockquote>
<p>Without opportunity and growth, large groups of people lose their sense of security or fail to develop one in the first place. This fuels a vicious spiral where lack of growth (development) leads to insecurity, insecurity further prevents growth, and so on. This spiral can lead to a spectrum of results, ranging from temporary, localized bouts of disorder to full blown anarchy.</p>
<p>In <a href="https://www.amazon.com/gp/product/0684832720/ref=as_li_tl?ie=UTF8&tag=strategyofsec-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=0684832720&linkId=04462d8aac60bda378a450f298786923&ref=content.strategyofsecurity.com">The Sovereign Individual</a>, authors James Dale Davidson and William Rees-Mogg describe the cause and effects of anarchy:</p>
<blockquote>
<p>Another important condition for anarchy to be sustained is viability or income adequacy. Individuals who lack a sufficient income to sustain life are likely either to (1) devote a great deal of effort to fighting in order to seize enough resources to survive, or (2) capitulate to another contestant in exchange for food and sustenance.</p>
</blockquote>
<p>In a state of disorder, growth and development fall to the wayside as our all-consuming safety-seeking mechanism kicks in. The delicate balance is tipped towards Freud's death drives, and aggression takes over.</p>
<p>Unfortunately, violence and aggression are effective bargaining tools that have been used in situations of inequality throughout history. The authors of <em>The Sovereign Individual</em> cited economist Thomas Schelling on this topic:</p>
<blockquote>
<p>Throughout history, violence has been a dagger pointed at the heart of the economy. As Thomas Schelling shrewdly put it, “The power to hurt — to destroy things that somebody treasures, to inflict pain and grief — is a kind of bargaining power, not easy to use but used often. In the underworld it is the basis for blackmail, extortion, and kidnapping, in the commercial world, for boycotts, strikes, and lockouts.”</p>
</blockquote>
<p>With increasing <a href="https://www.theguardian.com/news/2019/sep/09/inequality-is-it-rising-and-can-we-reverse-it?ref=content.strategyofsecurity.com">feelings of inequality</a> in the world (and <a href="https://ourworldindata.org/income-inequality?ref=content.strategyofsecurity.com">data to back it up</a>, even though progress is being made), people in both developed and developing countries turn towards aggression to seize resources. Robert Greene describes a somewhat grim prognosis for the situation:</p>
<blockquote>
<p>Human aggression in individuals and in groups tends to emerge or heat up when we feel helpless and vulnerable, when the impatience for control and effect rises. And as increasing numbers of people and groups are feeling this way, we can expect more of this and not less in the future.</p>
</blockquote>
<p>Most forms of human aggression are driven by emotions. Inequality plays a significant role in driving these emotions. The solution is development, but growth doesn't come easy. It's a challenging problem, for sure.</p>
<p>Economics aside, a small percentage of people are inherently evil. In the famous words of actor Michael Caine's character Alfred in <a href="https://www.amazon.com/gp/product/B0091WAN3C/ref=as_li_tl?ie=UTF8&tag=strategyofsec-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=B0091WAN3C&linkId=505d200a0421b9f587ac7bc35176bbf4&ref=content.strategyofsecurity.com">The Dark Knight</a>:</p>
<blockquote>
<p>"...some men aren't looking for anything logical, like money. They can't be bought, bullied, reasoned, or negotiated with. Some men just want to watch the world burn."</p>
</blockquote>
<p>No matter how much progress we make towards development and reduction of inequality, the complete elimination of evil and violent aggression is improbable.</p>
<p>The difficult takeaway from Greene and others is that insecurity and the aggression that results from it is here to stay. It's a problem that has been wrestled with throughout human history. We have no choice but to accept this, while also remembering that acceptance <a href="https://www.psychologytoday.com/us/blog/mindfully-present-fully-alive/201711/the-inescapable-importance-acceptance?ref=content.strategyofsecurity.com">doesn't mean approval</a>.</p>
<p>Instead, we should strive to make a meaningful impact within the scope of today's problems. By taking this point of view, we can focus our efforts on areas that are closer to our sphere of control. For most of us, this means technology.</p>
<h2 id="technologys-impact-on-historys-central-dilemma">Technology's Impact on History's Central Dilemma</h2>
<p>The need for safety and stability is an enduring struggle of humanity. Threats and forms of protection against them have evolved over time, but the fundamental need has never subsided.</p>
<p>In <em>The Sovereign Individual</em>, the authors go as far as characterizing protection from violence as history's central dilemma:</p>
<blockquote>
<p>Protection of life and property is indeed a crucial need that has bedeviled every society that ever existed. How to fend off violent aggression is history’s central dilemma. It cannot easily be solved, notwithstanding the fact that protection can be provided in more than one way.</p>
</blockquote>
<p>This characterization is squarely in line with Freud and Maslow's principles. However, Freud and Maslow's ideas about safety and security originated from an earlier time — long before today's technology brought a new set of opportunities and challenges into our daily lives.</p>
<p>At the time, their ideas generally applied to physical security. Our physical security is still just as important today. However, technology has added an interesting set of nuances into the mix that that threaten our security.</p>
<p>In <em>The Laws of Human Nature</em>, Robert Greene characterized the new threats that come with technology:</p>
<blockquote>
<p>The internet has also created a new and powerful weapon—cyberwar. As they always have, criminals simply co-opt technology to become more creative and elusive.</p>
</blockquote>
<p>Even though war and physical violence <a href="https://slides.ourworldindata.org/war-and-violence/?ref=content.strategyofsecurity.com">have been declining</a>, threats adapt to make use of new digital attack vectors. Again, from Robert Greene:</p>
<blockquote>
<p>Human aggression simply adapts to the newest media and technological innovations, finding ways to express and vent itself through them. Whatever the new invention is in one hundred years for communication, it will likely suffer the same fate.</p>
</blockquote>
<p>The connection between Freud and Maslow's timeless principles can easily be seen in these adapted forms of technology-enabled aggression. New threats also have the potential to creep upwards in Maslow's hierarchy and put our higher-level social, respect, and potential needs at risk.</p>
<p>Safety in the digital world is a bizarre contradiction of the physical safety many of us have today. Many people online live in developed countries. For the most part, we have our physical safety needs met. In Maslow's words:</p>
<blockquote>
<p>The healthy, normal, fortunate adult in our culture is largely satisfied in his safety needs. The peaceful, smoothly running, 'good' society ordinarily makes its members feel safe enough from wild animals, extremes of temperature, criminals, assault and murder, tyranny, etc. Therefore, in a very real sense, he no longer has any safety needs as active motivators. Just as a sated man no longer feels hungry, a safe man no longer feels endangered.</p>
</blockquote>
<p>Even though Maslow's work occurred over 80 years ago, his examples of our basic safety needs still sound a lot like they do today:</p>
<blockquote>
<p>...we can perceive the expressions of safety needs only in such phenomena as, for instance, the common preference for a job with tenure and protection, the desire for a savings account, and for insurance of various kinds (medical, dental, unemployment, disability, old age).</p>
</blockquote>
<p>Except, our digital lives today are different. We're arguably less safe online than we ever have been. On the internet, we can be attacked, extorted, or harassed from anywhere. Psychological warfare threatens our beliefs, institutions, and society. We're physically safe, but we're vulnerable online.</p>
<p>In simpler times, we used to be able to reduce the scope of inequality by containing it to our own nation-states. The thinking went like this: if everyone around us was somewhat equal, we didn't need to worry about the rest of the world, assuming we could physically secure our borders. We frequently hear variations of these nationalistic ideas today. They're not practical anymore.</p>
<p>In today's world, inequality anywhere creates incentives for violence. Technology enables people to act upon these incentives from anywhere. There's a reason why most ransomware attacks <a href="https://www.theguardian.com/technology/2021/oct/11/russia-and-nearby-states-are-origin-of-most-ransomware-says-uk-cyber-chief?ref=content.strategyofsecurity.com">originate from countries</a> where people lack opportunities for growth or common democratic freedoms are restricted.</p>
<p>The tension we observe comes from defending people who already have basic needs met (e.g. are working towards higher levels of needs) from those who don't. We're simultaneously raising global opportunities and standard of living to a point where everyone's basic needs are met. Progress doesn't happen overnight, and right now we are in the messy middle:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Security is a property of a system/environment and just like its cousins performance and reliability, it is neither absolute nor homogeneous.<br><br>The cybersecurity threats we see today are because the risks changed faster than our systems and environments were able to keep up with.</p>— Dino A. Dai Zovi (@dinodaizovi) <a href="https://twitter.com/dinodaizovi/status/1450431800971603978?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">October 19, 2021</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>On an individual level, phenomena like the <a href="http://users.rider.edu/~suler/psycyber/disinhibit.html?ref=content.strategyofsecurity.com">Online Disinhibition Effect</a> can cause our online personalities to become disinhibited. Disinhibition tips our delicate balance of security and aggression towards Freud's darker death instincts. We see this happen all the time in our daily lives.</p>
<p>Trolling and harassment are widespread. If we become truly vengeful, violence escalates into criminal attacks and full-blown cyber warfare. And, as I wrote about in <a href="https://strategyofsecurity.com/p/rhetoric-reality-and-riots/">Rhetoric, Reality, and Riots</a>, the Online Disinhibition Effect can also spill over into the physical world in unpredictable ways.</p>
<p>The adaptation of human aggression and crime towards technology has made cybersecurity an extremely complex and challenging field. We're still processing what all of this means and how to defend against it. One thing is certain: technology is going to be the new nexus of human aggression.</p>
<h2 id="the-path-forward">The Path Forward</h2>
<p>All of this talk about insecurity, aggression, and violence may sound grim. There is hope for a positive outcome, though — but it requires a shift in the mindset about how we view our work.</p>
<p>Our mission is to provide the protection that enables development and growth. The work we do is part of a virtuous cycle of development that improves long-term safety and security. This idea is bigger than ourselves, and it's worth remembering when progress feels bleak.</p>
<p>Security is a foundational fixture on Maslow's hierarchy of needs. Its place in the hierarchy is to enable humanity to reach higher level needs. As <a href="https://www.linkedin.com/in/zenfish/?ref=content.strategyofsecurity.com">Dan Farmer</a> says, security can't be the only thing that matters:</p>
<blockquote>
<p>If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders.</p>
</blockquote>
<p>Farmer's point addresses a larger myth about technology that we see frequently as cybersecurity professionals. As the myth goes, computers were a bad idea, and we'd be better off without them. Statements like this are usually made in jest, but there's a bit of truth in all sarcasm.</p>
<p>Metaphorically, we <em>could</em> turn off all the computers and return to simpler times. However, by doing so, we would also be cutting off the greatest engine for economic growth and development that's ever been built. And, as we now know, development is the most reliable driver of security in the long run. We need technology to help create opportunities because opportunities create better security.</p>
<p>To mentally prepare ourselves for the road ahead, we need to accept that conflict is going to happen and be strategic about how to defend against it. Widespread security isn't possible until basic needs are met for all individuals. Unfortunately, this is unlikely to occur in our lifetime. Until then, conflict and aggression are going to continue being issues we need to address on an ongoing basis:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">The proper goal of defensive cybersecurity is not to "win". There is no winning. Because "winning" implies decisive victory is possible.<br><br>No, the goal is to do all you reasonably can to prevent anything really bad from happening to what you protect. <br><br>The rest... isn't up to you.</p>— Brian in Pittsburgh (@arekfurt) <a href="https://twitter.com/arekfurt/status/1474231242287689738?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">December 24, 2021</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>There is no winning, and there is no avoidance. Erring too far towards either end of this spectrum is a fallacy. Instead, let's be prepared for conflict and use the instances we encounter to demonstrate our knowledge and character. Robert Greene says it best:</p>
<blockquote>
<p>If there is an ideal to aim for, it should be that of the strategic warrior, the man or woman who manages difficult situations and people through deft and intelligent maneuver.</p>
</blockquote>
<p>Since we can neither win nor avoid all conflicts, our goal is simply to be competitive in the arena. We can build our skills, tools, and influence to a point where we're as well-prepared as we can be to fend off conflict and aggression. All of us have an important role to play, even if it feels small or indirect at times.</p>
<p>Being strategic about how we build our skills and navigate difficult situations levels the playing field. Once our life instincts kick in, we can use our position to enable development. Put differently, we can get busy creating positive change in ourselves and as wide of a circle as we can possibly influence.</p>
<p>Thomas Malthus elegantly described the individual struggle against evil in a piece from 1798, <a href="http://www.esp.org/books/malthus/population/malthus.pdf?ref=content.strategyofsecurity.com">An Essay on the Principle of Population</a>:</p>
<blockquote>
<p>Evil exists in the world, not to create despair, but activities. We are not patiently to submit to it, but to exert ourselves to avoid it. It is not only the interest, but the duty of every individual, to use his utmost efforts to remove evil from himself, and from as large a circle as he can influence; and the more he exercises himself in this duty, the more wisely he directs his efforts, and the more successful these efforts are...</p>
</blockquote>
<p>Adopting this frame of mind is the <a href="https://fs.blog/carol-dweck-mindset/?ref=content.strategyofsecurity.com">difference between</a> a fixed mindset and a growth mindset. We can choose to adopt a fixed mindset and believe evil is always going to exist at the level it does today. Or, we can choose to adopt a growth mindset and believe we can slowly but surely raise the level of security for everybody. You'll have to make your own choice, but sign me up for the growth mindset.</p>
<p>One final thought from Robert Greene, this time on the ethos for furthering civilized values:</p>
<blockquote>
<p>Civilized values are not furthered if we are forced to surrender to those who are crafty and strong. In fact, being pacifists in the face of such wolves is the source of endless tragedy.</p>
</blockquote>
<p>Our story can either be a triumph or a tragedy — it's still being written. Even though it's unlikely we will see the outcome in our lifetime, we can still have the satisfaction of knowing we did our part.</p>
<hr>
<!--kg-card-begin: html-->
<p>Thanks for reading! How did you like this article?</p>
<p>
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6YTBiZTQ1YTYtOTU5ZC00N2ZkLWIzOTEtNjAyODU5YTM3YTc4?r=loved&ref=content.strategyofsecurity.com">Loved</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6YTBiZTQ1YTYtOTU5ZC00N2ZkLWIzOTEtNjAyODU5YTM3YTc4?r=great&ref=content.strategyofsecurity.com">Great</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6YTBiZTQ1YTYtOTU5ZC00N2ZkLWIzOTEtNjAyODU5YTM3YTc4?r=good&ref=content.strategyofsecurity.com">Good</a> •  
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6YTBiZTQ1YTYtOTU5ZC00N2ZkLWIzOTEtNjAyODU5YTM3YTc4?r=meh&ref=content.strategyofsecurity.com">Meh</a> • 
    <a href="https://a.sprig.com/WWw0dVR3cFI3Un5zaWQ6YTBiZTQ1YTYtOTU5ZC00N2ZkLWIzOTEtNjAyODU5YTM3YTc4?r=bad&ref=content.strategyofsecurity.com">Bad</a>
</p>
<!--kg-card-end: html-->
]]></content:encoded>
            <category>Concepts</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/Security-is-Growth-v3.png"/>
        </item>
        <item>
            <title><![CDATA[1Password's Blue Ocean Strategy]]></title>
            <link>https://strategyofsecurity.com/1passwords-blue-ocean-strategy/</link>
            <guid>61f3104975637e0048b31026</guid>
            <pubDate>Mon, 07 Feb 2022 13:05:00 GMT</pubDate>
            <description><![CDATA[A deep dive into 1Password's strategy and future after its massive Series C funding announcement.]]></description>
            <content:encoded><![CDATA[<p>Tell me if you've heard this story before: a little Canadian company builds a solid product that's profitable from day one, grows a large and passionate community of users, explodes onto the scene with large funding rounds, then dominates an industry.</p>
<p>That company is <a href="https://www.npr.org/2019/08/02/747660923/shopify-tobias-l-tke?ref=content.strategyofsecurity.com">Shopify</a>, now one of the <a href="https://www.notboring.co/p/shopify-and-the-hard-thing-about-a05?ref=content.strategyofsecurity.com">foundational companies</a> in e-commerce and valued at over $100 billion.</p>
<p>1Password feels like the cybersecurity version of Shopify. AgileBits, the parent company who owns the 1Password product, just announced a $620 million round of funding in January 2022, the largest funding round ever for a Canadian company (move over, Shopify). <em>Note: For simplicity, we'll use 1Password in reference to both the product and the company.</em></p>
<p>Everything about 1Password is fascinating. With the news and buzz about their latest round of funding, now is a good time to go deep into their business and explain what all this ruckus is about.</p>
<p>I didn't realize how excited I was about 1Password until I started researching and writing this deep dive. I've been a paying customer and loyal user for many years, but I hadn't stopped to think about how much I love the product or how big their opportunity truly is.</p>
<p>1Password is a classic <a href="https://www.amazon.com/gp/product/1625274491/ref=as_li_tl?ie=UTF8&tag=strategyofsec-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=1625274491&linkId=7fe55617dd0cf0e62f088448a235ad11&ref=content.strategyofsecurity.com">Blue Ocean Strategy</a> case study. Even if you haven't read the book and aren't an MBA strategy nerd like me, the ideas from <em>Blue Ocean Strategy</em> are still a great way to understand a business like this.</p>
<p>Through the process of researching and writing this article, I see 1Password in a completely different way. I'm excited to share my new point of view with you. Buckle up, we're about to go <em>deep</em> into the story about 1Password's strategy and opportunity going forward.</p>
<h2 id="the-long-slow-march-to-passwordless-authentication">The Long, Slow March to Passwordless Authentication</h2>
<p>First, we have to talk about passwords and the hype around passwordless authentication. Passwords are bad, full stop. We're not here to contest that.</p>
<p>Packy McCormick did a nice takedown of passwords in his piece about <a href="https://www.notboring.co/p/stytch-kill-the-password?ref=content.strategyofsecurity.com">Stytch</a>. In the article, investor Gaurav Ahuja concisely summarizes the case against passwords:</p>
<blockquote>
<p>First, the future should be passwordless. Actually, back up, first: passwords suck. And they suck in three ways:<br>
<br>
They’re a terrible user experience.<br>
They hurt user engagement, conversion, and revenue.<br>
They’re a burden on IT support.</p>
</blockquote>
<p>Completely accurate. Packy then captured how people <em>really</em> feel about passwords:</p>
<blockquote>
<p>Passwords cause pain and agony, or even worse, a persistent, nagging, low-grade annoyance. F*** passwords.</p>
</blockquote>
<p>These functional and emotional problems with passwords are the driver behind all the hype around passwordless and large investments made in companies building the technology to make it happen.</p>
<p>All the passwordless proponents (I'm one of them) are right — <em>eventually</em> passwords will go away. But not any time soon.</p>
<p>My rough, probabilistic estimate is a 70% probability that passwords will no longer be the dominant form of authentication before the end of our careers (around 2040 for me). That estimate isn't even saying passwords will be gone — just that another form of authentication will be used a majority of the time. The journey to passwordless is a decades-long transition.</p>
<p>Many people believe the transition is going to look like this, as if the new generation of passwordless authentication platforms will rapidly accelerate adoption:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v1_-Passwordless-Transition---Perceived.png" class="kg-image" alt="Perceived decline of passwords and adoption of passwordless." loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/v1_-Passwordless-Transition---Perceived.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/v1_-Passwordless-Transition---Perceived.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/v1_-Passwordless-Transition---Perceived.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v1_-Passwordless-Transition---Perceived.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>In reality, it will look like this:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v1_-Passwordless-Transition---Reality.png" class="kg-image" alt="Realistic decline of passwords and adoption of passwordless." loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/v1_-Passwordless-Transition---Reality.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/v1_-Passwordless-Transition---Reality.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/v1_-Passwordless-Transition---Reality.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v1_-Passwordless-Transition---Reality.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>We want the transition to be faster. It's not going to happen. Password usage will gradually decline in a long, slow curve over decades.</p>
<p>Why? Passwords have a <a href="https://en.wikipedia.org/wiki/Lindy_effect?ref=content.strategyofsecurity.com">Lindy effect</a> to them. Their staying power is proportional to their current age, even if we don't really want them around. Passwords are over sixty years old. They're still going to be around sixty years from now in some shape or form.</p>
<p>Inertia is the biggest competitor for every passwordless authentication company. Passwords have issues, but they mostly work, and people know how to use them.</p>
<p>Worse yet, there are too many applications in the world whose security model is built exclusively around passwords. This population includes legacy business applications that are duct taped together and ready to explode at any moment — that is to say, switching out a foundational service like passwords is not on the table.</p>
<p>Even new, innovative products who tried killing the password from the start in favor of magic links and social auth have since gone back and added the option to create a password. My unofficial mental scorecard has Medium, Slack, Notion, and Substack, to name a few.</p>
<p>Passwords are a deeply engrained habit that's hard for people to kick. When that habit gets in the way of user adoption, a passwordless-only approach becomes a lot less appealing. Even the latest and greatest apps have to cave.</p>
<p>Is there enough room in slow, downward decline of passwords to create large, successful passwordless authentication companies? You bet there is. But there's just as much room to create a hypergrowth company to manage the passwords that still exist during the transition. That's the opportunity 1Password has capitalized on.</p>
<h2 id="password-management-is-a-red-ocean">Password Management is a Red Ocean</h2>
<p>The story behind 1Password's successful blue ocean strategy starts with one of the big ideas from the book — that companies can achieve rapid growth in markets that appear to be unattractive and declining:</p>
<blockquote>
<p>What makes this rapid growth all the more remarkable is that it was not achieved in an attractive industry but rather in a declining industry in which traditional strategic analysis pointed to limited potential for growth.</p>
</blockquote>
<p>Segment the broader <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#authentication">authentication industry</a> way, way down and you end up with what looks like an unattractive micro-industry: password management. With all the talk about the decline of passwords, a seemingly niche industry like password management sure sounds like it's on the decline with limited potential for growth. This misconception about the password management market is the underpinning of 1Password's success.</p>
<p>Many great companies are created from seemingly unattractive industry segments known as "red oceans":</p>
<blockquote>
<p>Although some blue oceans are created well beyond existing industry boundaries, most are created from within red oceans by expanding existing industry boundaries.</p>
</blockquote>
<p>Password management is one such red ocean. This is where the "passwords are dead," "password management isn't that hard," "X cloud authentication company has won the market," and similar arguments take a sharp turn towards reality.</p>
<p>For consumers, anyone moderately tech-savvy knows the feeling of random requests from relatives to help reset a forgotten password (or similar types of issues). The best we can hope for is a nice dinner in exchange for our free tech support.</p>
<p>For businesses, passwords are a gnarly area of security and IT that most industry professionals don't want to touch. It's relegated to the job of the help desk, a Sisyphean task with no end in sight.</p>
<p>The dull pain and discomfort of password management is what drives our faith in passwordless authentication. Our magical thinking goes like this: <em>all our problems with passwords go away with passwordless, so let's ignore the uncomfortable problems we have right now</em>.</p>
<p>This is the exact opportunity 1Password has seized. Our password problems aren't going away. If anything, they're getting worse. A <a href="https://blog.lastpass.com/2017/11/lastpass-reveals-8-truths-about-passwords-in-the-new-password-expose/?ref=content.strategyofsecurity.com">study by LastPass</a> (one of 1Password's competitors) found this mind-blowing stat about the volume of passwords used by the average business user:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v1_-191-Passwords.png" class="kg-image" alt="An average business user has 191 passwords." loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/v1_-191-Passwords.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/v1_-191-Passwords.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/v1_-191-Passwords.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v1_-191-Passwords.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>Many businesses use <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#federated-identity">cloud authentication</a> products like <a href="https://strategyofsecurity.com/p/okta-auth0-q2-2021-results/">Okta</a> to help ease the burden through single sign-on (SSO). Applications integrated with SSO all use the same enterprise password. This means fewer passwords for people to remember and less need for a password manager like 1Password.</p>
<p>SSO helps, but it's easier said than done. Even with pre-built integrations in a product like Okta, implementation still takes time. Compatibility is also mixed. Many applications, especially custom-built internal ones, don't support standards for easy integration. This means SSO puts a dent in the problem, but it's not the full solution yet.</p>
<p>Consumers are an entirely different world. People still have hundreds of accounts, but they don't have fancy, enterprise-grade SSO solutions to manage them. Platform companies like Facebook and Google popularized the concept of <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#social-login">social login</a>, allowing users to sign in to supported applications with credentials from the social login provider. Similar to enterprise SSO, social login helps but isn't supported by every application in the world.</p>
<p>To manage this problem, people typically use the same password (or a variant) for multiple applications and services. At best, this password is semi-complex and based on something familiar. Conceptually, reusing passwords looks like this — a single password used on multiple applications:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v1_-Reused-Passwords.png" class="kg-image" alt="One password for multiple sites." loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/v1_-Reused-Passwords.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/v1_-Reused-Passwords.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/v1_-Reused-Passwords.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v1_-Reused-Passwords.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>A lame joke periodically makes the rounds on InfoSec Twitter: <em>"My email password has been hacked. That's the third time I've had to rename the cat."</em> Lame, but true. And completely relevant here.</p>
<p>A weak password that's compromised on one application makes every other application which uses the same password vulnerable to compromise. This problem is the basis of credential stuffing attacks, which <a href="https://www.verizon.com/business/resources/reports/dbir/?ref=content.strategyofsecurity.com">caused 61% of breaches</a> in 2021.</p>
<p>For the average person, using strong passwords and storing them in a password manager is far more secure than using the same simple password across multiple applications. 1Password pulled the right strategy levers and created a product that made it dramatically easier to manage multiple complex passwords in an a way that's affordable to individual consumers.</p>
<p>They literally made it possible to "forget your password" and use a unique complex password for every application. It works like this — a password for the 1Password vault with unique passwords for everything:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v1_-App-Passwords.png" class="kg-image" alt="Unique password for every site." loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/v1_-App-Passwords.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/v1_-App-Passwords.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/v1_-App-Passwords.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v1_-App-Passwords.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>This is entirely different from the conventional approach for managing passwords. If a password is compromised, the scope of the problem is limited to the one service the password is used for. Better yet, 1Password uses the <a href="https://haveibeenpwned.com/?ref=content.strategyofsecurity.com">Have I Been Pwned</a> breach reporting service to alert users if a password has been exposed. The approach is so simple, yet so effective.</p>
<p>We're several hundred words in and barely scratching the surface of password management. We haven't even started talking about Multi-Factor Authentication (MFA), Privileged Access Management (PAM), or any of the other topics and challenges in the immediate vicinity of passwords. By now, you can see big the problem actually is.</p>
<p>1Password is an ingenious idea because they addressed the problem as it stands right now: passwords are a pain to manage, they're not going away soon, so let's manage them as well as possible.</p>
<h2 id="they-said-password-management-wasnt-that-hard">They Said Password Management Wasn't That Hard</h2>
<p>It's easy to explain what a password manager does: it's a secure place for you to put your passwords. Simple as that. But the "manage them as well as possible" part is a whole lot harder than it sounds.</p>
<p>Back in 2005, founders Dave Teare and Roustem Karimov <a href="https://lifehacker.com/behind-the-app-the-story-of-1password-1643425238?ref=content.strategyofsecurity.com">wanted to build a tool</a> to manage their own passwords. It's fair to say the founders themselves underestimated the complexity of building a password manager. What started out as a three-month project is still going 17 years later. The good news is the founders underestimated the upside of the product, too.</p>
<p>If you take a quick spin through Twitter around the time of 1Password's funding announcement, it's not hard to find people throwing shade at people's inability to remember their passwords, the simplicity of building a password manager, and why a company who builds one is worth such a high valuation. Critics range from random internet commenters to high-profile industry analysts.</p>
<p>I've heard similar variants of this password management argument for years while working in cybersecurity. We'll avoid calling out any specific examples, so you'll have to take my observation at face value or go look around for yourself. Praise specifically, criticize generally.</p>
<p>The root of people's misunderstanding is a logical fallacy — a human tendency to oversimplify and overlook important nuances and details that make something deceptively complex. That's absolutely the case with a password manager.</p>
<p>To help explain the nuances of building a password manager, here's an anecdote from a recent Twitter thread by 1Password's Mitchell Cohen. <a href="https://x.com/mitchchn/status/1484225379854426114?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1484225379854426114%7Ctwgr%5Ec7014f45309a26f0b3f708ea2e5f18a89e06e799%7Ctwcon%5Es1_c10&ref_url=https%3A%2F%2Fstrategyofsecurity.com%2F1passwords-blue-ocean-strategy%2F&ref=content.strategyofsecurity.com">This thread</a> is a beautiful destruction of an unwitting Twitter user who threw shade and got a lesson security engineering.</p>
<p>TL;DR — the thread talks about the intense security engineering behind <em>loading the website icons</em> for the accounts you store in 1Password. A process most people wouldn't even think about needs months of engineering to be both secure and performant.</p>
<p>An example like 1Password's icon rendering is a <em>Zen and the Art of Motorcycle Maintenance</em> moment. Building a world-class password manager is an act of craft and quality. You <em>could</em> do it with less of both — after all, how many people would even care or notice if their password manager rendered icons insecurely?</p>
<p>Ah, but people like Mitchell Cohen care. If 1Password is going to build a password manager, it's going to be the best damn password manager humans can possibly build.</p>
<p>In <em>Zen and the Art of Motorcycle Maintenance</em>, author Robert Pirsig describes the philosophy behind this kind of quality:</p>
<blockquote>
<p>Care and Quality are internal and external aspects of the same thing. A person who sees Quality and feels it as he works is a person who cares. A person who cares about what he sees and does is a person who’s bound to have some characteristic of quality.</p>
</blockquote>
<p>For you and me, that means using a quality product looks and feels <em>different</em> in a way we can't quite articulate. In Pirsig's words, <em>"Even though quality cannot be defined, you know what quality is."</em> Genuine quality is an intentional and strategic act.</p>
<p>The cornerstone of any blue ocean strategy is an idea the authors call "value innovation." Companies who successfully create blue oceans do so by systematically building their companies in a different way:</p>
<blockquote>
<p>In this sense, value innovation is more than <em>innovation</em>. It is about <em>strategy</em> that embraces the entire system of a company's activities. Value innovation requires companies to orient the whole system toward achieving a <em>leap</em> in value for both buyers <em>and</em> themselves.</p>
</blockquote>
<p>Visually, the idea of value innovation looks like this:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v1_-Value-Innovation.png" class="kg-image" alt="Value Innovation diagram." loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/v1_-Value-Innovation.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/v1_-Value-Innovation.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/v1_-Value-Innovation.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v1_-Value-Innovation.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>The concept is simple, but the implications are powerful. By pulling a few levers and turning a few knobs on what is typically viewed as valuable (or not valuable), the boundaries of entire industries can be redefined:</p>
<blockquote>
<p>Value innovation is based on the view that market boundaries and industry structure are not given and can be reconstructed by the actions and beliefs of industry players.</p>
</blockquote>
<p>Value innovation doesn't occur by luck — that's where the systematic part comes in. Blue ocean strategies find uncontested markets, avoid competition, capture new forms of demand, and redefine the relationship between value and cost.</p>
<p>1Password created a blue ocean by systematically building their entire strategy around a different set of value props than traditional, enterprise-focused identity and access management companies.</p>
<p>A strategy canvas is a tool used in <em>Blue Ocean Strategy</em> to visualize factors that play a role in value innovation. This is what the strategy canvas of the broader access management market looked like in the early 2000s:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v2_-Strategy-Canvas---Access-Mgmt-Early-2000s.png" class="kg-image" alt="Strategy Canvas of the access management industry in the early 2000s." loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/v2_-Strategy-Canvas---Access-Mgmt-Early-2000s.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/v2_-Strategy-Canvas---Access-Mgmt-Early-2000s.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/v2_-Strategy-Canvas---Access-Mgmt-Early-2000s.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v2_-Strategy-Canvas---Access-Mgmt-Early-2000s.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>The diagram has two lines called value curves — one for the traditional industry competitors, and another for the upstart company's Blue Ocean Strategy. The points in each curve are plotted against common factors that influence value and purchasing behaviors. The value curves can then be compared to show how the blue ocean strategy is differentiated.</p>
<p>The best way to demonstrate the strategy canvas for the early years of 1Password (roughly 2005-2015, before teams were launched) is to compare their consumer password management product against the enterprise access management products of the time. This market isn't a totally fair comparison, but it's a good way to illustrate how 1Password innovated.</p>
<p>1Password created a blue ocean through value innovation across several factors:</p>
<h5 id="enterprise-focus">Enterprise Focus</h5>
<p>Traditional enterprise access management products were focused on, well, enterprises. The problem of managing passwords across multiple applications was viewed as a business problem. The problem was especially acute in big companies, where users often require access to dozens of applications to do their job.</p>
<p>1Password initially focused on consumers. When the product was launched in 2005, it was only compatible with Mac OS X. There was no Windows app. At the time, it was basically unheard of to use a Mac at work. No Windows app meant most business users weren't able to use the product.</p>
<h5 id="price">Price</h5>
<p>Enterprise access management products were (and still are) expensive. Companies buy enterprise license or subscriptions to use the products across the entire organization. For a large enterprises, costs can easily reach millions of dollars.</p>
<p>Pricing may have been the single most important innovation in 1Password's blue ocean strategy. They changed the pricing model of the entire industry and made enterprise-grade security accessible to the average consumer.</p>
<p>Making the product affordable for consumers necessarily meant growing revenue based on volume. As other digital and physical consumer products have proven, it's possible to generate a lot of revenue at scale.</p>
<p>However, a consumer-focused approach is highly uncommon in security software. This approach was a critical component of 1Password's strategy. It allowed the company to grow rapidly while flying under the radar for more than a decade.</p>
<h5 id="top-down-sales">Top-Down Sales</h5>
<p>Most enterprise software gets sold through top-down sales processes. Enterprise access management is no exception, particularly before Okta came along in 2009. The strategic implication of a top-down sales model is higher customer acquisition costs and longer sales cycles.</p>
<p>Because 1Password was a consumer-first product, it focused on bottom-up adoption. There was no sales team to speak of. They spent no money on advertising. All sales were made through self-service purchasing by consumers.</p>
<p>Bottom-up adoption was a necessary part of the strategy in order to keep pricing at a level affordable to individual consumers. As we'll see later, it was also a huge advantage as 1Password gained traction among business users.</p>
<h5 id="integrations">Integrations</h5>
<p>A core feature of enterprise access management products is integrations. That's how single sign-on happens. Products compete on the number of pre-built integrations they support. This reduces the time it takes to make an enterprise application compatible with the central enterprise access management solution.</p>
<p>The dilemma for companies who build enterprise access management products is the volume and variety of applications. It takes an enormous amount of effort to build and support pre-built application integrations. All of this effort drives is another factor that drives up costs.</p>
<p>1Password took an entirely different approach with their product. The early versions of the product integrated with nothing. It was purely a password vault focused on storing passwords and allowing users to quickly enter them when needed.</p>
<p>1Password isn't single sign-on because password managers don't reduce the number of passwords like an access management product would. However, it's a clever hack that essentially does the same job.</p>
<p>At an abstract level, the job to be done in the eyes of a user is logging into an application quickly. 1Password reduced the friction of accomplishing this job as much as possible by elegantly auto-filling the correct account information in login forms. More importantly, they avoided the treadmill of building and maintaining integrations — another strategic driver that keeps costs low.</p>
<h5 id="time-to-value">Time to Value</h5>
<p>Enterprise access management products can take a long time to  implement and integrate, even with pre-built integrations. In large enterprises with thousands of applications, implementations take years. Incremental value is delivered with individual application integrations; however, full value isn't delivered until a critical mass is reached.</p>
<p>1Password delivers value quickly, albeit in a much different way. Because the customer is an individual consumer, they start seeing value when the first password is stored in 1Password's vault. Value increases over time as the user makes further micro-investments to add more passwords to the vault. Time to value is fast, especially when the cost of the product is significantly lower than enterprise solutions.</p>
<h5 id="user-experience">User Experience</h5>
<p>"I love this enterprise SSO product" said nobody, ever. The user experience for enterprise access management product is neutral at best. UX trends towards negative if clunky MFA workflows are involved.</p>
<p>1Password makes the best of a difficult situation. We'd rather not have passwords, but since we have to, it's nice to use a product with the UX of 1Password. Browser plugins present the right password for the website you're visiting and capture new ones while you're creating new accounts. The list of conveniences goes on and on, which is why people rave about the product.</p>
<h5 id="user-community">User Community</h5>
<p>Most enterprise access management products have small communities, typically professional systems integrators who implement the product for a living. A sense of community exists, but it certainly isn't a focal point for most companies. This is partly a consequence of top-down sales models. When the buyer is a senior leader, community takes a back seat.</p>
<p>1Password has earned and cultivated a passionate user community since the very beginning. A 2011 <a href="https://qr.ae/pGEC42?ref=content.strategyofsecurity.com">Quora answer</a> from a 1Password employee quantified their sense of community:</p>
<blockquote>
<p>We have 61,786 registered members on our forums, and when you consider that only a handful of users, relatively speaking, sign up for forums, that's quite a lot.</p>
</blockquote>
<p>The number has undoubtedly increased in the 10+ years since that figure was published. It gives you a sense of how important and engaged the user community truly is.</p>
<p>The impact of a well-designed strategy canvas can't be understated. Entire industries can be transformed and restructured, unlocking new customers and massive business opportunities. From <em>Blue Ocean Strategy</em>:</p>
<blockquote>
<p>To fundamentally shift the strategy canvas of an industry, you must begin by reorienting your strategic focus from <em>competitors</em> to <em>alternatives</em> and from <em>customers</em> to <em>noncustomers</em> of the industry.</p>
</blockquote>
<p>In the case of 1Password, their intentional choices across the factors discussed above brought consumers into the world of personal password managers — previously noncustomers of traditional products in the market.</p>
<p>Over 17 years into the story of 1Password, we're still closer to the beginning than the end. Next, we'll look at 1Password's adoption curve and the massive market opportunity in front of them.</p>
<h2 id="all-the-cool-kids-are-using-1password">All the Cool Kids Are Using 1Password</h2>
<p>The opportunity for 1Password is to capture the rest of the adoption curve for password managers and beyond. The upside of a consumer-first product like 1Password is that everyone needs it. Like, literally everyone on the internet. That's 4.66 billion people as of today.</p>
<p>A TAM of almost five billion people is admittedly hyperbolic, but it's meant to illustrate a point. 1Password has around 15 million users today, according to their own statistics. That's 0.3 percent of total internet users.</p>
<p>All 4.66 billion people have passwords. Every single one of them. Using the internet without a password manager is in the realm of using the internet without a browser — not quite as essential, but close. It's just that fundamental of a service for today's internet user.</p>
<p>We'll let the venture capitalists estimate the exact addressable market (some of you subscribe to these articles, so please do!). Let's reasonably conclude it's big and move on to where we're at on the adoption curve for password managers.</p>
<p>An adoption curve for password managers looks something like this:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v2_-Password-Manager-Adoption-Curve.png" class="kg-image" alt="Adoption curve for password managers." loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/v2_-Password-Manager-Adoption-Curve.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/v2_-Password-Manager-Adoption-Curve.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/v2_-Password-Manager-Adoption-Curve.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v2_-Password-Manager-Adoption-Curve.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>I am on the furthest end of the Enthusiasts segment when it comes to password managers, which is obvious now that we're several thousand words into a discussion on the topic.</p>
<p>I keep all of my passwords in 1Password and use the product dozens of times per day. Outside of a browser, it's the piece of software I use the most. The interactions are short and quick, but it's an engrained habit. I'm hooked.</p>
<p>And I'm not the only one. People log into applications at an astonishingly high frequency. From <a href="https://medium.com/lightspeed-venture-partners/keep-your-friends-close-and-your-information-closer-announcing-lightspeeds-investment-in-867b4b9e5fa7?ref=content.strategyofsecurity.com">Lightspeed</a>:</p>
<blockquote>
<p>In 2021, an average business user logged into over 96 applications per day and entered login credentials, credit card details and contact information online every hour.</p>
</blockquote>
<p>This is why 1Password is unstoppable. High frequency use (multiple times per day), genuine pain points, and significant user investment are a classic example of a hook.</p>
<p>There's also an ironic nuance in the adoption curve for passwordless authentication: I couldn't go completely passwordless today even if I wanted to.</p>
<p>Services that offer passwordless authentication are still in the vast minority. The void creates a bifurcation in my enthusiasm. I'm an enthusiast for <em>both</em> passwordless authentication and password managers.</p>
<p>With my enthusiasm for passwordless authentication dampered due to lack of availability, it <em>creates</em> enthusiasm for password managers. I'd rather not have passwords at all, but since I do, I want the best password manager available.</p>
<p>Enthusiasts like me are only 2.5% of the adoption curve. We're the fans who have been using 1Password for years and go around telling everyone about it. If we zoom back out and look at 1Password's 15 million customers in relation to the adoption curve, it's easy to see that we're only just starting to reach the Pragmatists. Realistically, we're not even through the Visionaries yet.</p>
<p>We're still on the upward slope of an adoption curve in an addressable market that potentially includes billions of people. As discussed in the previous section, 1Password has built proprietary technology and invested years in building it. The product's hook is reliable, which drives good retention. Growth so far has come from <a href="https://strategyofsecurity.com/p/hashicorps-ipo-bottom-up-adoption-and-layering/">bottom-up adoption</a>, which means low customer acquisition costs.</p>
<p>Their current situation ticks all the boxes for a potential hypergrowth company. That's why 1Password has the attention (and money) of the top investors in the world.</p>
<p>A handful of the Visionaries are investors in 1Password's latest round. People like Ryan Reynolds, Scarlett Johansson, Robert Downey Jr., Matthew McConaughey, Chris Evans, Rita Wilson, Ashton Kutcher, Trevor Noah, Justin Timberlake and Pharrell Williams define culture.</p>
<p>We typically think of culture as things like fashion and entertainment, but culture comes in all forms. With technology becoming a central part of pop culture, people like this list of celebrity investors can help push adoption further along the curve into the majority.</p>
<p>An interesting observation about this adoption curve: 1Password is probably the only piece of security software used by both your mom and some of the top security professionals in the world.</p>
<p>This observation demonstrates the power of a high quality, consumer-first security product. It's robust enough to meet the needs of power users and simple enough to meet the needs of regular internet users.</p>
<p>People like me are drawn to the product because it's both secure and elegant. I tell people further down the adoption curve (e.g. my mom) who have a completely different view of the problem — they just want to remember their darn passwords. Regardless of motivation, our problems get solved, and the cycle of growth continues.</p>
<h2 id="and-so-are-businesses">...And So Are Businesses</h2>
<p>1Password has been around long enough to precede the macro trend of the consumerization of IT. As a consumer-first company, it's a clear beneficiary of this trend — a textbook example, actually.</p>
<p>1Password could have been a nice business as a consumer-only product. There are plenty of consumers in the world, and 1Password was able to grow and scale its business with reasonable customer acquisition costs (CAC) and recurring subscription revenue.</p>
<p>Our password problems aren't confined to our personal lives, though. The same problems exist when we open up our business devices. Using 1Password at work is a logical progression.</p>
<p>At work, people used to use 1Password on the down low, falling into the nefarious "Shadow IT" bucket. It wasn't technically a supported enterprise application. Security awareness training has taught us enough to know that using an unsanctioned password manager to store our work password is taboo. Many people did it anyway and paid for 1Password out of pocket.</p>
<p>The story played out this way for over ten years. That's a surprisingly long time in today's fast paced hypergrowth mode of startup building. 1Password for teams was launched in 2015. The initial business product wasn't even built for company-wide use. Demand was too strong, and <a href="https://techcrunch.com/2018/04/04/1password-business/?ref=content.strategyofsecurity.com">30,000 businesses</a> signed up in a three year span.</p>
<p>1Password Business was <a href="https://blog.1password.com/introducing-1password-business/?ref=content.strategyofsecurity.com">launched in 2018</a> with a wider set of business-focused features. This was 1Password's true entry into the enterprise. Features like SSO integration, automated provisioning, and reporting are business-only requirements. Adding them to a successful consumer product without degrading the experience for their core customer base required care and attention.</p>
<p>The upside to entering the enterprise market is high. A company-sanctioned 1Password license increases both the volume of users and revenue from subscription prices. It also encourages faster adoption if people can do it as a perk on their company's dime.</p>
<p>Equally as important, it unlocks a flywheel of growth on the consumer side. Every 1Password Business subscription comes with family plans — meaning the families of every employee can also use 1Password at home. This ingenious growth strategy is one more way of driving adoption further down the adoption curve into the masses of Pragmatists and Conservatives.</p>
<p>1Password's entry into the enterprise market was a significant and important milestone, but the ceiling is still much higher. Next, we'll take a look at what the future might look like for 1Password.</p>
<h2 id="whats-possible-for-1password">What's Possible for 1Password</h2>
<p>1Password reached a $6.8 billion valuation and raised money from the top investors in the world in part because its metrics are stellar, and especially because the upside is even better.</p>
<p>In a recent <a href="https://www.cnbc.com/2022/01/19/1password-valued-at-6point8-billion-by-investors.html?ref=content.strategyofsecurity.com">CNBC interview</a>, CEO Jeff Shiner disclosed a couple of the important metrics:</p>
<blockquote>
<p>Revenues for 2021 are expected to come in at around $150 million, Shiner said, adding that businesses now account for about 60% of 1Password’s revenue.</p>
</blockquote>
<p>Building on what we've discussed so far, there are a couple important takeaways from these numbers.</p>
<p>First, this implies the 1Password Business product is growing rapidly. Since the product wasn't officially launched until 2018, the growth is obvious given the company has a 60/40 business to consumer revenue mix just over four years later.</p>
<p>Additionally, the $150 million was generated almost exclusively from the core password manager product. Expansion and diversification of the product has been completely organic for most of the company's history. The solo exception was 1Password's <a href="https://blog.1password.com/secrethub-acquisition/?ref=content.strategyofsecurity.com">acquisition of SecretHub</a> in 2021. In relation to the revenue projection for 2021, it's unlikely the acquisition made a significant contribution to revenue during the year.</p>
<p>Both takeaways are important because they signal how much upside remains. There is significant room for growth left in the core password management product because we're still early on the adoption curve for both consumers and businesses. The latest round of capital also opens opportunities for more acquisitions to compliment the core product.</p>
<p>As Jeff Shiner wrote in the Series C funding announcement, the company's ambitions span far beyond the core password management product:</p>
<blockquote>
<p>But we don’t just want to keep up; our goal is to push the envelope and explore beyond the boundaries of traditional password management.</p>
</blockquote>
<p>The boundaries need to be pushed, and 1Password is the company to do it.</p>
<p>Zooming out to look at the product space, 1Password's big opportunity is to become the user experience layer on top of existing identity and access management tools. This is significant because of an earlier point in the enterprise access management strategy canvas: user experience in traditional products is bad, and 1Password makes it good.</p>
<p>Companies implement identity and access management tools for administrators, not for users. Any claims to business user experience are lip service — it's about managing risk for the company, not making the lives of employees easier.</p>
<p>This tension is at the core of 1Password's mission. As Jeff Shiner describes, it's about easing the tension between security and convenience:</p>
<blockquote>
<p>Security is hard work, but at 1Password we see it as a human challenge rather than a technological one. Our mission has always been to ease the tension between security and convenience, and the opportunity to deliver on this has never been greater.</p>
</blockquote>
<p>By adding 1Password — the user experience layer for security — into the mix, companies are making a sincere gesture towards convenience and improving the lives of business users. This is the <a href="https://strategyofsecurity.com/p/tessian-and-cybersecuritys-journey-towards-augmented-humanity/">human-centric future</a> of security.</p>
<p>In a <a href="https://www.future.1password.com/?ref=content.strategyofsecurity.com">preview of what's to come</a>, 1Password refers to the future experience as "Universal Sign On." For users, this is magical. Universal Sign On is essentially the grease between the old world of application-specific passwords and the new world of single sign-on. You don't need to worry about any of that anymore — just put your passwords in 1Password, and they'll remember how you need to sign in to the applications you're using.</p>
<p>The improvements in user experience aren't just a tradeoff. Security teams get meaningful benefits too, mainly in the form of aggregated statistics and insights across the company's base of 1Password users.</p>
<p>Insights into things like unused accounts, low security risk criteria, unauthorized applications, and employees involved in a data breach are valuable pieces of information when securing an enterprise. They're also extremely hard to get — most security teams only dream of having data like this.</p>
<p>By giving employees a password management tool they actually want to use, security teams get valuable information in return. Mutually beneficial value like this doesn't happen often in security. You have to appreciate it when you see it, and 1Password is one of those instances.</p>
<p>Ironically, the bold vision of 1Password is a work in progress. It's fair to say that the company is still building confidence and just beginning to assert itself despite consistent profitability, growth, and now three large rounds of funding.</p>
<p>In a recent <a href="https://twitter.com/1Password/status/1483829978894643200?s=20&t=RQRR4bsR8XjlM-GOWOEJBQ&ref=content.strategyofsecurity.com">Twitter Spaces conversation</a> with 1Password's founders and CFO, the company's Series C round was referred to as "confidence capital." It struck me as an interesting way to describe a massive round of funding — presumably because the norm is for startup founders to be oozing with confidence even before their seed round.</p>
<p>When most tech companies raise hundreds of millions, the reaction is: <em>"WE RAISED ALL THIS MONEY TO TAKE OVER THE WORLD."</em> 1Password's feeling of "confidence capital" is the most endearing and most Canadian ever. I'd contrast their reaction to other tech companies like this (my words, not theirs): <em>"Oh, we were just trying to make payroll, then a few nice people liked our product, and now it looks like the rest of the world might want to use it, eh?"</em></p>
<p>Consistent humility demonstrated for nearly two decades and counting is a perfect foundation for building an iconic company. I see a strong dose of "confidence capital" as the encouragement and validation 1Password needs to fully capture the blue ocean it created.</p>
<h2 id="what-could-possibly-go-wrong">What Could Possibly Go Wrong?</h2>
<p>Raising nearly a billion dollars in total to rapidly grow a company doesn't come without risk. Both the 1Password leadership team and its investors know that. Going big and scaling the company is a chance worth taking even though there are still obstacles to overcome.</p>
<p>Moving into the enterprise, 1Password is loosely competing with Privileged Access Management (PAM) products — the likes of <a href="https://strategyofsecurity.com/p/cyberark-and-the-new-paradigm-for-privileged-access/">CyberArk</a>, BeyondTrust, and soon to be Okta. It's a competitive market, and 1Password will have to continue carving out its space — its blue ocean — among established enterprise companies.</p>
<p>Along with the disruption and adaptation of industry incumbents, expanding the focus of 1Password's products shifts the strategy canvas. The evolution of strategy has a meaningful impact on 1Password's blue ocean. The curves are starting to mirror and converge:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v1_-Strategy-Canvas---Access-Mgmt-Today.png" class="kg-image" alt="Strategy Canvas of the access management industry today." loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/02/v1_-Strategy-Canvas---Access-Mgmt-Today.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/02/v1_-Strategy-Canvas---Access-Mgmt-Today.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/02/v1_-Strategy-Canvas---Access-Mgmt-Today.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/02/v1_-Strategy-Canvas---Access-Mgmt-Today.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>Enterprise access management products (including both cloud identity and privileged access, for simplicity) have become more affordable, increased bottom-up (developer led) adoption, and decreased time to value (Okta's claim to fame). They're still enterprise-focused, but the current generation of products has disrupted the monoliths.</p>
<p>Meanwhile, 1Password's shift towards the enterprise has split its focus between consumers and businesses. Prices for business customers are higher. A sales organization has been established to manage enterprise deals. Integrations have become more important and will drive much of the future product strategy. Time to value and user experience remain high priorities.</p>
<p>Building and maintaining a community at scale is a hard thing to do. As with most products and cultural movements, going further down the adoption curve into mass markets inevitably means losing the attention of some early adopters. The challenge is keeping the welcoming, community-oriented vibe while millions of additional users join the mix.</p>
<p>Bigger picture, it's a meaningful strategic advantage for 1Password to have both a profitable business and a stockpile of capital to deploy wisely. Even as they hit escape velocity, it's hard to imagine their fiscal discipline changing to a point where money is shot out of a cannon.</p>
<p>If the decline of passwords does hit an inflection point where their demise becomes imminent, 1Password is still in a good position (maybe other than their name). They have a long enough runway to get ahead of  this shift, adapt their core product, and diversify into adjacent product domains.</p>
<p>For example, 1Password now has the financial means to acquire a smaller passwordless authentication company. The 1Password brand has established a level of trust where any company they acquire becomes exponentially more trusted and valuable. This idea of transitory trust has worked well for <a href="https://strategyofsecurity.com/p/cyberark-and-the-new-paradigm-for-privileged-access/">companies like CyberArk</a> and their entry into the cloud access management market. The same effect will work for 1Password.</p>
<p>The downside of expanding a product portfolio is that acquisitions and new products competing in adjacent spaces don't always have the same success as the original core product. The history of tech is full of examples like this. Even the biggest and best tech companies in the world can't avoid it.</p>
<p>Accelerated growth means bets have to be taken. Calculated moves for building or buying complimentary products is the proven path to success. Avoid ruin at all costs, and it's always possible to overcome the variations in results that come with additional products.</p>
<p>In a way, raising venture capital funding to win the market seems like it was the only viable option. With the way money is flying around in cybersecurity right now, there was a chance an existing competitor or an entirely new company could have raised a ton of capital and quickly build a solid password manager. This kind of hypergrowth is difficult but possible in today's world.</p>
<p>Despite these challenges, building upon the blue ocean strategy it created is by far the best strategic decision for 1Password. Successfully executing a blue ocean strategy means getting the sequence of events right, even if the sequence takes time to develop. 1Password has done everything right so far. Now, it's time to capitalize on the position they're in.</p>
]]></content:encoded>
            <category>Startups</category>
            <category>#featured_home</category>
            <category>#featured_article</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/03/Logo_-1Password---Header.png"/>
        </item>
        <item>
            <title><![CDATA[The Rise of Security Augmentation]]></title>
            <link>https://strategyofsecurity.com/the-rise-of-security-augmentation/</link>
            <guid>61f06438a817a2003bbaa92f</guid>
            <pubDate>Tue, 01 Feb 2022 15:44:23 GMT</pubDate>
            <description><![CDATA[An exploration into the promise of security augmentation and a model for implementing it.]]></description>
            <content:encoded><![CDATA[<p><em>Note: This article originally appeared in Tessian's Human Layer Security publication. The content is no longer available after Proofpoint's acquisition of Tessian, so I'm republishing the article in full here (with original art by </em><a href="https://www.corneliali.com/?ref=content.strategyofsecurity.com" rel="noreferrer"><em>Cornelia Li</em></a><em>).</em></p><hr><p>As technologists, many of us have been convinced that automation is the solution to our problems. But augmentation is what we&nbsp;<em>really</em>&nbsp;need. We just don’t know it yet…</p><p>There is no discipline where this is more true than security. We’re constantly overmatched and under-resourced. Threats come at us from around the globe and at any time. The better we can scale the limited number of humans we have to protect our companies, the safer we will be.</p><p>The roots of our false sense of belief in automation are deep-seated. Take a look at marketing for nearly any security product. You’re bound to see automation as one of the core value props. When a belief is so pervasive, it’s hard to avoid it without consciously taking a step back to reexamine its accuracy.</p><p>Why do we allow ourselves to fall for this too-good-to-be-true story? Because we’re human, and humans are fallible. The promise of automation makes us believe the right tool can make our problems go away. And let’s face it: every company would&nbsp;<em>love</em>&nbsp;for their security problems to magically disappear.</p><p>This is where our trouble begins. We either fall into the trap and put too much faith into automation, or we put up our defenses and become skeptics. We need to reframe our positive or negative views on automation and form a more nuanced opinion.</p><p>To accomplish this, we need to reevaluate our beliefs about automation and establish a new mental model about when to use automation, augmentation, and human intelligence.</p><h2 id="the-spectrum-of-security-automation-beliefs">The spectrum of security automation beliefs</h2><p>The first step towards determining when to use automation in our security programs is to understand where we fall on the spectrum of beliefs about security automation. The paradigm many of us follow tends to gravitate towards one end of the spectrum:</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/06/spectrum-of-security-automation-beliefs-past.png" class="kg-image" alt="" loading="lazy" width="830" height="605" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/06/spectrum-of-security-automation-beliefs-past.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/06/spectrum-of-security-automation-beliefs-past.png 830w" sizes="(min-width: 720px) 720px"></figure><p>On one extreme, we’re so bullish on automation that we’ve falsely convinced ourselves we can automate everything. We try to automate tasks that have no business being automated, almost as an act of defiance.</p><p>Or, on another extreme, we’ve been burned so badly that we believe humans are the only reliable way to get things done. We insist on doing everything manually, even if it’s prohibitively expensive or tedious to do so.</p><p>The paradigm of the future looks different. By reframing our mindset around the traditional view of automated vs. manual, we unlock a powerful new model:</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/06/spectrum-of-security-automation-beliefs-future.png" class="kg-image" alt="" loading="lazy" width="830" height="954" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/06/spectrum-of-security-automation-beliefs-future.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/06/spectrum-of-security-automation-beliefs-future.png 830w" sizes="(min-width: 720px) 720px"></figure><p>If we can convince ourselves to prioritize augmentation over highly manual or highly automated processes, we end up with a more moderate and balanced view. The ideal mix for getting important work done is a combination of automation, human intelligence, and the true force multiplier: augmentation.</p><h2 id="a-prioritization-model-for-security-augmentation">A prioritization model for security augmentation</h2><p>Some forward-thinking leaders have already started to adopt this new augmentation-first paradigm. On a CISO Series <a href="https://cisoseries.com/defense-in-depth-promises-of-automation/?ref=content.strategyofsecurity.com" rel="noreferrer">podcast episode</a>, LinkedIn CISO Geoff Belknap shared his perspective on automation:</p><blockquote>“I’m not disappointed by what automation has delivered, but I think I have taken a very realistic view of what automation could do. Which is make smart humans able to make faster decisions, make better decisions.”</blockquote><p>This is exactly the mindset we need to take towards automation. First, be realistic about what automation is capable of. With that expectation, focus on areas where augmentation can help humans make faster and better decisions. That’s the winning formula.</p><p>One way to help ourselves adopt this mindset is by using a model to guide our decision making:</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/06/prioritization-model-for-security-automation.png" class="kg-image" alt="" loading="lazy" width="830" height="518" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2025/06/prioritization-model-for-security-automation.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/06/prioritization-model-for-security-automation.png 830w" sizes="(min-width: 720px) 720px"></figure><p>In our day-to-day lives as security professionals, most of our decision-making comes down to risk and urgency. Consciously or unconsciously, we spend our days triaging the tasks that come at us along these two vectors. As a result, they’re the axes in our model.</p><p>Our decision about the best way to execute different types of work comes down to specific criteria for each quadrant in the model. Based on where tasks map on the scale of risk and urgency, we can determine how to approach the work and the types of tools we should be using.</p><h3 id="augmentation">Augmentation</h3><p>Tasks that are both high risk and high urgency should be augmented using a combination of human intelligence and machines. This is the area where both speed and quality matter. Any gains in speed from machines or judgment from humans can make a big difference. A few ideas specific to security are outlined in the next section.</p><h3 id="automation">Automation</h3><p>Conversely, tasks that are low risk and high urgency are good candidates for automation. They’re important enough to be done, but not complex enough where human intervention is valuable. Let the machines do the fast, repetitive work.</p><p>Processes like access provisioning are great candidates for automation. Once roles or business rules have been established and applications have been integrated with access control systems, certain access can be automatically granted for every new employee. Human intervention is only needed for exceptions or errors.</p><h3 id="expertise">Expertise</h3><p>Tasks that are high risk and low urgency typically require expertise, or human intelligence, to be completed. They’re complex enough that creativity and time to weigh potential options is valuable. People with specific expertise are best suited for this type of work.</p><p>Security strategy, architecture, and engineering are inherently creative exercises. They’re high risk because the wrong strategy, architecture, or system design can have catastrophic consequences. However, machines can contribute relatively little to the creative process. In this case, it’s best to let the experts do their work.</p><h3 id="repetition">Repetition</h3><p>Finally, tasks that are low risk and low urgency but still need to be done can be executed through manual repetition. As much as we’d like to augment or automate everything, we have to prioritize. Sometimes a manual process is good enough.</p><p>For example, monitoring and following up on security policy exceptions is a repetitive task that’s more effective with a human touch. Instead of sending out automated reminders that are easy to ignore, it’s often better for a human to do the work.</p><h2 id="security-augmentation-in-the-real-world">Security augmentation in the real world</h2><p>New tools create new opportunities for augmentation in security. Here are a few ideas about how to start using augmentation in your own work.</p><h3 id="fraud-detection">Fraud detection</h3><p>An early example of human augmentation in security is PayPal’s approach for fighting fraud. As recounted by Peter Thiel in&nbsp;<em>Zero to One</em>, the young company had more than $10 million losses from fraud each month.</p><p>PayPal engineers first built an automated system that was ineffective because fraudsters adapted their techniques. However, they discovered an augmented approach was highly effective. Thiel described the incredible results:</p><blockquote>“This kind of man-machine symbiosis enabled PayPal to stay in business, which in turn enabled hundreds of thousands of small businesses to accept the payments they needed to thrive on the internet. None of it would have been possible without the man-machine solution—even though most people would never see it or even hear about it.”</blockquote><p>Instead of relying solely on automation, PayPal added the power of human judgment to mitigate fraud. The solution was so impactful that it saved the company.</p><h3 id="risk-and-compliance">Risk and compliance</h3><p>Risk and compliance is a notoriously manual process that is starting to see the benefits of augmentation. A new generation of continuous compliance tools like Drata, Secureframe, and Vanta has entered the market.</p><p>Augment your compliance teams with these tools to manage evidence collection workflows, reporting, and testing. Save your people for designing controls, interpreting results, and remediating any issues that come up. When implemented effectively, you can reduce your compliance timelines from months to weeks.</p><h3 id="application-security-testing">Application security testing</h3><p>Engineering teams are continuously under pressure to move fast and ship. Manual application security reviews add friction and decrease velocity.</p><p>Security teams can be augmented by embedding automated vulnerability scanning into development and build processes. Using automation strategically can allow your security teams to focus manual reviews on specific areas of risk and save hours of effort for each release.</p><h3 id="incident-detection-and-response">Incident detection and response</h3><p>When investigating security incidents, one of the biggest challenges engineers have is quickly and accurately identifying anomalous events. More data means more false positives. That’s a distraction when time is of the essence.</p><p>Incident detection and response engineers can augment themselves by iteratively building automated detection rules as they see anomalous events in the environment. High quality rules benefit the entire team by cutting down on false positives so real incidents can be identified faster.</p><h3 id="cloud-configuration-management">Cloud configuration management</h3><p>Monitoring and maintaining cloud security configurations is a daunting task, particularly in multi-cloud environments. One small change can open a gaping hole and expose your cloud infrastructure to significant risks.</p><p>This process can be augmented by continuously scanning your cloud configurations with cloud workload protection platforms. Automating checks for misconfigurations means you’ll find them faster and don’t need humans to intervene until anomalies are found.</p><h3 id="email-security">Email security</h3><p>Employees send and receive thousands of emails per day and are continuously targeted by attackers. As Forrester noted in a <a href="https://f.hubspotusercontent20.net/hubfs/1670277/Forrester%20-%20Take%20Control%20Of%20Email%20Security%20With%20Human%20Layer%20Security%20Protection.pdf?ref=content.strategyofsecurity.com" rel="noreferrer">study</a>, security teams spend up to 600 hours each month addressing email security incidents. It’s impossible to keep up with all the threats your employees are facing.</p><p>Augment your employees and security teams with products to help alert users when they’re seeing a suspicious email or potentially sharing sensitive data. Engaging people in-the-moment is far more effective than investigating incidents and remediating data loss after they’ve occurred.</p><h2 id="security%E2%80%99s-augmented-future">Security’s augmented future</h2><p>The next evolution of security is going to be led by augmentation, not automation. The greatest value comes from combining humans and machines and letting each do what they’re best at. In the famous words of mathematician Richard Hamming:</p><blockquote>&nbsp;“Machines should work. People should think.”</blockquote><p>It’s unfair to view tools as magic bullets. They’re not going to solve all our problems. However, it’s equally as unfair to view tools as enemies. We can’t expect people to do everything on their own — they need tools.</p><p>Top security leaders are making strategic choices about how and when to use automation, augmentation, and human intelligence. The stakes are higher than ever. The right choices can be the difference between a good night’s sleep and becoming another news headline.</p>]]></content:encoded>
            <category>Concepts</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2025/06/header-the-rise-of-security-augmentation.png"/>
        </item>
        <item>
            <title><![CDATA[Cybersecurity's 2022 IPO Pipeline (Part 2)]]></title>
            <link>https://strategyofsecurity.com/cybersecuritys-2022-ipo-pipeline-part-2/</link>
            <guid>61e5819e81cd02003bbce122</guid>
            <pubDate>Mon, 24 Jan 2022 17:36:54 GMT</pubDate>
            <description><![CDATA[The last of a two part series projecting the industry's most likely IPO candidates for the upcoming year.]]></description>
            <content:encoded><![CDATA[<p>There are so many cybersecurity companies in the IPO pipeline that it took two weeks to cover them all. If you missed Part 1 of the IPO pipeline analysis, you can catch up on it here:</p>
<figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://strategyofsecurity.com/p/cybersecuritys-2022-ipo-pipeline-part-1/"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Cybersecurity’s 2022 IPO Pipeline (Part 1)</div><div class="kg-bookmark-description">The first of a two part series projecting the industry’s most likely IPO candidates for the upcoming year.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://strategyofsecurity.com/p/favicon.png" alt=""><span class="kg-bookmark-author">Strategy of Security</span><span class="kg-bookmark-publisher">Cole Grolmus</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Title_-2022-IPO-Pipeline---Part-1.png" alt="" onerror="this.style.display = 'none'"></div></a></figure><p>And the list just keeps growing. Last week, 1Password <a href="https://blog.1password.com/future-of-1password/?ref=content.strategyofsecurity.com">announced</a> a new $620 million round of funding that values the company at $6.8 billion. Their valuation puts them squarely into the IPO pipeline based on comparable valuations for other companies in the pipeline and ones who have recently gone public.</p>
<p>I chose not to include 1Password in this week's analysis because they've taken such a unique path to reach the point they're at now. The company has grown steadily over the course of 17 years (!!!). Most of those years were bootstrapped until a recent burst of huge funding rounds. Their story is so unique that I'm planning to do a full article and cover them in much more detail.</p>
<p>This article covers the remaining six of twelve total companies who have the potential to go public this year.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Netskope.png" class="kg-image" alt="Netskope" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/01/Logo_-Netskope.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/01/Logo_-Netskope.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/01/Logo_-Netskope.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Netskope.png 1920w" sizes="(min-width: 720px) 720px"></figure><h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.netskope.com/?ref=content.strategyofsecurity.com">Netskope</a> has built a comprehensive Zero Trust platform that has become the leader in <a href="https://en.wikipedia.org/wiki/Secure_access_service_edge?ref=content.strategyofsecurity.com">Secure Access Service Edge (SASE)</a>. The platform includes multiple products within cloud security, including a Cloud Access Security Broker (CASB), Secure Web Gateway (SWG), and more.</p>
<p>SASE ("sassy") is a new cloud-centric networking model coined by Gartner in 2019. Netskope is perhaps the largest and most well known company to focus on the space.</p>
<p>The company was first known for its Cloud Access Security Broker (CASB) product and has since expanded into other areas of Zero Trust. Analyst reports for this space are a moving target. Netskope has been a consistent Leader in Gartner's Magic Quadrant for CASB and has ranked <a href="https://www.netskope.com/lp-gartner-2020-magic-quadrants-for-swg-and-casb?ref=content.strategyofsecurity.com">consistently high</a> in adjacent domains.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Netskope generally fits into the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#cloud-security">Cloud Security</a> domain with products spanning multiple areas of Zero Trust.</p>
<h5 id="how-much-money-have-they-raised">How much money have they raised?</h5>
<p>The company has raised $1 billion over 12 funding rounds, according to Crunchbase. The <a href="https://www.netskope.com/press-releases/netskope-attracts-300-million-in-additional-investment?ref=content.strategyofsecurity.com">most recent round</a> was $300 million in July 2021.</p>
<h5 id="what-is-their-most-recent-valuation">What is their most recent valuation?</h5>
<p>Netskope was valued at $7.5 billion as of their latest round of funding.</p>
<h5 id="have-they-stated-an-intention-to-go-public">Have they stated an intention to go public?</h5>
<p>No public statements about an IPO have been made, but journalists have speculated the most recent round of funding was its last as a private company.</p>
<h5 id="what-is-the-bull-case-for-an-ipo">What is the bull case for an IPO?</h5>
<p>Similar to Appgate and Illumio, Netskope should ride the popularity of Zero Trust to an IPO.</p>
<p>Netskope may have even more of a bull case because they essentially own the CASB market. Their products are relatively diversified compared to other companies focused on Zero Trust. They were also around long before SASE gained popularity.</p>
<p>A $7.5 billion valuation is also much higher than many cybersecurity companies who have already gone public. This likely means Netskope is in a good place in terms of revenue and growth, which should set up well for an IPO.</p>
<h5 id="what-is-the-bear-case-for-an-ipo">What is the bear case for an IPO?</h5>
<p>There's not much of a bear case here. Even if Zero Trust and SASE did miraculously end up being fads, Netskope's products are still useful.</p>
<p>A downside is that the CASB market is relatively small — <a href="https://www.verifiedmarketresearch.com/product/global-cloud-access-security-brokers-market-size-and-forecast-to-2025/?ref=content.strategyofsecurity.com">estimated</a> at $8.74 billion back in 2020. However, this can be overcome by continuing to diversify into adjacent markets and giving the CASB market time to grow.</p>
<h5 id="what-is-the-most-likely-outcome">What is the most likely outcome?</h5>
<p>Netskope is likely to IPO in 2022.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Pindrop.png" class="kg-image" alt="Pindrop" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/01/Logo_-Pindrop.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/01/Logo_-Pindrop.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/01/Logo_-Pindrop.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Pindrop.png 1920w" sizes="(min-width: 720px) 720px"></figure><h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.pindrop.com/?ref=content.strategyofsecurity.com">Pindrop</a> provides voice-driven authentication, fraud detection, behavioral analytics, and more. The product was actually built from the Ph.D. thesis of co-founder Vijay Balasubramaniyan. Seriously, <a href="https://smartech.gatech.edu/bitstream/handle/1853/44920/balasubramaniyan_vijay_a_201108_phd.pdf?ref=content.strategyofsecurity.com">here it is</a>.</p>
<p>Voice security is a relatively unique and undefined market, which is part of what makes Pindrop's platform special. However, there aren't many analyst ratings to go by.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Pindrop fits roughly into <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#biometrics">Biometrics</a> and <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#fraud-and-transaction-security">Fraud and Transaction Security</a>. It's a unique product, though, so this mapping isn't as clean of a fit as other companies.</p>
<h5 id="how-much-money-have-they-raised">How much money have they raised?</h5>
<p>The company has raised $219.6 million over six rounds, according to Crunchbase. Their most recent round of funding was a <a href="https://techcrunch.com/2018/12/05/pindrop-raises-90m-to-bring-its-voice-fraud-prevention-to-iot-devices-and-europe/?ref=content.strategyofsecurity.com">$90 million Series D</a> in 2018.</p>
<h5 id="what-is-their-most-recent-valuation">What is their most recent valuation?</h5>
<p>According to Bloomberg, Pindrop was <a href="https://www.bloomberg.com/news/articles/2021-03-18/andreessen-backed-startup-pindrop-agrees-to-buy-next-caller?ref=content.strategyofsecurity.com">valued at $925 million</a> as of their funding round in 2018.</p>
<h5 id="have-they-stated-an-intention-to-go-public">Have they stated an intention to go public?</h5>
<p>Co-founder Vijay Balasubramaniyan discussed an IPO as the end goal with no specific timeline. From <a href="https://www.cnbc.com/2018/12/05/pindrop-series-d-funding-round-backed-by-goldman-sachs-vitruvian.html?ref=content.strategyofsecurity.com">CNBC</a>:</p>
<blockquote>
<p>“If the world is moving to voice and we’re providing all of security and identity for voice, I think we’ll be a very valuable public company, so absolutely that’s where we’re headed."</p>
</blockquote>
<h5 id="what-is-the-bull-case-for-an-ipo">What is the bull case for an IPO?</h5>
<p><a href="https://www.pindrop.com/?ref=content.strategyofsecurity.com">Pindrop</a> is the clear leader in the market for voice authentication, fraud, and security. They <a href="https://www.yahoo.com/now/pindrop-acquires-next-caller-reaffirming-150000036.html?ref=content.strategyofsecurity.com">acquired</a> their top competitor in 2021. Owning a market with no close competitors and holding a significant intellectual property advantage sure sounds like a nice case for an IPO.</p>
<p>From a strategy perspective, their product has more upside than a typical security product because it's customer-facing. Authenticating yourself on a customer service call with your mom's maiden name and the last four digits of your SSN is something none of us enjoy doing. I'll take voice authentication, thanks.</p>
<p>Pindrop also prevents fraud, which is a big problem for many enterprise businesses with large customer service operations. According to the  CNBC interview with Vijay Balasubramaniyan, the product caught $350 million worth of fraud attempts in 2018. Delivering that kind of quantifiable value is a big deal.</p>
<h5 id="what-is-the-bear-case-for-an-ipo">What is the bear case for an IPO?</h5>
<p>Contact center platforms like Talkdesk are growing quickly (Talkdesk is currently <a href="https://www.talkdesk.com/news-and-press/press-releases/talkdesk-raises-series-d-funding/?ref=content.strategyofsecurity.com">valued at $10 billion</a>). These platforms <a href="https://www.talkdesk.com/contact-center-platform/security-compliance/authentication-identity-management/?ref=content.strategyofsecurity.com">already have</a> or will develop authentication features to include natively. The question for Pindrop is whether voice-based security is a standalone product or a feature within larger contact center platforms.</p>
<p>Pindrop is a case where switching costs could help fend off competition. Once their platform has been integrated into a company's IVR system and call center workflows, it's unlikely to be removed any time soon. The product is stickier than an average product after the initial sale is made.</p>
<h5 id="what-is-the-most-likely-outcome">What is the most likely outcome?</h5>
<p>Details and speculation are scarce, so it's hard to tell what this year will bring. I expect either an IPO or another large funding round in 2022 based on the timing of their last round of funding.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-QOMPLX.png" class="kg-image" alt="QOMPLX" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/01/Logo_-QOMPLX.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/01/Logo_-QOMPLX.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/01/Logo_-QOMPLX.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-QOMPLX.png 1920w" sizes="(min-width: 720px) 720px"></figure><h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.qomplx.com/?ref=content.strategyofsecurity.com">QOMPLX</a> is a cloud risk analytics platform. The platform is focused on cybersecurity. However, it's capable of handling other risk-based use cases in various industries. Broadly speaking, think <a href="https://www.palantir.com/?ref=content.strategyofsecurity.com">Palantir</a>.</p>
<p>Analyst ratings are out the window here because it's such a new and different product category. Public discussion is surprisingly limited for a company nearing an IPO.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Their product is unique and doesn't map cleanly into existing categories. It roughly maps to <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#analytics">Security Analytics</a> or <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#risk-ratings">Risk Ratings</a>, but the product does much more.</p>
<h5 id="how-much-money-have-they-raised">How much money have they raised?</h5>
<p>QOMPLX has raised $107 million across four rounds of funding. The most recent round was a <a href="https://venturebeat.com/2019/07/23/qomplx-raises-78-6-million-for-analytics-as-a-service-platform/?ref=content.strategyofsecurity.com">$78.6 million Series A</a> in 2019.</p>
<h5 id="what-is-their-most-recent-valuation">What is their most recent valuation?</h5>
<p>Their valuation is tricker than usual, mainly because of a planned SPAC that was called off (more on that in a second).</p>
<p>The company was valued at approximately $1.4 billion in post-transaction equity value, including proceeds and acquisitions from the SPAC shell company.</p>
<h5 id="have-they-stated-an-intention-to-go-public">Have they stated an intention to go public?</h5>
<p>QOMPLX <a href="https://www.nasdaq.com/press-release/qomplx-a-leader-in-cloud-native-risk-analytics-elects-to-become-a-public-company?ref=content.strategyofsecurity.com">announced a SPAC</a> in March 2021. As SPACs do, the intent was to take the merged company public that year. They even acquired two companies to round out the company's product portfolio.</p>
<p>By August, the SPAC <a href="https://www.marketwatch.com/story/spac-tailwind-acquisition-qomplx-call-off-14-billion-merger-citing-market-conditions-2021-08-17?ref=content.strategyofsecurity.com">merger was off</a>. The chairman of the SPAC company stated "market conditions" as the reason the plans were scrapped.</p>
<p>This was a curious answer since, well, a bunch of other cybersecurity companies managed to go public in 2021 under the same "market conditions." Intuitively, it seems likely there were more factors in play.</p>
<h5 id="what-is-the-bull-case-for-an-ipo">What is the bull case for an IPO?</h5>
<p>QOMPLX's platform appears to be ahead of its time. The company has grown quickly. Analytics is a solid foundation for doing lots of interesting things, and security teams need the best analytics they can get.</p>
<p>The company's founders have world-class backgrounds, including institutions like Oxford, West Point, and the Air Force Academy. QOMPLX's vibe is Palantir-esque — a semi-mysterious company with radically different tech and tone than the rest of the industry.</p>
<h5 id="what-is-the-bear-case-for-an-ipo">What is the bear case for an IPO?</h5>
<p>I worry their product isn't well understood or accepted yet. People buy based on existing models, and QOMPLX doesn't seem to fit nicely into a buying category most traditional companies already have. The pessimistic case is "technology in search of a problem."</p>
<p>In terms of growth, Palantir was able to become a massive company because it won the public sector. QOMPLX needs to find a similar growth driver.</p>
<h5 id="what-is-the-most-likely-outcome">What is the most likely outcome?</h5>
<p>They were already close in 2021, so I would expect another attempt in 2022. SPACs can be a slow moving game, so it's possible we could see an announcement that doesn't have the time to fully materialize this year.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Snyk.png" class="kg-image" alt="Snyk" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/01/Logo_-Snyk.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/01/Logo_-Snyk.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/01/Logo_-Snyk.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Snyk.png 1920w" sizes="(min-width: 720px) 720px"></figure><h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://snyk.io/?ref=content.strategyofsecurity.com">Snyk</a> is a developer security platform that performs real-time scans of source code to identify and fix security issues.</p>
<p>The company was <a href="https://snyk.io/blog/snyk-visionary-2021-gartner-magic-quadrant-for-ast/?ref=content.strategyofsecurity.com">recognized as a Visionary</a> in the 2021 Gartner Magic Quadrant for Application Security Testing. The market is relatively mature and led by companies that have been around much longer, including Synopsys and Veracode. Achieving a Visionary ranking in this market is a significant accomplishment.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Snyk's products map to the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#static-and-dynamic-application-security-testing-sastdast">Static and Dynamic Application Security Testing (SAST/DAST)</a> category of the cybersecurity ecosystem.</p>
<h5 id="how-much-money-have-they-raised">How much money have they raised?</h5>
<p>The company has raised $1.4B in funding over 11 rounds, according to Crunchbase.</p>
<h5 id="what-is-their-most-recent-valuation">What is their most recent valuation?</h5>
<p>Snyk was valued at $8.6 billion as of their most recent round of funding in September 2021.</p>
<h5 id="have-they-stated-an-intention-to-go-public">Have they stated an intention to go public?</h5>
<p>Snyk CEO Peter McKay has set an approximate IPO timeline for the next couple years. From <a href="https://finance.yahoo.com/news/cybersecurity-startup-snyk-said-plan-233847143.html?guccounter=1&ref=content.strategyofsecurity.com">Yahoo! Finance</a>:</p>
<blockquote>
<p>Snyk Chief Executive Officer Peter McKay said in an interview in March 2021 that the Boston-based company’s goal is to go public over the next couple years.</p>
</blockquote>
<h5 id="what-is-the-bull-case-for-an-ipo">What is the bull case for an IPO?</h5>
<p>Snyk is a fan favorite among developers because it's a new and cool way to secure code without needing to deal with people doing time-consuming security reviews. Developer productivity and security are both high priorities for modern companies. Snyk is a force multiplier because it improves security with the least amount of friction possible. That's an appealing value prop for any company.</p>
<p>Their competitors are much older products that aren't innovating at the same rate Snyk does. Snyk doesn't really have a modern, publicly traded competitor to dethrone. There is no CrowdStrike or Okta of application security testing. Snyk has a huge opportunity to be that kind of company.</p>
<h5 id="what-is-the-bear-case-for-an-ipo">What is the bear case for an IPO?</h5>
<p>Basically none. I'd like to be more skeptical, but there's no reason to be. Snyk is clearly leading the reform in the application security testing category. They're improving their product rapidly and seem to have won the affection of developers in this category of products.</p>
<p>They likely have significant losses because of investing in growth, but so does every cybersecurity company at IPO. The only reason for them to hold back on going public is to be better prepared and have their financial house a little more in order before opening it up to the public.</p>
<h5 id="what-is-the-most-likely-outcome">What is the most likely outcome?</h5>
<p>I expect an IPO in 2022.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Tanium.png" class="kg-image" alt="Tanium" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/01/Logo_-Tanium.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/01/Logo_-Tanium.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/01/Logo_-Tanium.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Tanium.png 1920w" sizes="(min-width: 720px) 720px"></figure><h5 id="what-does-the-company-do">What does the company do?</h5>
<p>Tanium is an endpoint security platform with modules covering multiple areas of the domain.</p>
<p>A father and son team spent five years developing the technology before going to market. It's not just another endpoint security platform. Tanium's approach to endpoint security and management is highly differentiated IP.</p>
<p>As described by a <a href="https://www.reddit.com/r/tanium/comments/q2jhuc/tanium_vs_crowdstrike_vs_sentinel_one/?utm_source=share&utm_medium=web2x&context=3">Reddit commenter</a> when clarifying the difference between Tanium and other Endpoint Detection and Response (EDR) products:</p>
<blockquote>
<p>First of all, Tanium is not an AV solution, though it can manage the native Microsoft Windows Defender AV at scale across your enterprise from a central platform console. It’s currently doing this for the US Airforce with over 1 million endpoints under management with Tanium. You can search for the articles discussing this use of Tanium.<br>
<br>
Second, the communication technology is what differentiates Tanium and is what they have patented. Instead of the traditional hub and spoke model that you typically see in server to client connections, Tanium uses a linear chain, so there is no need for the server to connect to each endpoint.</p>
</blockquote>
<p>Or, for a much more detailed rendition, check out Steven Sinofsky's a16z  <a href="https://a16z.com/2014/06/22/tanium-magic/?ref=content.strategyofsecurity.com">investment memo</a> from 2014.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Tanium is an endpoint management platform that covers multiple domains in the cybersecurity ecosystem. A few of the primary ones include <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#asset-management">Asset Management</a>, <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#patch-and-system-management">Patch and System Management</a>, <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#vulnerability-management-and-testing">Vulnerability Management and Testing</a>, and more.</p>
<h5 id="how-much-money-have-they-raised">How much money have they raised?</h5>
<p>Over $1 billion, according to a <a href="https://www.tanium.com/press-releases/tanium-announces-150-million-funding-round-sparked-by-major-industry-partnerships/?ref=content.strategyofsecurity.com">press release</a> in October 2020 and an additional <a href="https://www.tanium.com/press-releases/tanium-announces-150-million-funding-investment-to-bring-visibility-and-control-to-the-edge/?ref=content.strategyofsecurity.com">$150 million round</a> in January 2021.</p>
<h5 id="what-is-their-most-recent-valuation">What is their most recent valuation?</h5>
<p>Tanium is valued at over $9 billion, according to a <a href="https://www.tanium.com/press-releases/tanium-announces-150-million-funding-round-sparked-by-major-industry-partnerships/?ref=content.strategyofsecurity.com">press release</a> in October 2020.</p>
<h5 id="have-they-stated-an-intention-to-go-public">Have they stated an intention to go public?</h5>
<p>Tanium's founders haven't officially stated a date to take the company public. However, Tanium has been in the IPO pipeline for several years.</p>
<h5 id="what-is-the-bull-case-for-an-ipo">What is the bull case for an IPO?</h5>
<p>Tanium is a unique company that has the potential to join the ranks of very hyped public cybersecurity companies (Cloudflare, CrowdStrike, Zscaler, and Okta) once they IPO.</p>
<p>Tanium has a stellar list of customers, including half the Fortune 100 and 8 of the top 10 U.S. financial institutions. They don't need an IPO to reach the level of enterprise customers — Tanium has been an enterprise-grade company since the beginning.</p>
<p>They <a href="https://www.tanium.com/press-releases/tanium-announces-150-million-funding-round-sparked-by-major-industry-partnerships/?ref=content.strategyofsecurity.com">publicly disclosed</a> having $430 million in revenue back in October 2020. They've likely eclipsed $500 million in the time since. $500 million is more revenue than many cybersecurity companies who are already public.</p>
<h5 id="what-is-the-bear-case-for-an-ipo">What is the bear case for an IPO?</h5>
<p>Tanium doesn't directly compete with CrowdStrike and SentinelOne, but many parts of their platform are adjacent. They're on a collision course due to the inevitable <a href="https://strategyofsecurity.com/p/crowdstrike-and-the-bundling-of-cybersecurity/">bundling of products</a> that's happening within the endpoint security space.</p>
<p>Endpoint security is already a brutally competitive market for public companies. It will get more competitive when <a href="https://strategyofsecurity.com/p/cybersecuritys-2022-ipo-pipeline-part-1/">Cybereason (likely) joins</a> the ranks in 2022.</p>
<h5 id="what-is-the-most-likely-outcome">What is the most likely outcome?</h5>
<p>Tanium's decision is hard to predict since they've been IPO-ready for a few years. I expect 2022 will be the year Tanium finally goes public.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Transmit-Security.png" class="kg-image" alt="Transmit Security" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/01/Logo_-Transmit-Security.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/01/Logo_-Transmit-Security.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/01/Logo_-Transmit-Security.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Transmit-Security.png 1920w" sizes="(min-width: 720px) 720px"></figure><h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.transmitsecurity.com/?ref=content.strategyofsecurity.com">Transmit Security</a> is an authentication platform focused on passwordless auth for customer and workforce identity.</p>
<p>The product wasn't included in Gartner's 2021 Access Management Magic Quadrant; however, it's a competitor to cloud authentication platforms like Okta, Auth0, Forgerock, Ping Identity, and others. They have received some analyst recognition, including Gartner's 2019 Cool Vendors in Identity and Access Management.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Transmit Security is an <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#authentication">Authentication</a> product that has features across several domains within the market, including <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#adaptive-authentication">Adaptive Authentication</a>, <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#multi-factor-authentication-mfa">Multi-Factor Authentication (MFA)</a>, and <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#biometrics">Biometrics</a>.</p>
<h5 id="how-much-money-have-they-raised">How much money have they raised?</h5>
<p>The company has raised $583 million across two rounds of funding, according to Crunchbase. Their most recent funding was a massive <a href="https://techcrunch.com/2021/06/22/transmit-security-raises-543m-series-a-to-kill-off-the-password/?ref=content.strategyofsecurity.com">$543 million Series A</a> in June 2021. This was the largest fundraising round in Israeli cyber history.</p>
<p>Founders Mickey Boodaei and Rakesh Loonkar have done this before — most famously for <a href="https://www.imperva.com/?ref=content.strategyofsecurity.com">Imperva</a>. Successful exits put the founders in a position to self-finance the company for seven years (!) before raising outside capital.</p>
<h5 id="what-is-their-most-recent-valuation">What is their most recent valuation?</h5>
<p>Transmit Security was valued at $2.2 billion as of their most recent round of funding.</p>
<h5 id="have-they-stated-an-intention-to-go-public">Have they stated an intention to go public?</h5>
<p>Co-founder Mickey Boodaei outlined the goal for an IPO in a <a href="https://www.calcalistech.com/ctech/articles/0,7340,L-3910878,00.html?ref=content.strategyofsecurity.com">2021 interview</a>:</p>
<blockquote>
<p>"An IPO has always been a goal, and when VC funds come in it only emphasizes it. Every fund has that expectation and while it's not something I have a set date for, it's something that will come."</p>
</blockquote>
<p>The entire article is a great read about much more than big valuations and IPOs. Multiple Israeli founders describe the ethos for second-time founders and their desire to spend a long time building large, enduring companies.</p>
<h5 id="what-is-the-bull-case-for-an-ipo">What is the bull case for an IPO?</h5>
<p>When Transmit Security goes public, it will likely join an elite group of decacorn cybersecurity companies. As third time founders, Mickey Boodaei and Rakesh Loonkar look to be in it for the long run. An IPO is just one milestone on the path towards building a much larger public company.</p>
<h5 id="what-is-the-bear-case-for-an-ipo">What is the bear case for an IPO?</h5>
<p>There are a lot of great cloud authentication companies. A lot. Like, this is the golden era for authentication, and we need to appreciate it.</p>
<p>A market shared among so many great companies inevitably means intense competition. In that sense, Transmit Security is in a similar situation as Cybereason — they're competing against some of the very top companies in cybersecurity.</p>
<p>Intense competition isn't a shock to multiple time founders, though. They were fully aware of the challenge as they started and grew the company, so they're ready for it.</p>
<h5 id="what-is-the-most-likely-outcome">What is the most likely outcome?</h5>
<p>It's possible, but not probable, that Transmit Security could IPO in 2022. The founders have taken their time building the company and clearly have plans to create something that lasts. Whether that means an IPO this year or not, you can trust it will be the right long-term decision.</p>
<h2 id="cybersecurity-is-still-going-public">Cybersecurity is (Still) Going Public</h2>
<p>Despite my best efforts, it's hard to predict exactly how many companies in the cybersecurity IPO pipeline will actually go public this year. Making predictions is a fun game to play, but the final number ultimately doesn't matter.</p>
<p>When you zoom out a bit, more IPOs mean more legitimacy for cybersecurity companies. As I wrote in <a href="https://strategyofsecurity.com/p/cybersecurity-is-going-public/">Cybersecurity is Going Public</a>:</p>
<blockquote>
<p>The number and size of public cybersecurity companies is a factor in the legitimization of cybersecurity as a standalone industry. The same was true of tech as a whole two decades ago. The next evolution is for segments of the tech industry to establish themselves as viable cohorts of public companies. Cybersecurity is one of those segments.</p>
</blockquote>
<p>Even with current market volatility, cybersecurity companies have proven to be relatively resilient. Security isn't a problem that varies or goes away in uncertain economic times. Unless there is a major market correction, we're going to see a lot of IPOs this year.</p>
<p>I'll be updating and tracking the IPOs in a running list of public cybersecurity companies. I have some updates planned that will make this more than just a list of companies. For now, you can follow the current list here:</p>
<figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://strategyofsecurity.com/p/public-cybersecurity-companies/"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Public Cybersecurity Companies</div><div class="kg-bookmark-description">Information about publicly-traded cybersecurity companies.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://strategyofsecurity.com/p/favicon.png" alt=""><span class="kg-bookmark-author">Strategy of Security</span><span class="kg-bookmark-publisher">Cole Grolmus</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/10/Twitter-Card-1.png" alt="" onerror="this.style.display = 'none'"></div></a></figure>]]></content:encoded>
            <category>Startups</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Title_-2022-IPO-Pipeline---Part-2.png"/>
        </item>
        <item>
            <title><![CDATA[Cybersecurity's 2022 IPO Pipeline (Part 1)]]></title>
            <link>https://strategyofsecurity.com/cybersecuritys-2022-ipo-pipeline-part-1/</link>
            <guid>61e2f7f7061513003b85e703</guid>
            <pubDate>Mon, 17 Jan 2022 18:58:42 GMT</pubDate>
            <description><![CDATA[The first of a two part series projecting the industry's most likely IPO candidates for the upcoming year.]]></description>
            <content:encoded><![CDATA[<p>There could be more cybersecurity IPOs in 2022 than any previous year. Even with notable companies like SentinelOne, <a href="https://strategyofsecurity.com/p/forgerock-ipo/">ForgeRock</a>, and <a href="https://strategyofsecurity.com/p/hashicorps-ipo-bottom-up-adoption-and-layering/">HashiCorp</a> going public in 2021, the IPO pipeline is still full of stellar companies.</p>
<p>As I've previously written about, 2021 was <a href="https://strategyofsecurity.com/p/cybersecurity-is-going-public/">already a big year</a> for cybersecurity IPOs. Barring any significant macroeconomic changes, expect the momentum to continue this year.</p>
<p>I've divided up the analysis into a two part series. This week, we're going to take a look at the first six of twelve total cybersecurity companies that have the potential to go public in the upcoming year. We'll look at the remaining six companies next week.</p>
<p>Some are more likely than others. Regardless of timing, it's interesting to look at the up-and-coming companies that are going to become even more influential in the years to come.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Appgate.png" class="kg-image" alt="Appgate" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/01/Logo_-Appgate.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/01/Logo_-Appgate.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/01/Logo_-Appgate.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Appgate.png 1920w" sizes="(min-width: 720px) 720px"></figure><h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.appgate.com/?ref=content.strategyofsecurity.com">Appgate</a> is known as a Zero Trust company. Their products include networking (software-defined perimeter) and risk-based authentication — both of the core tenets for a Zero Trust Architecture (ZTA).</p>
<p>Their products have received good industry recognition. Appgate was recognized as a Leader by Forrester in both the <a href="https://ww3.appgate.com/Forrester-new-wave-ztna?ref=content.strategyofsecurity.com">The Forrester New Wave™ Zero Trust Network Access, Q3 2021</a> and <a href="https://ww3.appgate.com/forrester-wave-ztx/q3-2020?ref=content.strategyofsecurity.com">The Forrester Wave™ Zero Trust eXtended Ecosystem</a>, Q3 2020 reports.</p>
<p>Appgate is relatively new as a standalone company. It was originally the security business within Cyxtera Technologies, a global data center platform. Appgate and its products were <a href="https://www.cyxtera.com/about-us/press-releases/cyxtera-technologies-announces-spin-out-of-cybersecurity-business?ref=content.strategyofsecurity.com">spun off as a separate company</a> in November 2019.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Appgate fits broadly into both <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#network-security">Network Security</a> and <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#adaptive-authentication">Adaptive Authentication</a>. <em>Note: Admittedly, the categories related to Zero Trust could be better defined in the next iteration of the ecosystem mapping.</em></p>
<p>Their Software Defined Perimeter (SDP) product is relatively unique and fits nicely into an emerging category for Zero Trust networking.</p>
<p>Appgate's Risk-Based Authentication (RBA) product has a bit more competition. Larger authentication platforms like Okta, ForgeRock, and Ping Identity all have a well-defined set of adaptive authentication features within the product. Specific functionality varies, but making authentication and authorization decisions based on risk is a standard feature.</p>
<h5 id="how-much-money-have-they-raised">How much money have they raised?</h5>
<p>Appgate has raised an estimated $50 million, according to Momentum Cyber. The company's funding is not widely disclosed, in part because of their atypical path.</p>
<p>Since Appgate originated as a spinoff from an existing company, they didn't need a lot of outside capital to grow. The spinoff was done with the intention of filing for IPO within a relatively short period of time. As a result, the company didn't need additional funding before going public.</p>
<h5 id="what-is-their-most-recent-valuation">What is their most recent valuation?</h5>
<p>Appgate was valued at <a href="https://www.crn.com/news/security/security-firm-appgate-to-go-public-at-1b-valuation-via-merger?ref=content.strategyofsecurity.com">$1 billion</a> at the time of their reverse merger announcement in February 2021.</p>
<h5 id="have-they-stated-an-intention-to-go-public">Have they stated an intention to go public?</h5>
<p><em>Correction: Appgate officially became a public company as of October 2021 following their merger with Newtown Lane marketing. The transaction occurred via a reverse merger, not a SPAC. This section has been updated with revised details and timelines.</em></p>
<p>Appgate completed a reverse merger with the Newtown Lane Marketing company in October 2021, an important prerequisite step for uplisting to stock exchanges like Nasdaq or the New York Stock Exchange (NYSE). It's currently trading on the OTC Bulletin Board under the <a href="https://www.marketwatch.com/investing/stock/apgt?ref=content.strategyofsecurity.com">stock symbol APGT</a>.</p>
<p>Appgate's leadership <a href="https://www.appgate.com/news-press/appgate-a-leading-cybersecurity-company-founded-on-zero-trust-principles-closes-merger-with-newtown-lane-marketing?ref=content.strategyofsecurity.com">has been clear</a> about their intent to uplist — likely as soon as Q1:</p>
<blockquote>
<p>Appgate intends to seek to uplist to Nasdaq or the New York Stock Exchange as soon as possible following satisfaction of applicable listing requirements, which is expected to occur during the first quarter of 2022.</p>
</blockquote>
<p>Even though the company is already public, uplisting to Nasdaq or the NYSE is an important accomplishment.</p>
<h5 id="what-is-the-bull-case-for-an-ipo">What is the bull case for an IPO?</h5>
<p>This assessment from Barry Field, Appgate’s CEO, is pretty accurate:</p>
<blockquote>
<p>"The legacy methods of security, such as VPNs and firewalls, are no longer effective in keeping companies and networks secure. Today’s threat landscape is forcing executives to rethink how they secure their businesses, their data and their users. Grounded in the principles of Zero Trust, Appgate’s industry-recognized solutions are replacing outdated, easily compromised traditional network security."</p>
</blockquote>
<p>Zero Trust has lots of momentum right now. It makes sense for Appgate to capitalize on it since they're well positioned as a leader in the emerging space.</p>
<h5 id="what-is-the-bear-case-for-an-ipo">What is the bear case for an IPO?</h5>
<p>The bear case for Appgate is more long term. The hype cycle for Zero Trust could eventually fade. Then what?</p>
<p>Appgate's identity as a company is inextricably tied to Zero Trust. The association is working in their favor right now. If Zero Trust is a fad and not a movement, that spells trouble for a public company.</p>
<p>Additionally, reverse mergers and SPACs are relatively new concepts for cybersecurity. So far, companies that have gone public via SPAC haven't performed as well as traditional IPOs or direct listings. That could change as SPACs become more accepted within the industry and <a href="https://www.ndac.com/?ref=content.strategyofsecurity.com">firms like NightDragon</a> join the mix.</p>
<h5 id="what-is-the-most-likely-outcome">What is the most likely outcome?</h5>
<p>Appgate will go forward as planned to uplist in early 2022. Regulatory delays could push back the uplisting to later in the year, but it's almost certain they'll be trading on one of the two major U.S. exchanges this year.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-BigID.png" class="kg-image" alt="BigID" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/01/Logo_-BigID.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/01/Logo_-BigID.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/01/Logo_-BigID.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-BigID.png 1920w" sizes="(min-width: 720px) 720px"></figure><h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://bigid.com/?ref=content.strategyofsecurity.com">BigID</a> became famous for helping companies manage new data privacy regulations. When companies were scrambling to comply with new privacy regulations like GDPR and CCPA, BigID saved the day — especially with data discovery. Enterprises didn't know where all their sensitive data was, and BigID helped them find it.</p>
<p>The product is more of an end-to-end privacy and data governance platform now that the company has grown. It now has solutions for discovery, privacy management, data protection, and governance. The platform was highly rated in <a href="https://home.bigid.com/forrester-wave-2021?ref=content.strategyofsecurity.com">The Forrester Wave: Privacy Management Software, Q4 2021</a>.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>At its core, BigID is a <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#data-discovery-and-classification">Data Discovery and Classification</a> product. As noted earlier, it's become more of a platform spanning multiple areas of <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#privacy-and-data-protection">Privacy and Data Protection</a>.</p>
<h5 id="how-much-money-have-they-raised">How much money have they raised?</h5>
<p>According to <a href="https://techcrunch.com/2021/04/22/with-30m-extension-bigid-boosts-series-d-to-100m-at-1-25b-valuation/?ref=content.strategyofsecurity.com">TechCrunch</a>, BigID has raised over $200 million as of their last funding round in April 2021.</p>
<h5 id="what-is-their-most-recent-valuation">What is their most recent valuation?</h5>
<p>The same article set BigID's valuation at $1.25 billion based on the new round of funding.</p>
<h5 id="have-they-stated-an-intention-to-go-public">Have they stated an intention to go public?</h5>
<p>BigID hasn't said much yet about going public. Based on <a href="https://www.geektime.com/another-unicorn-is-born-bigid-lands-70m-but-doesnt-need-the-cash/?ref=content.strategyofsecurity.com">comments from co-founder Nimrod Vax</a> in December 2020, they appear content to take their time.</p>
<p>Vax explained how they didn't need capital but raised anyway because of the favorable terms:</p>
<blockquote>
<p>"BigID doesn’t need the cash and most of the capital has yet to be used. However, the offers we received were just too attractive to turn down, they allow us to accelerate growth and establish our leadership in both product and sales."</p>
</blockquote>
<p>With the current funding, their focus is on growth and product expansion rather than going public:</p>
<blockquote>
<p>"We continue to focus on customer growth in addition to our development and marketing processes. In the coming year, we are targeting the expansion of our service offering and customer variety. Solutions at scale for both small and large, for developers, and for small business units in enterprises."</p>
</blockquote>
<h5 id="what-is-the-bull-case-for-an-ipo">What is the bull case for an IPO?</h5>
<p>BigID has essentially won their segment of the market already. The main questions that remain are how much of the adjacent <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#privacy-and-data-protection">Privacy and Data Protection ecosystem</a> they can capture and exactly how big the company can get.</p>
<p>Better yet, data privacy regulations aren't going away. If anything, we'll see more of them in the next decade or sooner. That's exceptionally good news for BigID.</p>
<p>They've already done well enough to become a unicorn of IPO scale. With increased privacy regulations, they have a growth engine that can propel them into continued growth and success as a public company.</p>
<h5 id="what-is-the-bear-case-for-an-ipo">What is the bear case for an IPO?</h5>
<p>The best reason for BigID <em>not</em> to IPO isn't really a bear case — it's just old fashioned patience. They're doing well and, according to their co-founder, don't need the capital they recently raised.</p>
<p>This likely means they have everything they need to continue growing rapidly and further develop their products. They <em>could</em> IPO this year if they want to, but why rush if a later IPO would make them a more successful public company in the long run?</p>
<h5 id="what-is-the-most-likely-outcome">What is the most likely outcome?</h5>
<p>The most likely outcome this year is no IPO and continued focus on steady growth.</p>
<p>If the opportunity for growth and expansion merits additional fundraising, don't be surprised if BigID raises more money. Likewise, don't be surprised if they make acquisitions to expedite their growth.</p>
<p>This IPO seems more likely in 2023 or beyond, but it's something to keep an eye on.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Cybereason.png" class="kg-image" alt="Cybereason" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/01/Logo_-Cybereason.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/01/Logo_-Cybereason.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/01/Logo_-Cybereason.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Cybereason.png 1920w" sizes="(min-width: 720px) 720px"></figure><h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.cybereason.com/?ref=content.strategyofsecurity.com">Cybereason</a> is an Endpoint Detection and Response (EDR) platform that's making a move into the emerging eXtended Detection and Response (XDR) market. It's a brutal market because they're competing head on with fan favorites like CrowdStrike and SentinelOne.</p>
<p>Cybereason's platform hasn't done especially well in recent analyst ratings. It's ranked as a Visionary in Garner's latest Magic Quadrant for Endpoint Protection, well behind the Leaders category. Likewise, their XDR product is rated in the third tier as a Contender in The Forrester New Wave: Extended Detection And Response (XDR) Providers, Q4 2021.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Cybereason's platform fits squarely into the <a href="https://www.cybereason.com/?ref=content.strategyofsecurity.com">Endpoint Detection and Response (EDR)</a> market segment. They've also joined the fray in the emerging XDR segment.</p>
<h5 id="how-much-money-have-they-raised">How much money have they raised?</h5>
<p>The company has raised $713.6 million, per Crunchbase. Their most recent funding round was a <a href="https://techcrunch.com/2021/07/14/cybereason-raises-275m-at-series-f-adds-steven-mnuchin-to-board/?ref=content.strategyofsecurity.com">$275 million Series F</a> in July 2021.</p>
<h5 id="what-is-their-most-recent-valuation">What is their most recent valuation?</h5>
<p>Cybereason's valuation was reported to be $3.1 billion by TechCrunch and Crunchbase as of their last funding round.</p>
<h5 id="have-they-stated-an-intention-to-go-public">Have they stated an intention to go public?</h5>
<p>Lior Div, Cybereason's co-founder and CEO, has specifically targeted 2022 as their IPO year. From an <a href="https://www.geektime.com/israeli-cyber-startup-cybereason-raises-275m-at-3b-valuation/?ref=content.strategyofsecurity.com">interview in July 2021</a>:</p>
<blockquote>
<p>"We’re focusing on building a major company that secures the world’s biggest enterprises, and going public is a crucial milestone along the journey. We will aim for it in the coming year."</p>
</blockquote>
<h5 id="what-is-the-bull-case-for-an-ipo">What is the bull case for an IPO?</h5>
<p>The bull case for Cybereason is to take advantage of the high valuations of peers in the EDR market and grab their share. Companies in the EDR market have done exceptionally well in their IPOs. From my earlier <a href="https://strategyofsecurity.com/p/cybersecurity-is-going-public/">Cybersecurity is Going Public article</a>:</p>
<blockquote>
<p>SentinelOne became the <a href="https://www.cnbc.com/2021/06/30/sentinelone-soars-in-first-trade-as-highest-valued-cybersecurity-ipo.html?ref=content.strategyofsecurity.com">largest cybersecurity IPO</a> in history earlier in 2021. The company went public at a valuation of nearly $11 billion. A notable trend is that SentinalOne's IPO nearly doubled the previous mark — CrowdStrike set the previous record for largest cybersecurity IPO at a <a href="https://www.bizjournals.com/sanjose/news/2019/06/12/crowdstrike-ipo-crwd.html?page=all&ref=content.strategyofsecurity.com">$6.7 billion valuation</a> in 2019.</p>
</blockquote>
<p>Cybereason's revenue is relatively strong, reported at over $120 million (ARR) at the end of 2020. Assuming the usual high growth rate for cybersecurity companies at this stage, revenue is likely much higher now. If the timing, growth, and core metrics are all in place, why not go for it?</p>
<h5 id="what-is-the-bear-case-for-an-ipo">What is the bear case for an IPO?</h5>
<p>CrowdStrike and SentinelOne are two of the hottest companies in cybersecurity right now. They're direct competitors for Cybereason.</p>
<p>The market might not be ready yet for <em>another</em> publicly traded EDR company — especially given how much we heard about CrowdStrike and SentinelOne last year.</p>
<p>Even if they do IPO, they still have to perform if they're going to be successful as a public company. It's hard to live up to the standards of their competitors, but that's also a known issue — Cybereason has been competing in this market for a long time.</p>
<h5 id="what-is-the-most-likely-outcome">What is the most likely outcome?</h5>
<p>All the ingredients are in place for an IPO in 2022.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Exabeam.png" class="kg-image" alt="Exabeam" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/01/Logo_-Exabeam.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/01/Logo_-Exabeam.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/01/Logo_-Exabeam.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Exabeam.png 1920w" sizes="(min-width: 720px) 720px"></figure><h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.exabeam.com/?ref=content.strategyofsecurity.com">Exabeam</a> is a security operations company that has built a cloud analytics platform. They were made famous by their User Entity Behavior Analytics (UEBA) product and have since expanded into Security Information and Event Management (SIEM), and more.</p>
<p>Their SIEM product did exceptionally well in the <a href="https://www.exabeam.com/library/2021-gartner-magic-quadrant-for-siem/?ref=content.strategyofsecurity.com">2021 Gartner Magic Quadrant for SIEM</a>. It was the highest rated product in the Leaders category.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Exabeam has grown into a platform that maps most closely to <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#user-behavior-analytics-ubauser-entity-behavior-analytics-ueba">User Entity Behavior Analytics (UEBA)</a> and <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#security-information-and-event-management-siem">Security Information and Event Management (SIEM)</a>. They're also considered an <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#analytics">Analytics</a> product within the Security Operations domain.</p>
<h5 id="how-much-money-have-they-raised">How much money have they raised?</h5>
<p>The company has raised $390 million according to Crunchbase. Their latest round of funding was a <a href="https://techcrunch.com/2021/06/02/cybersecurity-unicorn-exabeam-raises-200m-to-fuel-secops-growth/?ref=content.strategyofsecurity.com">$200 million Series F</a> in June 2021.</p>
<h5 id="what-is-their-most-recent-valuation">What is their most recent valuation?</h5>
<p>Exabeam's valuation was $2.4 billion as of their latest funding in June 2021.</p>
<h5 id="have-they-stated-an-intention-to-go-public">Have they stated an intention to go public?</h5>
<p>Exabeam's new CEO, Michael DeCesare, talked generally about an IPO in a <a href="https://www.sdxcentral.com/articles/news/2-4b-valuation-shows-how-big-exabeam-can-be-ceo-decesare-says/2021/06/?ref=content.strategyofsecurity.com">June 2021 interview</a>:</p>
<blockquote>
<p>An IPO “is still on the table,” and DeCesare said he believes Exabeam “will be quite successful in the public market,” but it’s not a top priority.</p>
</blockquote>
<h5 id="what-is-the-bull-case-for-an-ipo">What is the bull case for an IPO?</h5>
<p>Exabeam's platform is strong in multiple product categories. The broader Security Operations ecosystem is critically important to cybersecurity. Exabeam is the leader of a new generation of analytics-focused tech in the space.</p>
<p>Like CrowdStrike, Exabeam wants to <a href="strategyofsecurity.com/crowdstrike-and-the-bundling-of-cybersecurity/">bundle cybersecurity</a>. From DeCesare:</p>
<blockquote>
<p>“We have a chance to be to cyber what ServiceNow is to the services market — the unification, the ability to create a CMDB and sit on top of your service system, your ticketing systems — that’s the real estate we occupy.”</p>
</blockquote>
<p>Being the ServiceNow of cybersecurity is a lofty but achievable goal in the long run. Having an exceptional analytics product is a strong foundation for expanding into other areas (unsurprisingly, XDR is a target for Exabeam). They have a good chance at becoming a very large and very successful company.</p>
<h5 id="what-is-the-bear-case-for-an-ipo">What is the bear case for an IPO?</h5>
<p>Similar to BigID, their biggest reason for holding off on an IPO might be time to further grow and mature.</p>
<p>Exabeam is a new entrant into the XDR market. Their XDR product wasn't yet included in Forrester's first New Wave for Extended Detection And Response (XDR) Providers report. That likely means the product was too new and incomplete to qualify for evaluation.</p>
<p>The biggest long term issue for Exabeam is the progress of the XDR market. If SIEM truly has lost and XDR is the way of the future, that could spell trouble for Exabeam. However, Exabeam isn't the legacy SIEM products of old. It's leading a new generation of SecOps analytics products. The company should be resilient enough to be valuable even if XDR does rise to prominence.</p>
<h5 id="what-is-the-most-likely-outcome">What is the most likely outcome?</h5>
<p>Like BigID, the most likely outcome seems to be patience. Don't expect an IPO until 2023 or beyond.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Illumio.png" class="kg-image" alt="Illumio" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/01/Logo_-Illumio.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/01/Logo_-Illumio.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/01/Logo_-Illumio.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Illumio.png 1920w" sizes="(min-width: 720px) 720px"></figure><h5 id="what-does-the-company-do">What does the company do?</h5>
<p><a href="https://www.illumio.com/?ref=content.strategyofsecurity.com">Illumio</a> is known for its Zero Trust networking and segmentation product. The company has been recognized as a leader in Zero Trust.</p>
<p>Honors include the top ranking in the Leader category by Forrester in <a href="https://www.illumio.com/lp/forrester-wave?ref=content.strategyofsecurity.com">The Forrester Wave: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020</a>.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Illumio's core product maps to the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#micro-segmentation">Micro-Segmentation category</a> within Cloud Security.</p>
<h5 id="how-much-money-have-they-raised">How much money have they raised?</h5>
<p>The company has raised over $550 million, according to TechCrunch. Their most recent round of funding was a <a href="https://techcrunch.com/2021/06/24/zero-trust-unicorn-illumio-closes-225m-series-f-led-by-thoma-brava/?ref=content.strategyofsecurity.com">$225 million Series F</a> in June 2021.</p>
<h5 id="what-is-their-most-recent-valuation">What is their most recent valuation?</h5>
<p>Illumio was valued at $2.75 billion as of their most recent funding round.</p>
<h5 id="have-they-stated-an-intention-to-go-public">Have they stated an intention to go public?</h5>
<p>Founder Andrew Rubin has broadly stated an IPO is the plan but hasn't provided specific details about when. From <a href="https://techcrunch.com/2021/06/24/zero-trust-unicorn-illumio-closes-225m-series-f-led-by-thoma-brava/?ref=content.strategyofsecurity.com">TechCrunch</a>:</p>
<blockquote>
<p>"If we do our job right, and if we make our customers successful, I’d like to think that would be part of our journey."</p>
</blockquote>
<h5 id="what-is-the-bull-case-for-an-ipo">What is the bull case for an IPO?</h5>
<p>Zero Trust is a big movement, and Illumio is <a href="https://www.illumio.com/lp/forrester-wave?ref=content.strategyofsecurity.com">recognized as a leader</a> by Forrester. That's impressive because they're rated ahead of much larger competitors, including multiple public companies.</p>
<p>The current valuation is high and momentum is on their side. Appgate is almost definitely going public. Their IPO could provide confidence for Illumio to move forward this year if all goes well.</p>
<h5 id="what-is-the-bear-case-for-an-ipo">What is the bear case for an IPO?</h5>
<p>Like its Zero Trust peer Appgate, Illumio's fate is tied to the rise or fall of Zero Trust. If Zero Trust falls out of favor with industry practitioners, Illumio may not have enough other options to fall back on.</p>
<p>Illumio is well known for its Illumio Core product. Currently, the company has two other products: one for cloud security, and one for endpoint security. Both are tough and competitive markets. Additional traction in these markets, along with further product diversification, might be needed before an IPO is practical.</p>
<h5 id="what-is-the-most-likely-outcome">What is the most likely outcome?</h5>
<p>It's a tough call. The more probable outcome seems to be staying private for another year. However, if the economy remains stable and other cybersecurity IPOs go well, don't be surprised to see Illumio go public in 2022.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Lacework.png" class="kg-image" alt="Lacework" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2022/01/Logo_-Lacework.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2022/01/Logo_-Lacework.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2022/01/Logo_-Lacework.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Logo_-Lacework.png 1920w" sizes="(min-width: 720px) 720px"></figure><h5 id="what-does-the-company-do">What does the company do?</h5>
<p>Lacework has built a comprehensive cloud security platform. The platform has a broad set of modules spanning cloud configuration management, policy compliance, workload protection, threat detection and response, and more.</p>
<p>Analyst ratings are a moving target in cloud security, so it's difficult to benchmark Lacemark that way. Anecdotally, they were named a <a href="https://www.lacework.com/blog/gartner-cool-vendor-in-cloud-security-and-cwpp/?ref=content.strategyofsecurity.com">2018 Gartner Cool Vendor in Cloud Security</a> by Gartner shortly after the company was founded.</p>
<h5 id="where-do-they-fit-into-the-cybersecurity-ecosystem">Where do they fit into the cybersecurity ecosystem?</h5>
<p>Lacework's platform fits broadly into the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#cloud-security">Cloud Security domain</a> with functionality in both Container and Workload Protection and Management and Compliance.</p>
<h5 id="how-much-money-have-they-raised">How much money have they raised?</h5>
<p>The company has raised $1.9 billion, according to Crunchbase. Their <a href="https://www.lacework.com/press-release/lacework-closes-seriesD-funding-round/?ref=content.strategyofsecurity.com">$1.3 billion Series D</a> in November 2021 was the largest funding round in the history of cybersecurity.</p>
<p>On one hand, raising the largest funding round ever is eye opening. On the other hand, $1.3 billion is <em>a lot</em> to raise at one time. That's more than some public companies have raised in total. For example, CrowdStrike (only?!) raised <a href="https://www.crunchbase.com/organization/crowdstrike/company_financials?ref=content.strategyofsecurity.com">$481M in funding over seven rounds</a> before its IPO.</p>
<h5 id="what-is-their-most-recent-valuation">What is their most recent valuation?</h5>
<p>Lacework was valued at a somewhat astonishing $8.3 billion as of their most recent funding round.</p>
<h5 id="have-they-stated-an-intention-to-go-public">Have they stated an intention to go public?</h5>
<p>Lacework co-CEO David Hatfield spoke broadly about an IPO with no specific timeline in an <a href="https://www.reuters.com/technology/cloud-security-startup-lacework-valued-83-bln-after-mammoth-funding-round-2021-11-18/?ref=content.strategyofsecurity.com">interview with Reuters</a>:</p>
<blockquote>
<p>"There are a lot of different options for companies like ours, (including) a direct listing or an IPO, and we are considering those options, but nothing actively."</p>
</blockquote>
<h5 id="what-is-the-bull-case-for-an-ipo">What is the bull case for an IPO?</h5>
<p>The fact that Lacework raised the largest amount of funding ever for a cybersecurity company is an important signal. Since we don't know the full details of their growth, revenue, and overall financials, we can only speculate that investors loved what they saw.</p>
<p>The bull case for Lacework is best summarized by this quote from Franklin Templeton Vice President <a href="https://www.cmswire.com/customer-experience/lacework-raises-83-billion-in-growth-funding/?ref=content.strategyofsecurity.com">Matt Cioppa</a>:</p>
<blockquote>
<p>"Lacework has built something that's powerful and unique, positioning it to be one of this generation's most important cybersecurity companies."</p>
</blockquote>
<p>The potential to become one of the most important cybersecurity companies is praise that shouldn't be taken lightly. Especially given how important companies in this generation actually are.</p>
<h5 id="what-is-the-bear-case-for-an-ipo">What is the bear case for an IPO?</h5>
<p>Headlines are great, but there's also risk that comes with raising such a large amount of funding at a high valuation. Expectations are high, and Lacework has to keep performing.</p>
<p>There isn't much of a bear case, though. As the Momentum Cyber team put it, "public markets today are focused on growth." As long as Lacework continues to grow, they will do just fine as a public company.</p>
<h5 id="what-is-the-most-likely-outcome">What is the most likely outcome?</h5>
<p>An IPO this year seems inevitable. They likely don't <em>need</em> to go public given the amount of capital they raised. However, their momentum and valuation are both great. It almost seems silly not to IPO when everything is in their favor.</p>
<h2 id="next-week-part-2">Next Week: Part 2</h2>
<p>Next week, we'll finish looking at the remainder of the cybersecurity IPO pipeline for 2022. The upcoming list includes Netskope, Pindrop, Qomplx, Snyk, Tanium, and Transmit Security.</p>
<p>If you're curious about other companies or know of any that should be on this list, don't hesitate to send an email or <a href="https://twitter.com/colegrolmus?ref=content.strategyofsecurity.com">DM me on Twitter</a>.</p>
]]></content:encoded>
            <category>Startups</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Title_-2022-IPO-Pipeline---Part-1.png"/>
        </item>
        <item>
            <title><![CDATA[Product Hunt: 2021 Cybersecurity and Privacy Launches]]></title>
            <link>https://strategyofsecurity.com/product-hunt-2021-cybersecurity-and-privacy-launches/</link>
            <guid>61d3c48894df3b0048b5395e</guid>
            <pubDate>Mon, 10 Jan 2022 13:05:00 GMT</pubDate>
            <description><![CDATA[Reviewing the most interesting cybersecurity and privacy launches on Product Hunt in 2021.]]></description>
            <content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>For me, nothing beats the excitement of an early stage cybersecurity company with a promising product and vision. Unless we all turn into technophobes, tech is the best hope we have for keeping ourselves and our companies secure. People don't scale. We <a href="https://strategyofsecurity.com/p/tessian-and-cybersecuritys-journey-towards-augmented-humanity/">need tools</a> to help us.</p>
<p>A fun way to find the freshest products anywhere in tech is <a href="https://www.producthunt.com/?ref=content.strategyofsecurity.com">Product Hunt</a>. It's the place where the world's best products pick up the megaphone and announce themselves to a huge audience of early adopters.</p>
<p>Cybersecurity and privacy products launch on Product Hunt almost every week. Some launch with tons of fanfare and upvotes. Other enterprise-focused or highly technical products sometimes attract less interest, even with an incredible product. Let's face it — a cool NFT project is going to get a lot more hype these days than a product that solves an important but mundane security problem.</p>
<p>That's why we're here: to uncover the most interesting cybersecurity and privacy Product Hunt launches from 2021. Upvotes aside, the best way to find products is to look at them through the eyes of a practitioner and pull out the ones that look interesting.</p>
<p>I left out a few that I've covered before in my article about <a href="https://strategyofsecurity.com/p/yc-s21-cybersecurity-startups/">Y Combinator's Summer 2021 batch</a>. The rest are companies that I'm covering for the first time, and hopefully more as they grow into the cybersecurity companies of the future.</p>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h2 id="identity-verification-for-any-use-case-with-persona">Identity verification for any use case with Persona</h2>
<p>Persona was one of the most high profile cybersecurity product launches during the year. Launched by Figma CEO <a href="https://twitter.com/zoink?ref=content.strategyofsecurity.com">Dylan Field</a>, Persona was the <a href="https://www.producthunt.com/posts/persona-4648353c-de35-49cb-93ba-7cb8f382e1d3?ref=content.strategyofsecurity.com">#1 Product of the Week</a> in February 2021.</p>
<p>Persona is an API-first identity verification platform with configurable workflows for any use case. There are many identity verification products on the market already. However, Persona has grown quickly because of its extensibility.</p>
<p>Modern products bend industry norms in ways that are hard to predict. That means there isn't a one best way to verify customer identities. Instead, people need building blocks that can be assembled as needed to create a process that works for them. That's exactly what Persona does, in a developer-friendly way.</p>
<p>The company was founded in 2018 and has already <a href="https://withpersona.com/blog/series-c?ref=content.strategyofsecurity.com">raised a Series C</a> at a $1.5 billion valuation. With an all-star list of customers that includes the likes of Square, Postmates, AngelList, Sonder, and more, Persona is a company to watch and a good direction for your identity verification needs.</p>
<!--kg-card-end: markdown--><!--kg-card-begin: html--><iframe style="border: none;" src="https://cards.producthunt.com/cards/posts/282907?v=1" width="500" height="405" frameborder="0" scrolling="no" allowfullscreen></iframe>&nbsp;<!--kg-card-end: html--><!--kg-card-begin: markdown--><h2 id="see-and-remove-your-personal-data-from-the-internet-with-optery-removaly-and-rita">See and remove your personal data from the internet with Optery, Removaly, and Rita</h2>
<p>Wittingly or unwittingly, most people have been spending years sharing their personal data online. We're nearing a time of reckoning. The public is more informed than ever about the potential risk and abuse of personal data collection. In lieu of constructive regulation, people need the tools to take matters into their own hands.</p>
<p>Three companies launched on Product Hunt in 2021 to solve this exact problem.</p>
<p><a href="https://www.optery.com/?ref=content.strategyofsecurity.com">Optery</a> is a Y Combinator backed startup that helps people see and remove private information held by data brokers. Optery checks over 170 services that range from legitimate to shady. Reviews were glowing.</p>
<p><a href="https://removaly.com/?ref=content.strategyofsecurity.com">Removaly</a> is a similar service that's bootstrapped by two founders. The product also received over 1,000 upvotes.</p>
<p><a href="https://ritapersonaldata.com/?ref=content.strategyofsecurity.com">Rita</a> is a mobile app for collecting, viewing and controlling your data from other apps. Their approach is relatively similar; however, Rita's focus is on apps instead of data brokers. It's complimentary to Optery and Removaly. Their <a href="https://www.producthunt.com/posts/rita-personal-data?ref=content.strategyofsecurity.com">Product Hunt launch</a> was highly successful and earned them the #1 ranking for the week of March 24, 2021.</p>
<p>Sadly, <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#consumer-liberty">consumer liberty</a> is still a nascent category within the larger cybersecurity ecosystem. It's encouraging to see multiple companies have success on Product Hunt — perhaps a sign of continued progress in the years to come.</p>
<!--kg-card-end: markdown--><!--kg-card-begin: html--><iframe style="border: none;" src="https://cards.producthunt.com/cards/posts/305970?v=1" width="500" height="405" frameborder="0" scrolling="no" allowfullscreen></iframe>&nbsp;<!--kg-card-end: html--><!--kg-card-begin: html--><iframe style="border: none;" src="https://cards.producthunt.com/cards/posts/307328?v=1" width="500" height="405" frameborder="0" scrolling="no" allowfullscreen></iframe>&nbsp;<!--kg-card-end: html--><!--kg-card-begin: html--><iframe style="border: none;" src="https://cards.producthunt.com/cards/posts/288946?v=1" width="500" height="405" frameborder="0" scrolling="no" allowfullscreen></iframe>&nbsp;<!--kg-card-end: html--><!--kg-card-begin: markdown--><h2 id="automate-your-compliance-programs-with-drata-and-vanta">Automate your compliance programs with Drata and Vanta</h2>
<p>Companies have been trying to automate the drudgery of compliance for over a decade with limited success. Most compliance programs today are a combination of one-off scripts, reports, and manual processes.</p>
<p>Weeks of effort go into building and maintaining these programs, all for an audited report or certificate provided by an independent party. This slog has been the norm for years — until the likes of <a href="https://drata.com/?ref=content.strategyofsecurity.com">Drata</a>, <a href="https://www.vanta.com/?ref=content.strategyofsecurity.com">Vanta</a> and more came along.</p>
<p>Although Drata and Vanta were founded in 2020 and 2017, respectively, <a href="https://www.producthunt.com/posts/drata?ref=content.strategyofsecurity.com">both</a> <a href="https://www.producthunt.com/posts/vanta?ref=content.strategyofsecurity.com">companies</a> officially launched on Product Hunt in 2021. Both launches were successful, in part because the companies were able to build solid products with demonstrated results before launching.</p>
<p>I have been giddy about modern products for compliance automation and management for years. Products like Drata and Vanta are starting to make dreams of smooth, painless compliance into reality. This is an interesting category within the <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/#compliance-automation">cybersecurity ecosystem</a> that I plan to cover in much more depth soon.</p>
<!--kg-card-end: markdown--><!--kg-card-begin: html--><iframe style="border: none;" src="https://cards.producthunt.com/cards/posts/280605?v=1" width="500" height="405" frameborder="0" scrolling="no" allowfullscreen></iframe>&nbsp;<!--kg-card-end: html--><!--kg-card-begin: html--><iframe style="border: none;" src="https://cards.producthunt.com/cards/posts/294350?v=1" width="500" height="405" frameborder="0" scrolling="no" allowfullscreen></iframe>&nbsp;<!--kg-card-end: html--><!--kg-card-begin: markdown--><h2 id="share-your-security-program-with-trustpage-and-safebase">Share your security program with Trustpage and SafeBase</h2>
<p>The next logical step after automating compliance programs is sharing your results with customers and partners. Products like <a href="https://trustpage.com/?ref=content.strategyofsecurity.com">Trustpage</a> and <a href="https://safebase.io/?ref=content.strategyofsecurity.com">SafeBase</a> make it easier to centralize and share details about your security program.</p>
<p>You can think of products like this similar to availability and uptime products like <a href="https://www.atlassian.com/software/statuspage?ref=content.strategyofsecurity.com">Statuspage</a>. Companies publish their availability metrics and outage notices so customers have a reliable and presentable place to see this data.</p>
<p>It's the same idea for Trustpage and SafeBase. Customers can visit a single place to view information about security, privacy, and compliance — some of which is kept up to date automatically with status published in real-time.</p>
<p>These products aren't meant to replace a detailed security report like a SOC 2, nor are they competitors to compliance automation products like Drata and Vanta. Their goal is to centralize information and communications about security.</p>
<p>This level of transparency and accountability is a big step forward. Security and trust are expected from modern companies using modern products. There is a lot of trust to be gained by being forthcoming and open about both successful efforts in building security programs and areas for improvement or non-compliance.</p>
<p>If you're ready to take that step and lead the way for the future of trust and transparency, Trustpage and SafeBase are for you.</p>
<!--kg-card-end: markdown--><!--kg-card-begin: html--><iframe style="border: none;" src="https://cards.producthunt.com/cards/posts/300563?v=1" width="500" height="405" frameborder="0" scrolling="no" allowfullscreen></iframe>&nbsp;<!--kg-card-end: html--><!--kg-card-begin: html--><iframe style="border: none;" src="https://cards.producthunt.com/cards/posts/313305?v=1" width="500" height="405" frameborder="0" scrolling="no" allowfullscreen></iframe>&nbsp;<!--kg-card-end: html--><!--kg-card-begin: markdown--><h2 id="keep-up-to-date-with-the-newest-launches">Keep up to date with the newest launches</h2>
<p>If finding new products and being an early adopter is your thing, there are a few useful ways to cut straight to the cybersecurity and privacy products on Product Hunt.</p>
<p>First, you can follow specific topics and see a feed of all the product launches related to that topic. The most relevant Product Hunt topic for us is Privacy. <a href="https://www.producthunt.com/topics/privacy?ref=content.strategyofsecurity.com#order=by-date">This link</a> will take you directly to the Privacy topic, sorted by date (most recent first). From there, you can follow the topic if you'd like to stay up to date.</p>
<p>Next, you can search for specific words within a time duration. For example, <a href="https://www.producthunt.com/search?q=security&postedDate=12%3Amonths&ref=content.strategyofsecurity.com">this search</a> returns all products containing the word &quot;security&quot; within the past 12 months. Search has a little more noise than you'd find in a topic, but it's helpful since privacy is the only security-related topic that's formally defined.</p>
<p>Finally, you can follow my <a href="https://www.producthunt.com/@colegrolmus?ref=content.strategyofsecurity.com">Product Hunt profile</a> to see any products I upvote or hunt. I started a <a href="https://www.producthunt.com/@colegrolmus/collections/cybersecurity-and-privacy-products-2022?ref=content.strategyofsecurity.com">collection</a> of cybersecurity and privacy products launched this year, which you can also follow as I build it in real time.</p>
<!--kg-card-end: markdown-->]]></content:encoded>
            <category>Startups</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/Title_-Product-Hunt-2021-Launches.png"/>
        </item>
        <item>
            <title><![CDATA[Rhetoric, Reality, and Riots]]></title>
            <link>https://strategyofsecurity.com/rhetoric-reality-and-riots/</link>
            <guid>61d267e494df3b0048b538fc</guid>
            <pubDate>Mon, 03 Jan 2022 13:05:00 GMT</pubDate>
            <description><![CDATA[Exploring the Online Disinhibition Effect and the January 6, 2021 attack on the U.S. Capitol.]]></description>
            <content:encoded><![CDATA[
<!--kg-card-begin: html-->
<div class="alert">
<strong>Politics:</strong> This article discusses a sensitive political topic. I have tried to moderate the sensitivity and present an objective discussion. If you're tired of reading about politics, you may want to sit this one out.
</div>
<!--kg-card-end: html-->

<!--kg-card-begin: html-->
<div class="alert">
<strong>Spoiler Alert:</strong> This article uses examples that reveal key story plots from Ready Player One and Q: Into the Storm.
</div>
<!--kg-card-end: html-->
<p>Since the United States Capitol attack one year ago, I still find myself repeatedly asking <em>"what the (stars) happened?"</em></p>
<p>Watching the events of that fateful January 6th day unfold felt surreal. I've visited the U.S. Capitol multiple times and have vivid memories of the peaceful and functioning democratic institution. I never would have expected it to be attacked by American citizens.</p>
<p>After more time to reflect, better questions emerged:</p>
<ul>
<li>
<p>What causes thousands of people within a shared set of beliefs to commit violent actions?</p>
</li>
<li>
<p>Why do online discussions and threats turn into real world damage?</p>
</li>
</ul>
<p>One year later, I feel like I'm starting to understand the causes and underlying trends that led to this and other events, both before and after January 6th, 2021.</p>
<p>An unlikely combination of anecdotes help explain what's happening:</p>
<ul>
<li>
<p>John Suler's scholarly article about the <a href="http://users.rider.edu/~suler/psycyber/disinhibit.html?ref=content.strategyofsecurity.com">Online Disinhibition Effect</a>. To the extent an academic paper can explain a set of real world events, this is it.</p>
</li>
<li>
<p>Cullen Hoback's documentary, <a href="https://en.wikipedia.org/wiki/Q_Into_the_Storm?ref=content.strategyofsecurity.com">Q: Into the Storm</a>, an HBO mini-series about the QAnon conspiracy theory.</p>
</li>
<li>
<p>Steven Spielberg's rendition of <a href="https://www.imdb.com/title/tt1677720/?ref=content.strategyofsecurity.com">Ready Player One</a>, a science fiction movie based on the book by Ernest Cline.</p>
</li>
</ul>
<p>John Suler published his article about the Online Disinhibition Effect in 2004, just as the popularity of social networks was beginning to rise. This research is more relevant than ever today.</p>
<p>It's particularly relevant when applied to specific examples — for this article, the ones noted above. In these three examples, there are clear cases where disinhibition reached a high level and carried over from the internet into the real world.</p>
<p>Suler's research describes the specific factors that cause online disinhibition and result in people carrying out acts online that they may not have in the real world. Ultimately, the cause comes down to a disconnect between our online and offline behavior. The behavior can cross over in increasingly harmful ways as the lines between the real world and the metaverse get blurred.</p>
<p>Studying the Online Disinhibition Effect also helps us understand how its factors could lead to similar events in the future. Technology's impact on socio-political matters is here to stay. It's better to treat events like the U.S. Capitol attacks as a pattern of behavior that's capable of reoccurring in different forms, not as an extraordinary one-off event.</p>
<h2 id="defining-inhibitions-and-disinhibitions">Defining Inhibitions and Disinhibitions</h2>
<p>First, a quick explainer on the meaning of inhibitions and disinhibitions. They're certainly not words I use every day, but the meaning of the words is critically important to understanding the effects they cause.</p>
<p>In psychology terms, an inhibition is <em>"a voluntary or involuntary restraint on the direct expression of an instinct."</em> Inhibitions are useful on a practical basis: they stop us from acting upon anything and everything that crosses our mind.</p>
<p>Have you ever been on a phone call and became so frustrated you wanted to smash your phone into the ground? I'd guess you have, or at least have experienced something similar. Even though you thought about breaking your phone, did you? Probably not. That's inhibition.</p>
<p>Disinhibition is simply the opposite: losing our ability to restrain the direct expression of an instinct. A society with little or no inhibitions would be chaos — like a bad game of The Sims or Grand Theft Auto.</p>
<p>The real world is a delicate balance of inhibitions and disinhibitions. We all act upon our instincts some of the time, but most of us have enough restraint for society to function.</p>
<h2 id="how-the-online-disinhibition-effect-happens">How the Online Disinhibition Effect Happens</h2>
<p>John Suler's research on the Online Disinhibition Effect describes six specific factors. The combination of these factors determines a person's reaction to any online event. Depending on the severity, some reactions can cross over into the real world.</p>
<p>To understand each factor, we'll walk through them one by one with anecdotes from the case studies.</p>
<h4 id="you-dont-know-me">You Don't Know Me</h4>
<p>Anonymity, whether perceived or intentional, can be used to justify unethical or unlawful actions. As Suler describes:</p>
<blockquote>
<p>...anonymity works wonders for the disinhibition effect... Whatever they say or do can't be directly linked to the rest of their lives. They don't have to own their behavior...</p>
</blockquote>
<p>Anonymity was an essential feature of the OASIS in <em>Ready Player One</em>. Parzival describes it in the book:</p>
<blockquote>
<p>People rarely used their real names online. Anonymity was one of the major perks of the OASIS. Inside the simulation, no one knew who you really were, unless you wanted them to. Much of the OASIS’s populaity and culture were built around this fact.</p>
</blockquote>
<p>As portrayed in <em>Q: Into the Storm</em>, anonymity was also a major factor in the QAnon movement. 8chan founder Fredrick Brennan literally referred to users on the message board as "anons." Q himself was an anonymous pseudonym that still isn't definitively known today.</p>
<p>In the case of the U.S. Capitol attacks, most people in the crowd didn't know each other by name. No pre-registration, purchasing, or screening was required for the events. If you felt passionately enough about the cause, you could just show up. Anonymity is a feature of unorganized or semi-organized events.</p>
<p>Rioters didn't anticipate becoming known or identified by people on the internet combing through pictures and videos of the event. As the post-event investigations made clear, people weren't actually as anonymous as they thought. Things get interesting, and often go wrong, when anonymity is lost.</p>
<p>The main objective for Cullen Hoback in <em>Q: Into the Storm</em> is to discover and reveal the identity of Q. Even though his investigation produced no definitive answer, the implication of Ron Watkins as Q (based on his own comments) was enough to effectively <a href="https://www.cnet.com/news/qanon-faq-its-been-a-year-since-qs-last-drop-but-people-still-believe/?ref=content.strategyofsecurity.com">end the conspiracy</a>:</p>
<blockquote>
<p>The last Q drop was on Dec. 8, 2020, and consisted of a YouTube link to a pro-Trump video featuring the song We're Not Gonna Take It from '80s heavy metal band Twisted Sister.</p>
</blockquote>
<p>Ironically, the "We're Not Gonna Take It" post is likely a direct reference to a scene from <em>Ready Player One</em>. The song is playing in the background after Parzival broadcasts a message to the entire OASIS summoning people to help him fight ICI, just as Q (potentially) summoned people to storm the Capitol.</p>
<p>In <em>Ready Player One</em>, Parzival reveals his identity despite warnings from Art3mis:</p>
<blockquote>
<p>Parzival: I want to know your real name. My name is Wade.<br>
<br>
Art3mis: What?<br>
<br>
Parzival: I said my name...<br>
<br>
Art3mis: Stop! You crazy? You don't tell anyone who you are. You can't use your real name.<br>
<br>
Parzival: You're not just anyone.<br>
<br>
Art3mis: You don't know me. You don't know anything about me. We've never met.</p>
</blockquote>
<p>This discussion resulted in the evil ICI corporation tracing Parzival's identity and attacking him and his family in the real world. Anonymity was lost, and it had real world consequences.</p>
<p>In the U.S. Capitol attacks, some members of the mob dressed in normal clothes and made no effort to conceal their face. They perceived a period of anonymity within the crowd at the time of the event, or they simply didn't care. Being part of the crowd was enough anonymity for disassociation. It wasn't until later, when high resolution photos and video were released and analyzed, that anonymity was lost and real identities were uncovered.</p>
<p>Other members of the mob made intentional efforts to remain anonymous. They wore clothing and face coverings that further concealed their identities. Even then, it was hard to fully maintain anonymity. Their choice of clothing, patches, and other symbols still gave away valuable information that could be used for identification. Many people <a href="https://twitter.com/jsrailton/status/1348384738671779847?s=20&ref=content.strategyofsecurity.com">learned this lesson</a> the hard way at the hands of John Scott-Railton and other OSINT researchers.</p>
<h4 id="you-cant-see-me">You Can't See Me</h4>
<p>The perception of invisibility is closely related to anonymity. As Suler describes:</p>
<blockquote>
<p>Invisibility gives people the courage to go places and do things that they otherwise wouldn't...Even with everyone's identity visible, the opportunity to be physically invisible amplifies the disinhibition effect.</p>
</blockquote>
<p>You know...things like attacking the U.S. Capitol building. In a large enough crowd, it's easy to feel invisible. The crowd gave the rioters a false sense of invisibility and made them take actions they likely wouldn't have done alone.</p>
<p>In <em>Ready Player One</em>, Parzival describes the motivation behind playing the game:</p>
<blockquote>
<p>People come to the OASIS for all the things they can do, but they stay for all the things they can be.</p>
</blockquote>
<p>That's the power of invisibility. When people become disinhibited enough to feel invisible, their impulses run wild with ideas about what they could be.</p>
<p>In one specific example, Aech cautions Parzival about the uncertainty caused by invisibility and the need to be cautious:</p>
<blockquote>
<p>Aech: [Discussing Parzival's upcoming date with Art3mis] Z, you gotta be more careful about who you meet out on the OASIS.<br>
<br>
Parzival: Aech, Art3mis gets me. She'll get my outfit, there's just this connection. I mean, sometimes, we even...<br>
<br>
Aech: Finish each other's sentences.<br>
<br>
Parzival: Yeah!<br>
<br>
Aech: We have that, me and you.<br>
<br>
Parzival: Yeah, I know. But that's because we're best friends, dude.<br>
<br>
[Puts hand up for a high-five]<br>
<br>
Aech: She could be a dude too, dude.<br>
<br>
Parzival: Nah, come on.<br>
<br>
Aech: I'm serious. She could actually be a 300 pound dude who lives in his momma's basement in suburban Detroit. And her name is Chuck.<br>
<br>
[Puts hand on Parzival's shoulder]<br>
<br>
Aech: Think about that.</p>
</blockquote>
<p>Invisibility starts to lose its power when people become physically visible, or when acting in the physical world as individuals or part of a small group.</p>
<p>A quick thought exercise: how many of the U.S. Capitol attack participants would have taken similar actions individually as lone individuals or small groups? Many fewer, and perhaps none. The perception of invisibility granted by the large crowd gave people the courage to go places and do things they otherwise wouldn't.</p>
<h4 id="see-you-later">See You Later</h4>
<p>Negative actions can become more severe when disinhibitions are disconnected from real world feedback:</p>
<blockquote>
<p>Not having to deal with someone's immediate reaction can be disinhibiting.</p>
</blockquote>
<p>Without the nonverbal feedback provided in the physical world, people become detached from the harm their actions are causing:</p>
<blockquote>
<p>Immediate, real-time feedback from others tends to have a very powerful effect on the ongoing flow of how much people reveal about themselves.</p>
</blockquote>
<p>This can result in outbursts of negative behavior without feeling any repercussions:</p>
<blockquote>
<p>In some cases, as Kali Munro, an online psychotherapist, aptly describes it, the person may be participating in an "emotional hit and run."</p>
</blockquote>
<p>In the U.S. Capitol attack, people who participated didn't experience real-time feedback from others about their actions. Many people expressed little remorse and justified their actions on social media immediately following the attack. The collective disdain of the nation didn't become clear until the hours and days that followed.</p>
<p>Days later, apologies and claims of <a href="https://abcnews.go.com/US/video-shows-retired-navy-seal-boasting-breaching-capitol/story?id=75206495&ref=content.strategyofsecurity.com">"I'm not a terrorist"</a> or "this isn't me" emerged. Attackers saw the overwhelming amount of negative feedback. Some regained their inhibition and faced the consequences of their actions.</p>
<h4 id="its-all-in-my-head">It's All in My Head</h4>
<p>Radicalized rhetoric and conversation can (quite literally) take over a person's mind:</p>
<blockquote>
<p>Reading another person's message might be experienced as a voice within one's head, as if that person magically has been inserted or "introjected" into one's psyche.</p>
</blockquote>
<p>Inhibitions are free to roam inside a person's mind, including those planted by others:</p>
<blockquote>
<p>In their imagination, where it's safe, people feel free to say and do all sorts of things that they wouldn't in reality.</p>
</blockquote>
<p>Over time, continuous rhetoric and radicalization from prominent figures in the community deeply aligns with the minds and belief systems of their followers. If you already hold shared values, the rhetoric you hear reinforces and amplifies the image you have in your imagination.</p>
<p>This led people to say all sorts of things online that they wouldn't (or would be less likely to) say in reality. In the U.S. Capitol attacks, a father and sales professional went from owning a few guns, to making threats of violence online, to physically joining the attack, and eventually died participating. He was <a href="https://twitter.com/benkesslen/status/1347278424226803713?ref=content.strategyofsecurity.com">described by his family</a> as "a wonderful father and husband who loved life" — clearly a different view from his actions. This is disinhibition at work.</p>
<p>In <em>Q: Into the Storm</em>, Hobart's interviews depict the introjection of Q's ideas into the psyche of QAnon followers. The interesting twist in the QAnon story is how Q's cryptic drops were interpreted and spread by prominent followers. Interpreting drops was literally a full-time job — multiple followers built influence solely from interpreting Q's messages. This two-dimensional effect created all sorts of wild propaganda and real world consequences.</p>
<p><em>Ready Player One</em> is a more innocent example. Parzival studies the image and media produced by Art3mis, building a specific image of her in his mind. His perception reaches a point where he proclaims his love for her:</p>
<blockquote>
<p>Art3mis: You don't know anything about me.<br>
<br>
We've never met.<br>
<br>
Parzival: I do know you, Arty.<br>
<br>
I'm in love with you.<br>
<br>
...<br>
<br>
Parzival: Did you hear what I said?<br>
<br>
I said I'm in love with you.<br>
<br>
Art3mis: No.<br>
<br>
You're not.<br>
<br>
You know what I want you to know.<br>
<br>
You only see what I want you to see.<br>
<br>
That's what you're in love with!</p>
</blockquote>
<p>Art3mis's reaction explains the disinhibition Parzival was experiencing. She crafted an image that was highly curated — one that only portrayed what she wanted the world to know and see. Her specifically crafted image was introjected into Parzival's mind.</p>
<h4 id="its-just-a-game">It's Just a Game</h4>
<p>Behaving inappropriately is easier to do when a person sees their actions as a game:</p>
<blockquote>
<p>...one's online persona along with the online others live in an make-believe dimension, a dream world, separate and apart from the demands and responsibilities of the real world.</p>
</blockquote>
<p>When viewed as a game, people can perceive that the rules of society don't apply:</p>
<blockquote>
<p>"Emily Finch...has suggested that some people see their online life as a kind of game with rules and norms that don't apply to everyday living."</p>
</blockquote>
<p>In <em>Ready Player One</em>, Parzival summarizes the motivation behind playing the game:</p>
<blockquote>
<p>...after people stopped trying to fix problems and just tried to outlive them... These days, reality is a bummer. Everyone is looking for a way to escape. That's why Halliday was such a hero to us. He showed us that we could go somewhere without going anywhere at all.</p>
</blockquote>
<p>The OASIS was an escape — an opportunity for people to create an online persona and play it out in a make-believe dimension away from real world responsibilities.</p>
<p>In <em>Q: Into the Storm</em>, Fredrick Brennan revolts against Jim and Ron Watkins, causing a wild reaction among everyone involved. Brennan went on the offensive on Twitter and during media appearances. The Watkins countered with lawsuits.</p>
<p>When interviewed, Brennan observed that his actions on 8chan had felt detached from the real world for several years. It was only after facing jail time in the Philippines and barely escaping that he felt the consequences of his actions.</p>
<p>Intentionally or unintentionally, many people view social media and politics as a game. It's alternate dimension of existence that provides entertainment, confirms existing beliefs, and allows people to act upon their beliefs without meaningful consequences.</p>
<p>A quick thought exercise to illustrate the point: would U.S. Capitol attackers have taken similar actions in a non-political situation? Say, a hostile takeover of Harley Davidson by activist investors?</p>
<p>Probably not — at least not to this extent. Disinhibition caused the U.S. Capitol attacks to feel like a game. At the time, the game didn't appear to have consequences.</p>
<h4 id="were-equals">We're Equals</h4>
<p>The final factor that drives the Online Disinhibition Effect is what Suler describes as "equality." People are perceived to be more equal when they're outside their normal environment:</p>
<blockquote>
<p>If people can't see you or your surroundings, they don't know if you are the president of a major corporation sitting in your expensive office, or some "ordinary" person lounging around at home in front of the computer.</p>
</blockquote>
<p>Combined with anonymity and invisibility, people can discard traditional social hierarchies and behave in negative ways:</p>
<blockquote>
<p>But online, in what feels like a peer relationship - with the appearances of "authority" minimized - people are much more willing to speak out or misbehave.</p>
</blockquote>
<p>In <em>Ready Player One</em>, the entire contest for control of the OASIS was a lesson in Suler's notion of equality. Any player of the game could compete and win. That's exactly what happened. Three young adults teamed up with a teenager and an 11-year-old to face off against ICI, a corporation formed for the sole purpose of winning the contest. Real world identities, resources, and backgrounds didn't matter — in fact, none of these people had met until many years into the story.</p>
<p>In <em>Q: Into the Storm</em>, 8chan owners Fredrick Brennan, Jim Watkins, and Ron Watkins all have non-traditional backgrounds. In the words of Fredrick Brennan, who has suffered from a severe disability since birth:</p>
<blockquote>
<p>Behind the keyboard, it doesn't matter that physically my body doesn't work properly.</p>
</blockquote>
<p>Online, it didn't matter — they were the administrators of 8chan. Anonymized behind their forum handles, they held a significant amount of power within the QAnon movement.</p>
<p>The U.S. Capitol attack was an opportunity for regular people — bartenders, salespeople, real estate agents — to participate as equals with decorated military veterans, Olympians, and elected officials.</p>
<p>Additionally, the blessing of real world authority figures gave the illusion of approval and clemency. Authority figures partaking in events minimizes authority and makes them appear as equals. By speaking directly to the crowd, their words gave credence to the disinhibitions that ultimately led to a violent attack.</p>
<h2 id="variables-and-influences">Variables and Influences</h2>
<p>In addition to the six factors, Suler's research on The Online Disinhibition Effect also describes four variables and influences that amplify the effect. Think of them like a wildcard that can create intense and unpredictable results.</p>
<h4 id="personality-variables">Personality Variables</h4>
<p>The first variable that drives the Online Disinhibition Effect is personality variables. Reactions to stimuli determine how susceptible a person is to disinhibition:</p>
<blockquote>
<p>The strength of underlying feelings, needs, and drive level has a big influence on how people behave.</p>
</blockquote>
<p>The result of these stimuli can be highly unpredictable. It's based on personality variables:</p>
<blockquote>
<p>The online disinhibition effect will interact with these personality variables, in some cases resulting in a small deviation from the person's baseline (offline) behavior, while in other cases causing dramatic changes.</p>
</blockquote>
<p>In <em>Ready Player One</em>, Sorrento (the CEO of IMI) had several personality variables that escalated to a point of him taking real world action and nearly killing Parzival in real life. Sorrento's greed, ruthlessness, and disdain caused severe disinhibition when ICI was losing the competition for control of the OASIS.</p>
<p>The socio-political climate at the time of the U.S. Capitol attacks was described as "emotionally raw." The volume and tone of messaging and rhetoric was high, as was the division of opinions. This was a recipe for extreme reactions.</p>
<p>Most people who joined online discussions of political violence <em>didn't</em> participate in the attacks. However, enough of them were susceptible to high disinhibition to cause a major event. When the denominator is large, it only takes a few people reacting dramatically to create a bad situation.</p>
<h4 id="true-self">True Self?</h4>
<p>The second variable that influences the Online Disinhibition Effect is the idea of the "true self." Suler's analysis of the notion of "self" is wide-ranging. As he observes, it's also prone to ambiguity and misinterpretation:</p>
<blockquote>
<p>In an in-depth exploration of the online disinhibition effect, the idea of a true self is too ambiguous, arbitrary, and rudimentary to serve as a useful concept.</p>
</blockquote>
<p>However, many dimensions are revealing when applied to this situation and raise important questions:</p>
<blockquote>
<p>...some people who need to deny or rationalize the unfulfilling quality of their in-person relationships may resort to a personal philosophy that idealizes the disinhibition effect and the notion that the true self appears online.</p>
</blockquote>
<p>Were some (perhaps many?) of the U.S. Capitol rioters unhappy and unfulfilled in other areas of their lives? Did they fit in better with the idealized views of the media, conspiracy theories, and other alternative viewpoints?</p>
<p>This was certainly the case for Fredrick Brennan, the creator of 8chan. In <em>Q: Into the Storm</em>, Brennan reflects on the quality of his in-person relationships:</p>
<blockquote>
<p>I didn't spend enough time making friends in real life.</p>
</blockquote>
<p>It makes people feel important to think they have information that others don't, especially when that information aligns with their beliefs. For some, it's deeply satisfying to hear points of view that align with their desired outcomes and expectations. This is easier and more comfortable than facing the truth. From Suler:</p>
<blockquote>
<p>The same is true online. Some people in some online situations become disinhibited and reveal aspects of themselves. However, at the same time, they may not be not grappling with the underlying causes of that inhibition, and therefore are missing an opportunity to discover something important about themselves - something very true about themselves, but often unconscious. If anonymity in cyberspace eases people's anxiety so they are more comfortable to express themselves, then they also are bypassing an essential component of who they are. Important personality dynamics are embedded in that anxiety.</p>
</blockquote>
<p>In other words, people who say violent things on social media sites could be failing to address underlying causes of their disinhibitions.</p>
<p>When emotions are high, it's easy to bypass the question of "why do I feel this way?" and jump straight to disinhibition. Self-reflection is a difficult task — one that many people are uncomfortable with.</p>
<p>Anonymity in cyberspace (on social media platforms) eased the anxiety and made people more comfortable with expressing themselves. Some stopped at angry tweets or parleys. Some took their theories offline and shared them with family, often creating rifts and division. Others became disinhibited enough to riot.</p>
<p>Individual identity also becomes distorted between online and offline personas. From Suler:</p>
<blockquote>
<p>In online communication, consciously or unconsciously, people conceal or misrepresent aspects of themselves as often as they honestly reveal aspects of themselves. Any particular media encourages some aspects of identity to be expressed while inhibiting other aspects. Something is revealed while something else is hidden.</p>
</blockquote>
<p>This online-to-offline representation of identity was prevalent before, during, and after the U.S. Capitol attacks.</p>
<p>For example: an unemployed father of five hid his personal identity while messaging on social networks. He dressed in horns and face paint while attending real-world events. Nobody knew or cared about his family or work when he was online, attending rallies, or rioting. An extreme part of his identity was revealed, and other parts were hidden.</p>
<p>Multiple rioters took on extremely different personas when involved in political events. These aspects of themselves were hidden from and unrecognizable to family and friends when they learned of the rioters' behavior after the attack.</p>
<p>Identity and behaviors can also differ significantly among various mediums:</p>
<blockquote>
<p>Each media allows for a particular expression of self that differs - sometimes greatly, sometimes subtly - from another media. In different media people present a different perspective of their identity. Chat, email, blogs, videocams, telephones, face-to-face conversation, and all types of communication modalities, each uniquely highlight certain aspects of self expression and personal identity, while hiding others.</p>
</blockquote>
<p>Would someone who posts online about wishing for a politician to catch a life-threatening disease and die say the same thing to friends or family offline?</p>
<p>What about the reverse? If their boss changed a policy at work that made them unhappy, would they go online and express similar wishes of harm?</p>
<p>The medium and context matters. Nuanced differences cause variation in reactions. It's easier for someone to express desire for harm towards a politician they don't know when they're posting anonymously online. It's harder for someone to wish harm towards their neighbor (a person they know), especially when saying these words in person.</p>
<h4 id="self-constellations-across-media">Self Constellations Across Media</h4>
<p>The third variable that influences the Online Disinhibition Effect is the idea of "self constellations". Suler defines it like this, adding a helpful example:</p>
<blockquote>
<p>The self interacts with the environment in which it is expressed. It is not independent of that environment. If a man suppresses his aggression in life but expresses it online, both behaviors reflect important aspects of his personality that surface under different conditions. If a woman is shy in-person but outgoing online, neither self-presentation is more true than the other. Both are dimensions of who she is, each revealed within a different situational context.</p>
</blockquote>
<p>Essentially, we are still the same person even if our personalities and actions differ significantly online versus offline. All behaviors are related. They might be buried beneath the surface and hard to detect, but the signs are there.</p>
<p>Suler describes how our behaviors can shift depending on the environment:</p>
<blockquote>
<p>We can think of the disinhibition effect as a person shifting to an "online" personality constellation that may be dissociated - in varying degrees, depending on the person - from the in-person constellation.</p>
</blockquote>
<p>This partially explains the online behavior of people in the crowd prior to the U.S. Capitol attacks. The event caused them to express their online personality in a real-world scenario in ways they may have never done before — for some, in wildly inconsistent ways with how their families and friends perceived them in real life.</p>
<h4 id="altering-self-boundary">Altering Self Boundary</h4>
<p>The final variable that influences the Online Disinhibition Effect is the alteration of self-boundary. The idea of self-boundary is complex, but it helps to explain people's feelings towards online behavior and offline behavior:</p>
<blockquote>
<p>Self-boundary is the sense of what is me and what is not me. It's the experience of a flexible perimeter marking the distinction between my personality - my thoughts, feelings, and memories - and what exists outside that perimeter, within other people.</p>
</blockquote>
<p>According to Suler, being online creates a different type of environment than the real world. This environment makes self-boundary less stable:</p>
<blockquote>
<p>Life in cyberspace tends to disrupt these factors that support self-boundary. The physical body and its five senses no longer play as crucial a role as in face-to-face relationships...As a result, this altered state of consciousness in cyberspace tends to shift or destabilize self-boundary...boundaries between self and other representations become more diffuse, and thinking becomes more subjective and emotion-centered...We allow the hidden self to surface because we no longer experience it as a purely inner self; but at the same time we also sense, sometimes vaguely and sometimes distinctly, the intrusion of an unknown other into our private world, which results in suspicion, anxiety, and the need to defend our exposed and vulnerable intrapsychic territory.</p>
</blockquote>
<p>Similar to the ideas Suler discusses in Personality Variables, reactions towards altered self-boundary vary significantly by person. When online, some people become suspicious and lurk in the background. Others get so angry they riot. It all depends on the person:</p>
<blockquote>
<p>There are important individual differences in how people shift along the inhibition/disinhibition continuum. The effect of inhibition or disinhibition might be weak or strong, depending on the person and the situation. People might experience small or wide oscillations between the two polarities. Some might be more susceptible to inhibition than to disinhibition, or vice versa.</p>
</blockquote>
<p>Suler's idea of individual variations in self-boundary raises an interesting question: how many people participated in violent discussions or made threats on Parler (or other social networks) but <em>didn't</em> become disinhibited enough to join the real world attacks on the U.S. Capitol? There were certainly fewer people (perhaps millions) who became so disinhibited they carried out real world violence, even after participating in online threats and discussions.</p>
<p>Online disinhibition happens to all of us, but our sense of self-boundary remains strong enough most of the time to avoid violent reactions. It only takes a few, though. That's exactly what happened.</p>
<h2 id="reality-is-real">Reality Is Real</h2>
<p>As more of our lives move online and the lines between the physical and virtual world get blurred, the distinction remains as important as ever.</p>
<p>In <em>Ready Player One</em>, James Halliday, the creator of the online world known as the OASIS, describes the distinction perfectly:</p>
<blockquote>
<p>I created the OASIS because I never felt at home in the real world. I just didn't know how to connect with people there. I was afraid for all my life, right up until the day I knew my life was ending. And that was when I realized that... as terrifying and painful as reality can be, it's also... the only place that... you can get a decent meal. Because, reality... is real.</p>
</blockquote>
<p>The real world can be a hard place to live, especially during the current times. Retreating online is an appealing way to escape — especially when our disinhibitions run wild and create a better (albeit distorted) sense of reality.</p>
<p>The real world is too important to lose sight of, though. Without a functioning real world planet and society, the online world would almost certainly cease to exist.</p>
<p>Understanding the Online Disinhibition Effect is a great starting point for learning how to balance the tremendous upside of the internet with the devastating consequences that can occur when disinhibitions cross over. Reality is real, and we have to protect it.</p>
]]></content:encoded>
            <category>Concepts</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2022/01/v1_-U.S.-Capitol-Attacks.png"/>
        </item>
        <item>
            <title><![CDATA[HashiCorp's IPO, Bottom-up Adoption, and Layering]]></title>
            <link>https://strategyofsecurity.com/hashicorps-ipo-bottom-up-adoption-and-layering/</link>
            <guid>61b8cf0e5a4bbc003bf9ec09</guid>
            <pubDate>Tue, 14 Dec 2021 18:30:46 GMT</pubDate>
            <description><![CDATA[A deeper look into the unique ingredients that made HashiCorp into a special company and propelled it to an IPO.]]></description>
            <content:encoded><![CDATA[<p>HashiCorp (<a href="https://twitter.com/search?q=%24HCP&ref=content.strategyofsecurity.com">$HCP</a>) <a href="https://www.hashicorp.com/blog/a-new-chapter-for-hashicorp?ref=content.strategyofsecurity.com">IPO'ed</a> on Thursday, December 9, 2021 — another company with a heavy stake in cybersecurity to go public during a busy year for IPOs in the industry. Their nine year journey as a company is an interesting one to follow. HashiCorp is unique in the truest and best sense of the word.</p>
<p>Their uniqueness stems from several attributes about HashiCorp as a company, including their leadership and culture, products and focus on open source, and growth via unwavering focus on developers. In this article, we'll study these  characteristics in more detail along with the company's future growth prospects as a public company.</p>
<h2 id="beginnings-and-entry-into-cybersecurity">Beginnings and Entry Into Cybersecurity</h2>
<p>It's hard to place HashiCorp cleanly within a single industry segment. They've been a multi-product company since the very beginning. And they continue to enter new, adjacent markets every year.</p>
<p>Before HashiCorp was formally founded as a company, co-founder Mitchell Hashimoto created <a href="https://www.vagrantup.com/?ref=content.strategyofsecurity.com">Vagrant</a>, an open source product that creates and manages virtual development environments.</p>
<p>Vagrant launched in 2010 and gained so much traction by 2012 that HashiCorp was formed to formally support it. A fun time capsule from 2012 shows the roots of HashiCorp's open source beginnings:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Searched back through the email archives tonight on the eve of <a href="https://twitter.com/search?q=%24HCP&src=ctag&ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">$HCP</a> <a href="https://t.co/LLNIOGJQBB?ref=content.strategyofsecurity.com">pic.twitter.com/LLNIOGJQBB</a></p>— Semil (@semil) <a href="https://twitter.com/semil/status/1468782339232714755?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">December 9, 2021</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p><a href="https://www.packer.io/?ref=content.strategyofsecurity.com">Packer</a> was launched shortly after, and they've been launching new products ever since.</p>
<p>HashiCorp is unique in that it's more focused on themes than specific technologies. The <a href="https://www.hashicorp.com/tao-of-hashicorp?ref=content.strategyofsecurity.com">Tao of HashiCorp</a> (an interesting and thoughtful document in its own right) defines the company's focus on workflows:</p>
<blockquote>
<p><strong>Workflows, not technologies</strong><br>
<br>
The HashiCorp approach is to focus on the end goal and workflow, rather than the underlying technologies. Software and hardware will evolve and improve, and it is our goal to make adoption of new tooling simple, while still providing the most streamlined user experience possible. Product design starts with an envisioned workflow to achieve a set goal. We then identify existing tools that simplify the workflow. If a sufficient tool does not exist, we step in to build it.</p>
</blockquote>
<p>Opportunistically building around developer workflows is how HashiCorp ended up with products in multiple different industry segments. They see problems and build tools to fix them. There's a common theme, for sure. In HashiCorp's own words, their products are:</p>
<blockquote>
<p>...critical processes involved in delivering applications in the cloud: infrastructure provisioning, security, networking, and application deployment.</p>
</blockquote>
<p>The unique part is intentionally focusing on workflows and building from there. As we'll explore more later, focusing on workflows is just one of many unique beliefs HashiCorp holds as a company.</p>
<p>In terms of the cybersecurity ecosystem, HashiCorp fits into the category of a "hybrid" company — one with significant cybersecurity product offerings and revenue combined with other non-cybersecurity products and revenue. From my <a href="https://strategyofsecurity.com/p/cybersecurity-is-going-public/">Cybersecurity is Going Public</a> article:</p>
<blockquote>
<p>Some companies are "hybrids" — a combination of two or more traditional industries. This type of company is debatably part of the cohort of public cybersecurity companies. Opinions vary, sometimes based on financial data, and sometimes based on perception and beliefs.<br>
<br>
A few examples are Cloudflare, Sumo Logic, and Splunk. Cloudflare is a combination of networking and cybersecurity. Sumo Logic and Splunk are a combination of application monitoring and security operations. Significant parts of their product portfolio and revenue come from cybersecurity, and part comes from other industries.</p>
</blockquote>
<p>HashiCorp entered the cybersecurity ecosystem in 2015 with the launch of an open source version of <a href="https://www.hashicorp.com/products/vault?ref=content.strategyofsecurity.com">Vault</a>, followed by an enterprise version in 2016. They added <a href="https://www.boundaryproject.io/?ref=content.strategyofsecurity.com">Boundary</a> in 2020.</p>
<p>What's more unique is the way their adjacent products enable security. A brief case study from from the S-1:</p>
<blockquote>
<p>Our products can be adopted individually and are also designed to work together as a stack in order to solve larger, more complex challenges. For instance, deploying Vault and Consul is the basis for a complete Zero Trust security architecture with identity-driven controls, offering a full range of authentication, authorization, and access management for human users or machines, like servers or applications.</p>
</blockquote>
<p>This example is representative of a larger technology trend: the line between security and other foundational technology tools is being blurred.</p>
<p>HashiCorp is connecting the dots between infrastructure and security, similar to how Cloudflare connected the dots between networking and security. New technologies have security intentionally built in and enable the security outcomes companies want by default.</p>
<p>Even though HashiCorp only classifies two of its products as pure security offerings, all of their products support security in important ways. That's the type of future we want —&nbsp;one where security is an inherent part of how we build and deliver tech, not an afterthought.</p>
<h2 id="philosophy-leadership-and-culture">Philosophy, Leadership, and Culture</h2>
<p>HashiCorp is one of the rare cases where a company's underlying philosophy is truly a differentiator. I would argue their philosophy the most unique and critical differentiator they have — especially because of the way it drives everything they do.</p>
<p>In true open source spirit, HashiCorp's company philosophy has been publicly available for years. It's implemented across three different pieces, all written by the founders:</p>
<ul>
<li><a href="https://www.hashicorp.com/our-principles?ref=content.strategyofsecurity.com">Principles of HashiCorp</a>: company culture and values</li>
<li><a href="https://www.hashicorp.com/tao-of-hashicorp?ref=content.strategyofsecurity.com">Tao of HashiCorp</a>: product design ethos</li>
<li><a href="https://works.hashicorp.com/?ref=content.strategyofsecurity.com">How HashiCorp Works</a>: codified company processes</li>
</ul>
<p><br>
HashiCorp isn't the first company to make some or all of these aspects of their culture public. However, what they've done is one of the best implementations I've seen. Everything they do has a level of intentionality, cohesion, and polish that's unique for any company — much less a company with exclusively open source products. HashiCorp has a unique aura that simultaneously captures and shapes the zeitgeist of our times.</p>
<p>The company and its philosophy are unique because of its founders. <a href="https://twitter.com/mitchellh?ref=content.strategyofsecurity.com">Mitchell Hashimoto</a> and <a href="https://twitter.com/armon?ref=content.strategyofsecurity.com">Armon Dadgar</a> founded the company as students at the University of Washington...sort of. Incredibly, the company eventually known as HashiCorp almost failed before it started. This is <a href="https://www.hashicorp.com/resources/what-is-the-hashicorp-origin-story?ref=content.strategyofsecurity.com">Mitchell Hashimoto's recap</a> of the timeline and sequence of events:</p>
<blockquote>
<p>And it was a learning experience as we went through bad idea after bad idea. Ultimately, we ended up abandoning it and both moved to San Francisco and working at the same mobile ad company.<br>
<br>
It was only moving back to the Bay area and being surrounded by a bunch of tech companies that we realized like, "Wow, a lot of these people are hitting the problems that we hit like four or five years ago."<br>
<br>
I wrote down the notes for that retro in a moleskin notebook, and I still have it. And it was like four years later that I opened that notebook and I was like, "Yeah, we wrote all these down. We should try to solve these."</p>
</blockquote>
<p>Patience stands out in the story of HashiCorp. After graduating, the founders didn't race out to raise a pile of venture capital money to fuel their search for problems and solutions. Even after agreeing to start a company during college, they toiled away at Silicon Valley tech companies for years. These years gave them a true understanding of the emergent problems in cloud infrastructure they were uniquely suited to solve.</p>
<p>Another unique twist to the story is Mitchell Hashimoto's principled decision to step down as an executive and remain with the company in an individual contributor role:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">I've decided to become a full-time individual contributor at HashiCorp and will no longer be an exec. This is something we've planned for years and I'm so happy HashiCorp is in a place to allow it to happen. Do what you love, not what others expect! ❤️ <a href="https://t.co/M3h8ipjEf0?ref=content.strategyofsecurity.com">https://t.co/M3h8ipjEf0</a></p>— Mitchell Hashimoto (@mitchellh) <a href="https://twitter.com/mitchellh/status/1418315344800669698?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">July 22, 2021</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>He further expanded on his rationale and personal philosophy in in a tweet and subsequent Q&amp;A in the comments the next day:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Careers aren't a linear ladder. Careers are one mechanism to check the "yes" box for questions such as: Is my family cared for? Do I have purpose? Can I do what I love? etc. Different questions for different people. A straight path rarely guarantees "yes" to all of it. Do you.</p>— Mitchell Hashimoto (@mitchellh) <a href="https://twitter.com/mitchellh/status/1418635895972896769?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">July 23, 2021</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>Mitchell Hashimoto is special.</p>
<p>Most people don't become founders and executives of multi-billion dollar startups in the first place. The few who do rarely have the self-awareness to introspect and understand the work they truly enjoy. And then, there's ego. Founders who aren't doing what they enjoy rarely step down — especially not to individual contributor roles while remaining with the company.</p>
<p>HashiCorp reflects the best qualities of both Hashimoto and Armon Dadgar. That's why it's valuable.</p>
<h2 id="products-open-source-and-layering">Products, Open Source, and Layering</h2>
<p>HashiCorp's product strategy is unique because of the number of products they've developed from scratch and their process of incubating products from free open source tools into commercial enterprise offerings.</p>
<p>One of the biggest challenges for tech companies is continuing growth after demand for their initial product plateaus. Andreessen-Horowitz Managing Partner <a href="https://twitter.com/jeff_jordan?ref=content.strategyofsecurity.com">Jeff Jordan</a> described the problem like this in his <a href="https://a16z.com/2012/01/18/a-recipe-for-growth-adding-layers-to-the-cake-2/?ref=content.strategyofsecurity.com">now famous article</a>:</p>
<blockquote>
<p>Virtually all businesses, even hyper-growth ones, inevitably experience slower growth as they get larger, with their growth rates falling relentlessly back down to Earth over time.  I call this effect “gravity” and it will weigh down even the most promising of companies—unless a CEO can find a way to accelerate growth and positively change the long-term growth trajectory of the business.</p>
</blockquote>
<p>Based on his experience at eBay, Jordan argues the solution to this problem is a strategy called "layering":</p>
<blockquote>
<p>I came to call this process of layering in new innovations on top of the core business “adding layers to the cake”.  Much of the natural effort in the organization is spent on chasing optimization of the core business.  This makes sense, as small improvements in a big business can have a meaningful impact.  But there is huge potential leverage to adding layers of new, complementary businesses on top of the core (aka “cake”).</p>
</blockquote>
<p>Since the beginning of the company, HashiCorp has developed layers of products that continuously add complimentary revenue and new market segments on top of its existing business. This visual from the S-1 filing clearly shows the layering strategy at work:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/12/HCP_Layering.png" class="kg-image" alt="" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2021/12/HCP_Layering.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2021/12/HCP_Layering.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2021/12/HCP_Layering.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/12/HCP_Layering.png 1920w" sizes="(min-width: 720px) 720px"></figure><p>The best part about HashiCorp is that their layering of products appears to be an intrinsic and innate behavior of the company. They build new products because they find new needs that need to be addressed and <em>only then</em> start generating revenue from products that already have traction. It's a much more fluid and organic process than saying "oh, $&amp;#@, we need more revenue so let's build or buy a product."</p>
<p>It's also worth noting that HashiCorp's product hits keep getting bigger. Many successful companies are like one-hit wonders: the original product they build is great, and every product after fails to match the success of the first.</p>
<p>HashiCorp is a consistent hit machine. Their original Vagrant product was wildly successful among developers. Subsequent launches of Packer, Consul, Terraform, and Vault were all successes in their own domains. HashiCorp's path to sustainable growth rests on their continued production of hit products —&nbsp;something they've already proven to be capable of multiple times over.</p>
<p>Their layering strategy works because of open source. HashiCorp is steadfastly committed to the model of building open source products first, then adding enterprise-specific features on top of them. From the S-1:</p>
<blockquote>
<p>We have deliberately built our products using an open-core software development model. All of our products are developed as open source projects, with large communities of users, contributors, and partners collaborating on their development. We sell proprietary, commercial software that builds on our open source products with additional enterprise capabilities.</p>
</blockquote>
<p>Building and releasing smaller open source products for free — and many years before turning them into commercial enterprise offerings — allows them to iteratively test and refine until they've built something people truly want.</p>
<p>Monetization aside, the open source model is clearly working. The S-1 includes two mind-bending stats about HashiCorp's open source adoption. First, their open source products have millions of downloads:</p>
<blockquote>
<p>Companies of all sizes and industries use our products, which have been downloaded approximately 100 million times during the fiscal year ended January 31, 2021, or fiscal 2021.</p>
</blockquote>
<p>And second, they have a high number of GitHub stars (favorites or likes from other developers) for each of their products:</p>
<blockquote>
<p>Today, HashiCorp is one of the highest rated software technologies for practitioners, as evidenced by over 219,000 stars on our GitHub repositories. Our GitHub community includes thousands of contributors beyond our employees, including hundreds of partners.</p>
</blockquote>
<p>We don't have the data to break down the exact number of downloads by product, it's worth noting that the number of GitHub stars for each product is a relatively even distribution (e.g. one product isn't driving the statistics):</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/12/HCP_-GitHub-Stars.png" class="kg-image" alt="" loading="lazy" width="1920" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2021/12/HCP_-GitHub-Stars.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2021/12/HCP_-GitHub-Stars.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2021/12/HCP_-GitHub-Stars.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/12/HCP_-GitHub-Stars.png 1920w" sizes="(min-width: 720px) 720px"></figure><p>Numbers like this aren't surprising for, say, a small and ubiquitous open source package used by many developers. However, enterprise-grade infrastructure and security products are much bigger and much less exciting. The only conclusion you can draw is that HashiCorp's products are effective, and developers love them.</p>
<h2 id="developers-and-bottom-up-adoption">Developers and Bottom-up Adoption</h2>
<p>HashiCorp is one of the only cybersecurity companies that has grown with a bottom-up adoption strategy. Bottom-up adoption for enterprise products is a relatively new and novel concept, originally made famous by Slack.</p>
<p>Andreessen-Horowitz put some formal definition around the approach when partners <a href="https://twitter.com/martin_casado?ref=content.strategyofsecurity.com">Martin Casado</a> and <a href="https://twitter.com/andrewchen?ref=content.strategyofsecurity.com">Andrew Chen</a> started talking publicly about the topic in late 2018:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">0/ Mastering bottoms up adoption *and* enterprise sales is really hard. Yet many of the fastest growing enterprise companies do.  This thread explores some of the considerations and why juggling both motions is a lot more complicated than most assume.</p>— martin_casado (@martin_casado) <a href="https://twitter.com/martin_casado/status/1070017315876552704?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">December 4, 2018</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>Casado elaborated on the phenomenon in an <a href="https://future.a16z.com/podcasts/growth-saas-enterprise-bottomsup?ref=content.strategyofsecurity.com">a16z podcast episode</a>:</p>
<blockquote>
<p>So traditionally in the enterprise, you’d build a product, and that product would be informed by your knowledge of the market. And then once that product was ready, you’d go ahead and sell it by hiring salespeople and the salespeople would go directly engage. You’d probably do some sales-led marketing where maybe the salespeople would go find the customers or you’d have some basic marketing to do it. But the majority of the go-to-market effort in the early days was this kind of direct sale.<br>
<br>
And we’re seeing kind of this huge shift, especially in SaaS and in open source where companies establish massive market presence and brand and growth using these kind of more traditional consumer-ish growth motions. And then that very seamlessly leads into sales, and often a very different type of sale. And so I think a lot of people in the industry are on their heels, both investors and people that have started companies in the enterprise before, they’re trying to understand exactly what’s going on.</p>
</blockquote>
<p>In the case of HashiCorp, they get hands-on users (practitioners, in their words) within companies to adopt their <a href="https://github.com/hashicorp/?ref=content.strategyofsecurity.com">open source products</a> for free. Once usages grows to a point where the company wants to buy an enterprise subscription, HashiCorp has a new paying customer.</p>
<p>HashiCorp's unique approach to sales and marketing matters because it's the recipe for their rapid, exponential growth. Martin Casado describes the distinction between traditional enterprise sales and successful bottom-up adoption like this:</p>
<blockquote>
<p>On the other hand, we see companies that will just do sales. And for them, it’s actually very difficult to grow quickly because they don’t have the type of funnel that you’d get from the growth metrics. And the ones that seemed to have figured it out the best, what they’ll do is they’ll create kind of a brand phenomenon. They’ll get this growth, they’ll get that engine working and then they do kind of tack on some sort of sales on the backend and then those two motions work in tandem.</p>
</blockquote>
<p>HashiCorp created a phenomenon that drove organic growth, then added enterprise sales to monetize the adoption. More impressively, they accomplished this at least four times — once for each of their flagship commercial products.</p>
<p>The <a href="https://www.sec.gov/Archives/edgar/data/0001720671/000119312521342246/d205906ds1a.htm?ref=content.strategyofsecurity.com">S-1 filing</a> describes HashiCorp's product and sales strategy in a nutshell. It's exactly in line with a bottom-up adoption strategy:</p>
<blockquote>
<p>At HashiCorp, we've always built tools we want to use ourselves. When practitioners succeed with our products, we win the right to be considered a commercial partner to their organizations.</p>
</blockquote>
<p>All of this matters because establishing a balanced bottom-up and top-down growth engine is an incredibly valuable asset. The growth engine HashiCorp has built is the envy of every company with a traditional enterprise sales model — including nearly all of the <a href="https://strategyofsecurity.com/p/cybersecurity-is-going-public/">publicly traded cybersecurity companies</a>.</p>
<p>HashiCorp's point of view on developers as their end users is also distinct from their industry peers. From the <a href="https://www.sec.gov/Archives/edgar/data/0001720671/000119312521342246/d205906ds1a.htm?ref=content.strategyofsecurity.com">S-1 filing</a>:</p>
<blockquote>
<p>Practitioners, rather than executives, have become the decision makers for adopting modern enterprise products, making it imperative that we focus on these end users.</p>
</blockquote>
<p>It's an interesting point of view because HashiCorp is one of the first companies to call out this trend so explicitly. You'd expect to hear something like this from an early stage startup pitching to VCs, not a company at the point of an IPO. This rhetoric is also more common for pure dev tools companies than enterprise cybersecurity companies.</p>
<p>This vision of the future isn't fully realized yet (plenty of executives still consider themselves the decision makers, thank you very much!). However, the trend is in motion. HashiCorp is a recent case study reinforcing that organic growth through bottom-up sales is a viable growth strategy. More importantly for us, HashiCorp proves this approach is possible for cybersecurity companies.</p>
<h2 id="hashicorps-future-as-a-public-company">HashiCorp's Future as a Public Company</h2>
<p>First, the elephant in the room: HashiCorp is losing a lot of money. From the S-1:</p>
<blockquote>
<p>We incurred net losses of $53.4 million and $83.5 million for fiscal 2020 and 2021, respectively, and $76.6 million and $62.4 million for the nine months ended October 31, 2020 and 2021, respectively. We expect we will incur net losses for the foreseeable future as we continue to invest into the market opportunity ahead of us.</p>
</blockquote>
<p>HashiCorp's products are used by millions of people and over 340 of the Forbes Global 2000 companies. However, the concern many investors have is how much value they can capture and monetize. Martin Casado described the tension around monetization for this type of company in the a16z podcast:</p>
<blockquote>
<p>At the highest level, I think there actually are a lot of conflicts in these motions and in a number of areas. And the most obvious one and this is something that’s so prevalent in open source is, a good way to get organic growth is to give something away for free. And if you give it away for free, it may be hard to monetize it because a lot of the assumptions here are predicated on organic growth, there’s always an open question of how much do you give away versus how do you monetize it? Enterprise really is all about monetization because there is no conversion between eyeballs and dollars like you do in kind of more advertising-like domains. And so there’s a real tension there.</p>
</blockquote>
<p>As Casado noted, the ongoing tension for HashiCorp will be how much to give away versus how much to monetize. HashiCorp faces this problem at both the micro and macro level because they're a multi-product company. At a micro level, the tension is about which features and services to include in the open source product versus an enterprise offering. At a macro level, some products are highly monetizable (for example, their four current commercial products), and others are useful but may never become profitable.</p>
<p>In business, people (especially investors) want a predictable and linear path towards profitable growth. HashiCorp doesn't have that, and the reason is simultaneously frustrating and exciting. This is the tension Casado characterized so well.</p>
<p>HashiCorp's losses are a delicate cycle. R&amp;D investments drive innovation and new product development, which attracts developers and creates fans. Attracting developers drives the bottom-up adoption that eventually converts to paying enterprise customers.</p>
<p>If HashiCorp stunts the R&amp;D process to reduce spending, it risks a cascading effect that causes developers to lose interest and the bottom-up entry into enterprises to slow. They can't kill their growth engine. So, their only option is to keep investing and do their best to continue fueling organic growth.</p>
<p>They have the attention of developers, a precious and valuable asset to command. However, the downside risk of building your company around developers is real. HashiCorp faces many of the same challenges as Auth0, another developer-focused company. I said this when <a href="https://strategyofsecurity.com/p/okta-auth0-q2-2021-results/">analyzing Auth0's acquisition by Okta</a>:</p>
<blockquote>
<p>Developers are a notoriously finicky bunch with little tolerance for hiccups or other inconveniences.</p>
</blockquote>
<p>The upside of building and nurturing developer attention and support is more exciting than it is risky. Amazing things can happen when developers are behind your company. It's the closest thing to viral growth that's possible in an enterprise setting. And it's one of the only ways explosive growth numbers like these are possible:</p>
<blockquote>
<p>Our revenue was $121.3 million and $211.9 million for the fiscal year ended January 31, 2020, or fiscal 2020, and 2021, respectively, representing year-over-year growth of 75%. Our revenue was $150.0 million and $224.2 million for the nine months ended October 31, 2020 and 2021, respectively, representing period-over-period growth of 49%.</p>
</blockquote>
<p>When developers can adopt your products, you find a way into the largest companies in the world without the toil and frustration of long enterprise sales cycles. Competitors with top-down enterprise sales approaches often spend thousands of dollars and years of time to close a sale.</p>
<p>All too often, their efforts are unsuccessful because an appealing product with self-service adoption circumvents the regular enterprise procurement channels. By then, it's too late to turn back — the product is already implemented, and people love it. HashiCorp is one such example, and a rare one in cybersecurity.</p>
<p>Ultimately, the promise of HashiCorp is its uniqueness: philosophy, products, and community. The upside is tremendous if they can keep building upon these unique characteristics in the years to come.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/12/v1_-HashiCorp-IPO.png"/>
        </item>
        <item>
            <title><![CDATA[CrowdStrike and the Bundling of Cybersecurity]]></title>
            <link>https://strategyofsecurity.com/crowdstrike-and-the-bundling-of-cybersecurity/</link>
            <guid>61ae66fab4650c003b92dbb7</guid>
            <pubDate>Wed, 08 Dec 2021 16:40:10 GMT</pubDate>
            <description><![CDATA[CrowdStrike is bundling the cybersecurity ecosystem in a way that's never been done before. This article examines their strategy, its impact on the industry, and their future growth potential.]]></description>
            <content:encoded><![CDATA[<p>CrowdStrike announced Q3 fiscal year earnings last week. They're the final company in my brief series of analyzing strategy for public cybersecurity companies this earnings period.</p>
<p>Among many well-hyped cybersecurity companies, CrowdStrike is one of the four outliers (along with Cloudflare, Zscaler, and Okta). To nobody's surprise, their recent earnings and growth announcement was excellent. From <a href="https://www.yahoo.com/entertainment/crowdstrike-crwd-q3-earnings-revenues-124712495.html?ref=content.strategyofsecurity.com">Yahoo</a>:</p>
<blockquote>
<p>CrowdStrike Holdings CRWD reported third-quarter fiscal 2022 results, wherein non-GAAP earnings jumped over two fold to 17 cents per share from 8 cents posted in the year-ago quarter. The bottom-line figure surpassed the Zacks Consensus Estimate of 10 cents.<br>
<br>
CrowdStrike added $170 million to its net new annual recurring revenue (ARR) in the quarter, reaching total ARR to $1.51 billion, up 67% from the year-ago quarter’s levels.<br>
<br>
During the third quarter, CrowdStrike witnessed growing demand for its identity protection and Zero Trust, Humio and cloud security modules.</p>
</blockquote>
<p>Earnings aside, the strategic impact of CrowdStrike is much bigger than any single quarterly announcement. CrowdStrike is driving the movement towards bundling large parts of the cybersecurity ecosystem — a massive change for an industry that has seen relatively little bundling compared to tech at large.</p>
<p>Unlike media examples where huge markets were unlocked by <em>unbundling</em>, CrowdStrike didn't reach its current position by doing so. They built a product that was 10x better than existing endpoint protection products. It was a <a href="https://www.amazon.com/Blue-Ocean-Strategy-Expanded-Uncontested-ebook/dp/B00O4CRR7Y/ref=sr_1_1?keywords=blue+ocean+strategy&qid=1638911760&sr=8-1&ref=content.strategyofsecurity.com">Blue Ocean Strategy</a> — they created and won an uncontested market space hiding in plain sight.</p>
<p>The trick wasn't to build another signature-based endpoint protection platform. It was to follow the trend of increasing sophistication by attackers and build a product that recognized attack patterns. They also took advantage of the cloud mega-trend and re-imagined what an endpoint security product built for the cloud would look like.</p>
<p>This was all made possible by the unique expertise of CEO George Kurtz — a rare individual with both a successful exit and experience leading a legacy endpoint protection platform for several years as the CTO. He knew exactly where legacy products were lacking and where the market was headed. The result was CrowdStrike, the most valuable cybersecurity company today.</p>
<p>This article takes a deeper look into their current strategy and growth potential for the future.</p>
<h2 id="bundling-and-unbundling">Bundling and Unbundling</h2>
<p>There's a punchy saying in business you've probably heard before, just not in the context of cybersecurity. It's from Jim Barksdale, the CEO of Netscape at the time it was coined:</p>
<blockquote>
<p>"There’s only two ways I know of to make money: bundling and unbundling."</p>
</blockquote>
<p>The classic case study is the consumption of music. People used to buy albums (bundles of songs). Napster and illicit file sharing services made individual songs available for download (unbundling of albums). Apple's iTunes made the behavior legal with purchases of individual songs. Now, Spotify is re-bundling distribution by selling subscriptions to access millions of songs.</p>
<p>Cybersecurity has never been bundled before — certainly not in the same way as media examples like music, newspapers, and TV. There is no dominant or monopolistic company in the ecosystem, despite participation from major tech companies and <a href="https://strategyofsecurity.com/p/public-cybersecurity-companies/">over 30 public companies</a>.</p>
<p>However, the change is underway. Customers want bundling. Take a look through InfoSec Twitter or LinkedIn on any given day, and you're bound to find someone ranting ad nauseam about topics like vendor fatigue, agent bloat, or the explosion of acronyms in the industry. These are all symptoms of the upstream customer desire for bundling.</p>
<p>The solution to vendor fatigue is bundling. Exactly CrowdStrike's strategy. I briefly talked about a centralized product strategy when <a href="https://strategyofsecurity.com/p/q3-2021-cybersecurity-earnings-strategies-for-services-saas-and-platforms/">covering Qualys</a>. The theme has re-emerged again with CrowdStrike in a much bigger way — one that's achievable given their momentum, growth, and leadership.</p>
<p>While the strategy itself is no secret, a few dots need to be connected between the idea of a bundling strategy and CrowdStrike's specific implementation of it.</p>
<p>No company calls their strategy "bundling," as Jim Barksdale astutely noted in a <a href="https://hbr.org/2014/06/how-to-succeed-in-business-by-bundling-and-unbundling?ref=content.strategyofsecurity.com">Harvard Business Review (HBR) interview</a> with Marc Andreessen:</p>
<blockquote>
<p>Well, most companies when they’re building strategies don’t ever use the term bundling. They just think of adding strategic advantages to their products. If they can add it to their core, they add it, and try to be as efficient as they can be, because there are efficiencies in bundling.<br>
<br>
And there are synergies related to bundling. You don’t have to redo a lot of the core services when you put products together. But, I doubt most strategies were ever built using the term, “Let’s bundle.” Or, “Let’s unbundle.” That’s not a strategic term, really, it’s just an observation I made.</p>
</blockquote>
<p>Several terms that CrowdStrike CEO George Kurtz used on the earnings call are indicative of the bundling strategy at CrowdStrike: "consolidation," "platform," and "modules."</p>
<p>Kurtz specifically mentioned consolidation twice on the earnings call. First, when talking about agent fatigue:</p>
<blockquote>
<p>A big part of what we're doing is being able to consolidate other vendors. Agent consolidation, agent fatigue is a big issue that's out there. And obviously, we have a broad platform that's differentiated and works, and that's the key aspect of the platform that it actually works.</p>
</blockquote>
<p>And second, when talking about a specific example for CrowdStrike's File Integrity Monitoring (FIM) module:</p>
<blockquote>
<p>And again, it goes to our strategy of consolidating agents and getting rid of other technologies that are costly and complex and weigh the system down.<br>
<br>
When you think about FIM, it's a pure and simple compliance requirement. When you think about things like PCI and in the financial services industry, you have to understand what files change and who changed them and implement controls around that. So we've been able to do a lot of that for a long time.<br>
<br>
We've enhanced some features, put it into a module. And it's been extremely well received because it is literally a check box for just about any company that's out there, given the current regulatory frameworks and the various standards that exist.</p>
</blockquote>
<p>CrowdStrike's leadership also has a strong level of conviction about their platform strategy. When asked by an analyst about being perceived as an endpoint security company (an un-bundled node in the cybersecurity ecosystem), Kurtz was emphatic about the bigger picture:</p>
<blockquote>
<p>I think if folks are looking at us as just an endpoint company, pigeonholed endpoint company, they're really missing the big picture. I mean that's as simple as I could say it.</p>
</blockquote>
<p>He also gave an interesting metaphor and touted the company's module count:</p>
<blockquote>
<p>We've proven that we are a platform company, as I said before, the Salesforce of security, 21 modules.</p>
</blockquote>
<p>Just as Salesforce bundled a large set of sales and marketing tech, CrowdStrike is bundling a large set of cybersecurity tech. Additional data about customer purchasing shows that the strategy is starting to work. From George Kurtz:</p>
<blockquote>
<p>Our module adoption rates demonstrate the flywheel effect of our platform in motion with subscription customers that have adopted four or more modules, five or more modules and six or more modules increasing to 68%, 55% and 32%, respectively, in the third quarter. We believe high adoption rates of our modules drive high retention rates and reflect our growing position as the trusted platform of record with the average number of modules per customer also increasing quarter after quarter.</p>
</blockquote>
<p>These stats are particularly incredible because CrowdStrike currently has 14,687 total customers. When you have 68% of your customers using 4+ modules, and that number is growing rapidly every quarter, your bundling strategy is definitely working.</p>
<p>So, why is CrowdStrike's bundling strategy working so well? In the HBR interview with Barksdale, Marc Andreessen described underlying technology changes as the primary driver behind bundling within industries:</p>
<blockquote>
<p>I think a lot of it is based on the underlying technology change. The way I think about it is — at least in the world that I work in, sort of tech and Internet media — bundles emerge as a consequence of the current technology.</p>
</blockquote>
<p>In the case of CrowdStrike and this portion of the cybersecurity ecosystem, there are two underlying technology changes driving the bundling. Cloud computing is driving this change at the macro level, and eXtended Detection and Response (XDR) is driving the change at a micro level. We'll focus on trends in XDR next.</p>
<h2 id="edr-as-the-foundation-for-xdr">EDR as the Foundation for XDR</h2>
<p>Bundling is starting to become possible because XDR is reframing an important part of the product space, both including and adjacent to Endpoint Detection and Response (EDR).</p>
<p>The next stage in the evolution of EDR is XDR. The major innovations of XDR are its focus on endpoints, scoped data collections across multiple security tools, and automated incident detection and response workflows. The focus on endpoints is the starting point for CrowdStrike's potential success in this market.</p>
<p>Forrester analyst Allie Mellen stated in a <a href="https://www.forrester.com/report/adapt-or-die-xdr-is-on-a-collision-course-with-siem-and-soar/RES165775?ref=content.strategyofsecurity.com">recent report on XDR</a>, <em>"good XDR lives and dies by the foundation of a good EDR."</em> CrowdStrike definitively has that foundation. From the <a href="https://go.crowdstrike.com/2021-Gartner-Magic-Quadrant-Epp-Report.html?ref=content.strategyofsecurity.com">2021 Gartner Magic Quadrant for Endpoint Protection</a>:</p>
<blockquote>
<p>CrowdStrike has a strong reputation in the market as the single solution for endpoint security for organizations looking to consolidate their EPP and EDR agents/solutions. Falcon X threat intelligence and Threat Graph cloud-based data analytics provide the ability to detect advanced threats and analyze user and device data to spot anomalous activity.</p>
</blockquote>
<p>George Kurtz certainly agrees. He added some additional commentary on the evolution from EDR to XDR during the earnings call:</p>
<blockquote>
<p>So when we think about XDR, you have to start with the best EDR in the market, which is ours. It's been validated by Gartner and others and IDC, I mean, down the list. And the extension of EDR is XDR, right? And as a company who pretty much pioneered cloud-delivered endpoint security with Threat Graph and the massive data moat that we have by combining that with some of the technology we acquired from Humio and our Threat Graph.<br>
<br>
I think we're in a unique position to be able to drive additional threat detection outcomes as well as the declaration of the threat narrative, right, the attack narrative. And that's independent of Humio as a stand-alone log management observability platform.<br>
<br>
So we're really driving a lot of innovation in this area. And to your point, if you are just kind of a SIEM vendor now trying to glom on to XDR as an acronym, it's not going to work. You have to start with the best EDR in the world. And in my opinion, that's CrowdStrike.</p>
</blockquote>
<p>Building an XDR product from a solid EDR foundation is a distinct advantage over other new entrants to the XDR market. For example, Qualys has an endpoint detection product that isn't yet included in the Gartner Magic Quadrant for Endpoint Protection. Analyst reports aren't everything, but not being included is telling if EDR is truly the foundation of XDR. In the case of Qualys, they're building from the best starting point they have — vulnerability management — but it feels like they're on the outside looking in.</p>
<p>The architecture for XDR fits CrowdStrike's bundling strategy perfectly. Along with Microsoft, CrowdStrike leads the EDR market by <em>a lot</em>. They can use their market-leading position in EDR to reach the next level of bundling with XDR as a major driver.</p>
<h2 id="falcon-xdr-and-acquisitions">Falcon XDR and Acquisitions</h2>
<p>CrowdStrike is primarily executing its bundling strategy through acquisitions. They've acquired several companies in the past year, including:</p>
<ul>
<li>
<p><a href="https://www.crowdstrike.com/press-releases/crowdstrike-to-acquire-humio/?ref=content.strategyofsecurity.com">Humio</a> for log management and analysis</p>
</li>
<li>
<p><a href="https://www.crowdstrike.com/press-releases/crowdstrike-acquires-preempt-security/?ref=content.strategyofsecurity.com">Preempt</a> for identity analytics</p>
</li>
<li>
<p><a href="https://www.crowdstrike.com/press-releases/crowdstrike-to-acquire-securecircle-to-enforce-zero-trust-data-protection/?ref=content.strategyofsecurity.com">SecureCircle</a> for data protection</p>
</li>
</ul>
<p>The acquisitions were all made for relatively nominal amounts, ranging from $100-400 million. Along with homegrown products like FileVantage for FIM, the Falcon platform now offers 21 total modules for purchase.</p>
<p>Longer term, CrowdStrike's bundling strategy is headed towards even more modules built on top of a combined Threat Graph and Humio data infrastructure. From CrowdStrike's <a href="https://ir.crowdstrike.com/events/event-details/crowdstrike-investor-product-briefing?ref=content.strategyofsecurity.com">2021 Investor Product Briefing</a>:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/12/crowdstrike-falcon-platform.png" class="kg-image" alt="" loading="lazy" width="2000" height="1250" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2021/12/crowdstrike-falcon-platform.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2021/12/crowdstrike-falcon-platform.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2021/12/crowdstrike-falcon-platform.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w2400/2021/12/crowdstrike-falcon-platform.png 2400w" sizes="(min-width: 720px) 720px"></figure><p>The diagram doesn't include details down to the module level, but the concept is clear: protect every endpoint with a single agent, process and analyze data from the agents in Threat Graph and Humio, and integrate the data with tools across multiple cybersecurity domains.</p>
<p>In addition to the existing Falcon modules, the emerging stars of the platform are the recent acquisitions.</p>
<h4 id="humio-and-falcon-xdr">Humio and Falcon XDR</h4>
<p>On the earnings call, George Kurtz described Humio as a critical component of Falcon XDR:</p>
<blockquote>
<p>Falcon XDR leverages the technology we acquired from Humio and extends CrowdStrike's industry-leading endpoint detection and response capabilities to deliver real-time detection and automated response across the entire security stack.</p>
</blockquote>
<p>CrowdStrike's commentary about the acquisition heavily emphasizes the technology aspects of Humio: speed, index-free searching, and high volume data storage. Like many modern observability platforms, Humio wasn't built explicitly for security.</p>
<p>While security makes up a majority of the primary use cases, some confusion occasionally creeps in with a pure security company as the new owner. In response to a question about the fit between Humio and Falcon XDR on the earnings call, George Kurtz described the opportunity like this:</p>
<blockquote>
<p>You can connect it to whatever you want to connect it to, and you can drive observability information from things that are outside just core security, things like connecting it to your HR system, to your performance management systems, to all the various workflows in your environment. That's not the use case of XDR. Security use cases XDR and Humio goes way beyond that.</p>
</blockquote>
<p>While true, potential buyers may question why they need Humio to connect to areas outside of core security. Given CrowdStrike's focus on security, savvy buyers will be skeptical about the level of commitment to product development outside of security.</p>
<p>Longer term, it seems more likely that Humio's technology platform will be tightly integrated with Threat Graph data and narrowed to focus on cybersecurity use cases.</p>
<h4 id="preempt-and-identity-protection">Preempt and Identity Protection</h4>
<p>CrowdStrike's acquisition of Preempt is an interesting opportunity. From an industry perspective, the perplexing part about Preempt is why none of the large companies in the Access Control market either built or acquired a product like this.</p>
<p>CrowdStrike has been lurking around identity and access recently, including an <a href="https://jumpcloud.com/press/seriesfclose?ref=content.strategyofsecurity.com">investment in JumpCloud's Series F round</a> from their Falcon Fund. It's unlikely CrowdStrike will ever fully enter the Access Control market and compete head-on. However, it's both possible and encouraging to see them including targeted areas of the ecosystem in their platform.</p>
<p>Preempt was a relatively good deal at a <a href="https://www.crn.com/news/security/crowdstrike-to-buy-identity-startup-preempt-security-for-96m?ref=content.strategyofsecurity.com">$98m acquisition price</a> (on $27.5 million in funding). It had lots of upside to be gained from piggybacking on Crowdstrike's sales and marketing engine. CrowdStrike identified and seized the opportunity for this nascent market segment before other companies made a serious effort.</p>
<p>Post-acquisition, CrowdStrike categorized the product as "identity protection" and re-branded Preempt to Falcon Identity Protection. Generally speaking, I would call Preempt an identity analytics product. Its primarily focus is on threat detection in authentication platforms like Active Directory and integrated Single Sign-On (SSO) products.</p>
<p>The identity analytics space blurs the line between access control and threat detection. As you'd expect, the product includes detective analysis of events and log data. The preventive analysis features are far more exciting: the product also does analysis of account permissions and enables policy creation to help remediate potential issues before they happen.</p>
<p>The acquisition and strategy appears to be working. Specific numbers weren't provided, but George Kurtz talked about positive momentum on the earnings call:</p>
<blockquote>
<p>Demand is broad-based across the board, and it really hit an inflection point. We've seen massive growth in it, as we said, more than all Preempt had as a stand-alone company. And the thing is we took the time and effort to do the integration right. Customers see the value of a single integrated agent. They understand that identity is critical to security.</p>
</blockquote>
<p>He's absolutely right in saying identity is critical to security. I previously said this about the big opportunity for identity in both Zero Trust and XDR — two of CrowdStrike's high potential growth areas:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Zero Trust and XDR are both good opportunities for identity to collaborate with the rest of security.<br><br>It was easy for identity to get siloed before these two emerging trends. Now, identity and the data it produces are critical for ZT and XDR to function.</p>— Cole Grolmus (@colegrolmus) <a href="https://twitter.com/colegrolmus/status/1466128719798538251?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">December 1, 2021</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p>The big opportunity is that identity isn't truly integrated with the rest of security. The systems and data still remain silo'ed in many organizations. CrowdStrike is starting to change that paradigm by adding identity analytics to its platform.</p>
<p>This feels like a smart acquisition for CrowdStrike and a missed opportunity for Okta, SailPoint, and other identity-focused companies. Identity analytics has long been a forgotten feature that no product has truly solved at scale — especially not as a standalone company like Preempt was. The market hasn't been won yet, but a company like CrowdStrike putting its resources into it is a big step forward.</p>
<h2 id="protecting-cloud-assets">Protecting Cloud Assets</h2>
<p>CrowdStrike's biggest area of exposure is in the emerging markets for protecting cloud assets: Cloud Security Posture Management (CSPM) and Cloud Workload Protection (CWP). The combined markets are a strategic growth area where CrowdStrike could struggle if they don't keep pace with product innovations from startup companies.</p>
<p>When asked about growth in this area on the earnings call, the answer given was relatively opaque:</p>
<blockquote>
<p>So when we think about our Cloud Workload Protection, so right now, what we can tell you is that it's growing, it's continuing to grow, and we've seen growth in the amount of opportunities that are available to us in the cloud. Right now, we -- what we do talk about is the fact that 25% of our servers that we protect are in the cloud. So that's just giving you an indication of where we're going. Maybe George has a couple of other comments on that.</p>
</blockquote>
<p>Endpoint computing isn't going away any time soon. However, the number of assets to protect is growing more quickly in the cloud. Well-funded cloud startups like <a href="https://www.wiz.io/?ref=content.strategyofsecurity.com">Wiz</a> and <a href="https://orca.security/?ref=content.strategyofsecurity.com">Orca Security</a> are rapidly gaining traction and building great products. The competition in this part of the cybersecurity ecosystem is intense.</p>
<p>CrowdStrike's leadership team feels they are well-positioned and offered some insightful commentary about the product space. From George Kurtz:</p>
<blockquote>
<p>I think it's a largely greenfield opportunity. Obviously, you have a lot of early-stage companies out there, but this is so early in the life cycle, and it's a massive opportunity for all the players that are out there.<br>
<br>
We think we're in a great position because a lot of the players actually don't have the run time protection, which is important. You have to tie those two together. It just -- it isn't just about connecting, getting information from APIs, right? And although we do that in a differentiated way because we've basically ported some of our indicator of attack technology across that agentless technology, tying them together, I think, is really important for customers.</p>
</blockquote>
<p>CrowdStrike is in a unique position because they have runtime (also referred to as containers or workloads) protection and are already established leaders in endpoint security, including servers. The main challenges for CrowdStrike are whether offering both workload protection and CSPM together is valuable enough, and whether their product innovation can keep up with the startups who are exclusively focused on CSPM.</p>
<h2 id="future-growth-potential">Future Growth Potential</h2>
<p>CrowdStrike is already the most valuable pure cybersecurity company. The future is looking bright, too. George Kurtz described his thoughts on growth opportunities like this:</p>
<blockquote>
<p>And when you look at the market in its totality, right, you have things like cloud adoption, cloud expansion, massive opportunity, and we've proven that with servers and what we're doing there.<br>
<br>
When you look at the legacy players that are out there, the replacements, the Symantecs, the McAfees, Microsofts, et cetera, massive opportunity for us, that's a long tail. You don't do that in one year. So we see that as a big driver for next year.<br>
<br>
And as I pointed out, even -- I mean, it's a smaller base, but even the next-gen players, we see those as opportunities as customers get dissatisfied as I pointed out with some of the players that are out there.<br>
<br>
So -- and you got to bifurcate a bit into pure endpoint and cloud, and I see both as massive opportunities because, again, if you look at our overall customer count, it's fantastic, but it's still small in the grand scheme of customers that are out there. And there's still a lot of legacy technologies that are out there that are and will be displaced.</p>
</blockquote>
<p>CrowdStrike's 2021 Investor Product Briefling provides relevant data about exactly how much market share from legacy technologies is still left to be gained:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/12/crowdstrike-market-share.png" class="kg-image" alt="" loading="lazy" width="2000" height="1250" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2021/12/crowdstrike-market-share.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2021/12/crowdstrike-market-share.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2021/12/crowdstrike-market-share.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/12/crowdstrike-market-share.png 2000w" sizes="(min-width: 720px) 720px"></figure><p>Even as the dominant leaders of the EDR market, CrowdStrike and Microsoft combined still only hold 22% of the market share. CrowdStrike's bundling strategy and growth potential look even better when you add in the potential revenue from additional markets beyond EDR.</p>
<p>Their strategy for the future is clear: invest in growth and innovation. From CrowdStrike's CFO:</p>
<blockquote>
<p>We want to invest aggressively. We're not going to move away from that strategy.<br>
<br>
And then in R&amp;D, I think in investing in innovation is key and core to who we are. So I think that we're going to continue to keep our eye on that and invest in exactly what I talked about to be able to go after that massive opportunity that we see ahead of us. So that's how we think about it.</p>
</blockquote>
<p>Bundling large parts of the cybersecurity ecosystem might be possible after all — and if it is, CrowdStrike will be leading the way.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/12/v2_-CrowdStrike-Bundling.png"/>
        </item>
        <item>
            <title><![CDATA[CyberArk and the New Paradigm for Privileged Access]]></title>
            <link>https://strategyofsecurity.com/cyberark-and-the-new-paradigm-for-privileged-access/</link>
            <guid>6199b7dbb9377a0048de0c06</guid>
            <pubDate>Mon, 22 Nov 2021 13:05:00 GMT</pubDate>
            <description><![CDATA[A deep dive into CyberArk's Q3 2021 earnings and how the company is changing the paradigm for privileged access.]]></description>
            <content:encoded><![CDATA[<p>CyberArk is next up in my brief series of analyzing strategy for public cybersecurity companies during the Q3 2021 earnings period. They are another staple company among the current group of public cybersecurity companies —&nbsp;a model we can all learn from.</p>
<p>The company's revenue growth and stock price have risen steadily since their IPO in 2014. CyberArk is still led by its co-founder and CEO, Udi Mokady, who provided most of the insightful commentary on the earnings call. They have all the ingredients for continued success.</p>
<p>On to the updates. From <a href="https://www.yahoo.com/now/cyberark-announces-strong-third-quarter-111600213.html?ref=content.strategyofsecurity.com">Yahoo Finance</a>:</p>
<blockquote>
<p><strong>CyberArk Announces Strong Third Quarter 2021 Results</strong><br>
<br>
Total Revenue of $121.6 Million<br>
<br>
Subscription Bookings Mix Reaches 72%<br>
<br>
Subscription Portion of Annual Recurring Revenue (ARR) of $139 Million with Growth Accelerating to 131%<br>
<br>
Total ARR of $344 million with Growth Accelerating to 38%</p>
</blockquote>
<p>CyberArk is performing well as a company, and their leadership is clearly excited about the results. Here's the excitement in words from Udi Mokady on the earnings call:</p>
<blockquote>
<p>Q3 was another amazing quarter and we are thrilled with our results. If I could use only one word to characterize this quarter, it would be acceleration. Acceleration in the demand environment, and the underlying growth of the company, specifically bookings and in the metrics that demonstrate the health of the business.</p>
</blockquote>
<p>They have good reasons to be excited. Financially, their Annual Recurring Revenue (ARR) growth and other key growth metrics are all around 40%. They added over 230 new customers in this quarter alone. Excellent results for a company that has been doing well for a long time.</p>
<p>Udi Mokady summarized the quarter like this:</p>
<blockquote>
<p>Our business is accelerating on the back of record year-over-year bookings growth. SaaS is leading the way and reached a new record quarter this quarter. Privileged Cloud is pushing into the large enterprise and EPM has moved into the mainstream security discussion. Our subscription transition is making strong progress. Our industry-leading idea security platform across PAM, Access and DevSecOps has never been more relevant.</p>
</blockquote>
<p>CyberArk's strategy is clearly working. Let's get into more detail on a few of the items Udi Mokady mentioned.</p>
<h2 id="changing-the-privileged-access-paradigm">Changing the Privileged Access Paradigm</h2>
<p>The biggest news of all was difficult for the untrained eye to see. CyberArk announced general availability of a new product called <a href="https://www.cyberark.com/products/secure-web-sessions/?ref=content.strategyofsecurity.com">Secure Web Sessions</a>. The product monitors activity and protects sessions for specific web applications.</p>
<p>The announcement may seem "ho-hum." The important part is bigger than the product: the paradigm for privileged access is changing.</p>
<p>The traditional paradigm of privileged access is rigid. It's focused on specific types of people with specific types of access —&nbsp;typically IT people with administrative access to infrastructure. A System Administrator (specific type of person) with sudo access to Linux servers (specific type of access) is a classic example of the traditional paradigm.</p>
<p>Products like Secure Web Sessions advance the paradigm of privileged access to a more flexible and context-based model. Any type of person could have privileged access some of the time — certain roles or privileges in business applications. For example, a bank branch employee who can access the company's core banking application, override approvals, and wire money from your bank account is privileged in that specific business context. The same employee checking their email or personal employee benefits is not privileged in these low risk, business-as-usual processes.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/v1_-PAM-Paradigm-Shift.png" class="kg-image" alt="" loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2021/11/v1_-PAM-Paradigm-Shift.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2021/11/v1_-PAM-Paradigm-Shift.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2021/11/v1_-PAM-Paradigm-Shift.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/v1_-PAM-Paradigm-Shift.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>The new paradigm broadens the scope of people beyond IT. It also shifts the target of "privileged" from people to applications based on the meaning of risk in your organization. Udi Mokady explained the concept like this:</p>
<blockquote>
<p>We see the proliferation of privilege that you have more and more cases where a business user is actually privileged and the organization is worried about having no control over the session.</p>
</blockquote>
<p>The idea is a huge leap forward. The traditional paradigm of privileged access remains relevant in that many types of IT access are privileged and always will be. The new paradigm extends privileged access into the modern and dynamic era we live in today.</p>
<p>A better reflection of reality removes the fabricated barrier between business and IT and evaluates access on business risk and relevance. That's how privileged access should work. CyberArk is making it possible and practical for companies to implement.</p>
<p>The new paradigm has important business implications for CyberArk. Udi Mokady predicted the convergence of access management and PAM:</p>
<blockquote>
<p>Secure Web Sessions merges the worlds of access and PAM. We are now the only vendor in the market that can empower customers with continuous authentication and session protection, including session recording for all types of web applications from business apps to cloud consoles.</p>
</blockquote>
<p>If the worlds of access management and PAM truly do merge, CyberArk could become an important access management company. We'll talk about that next.</p>
<h2 id="identity-as-a-service-idaas-market-entry">Identity as a Service (IDaaS) Market Entry</h2>
<p>Unbeknownst to many, CyberArk officially entered the Identity as a Service (IDaaS) market (otherwise called cloud access management) with their <a href="https://www.cyberark.com/press/cyberark-acquires-identity-as-a-service-leader-idaptive/?ref=content.strategyofsecurity.com">acquisition of Idaptive</a> in 2020. This category was previously an adjacent space to PAM that CyberArk left to companies like Okta, Ping Identity, and ForgeRock.</p>
<p>As I wrote earlier when <a href="https://strategyofsecurity.com/p/okta-auth0-q2-2021-results/">analyzing Okta and Auth0's strategy</a>, it's a big deal for public companies in adjacent markets within the wider <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/">Access Control ecosystem</a> to start competing:</p>
<blockquote>
<p>Okta entering the Identity Governance (IGA) and Privileged Access Management (PAM) markets is a big deal. These markets are traditionally owned by two of Okta's contemporary peers — IGA by SailPoint, and PAM by CyberArk. Along with Ping Identity, these identity-focused companies essentially grew up together and IPO'ed at roughly similar times.</p>
</blockquote>
<p>A quick aside: CyberArk's acquisition of Idaptive for $70 million is a dramatically different approach than Okta's splash acquisition of Auth0 for $6.5 billion. The comparison is apples and oranges, but CyberArk's strategy is interesting to look at. They bought a relatively stable product (Idaptive was a <a href="https://www.centrify.com/about-us/news/press-releases/2018/centrify-spins-out-idaptive/?ref=content.strategyofsecurity.com">spinoff from Centrify</a>) at a nominal price. Putting the CyberArk brand behind the product immediately amplifies its value because of the trust CyberArk has gained in the market. They knew exactly what they were doing and what the upside would be without paying billions (or even hundreds of millions) to execute their strategy.</p>
<p>CyberArk's strategy for entering the cloud access management market is intentional and focused. While Okta, ForgeRock, Ping Identity, and others are off chasing Customer Identity (CIAM), CyberArk is squarely focused on workforce access management.</p>
<p>There are two different approaches to the product that are in play here, and both are viable. Okta, ForgeRock, Ping Identity, and others in the existing cloud access management market approach their products as an authentication platform capable of delivering both workforce and customer use cases. CyberArk's approach banks on the convergence of traditional privileged access and user access management exclusively for workforce use cases.</p>
<p>Udi Mokady gave this commentary on the topic during the Q3 earnings call:</p>
<blockquote>
<p>I think we benefit from the two worlds right now where for a customer looking to put in that critical layer of Privileged Access Management. CyberArk is the market leader, go to us. We have the go to market, the reach and the opportunity to really capture that demand is strong and the strongest I can recall for Privileged Access Management.<br>
<br>
Access is a new motion for us and -- but it's a huge growing market because of the need to enable digital transformation. And we can write it -- and the way we're doing it is very much centered on our customer base that trust us on PAM. So I would say they're both in strong demand.<br>
<br>
PAM is definitely the one that resonates the most with the CISO is a layer that they must have and need to present to the Board. And I would say, even a basic pillar of their cybersecurity strategy. So PAM is more of cybersecurity driven. Our PAM customers trust us with the expansion to the rest of the portfolio, and Access gets the driver of digital transformation and enablement, which is also here to stay.</p>
</blockquote>
<p>CyberArk's focus is an important thesis that could be the difference in who eventually wins the market. They could gain significant traction if companies care more about managing privileged access within their workforce instead of using the same access management platform across both workforce and customer identity. Or, they could win because enterprises trust them for Privileged Access Management, and workforce access management is a logical extension of their hard-earned trust. It's fair to say CyberArk is currently an underdog, but they have a chance. Persistence might eventually pay off.</p>
<p>The early results are positive. In the most recent Forrester Wave report for Identity As A Service (IDaaS) For Entrerprise, CyberArk is already ranked in the Leaders category — notably ahead of both Microsoft and Ping Identity:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/cyberark-forrester-wave.png" class="kg-image" alt="" loading="lazy" width="1464" height="1614" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2021/11/cyberark-forrester-wave.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2021/11/cyberark-forrester-wave.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/cyberark-forrester-wave.png 1464w" sizes="(min-width: 720px) 720px"></figure><p>At worst, CyberArk should become the third or fourth best product in the access management market. It's a large market that is adjacent to CyberArk's core business in the Privileged Access Management (PAM) market. Earning a few million dollars of "extra" ARR from an adjacent market is still a good outcome — especially since the upside of winning the entire market is clearly higher.</p>
<h2 id="saas-transition">SaaS Transition</h2>
<p>Like SailPoint, CyberArk is also in the middle of a product transition from on-premise to SaaS. When <a href="https://strategyofsecurity.com/p/q3-2021-cybersecurity-earnings-strategies-for-services-saas-and-platforms/">writing about SailPoint</a>, I said this about the transition process:</p>
<blockquote>
<p>Companies like SailPoint, who built and grew with exclusively on-premise software, often stumble when crossing the chasm from their legacy on-premise products to SaaS solutions. It appears that SailPoint is going to be an exception — one of the few companies to successfully navigate the transition and remain a market leader on the other side.</p>
</blockquote>
<p>The same thought certainly applies to CyberArk as well. In fact, the degree of difficulty for CyberArk's product transition is even harder.</p>
<p>Privileged Access Management (PAM) is going to be one of the last cybersecurity services companies move to the cloud. Many security leaders (enterprises in particular) are reluctant to move their most sensitive credentials out of their own data centers. Privileged accounts and their credentials are the holy grail for attackers. If the vault the credentials are stored in is compromised, it's game over.</p>
<p>CyberArk is starting to mount some important wins for their SaaS platform. Udi Mokady highlighted a big one from Q3:</p>
<blockquote>
<p>In the third quarter, a Fortune 30 company signed our largest annual contract for Privilege Cloud ever, a great win that demonstrates the increased adoption we are seeing in our enterprise customer base.</p>
</blockquote>
<p>It's hard to overstate how significant it is for a Fortune 30 company to be using a cloud-based PAM platform. The process will be much slower for other companies — and some will never migrate until they're forced — but wins like this make a statement that CyberArk's SaaS platform is viable.</p>
<p>In yet another parallel to SailPoint's SaaS transition strategy, CyberArk is also giving its customers the space and time they need to make the transition. From Udi Mokady:</p>
<blockquote>
<p>...to move to SaaS is more gradual among the enterprise while we find ourselves pleasantly surprised like some of the examples I gave in the Fortune 30 customer that more and more enterprises are also migrating taking on Privilege Cloud. We'll see that as a pathway over the year -- in the coming years. And one of the strengths of CyberArk is really giving customers optionality on how to consume the identity security portfolio.</p>
</blockquote>
<p>This approach is unsurprising, and completely the right strategy. In CyberArk's case, transitioning to SaaS is even more of a sensitive topic given the nature of their business and their flagship PAM product.</p>
<h2 id="subscription-model-transition">Subscription Model Transition</h2>
<p>Like its <a href="https://strategyofsecurity.com/p/q3-2021-cybersecurity-earnings-strategies-for-services-saas-and-platforms/">longtime peer SailPoint</a>, CyberArk is also undergoing a transition from perpetual licenses to a subscription model. This is an industry-wide trend for companies who started with primarily on-premises products. It's a necessary step on the journey towards SaaS, among other reasons.</p>
<p>Udi Mokady summarized the progress they've made with transitioning to a subscription model:</p>
<blockquote>
<p>Customers are embracing the subscription model as evidenced by 72% of new license bookings coming from SaaS and subscription in the third quarter, ahead of our guidance framework.</p>
</blockquote>
<p>A 72% subscription mix this quarter is good on the surface. However, the figure is slightly opaque on its own. As shown in the chart below, 44% of total subscription revenue ($54 million) came from recurring maintenance from perpetual contracts:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/cyberark-q3-2021-subscription-details.png" class="kg-image" alt="" loading="lazy" width="2000" height="1123" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2021/11/cyberark-q3-2021-subscription-details.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2021/11/cyberark-q3-2021-subscription-details.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2021/11/cyberark-q3-2021-subscription-details.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/cyberark-q3-2021-subscription-details.png 2000w" sizes="(min-width: 720px) 720px"></figure><p>The strategic implication with this additional level of detail is that CyberArk still has a way to go before it reaches a true subscription model driven by SaaS. Recurring maintenance from perpetual contracts is a hangover from the exact licensing model they're trying to escape. Subscriptions for on-premises implementations are a midway point. SaaS is the gold standard for a true subscriptions company. Both of those combined are only 29% of total subscription revenue for CyberArk.</p>
<p>Pure SaaS revenue of $19 million is fairly encouraging for a company like CyberArk. As I discussed earlier, transitioning to SaaS is going to be an uphill climb. To generate even the revenue they currently have from SaaS should be considered a big win.</p>
<p>Semantics aside, CyberArk is planning to be done with their version of the subscription transition earlier than expected. From Udi Mokady:</p>
<blockquote>
<p>As we expected when we began the subscription journey, customers are getting faster type of value and prioritizing our platform, which will result in higher lifetime value over time. We are thrilled with the progress of our subscription transition. And with our success year-to-date, we are confident we will exit the transition by the third quarter of 2022.</p>
</blockquote>
<p>CyberArk's CFO provided additional details about the growing trend of subscription-based licenses for new customers this quarter:</p>
<blockquote>
<p>We signed more than 230 new customers with 85% of them opting for subscription compared to about 59% in the third quarter of last year.</p>
</blockquote>
<p>Reaching this point in the transition to subscriptions is a good financial accomplishment. Based on the current mix of subscriptions for new customers, the recurring maintenance for perpetual contracts will slowly fade away and absorb itself into regular subscriptions.</p>
<p>If the (admittedly nit-picky) classification of subscription revenue types is the biggest critique of CyberArk's results, they're doing an excellent job as a company. Future developments with CyberArk's move into cloud access management will be significant for the cybersecurity ecosystem and interesting to follow from a strategy perspective.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/v1_-CyberArk-Q3-2021-Earnings.png"/>
        </item>
        <item>
            <title><![CDATA[Q3 2021 Earnings: Strategies for Services, SaaS, and Platforms]]></title>
            <link>https://strategyofsecurity.com/q3-2021-cybersecurity-earnings-strategies-for-services-saas-and-platforms/</link>
            <guid>618ebd57d0e23a003b16c98d</guid>
            <pubDate>Mon, 15 Nov 2021 13:27:00 GMT</pubDate>
            <description><![CDATA[The top highlights in recent Q3 2021 earnings announcements from Mandiant, SailPoint, and Qualys.]]></description>
            <content:encoded><![CDATA[<p>There has been a slew of earnings announcements in the past two weeks as companies end Q3 and move into the final quarter of 2021. All of the <a href="strategyofsecurity.com/public-cybersecurity-companies/">public cybersecurity companies</a> are doing well —&nbsp;some <em>very</em> well. It's a good time to be a publicly-traded cybersecurity company. And <a href="https://www.reuters.com/technology/software-company-hashicorp-files-us-ipo-2021-11-04/?ref=content.strategyofsecurity.com">more companies</a> will be joining the party soon.</p>
<p>Earnings calls are one of the best ways to get a peek into a company's strategy. Looking at a group of companies in aggregate is interesting because it gives us some insights into developments across the entire cybersecurity ecosystem.</p>
<p>I wanted to spend some time doing a roundup of a few specific companies and trends: Mandiant, SailPoint, and Qualys for this article. I've <a href="https://strategyofsecurity.com/p/mandiant-and-the-future-of-cybersecurity-professional-services/">written about Mandiant</a> in the past. Coverage for SailPoint and Qualys is new.</p>
<p>This quarter is the first major grouping of earnings announcements since I started writing (we were at the tail end of Q2 when I wrote my first article). Bigger picture, I will continue expanding coverage and analysis of cybersecurity companies and their strategies.</p>
<p>I plan to analyze both private and public companies, similar to how I've written about companies like <a href="https://strategyofsecurity.com/p/okta-auth0-q2-2021-results/">Okta</a>, <a href="https://strategyofsecurity.com/p/tessian-and-cybersecuritys-journey-towards-augmented-humanity/">Tessian</a> and more. There's a bit of runway required to reach widespread coverage, but I expect the results will be worth the time once I get there.</p>
<p>On to the updates.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/Logo_-Mandiant.png" class="kg-image" alt="Mandiant" loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2021/11/Logo_-Mandiant.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2021/11/Logo_-Mandiant.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2021/11/Logo_-Mandiant.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/Logo_-Mandiant.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>It's an interesting time for Mandiant — there's a lot going on with the company. Given the amount of activity, this is a longer update.</p>
<p>From <a href="https://seekingalpha.com/news/3766419-mandiant-shares-slip-almost-3-following-cybersecurity-companys-mixed-results?ref=content.strategyofsecurity.com">Seeking Alpha</a>:</p>
<blockquote>
<p>Mandiant (NASDAQ:MNDT) shares fell more than 3%, Friday, as investors had a mixed response to the cybersecurity company's first quarterly results since it was spun off from FireEye in October.<br>
<br>
On Thursday, Mandiant (MNDT) said its third quarter adjusted pre-spinoff earnings were 6 cents a share, on revenue of $122 million, compared a profit of 11 cents a share, on $100 million in revenue in the same period a year ago. Wall Street analysts were looking for the company to earn 6 cents a share on $120.2 million.</p>
</blockquote>
<p>Kevin Mandia made one thing explicitly clear on the Q3 earnings call: expect volatility for a year or more until the post-divestiture activity from FireEye settles down. In his exact words:</p>
<blockquote>
<p>We felt very confident saying that we are going to be operating margin positive from a non-GAAP perspective in 2023 because there is significant Mandiant’s re-launch costs that happened in Q4 and carried through 2023. So there’s a little bit more noise in 2022. But 2023, we feel very good that you will start seeing pretty significant leverage each and every quarter going forward.</p>
</blockquote>
<p>For investors, that's going to mean inconsistency in their financials and stock price for the next year or so. For anyone taking a longer-term outlook, these are totally reasonable expectations and part of a much bigger and exciting business strategy.</p>
<h3 id="post-fireeye-revenue-growth">Post-FireEye revenue growth</h3>
<p>The new Mandiant is growing at a rapid rate — especially for a company with substantial revenue from professional services. Total revenue for Q3 increased 22% year-over-year to $122 million. Annual recurring revenue (ARR) grew 26% year-over-year to $264 million.</p>
<p>Anything over 20% growth is great for a public cybersecurity company. Both the growth and total amount of ARR is especially great for a professional services focused company like Mandiant. Traditional professional services firms have essentially no recurring revenue — they have to win it year over year, project after project.</p>
<p>Mandiant also won several projects greater than $1 million. Wins included a specific example of their productized services strategy. From Kevin Mandia:</p>
<blockquote>
<p>Mandiant deals greater than $1 million grew 79% year-over-year from 14 deals a year ago to 25 deals this past quarter. The total value of these deals greater than $1 million almost doubled, growing from $24 million to $47 million year-over-year.<br>
<br>
As an example of these larger deals we added a new Fortune 50 customer, who in addition to our incident response expertise, asked us to help transform this security program through a powered by Mandiant approach that leverages our full suite of intelligence validation, and a Mandiant advantage platform.</p>
</blockquote>
<p>The Fortune 50 security program transformation example is more important than your average citation for a customer win. This demonstrates progress towards fixing one major problem: consistency of revenue outside of up-and-down incident response services. It's also a quick win for their vision of professional services enabled by technology. As I've previously written, quick results like this are desperately needed:</p>
<blockquote>
<p>Mandiant's productized services model has to start showing results quickly. If it doesn't, investors are going to view Mandiant as just another professional services firm with underperforming profitability.</p>
</blockquote>
<h3 id="mandiant-advantage-platform-expansion">Mandiant Advantage platform expansion</h3>
<p>Mandiant announced several big plans for additional features on their Mandiant Advantage SaaS platform. The first announcement was the addition of active breach and intel monitoring:</p>
<blockquote>
<p>We plan to launch active breach and intel monitoring the first quarter of 2022. This capability enables visibility into Mandiant threat intelligence in real time. It is the functional equivalent of collaborating with our incident responders in the field, proactively checking our customers’ environment with the most up-to-date intelligence available as respond to the new and novel cyber attacks.</p>
</blockquote>
<p>The idea of building <em>"the functional equivalent of collaborating with our incident responders in the field"</em> is exactly in line with the productized services theme I've been so excited about.</p>
<p>The second announcement was the addition of attack surface management, driven by the acquisition of <a href="https://www.intrigue.io/?ref=content.strategyofsecurity.com">Intrigue</a>:</p>
<blockquote>
<p>Intrigue allows Mandiant to deliver attack surface management (or ASM) as another module in the Mandiant advantage platform. ASM identifies how organizations could be compromised by identifying applications that are visible, vulnerable and exploitable and we point that out net. We have already derived significant value in our services business from this capability, and we plan to integrate attack service management into the Mandiant advantage platform in the first quarter of 2022.</p>
</blockquote>
<p>Attack surface management is important because it's a layer deeper than pure asset management. Knowing your asset inventory is still important, but the ability to understand what could be exploited and how is valuable. As Kevin Mandia stated, it's also a driver of add-on services — someone has to prioritize and fix the vulnerabilities.</p>
<p>A deeper dive into the vision for the Mandiant Advantage platform is another article for another time. For now, it's encouraging to see the progress with additional platform capabilities and cohesion with professional services.</p>
<h3 id="professional-services-growth-and-opportunities">Professional services growth and opportunities</h3>
<p>Mandiant's professional services are extremely profitable. Like, <em>2x or more than industry average</em> profitable. Margins in Q3 were 51%, which is relatively consistent with prior quarters. They're also growing at a rapid pace across both incident response and proactive consulting engagements. From Kevin Mandia:</p>
<blockquote>
<p>We had a record third quarter for Mandiant consulting revenue at $61.7 million, representing 20% year-over-year growth while growing deferred revenue to $113.1 million.<br>
<br>
While we continue to respond to very prominent and well publicized security breaches globally, we also continue to maintain a healthy balance across our services portfolio, scheduling proactive and strategic services well into 2022. Our security transformation practice grew revenues approximately 40% year-over-year.</p>
</blockquote>
<p>When you're investing a ton of money in building a SaaS platform, it sure helps to have this kind of profitability in professional services to draw from. Better yet, the investments in the SaaS platform are mutually reinforcing: they create even more services revenue and higher margins.</p>
<p>The longer-term opportunity is productized services. Mandiant seems to understand this opportunity more than anyone else. From Kevin Mandia:</p>
<blockquote>
<p>We believe we are uniquely positioned to address an enormous market need. We intend to continue automating Mandiant expertise to create a scalable more effective platform for the next generation of security operations. I believe we are at the onset of the convergence of security automation, managed services, XDR and security consulting. And this convergence is necessary to help deliver the outcome organizations want. They want a comprehensive, effective and efficient security program that instills confidence that the organization is secure from the latest cyber threats.<br>
<br>
...<br>
<br>
We are building towards technology enabled services as well, where you get more leverage from the consultants. What that means is, as our consultants use the platform more and more to deliver things like Ransomware assessments or as we learn to scale managed defense with other products through our own platform, you get to see the margins increase, gross margin will get better. And at the same timeframe you just see more leverage there and more scalability. We can deliver things quicker and faster, which leads to growth.</p>
</blockquote>
<p>The machinery to do this is being built as we speak, and it's already starting to work.</p>
<h3 id="partnerships">Partnerships</h3>
<p>Finally, a quick word on partnerships. It was interesting to hear Mandiant's leadership team speak so bluntly about how badly FireEye handcuffed their ability to create and sustain partnerships. Kevin Mandia summarized the problem like this:</p>
<blockquote>
<p>We were surrounded as FireEye. We were email security, network security, we had a SIM, we had an endpoint. We had services, managed services, intel, we were in every single business and it made it very hard to have frictionless partners. So we have a very aligned strategic operations group to get leverage from partnerships that historically, we haven’t had any.</p>
</blockquote>
<p>With FireEye, they were basically competing with everyone and couldn't form partnerships. This approach works great if you're a closed ecosystem with industry-leading products in nearly every product category you operate in. FireEye was certainly not that, so the strategy didn't work.</p>
<p>Now that Mandiant is more conflict-free, the phone for partnerships has already started ringing:</p>
<blockquote>
<p>I can’t emphasize how important Mandiant being vendor agnostic is, it literally allows us we are getting inbound calls to partner for the first time since about 2015. So now we’ve got leverage from partners that are possible.</p>
</blockquote>
<p>This might not seem significant, but partnerships are one of the main channels for growth in the cybersecurity industry. I wrote about ForgeRock's potential over-reliance on partnerships in <a href="https://strategyofsecurity.com/p/forgerock-ipo/">ForgeRock's IPO, Identity Crisis, and Path Forward</a>:</p>
<blockquote>
<p>At this point, ForgeRock is essentially locked into its parter-driven distribution model. Put differently, much of their future growth is beholden to others. The company doesn't have many options other than to accept the risk and try to keep its partners happy and engaged. Top-down sales models work — they're just more complicated and tumultuous when powerful third parties are involved.</p>
</blockquote>
<p>Under FireEye, Mandiant was in exactly the opposite situation. Nobody wanted to partner with them, so all of their sales had to be driven organically. For Kevin Mandia to flat out say they got no inbound calls for partnerships since 2015 is an incredible anecdote for how difficult their situation was. Under-reliance on partners is not a recipe for success, either — as Kevin Mandia made blatantly clear.</p>
<p>Mandiant still has a lot of work to do to build a partnerships program from the ground up. A balanced mix of sales-driven and partner-driven growth is the path forward. The progress so far is encouraging.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/Logo_-SailPoint.png" class="kg-image" alt="SailPoint" loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2021/11/Logo_-SailPoint.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2021/11/Logo_-SailPoint.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2021/11/Logo_-SailPoint.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/Logo_-SailPoint.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>I have been wanting to write about SailPoint for quite a while. Now seems like a great time to start — Q3 was all sunshine and roses for them.</p>
<p>From <a href="https://seekingalpha.com/news/3768560-sailpoint-technologies-shares-climbs-after-q3-tops-estimates-boosts-full-year-revenue-outlook?ref=content.strategyofsecurity.com">Seeking Alpha</a>:</p>
<blockquote>
<p>SailPoint Technologies (NYSE:SAIL) up 12% after yesterday's third quarter results beat top and bottom-line estimates.<br>
<br>
Total revenue grew 17% year-over-year to $110.1M, above the consensus of $103.9M. The company did break even in the quarter, above $0.07 loss expected by analysts.</p>
</blockquote>
<p>SailPoint is one of the pillar companies among the current group of publicly-traded cybersecurity companies. This quarter showed exactly why. Their overall revenue growth was solid, but the fundamentals are even better. Most importantly, they're successfully transitioning to a subscription-based revenue model with a balance of product investments in their on-premise and SaaS offerings.</p>
<h3 id="transition-to-subscription-based-pricing">Transition to subscription-based pricing</h3>
<p>SailPoint's transition to subscription-based pricing is important for both customers and the company itself. For most customers, subscription pricing is a better model than multi-year licensing contracts because they don't have to pay the entire license up front. For SailPoint, it means more predictable revenue and essentially indefinite contract lengths.</p>
<p>SailPoint's CEO, Mark McClain, explained more about where the company is at in the transition:</p>
<blockquote>
<p>Our transition to a subscription-based business model, which we outlined at our analyst day earlier this year, has happened well ahead of our initial expectations. In Q3, 87% of the total new bookings came from our subscription-based offerings up from 82% last quarter, and 72% in Q1. This accelerated timeline has been driven by two key factors. Incredibly strong growth in demand for our SaaS platform, and customers desire to procure our other products on a subscription basis. Our transition to a subscription model is, in our view, largely complete.</p>
</blockquote>
<p>For SailPoint, perpetual licenses are essentially a thing of the past:</p>
<blockquote>
<p>We ended the third quarter with $179 million of ARR from our subscription-based offerings, which represents an 81% year-over-year increase. Our subscription ARR consists of $132 million from SaaS and approximately $47 million from recurring term licenses.<br>
<br>
With over $110 million of total revenue this quarter, less than 10% came from perpetual licenses. Further highlighting that our transition to a subscription revenue model is in our view largely complete, but we expect to see the occasional new perpetual license transaction and ongoing expansion deals for current customers, our entire team's principal focus is on selling SaaS and term licenses.</p>
</blockquote>
<p>Subscriptions are primarily measured in ARR, and 81% growth in that category means they're well on their way. Bigger picture, the transition in pricing model is an indicator for the company's overall shift to a SaaS mentality.</p>
<h3 id="transition-to-being-saas-first">Transition to being "SaaS-first"</h3>
<p>Companies like SailPoint, who built and grew with exclusively on-premise software, often stumble when crossing the chasm from their legacy on-premise products to SaaS solutions. It appears that SailPoint is going to be an exception — one of the few companies to successfully navigate the transition and remain a market leader on the other side.</p>
<p>On the earnings call, they talked about "leading with SaaS":</p>
<blockquote>
<p>That's the motion, it's the principal motion of the sales force today is to lead with SaaS and we're doing that, and it's having great success and that's demonstrated by the numbers you saw in the release today.</p>
</blockquote>
<p>Shifting the mindset of the sales organization is a good start. More importantly, customers need to be in the mindset of buying SaaS. Mark McClain gave some good historical context on this topic:</p>
<blockquote>
<p>We talked to the market 15 years ago, when get this company started...it was just very clear that those high-end customers were not really interested in getting this product delivered as a SaaS offerings, that has shifted. I think their preference has shifted to a kind of a SaaS first expectation, their confidence in the kind of bulletproof nature of the security environments of the cloud providers like Amazon and Azure and Google is just very high. And so I think they trust and believe this is in fact, a very secure way to manage it and they get that SaaS is just a really, really smart way to do this to continue to allow them and as to extend the product quickly and easily over time.</p>
</blockquote>
<p>For SailPoint, this mindset shift to SaaS is important because they've been building their IdentityNow SaaS offering for years. They were prepared for this transition and made the appropriate investments in product.</p>
<h3 id="migrating-customers-from-on-premise-to-saas">Migrating customers from on-premise to SaaS</h3>
<p>Even though the licensing model transition was relatively fast, the transition of customers from SailPoint's on-premise IdentityIQ product to its cloud-based IdentityNow product is happening slowly. Their strategy is clearly to let customers make the transition at their own pace, at least for the time being. From Mark McClain:</p>
<blockquote>
<p>We really do want to reinforce we're not pressing people to make this move, where we're going to increasingly think we'll hear more about their interest in it from some subset of our base. But as Cam said, there is pressure on those customers to migrate, but we do anticipate seeing a little more uptick over -- starting more next year and probably increasing frankly in the next few years, but still with a large IQ base probably for quite a long time in front of us.</p>
</blockquote>
<p>This is probably a good business strategy given SailPoint's focus on long-term customer relationships. The nature of Identity and Access Governance (IAG) tends to be long-term usage — once the product is implemented, it's prohibitively expensive to replace. Customers remain customers for years, and possibly decades.</p>
<p>SailPoint's challenge with this approach is in product strategy. Continuing to make investments in building both an on-premise and SaaS product is expensive. From Cam McMartin:</p>
<blockquote>
<p>And quite frankly, the fact that we continue to make investments in the IdentityIQ product portfolio, to enrich and extend the value prop there. So in both ways, that this will be a multi-year transition process.</p>
</blockquote>
<p>In their case, IdentityIQ and IdentityNow are essentially two separate products with minimal overlap in the codebase. This differs from competitors like ForgeRock, who run essentially the same product on-premise and in the cloud.</p>
<p>A multi-year transition process with no end in sight either means continuously high expenses in developing both products or dilution of progress in both. This conundrum is more a reflection of the market than a fault of SailPoint: a significant portion of companies aren't ready to run their IAG solution in the cloud yet.</p>
<h3 id="opportunities-for-replacing-legacy-iam-solutions">Opportunities for replacing legacy IAM solutions</h3>
<p>Being stuck in the middle of the IAG market's on-premise to cloud conundrum isn't great news in the near term, but there is a lot of longer-term upside. Mark McClain explained exactly how far there is to go and how much opportunity remains:</p>
<blockquote>
<p>I think we're in the first third of the game in terms of the amount of legacy particularly legacy implementations in these larger enterprises that is still yet to be turned over. And so we're pretty bullish on the number of places, we think we can still take the solution in the Fortune Global 5000 around the world, I think there's a lot of installed identity products out there still from the legacy players.</p>
</blockquote>
<p>Continuing the metaphor, SailPoint reached the point of being a public company with $400m in annual revenue in the first third of the game alone. They still have lots of room to grow. Even better, the COVID-19 pandemic has accelerated people's understanding about the importance of identity to a security program:</p>
<blockquote>
<p>In general, this is more like a sea change of people just recognizing that identity is a vector they weren't as focused on managing wealth in their enterprises, that only got exposed and highlighted a bit through the early stages of the pandemic.<br>
<br>
...<br>
<br>
It's just a level of awareness that so many of the bad things that happen are related to some level of compromised identity. And that's just driving a lot of focus in this area.</p>
</blockquote>
<p>This trend is great news for SailPoint and any other company in the broader access control portion of the cybersecurity ecosystem.</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/Logo_-Qualys.png" class="kg-image" alt="Qualys" loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2021/11/Logo_-Qualys.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2021/11/Logo_-Qualys.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2021/11/Logo_-Qualys.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/Logo_-Qualys.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>Qualys is one of the more mature public companies in cybersecurity, having IPO'ed nearly 10 years ago in 2012. The company's stock and overall growth have struggled in the past year — it's down 25% from all-time highs. However, positive trends in their strategy are starting to show.</p>
<p>From <a href="https://www.nasdaq.com/articles/qualys-qlys-q3-earnings-and-revenues-top-estimates-2021-11-03?ref=content.strategyofsecurity.com">NASDAQ</a>:</p>
<blockquote>
<p>Qualys, which belongs to the Zacks Security industry, posted revenues of $104.93 million for the quarter ended September 2021, surpassing the Zacks Consensus Estimate by 0.77%. This compares to year-ago revenues of $93.07 million. The company has topped consensus revenue estimates four times over the last four quarters.<br>
<br>
Qualys shares have added about 2.5% since the beginning of the year versus the S&amp;P 500's gain of 23.3%.</p>
</blockquote>
<p>Qualys is at an interesting juncture as a company. They have long been known for vulnerability management, dating all the way back to their beginnings in 2000 when they became the first SaaS-based vulnerability management platform. They're a market leader in vulnerability management, but the company has struggled with growth relative to top performing cybersecurity companies — just a 13.97% compound revenue growth rate over the past three years.</p>
<p>Qualys is a notable exception among public cybersecurity companies because they're profitable at the expense of growth. To increase growth, they are now pursuing a broader platform strategy with product consolidation as its primary value proposition.</p>
<h3 id="consolidation-of-security-tools">Consolidation of security tools</h3>
<p>Qualys is using its strong position as a leader in vulnerability management to implement a broader platform strategy. Vulnerability management is a solid foundation for expansion into other adjacent product categories because it's established and ubiquitous — every company needs to do vulnerability management, and Qualys is the tool of choice for many.</p>
<p>Qualys's goal with the Qualys Cloud Platform is to be at the center of a company's end-to-end security program with integrated "apps" that cover multiple needs. Their marketing headline is an accurate depiction of this strategy: "One Platform. One Agent. One View."</p>
<p>They believe this strategy is starting to show proof of results. From CEO Sumedh Thakar:</p>
<blockquote>
<p>We believe that these new wins and expansions illustrate that when customers are ready to re-architect and consolidate their security stack, Qualys is the best cloud-native, multi-solution platform to meet their needs.</p>
</blockquote>
<p>Qualys's broader thesis is that companies want to consolidate their security tools and use a centralized platform. Sumedh Thakar went into additional details about what Qualys is seeing and hearing from their customers:</p>
<blockquote>
<p>What we see right now is new customers, when they are coming to us they are in the mental state where they really are looking to re-architect their security solution and look for a new vendor. And so when they see that Qualys is providing not only just a list of vulnerabilities, but the ability to patch, the ability to have asset inventory, the ability to have File Integrity Monitoring and other capabilities, policy compliance built in that's why we see that our top new customers this quarter, as we said also last quarter, right out the bat when they buy something from Qualys, they're not just buying VMDR, they're buying other capabilities, including patch management, as well as file integrity monitoring and other solutions right off the bat. So we see that desire to consolidate with the fact that our platform actually provides that in a seamless and easy manner. A combination of that is what we see in our conversation with customers.</p>
</blockquote>
<p>The vendor fatigue is real — nobody would question the sentiment companies feel about too many vendors or pains from integrating products. Qualys's strategy to try and address the problem is a logical. It's also a tall order to execute successfully.</p>
<p>I remain skeptical about the monolithic, one-platform-to-rule-them-all product strategy in cybersecurity, at least in the near term:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Cybersecurity vendor fatigue is going to be around for a while.<br><br>The big monolith isn't coming. You'd probably be disappointed if it did.<br><br>Use the best products. Build good integrations between them.</p>— Cole Grolmus (@colegrolmus) <a href="https://twitter.com/colegrolmus/status/1448670757823913985?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">October 14, 2021</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>The risk with this strategy is dilution: average or below-average products in multiple product categories. Market leadership in few to none.</p>
<p>Qualys already has market leadership in vulnerability management, so it will be interesting to see the progress they can make with their centralized platform strategy.</p>
<h3 id="entering-the-xdr-market">Entering the XDR market</h3>
<p>Like seemingly everyone these days, Qualys is entering the XDR market. The interesting part isn't the news — it's their strategy for differentiating the XDR product from others in the market. Sumedh Thakar described their approach for differentiation like this:</p>
<blockquote>
<p>Where we differentiate ourselves in the approach that with Qualys platform deployed, as you see, so many solutions already consolidated on the platform, a customer who has the current Qualys capabilities already is getting all the telemetry needed...So the amount of additional information needed for correlation from third party products is limited to firewalls and a few other solutions like that.<br>
<br>
The deployment and the value that a customer can get by being in their existing Qualys account and enabling this capability XDR capability and then being able to bring third party data, we believe is going to be very differentiating in the market where typical XDR solutions require a lot of time to get them deployed and get them working and a lot of professional services are required.</p>
</blockquote>
<p>Qualys's strategy for entering the XDR market is a specific instance of the centralized platform strategy in practice. If a customer is using multiple apps within the Qualys Cloud Platform, they already have most of the data they need for an XDR product to function. A few additional integrations might be required, but the total nets out to less because of the centralized platform. That's a pretty compelling value proposition.</p>
<p>Again, an interesting strategy to watch — especially in an emerging market like XDR where value propositions vary widely and remain somewhat unclear.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/v1_-Cybersecurity-Earnings---Q3-2021-1.png"/>
        </item>
        <item>
            <title><![CDATA[Tessian and Cybersecurity's Journey Towards Augmented Humanity]]></title>
            <link>https://strategyofsecurity.com/tessian-and-cybersecuritys-journey-towards-augmented-humanity/</link>
            <guid>618aa288eb021a003b3dbcf8</guid>
            <pubDate>Tue, 09 Nov 2021 17:14:40 GMT</pubDate>
            <description><![CDATA[Humans are a massive security risk. They're also the only chance we've got. The future is security designed for humans and augmented with technology.]]></description>
            <content:encoded><![CDATA[<p>What if security was designed for humans and embedded in everything we do? That's the question I took away from Tessian's <a href="https://www.tessian.com/human-layer-security-summit-registration/?ref=content.strategyofsecurity.com">Human Layer Security Summit</a> last week.</p>
<p>The event was hosted by Tessian, a Series C company founded in 2013. The message was about so much more. We're entering an era of human-centered security. Their products and subsequent discussion at the event give us a look into what the the future of security could hold if design and human augmentation prevail.</p>
<h2 id="resignation-and-bad-vibes">Resignation and Bad Vibes</h2>
<p><a href="https://www.forrester.com/analyst-bio/Jess%20Burn/BIO13444?ref=content.strategyofsecurity.com">Jess Burn</a>, a Senior Analyst at Forrester, <a href="https://youtu.be/vorZVurNMUc?ref=content.strategyofsecurity.com">summed up the current mindset</a> of many cybersecurity professionals:</p>
<blockquote>
<p>"I was most surprised about the level of resignation that we saw in the data for those security leaders and security pros that have all the traditional email security and DLP tools in place. But none of them are stopping the sophisticated phishing and BEC (Business Email Compromise) attacks.<br>
<br>
40% said they see, on average, 10+ employee-related security incidents per month.<br>
<br>
It was surprising, but it was also a little bit sad to see that level of resignation because there are solutions out there that can help. It's time to start thinking about what comes next for email security as sophistication only continues to rise."</p>
</blockquote>
<p>There is data to back up these bad vibes. Summarizing a few statistics from Forrester's <a href="https://www.tessian.com/resources/forrester-study-take-control-of-email-security-human-layer-security/?ref=content.strategyofsecurity.com">Take Control of Email Security with Human Layer Security Protection</a> study:</p>
<ul>
<li>
<p>Employee mistakes cause roughly a third of security incidents in organizations.</p>
</li>
<li>
<p>Organizations experienced between one and 50 employee-related email security incidents per month on average with nearly 40% reporting at least 10 or more incidents per month.</p>
</li>
<li>
<p>61% of security and risk leaders believed that an employee’s actions will cause their organizations’ next data breach.</p>
</li>
<li>
<p>48% of security and risk leaders said human error-caused security incidents will increase in the next year.</p>
</li>
</ul>
<p>In other words: employees cause a lot of security incidents, and most security leaders believe the problem will get worse.</p>
<p>The problems created by regular employees have both anecdotal and measurable impacts on information security teams. I've have previously written about Mandiant CEO Kevin Mandia's observations on the burden placed on these teams:</p>
<blockquote>
<p>The combination of increasing threats and a growing shortage of cybersecurity skills means in-house teams are overworked, and they may lack the expertise or visibility to manage their security controls and security posture.</p>
</blockquote>
<p>The Forrester report gave us some additional data about one specific instance: email security incidents. Organizations reported spending up to 12 hours of time triaging, investigating, and remediating each individual incident. Total resolution time for all incidents took up to 600 hours per month.</p>
<p>The situation around email security incidents is untenable. It isn't economically viable to be spending 600 hours (or nearly four dedicated FTEs) monthly and still end up with 10 or more qualified incidents per month. We need better results in less time.</p>
<p>It isn't viable from a morale standpoint, either. Most employees don't want to harm their companies intentionally, yet a third of incidents are caused by employees. Information security teams are already strained. Time spent addressing email security incidents could be better focused elsewhere or banked as time <em>not</em> spent to reduce workloads.</p>
<h2 id="augmented-attackers">Augmented Attackers</h2>
<p>On top of the bad vibes and sense of resignation, the news actually gets more terrifying. A research team from Singapore's Government Technology Agency (GovTech Singapore) <a href="https://youtu.be/Smef3W35ed8?ref=content.strategyofsecurity.com">shared findings</a> about use of AI and data analytics by attackers to increase the quality and scale of their phishing campaigns.</p>
<p>You read that correctly: attackers are augmenting themselves with AI and data.</p>
<p>The simplest use case is generating high quality text for phishing emails. Poor grammar and sentence structure is one of the classic signals rule-based Secure Email Gateway (SEG) products use to identify malicious emails. Content quality can obviously be improved with manual reviews. It becomes exponentially more efficient and scalable with AI augmentation.</p>
<p>This isn't hyperbole. Tools like <a href="https://www.copy.ai/?ref=content.strategyofsecurity.com">Copy.ai</a> already exist for marketers. It uses OpenAI's GPT-3 on the back end to generate high quality marketing copy with minimal user input. This exact model can be used for nefarious tools to generate phishing emails. The only thing stopping this reality is AI companies voluntarily restricting use of their APIs. Yep, that's all.</p>
<p>Augmentation scenarios get even more advanced when you start looking at the end-to-end phishing pipeline. According to researcher Eugene Lim, attackers may analyze people at a level of their personality and make this part of their pipeline. They will use AI tools like GPT-3 to generate convincing emails based on personality and likelihood of response.</p>
<p>A highly sophisticated approach like the one Lim described is well beyond simple proofreading of text. When people are being individually targeted with intentionally designed messages tailored to their personality attributes, we're in trouble. There is no current evidence of this exact type of attack in the wild, but the necessary ingredients already exist.</p>
<p>Beyond using AI for quality and accuracy, attackers have started using data to close the feedback loop and iteratively improve the effectiveness of their email campaigns. As Tessian’s CTO Ed Bishop noted in the session:</p>
<blockquote>
<p>I can totally see bad actors measuring the click-through rate on their phishing campaigns, and then having the AI learn from what’s worked to feed into the next one.</p>
</blockquote>
<p>Does this sound like a marketing campaign? It should — savvy email marketers use a similar approach. I have made comparisons between techniques used by marketing and cybersecurity teams in the past:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Marketing and cybersecurity aren’t as different as you’d think:<br><br>Marketing tracks activity for profit.<br><br>Cybersecurity tracks activity for safety.<br><br>Different objectives. Many similar techniques.</p>— Cole Grolmus (@colegrolmus) <a href="https://twitter.com/colegrolmus/status/1451567526505324549?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">October 22, 2021</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>This finding from GovTech Singapore takes the connection one step further. Traditional marketing techniques are being used by both the good people and bad people in cybersecurity. With examples like these, it's no wonder information security teams are feeling a sense of resignation.</p>
<h2 id="designing-security-for-humans">Designing Security for Humans</h2>
<p>Accepting defeat isn't a solution. Relying solely on information security teams (at a micro level) and law enforcement (at a macro level) isn't working. Both are an important part of combating cyber crime. However, we can't leave regular people defenseless. They can't be completely shielded from attacks, no matter how hard we try.</p>
<p>To get ahead of attackers, it's going to take everybody. We need to give regular people more useful tools to help defend themselves and their companies. The path to accomplishing this starts with a mindset shift: we need to design security into people's daily workflows and make it usable.</p>
<p>Karl Knowles, the Global Head of Cyber for HFW, <a href="https://youtu.be/yW7bVmCeBi8?ref=content.strategyofsecurity.com">gave the perfect metaphor</a>. Think of your defenses like a football (soccer) team:</p>
<ul>
<li>
<p>Strikers aren't great at defending. Email providers are strikers. They stop some malicious content but let lots in.</p>
</li>
<li>
<p>Midfielders are like Secure Email Gateways (SEG). They give you some additional defense and offense.</p>
</li>
<li>
<p>Defenders are tools like Tessian. They back up SEGs and enhance your defense.</p>
</li>
<li>
<p>Goalkeepers are your people. The only way they can keep a clean sheet (allow no goals) is having strength in depth in front of them to prevent direct shots on goal.</p>
</li>
</ul>
<p>We need to build the defenses in front of our goalkeepers. And we need to do everything we can to prepare our goalkeepers for shots on goal. Jess Burn described exactly what to do: <em>"Get to know your humans and how they work."</em></p>
<p>A good place start is securing communications — exactly what Tessian does. Designing security into people's everyday workflows means giving them clear and informative information they wouldn't have had without technology augmenting them. This gives them the context they need to either take action or <em>not</em> take action based on the circumstances.</p>
<p>Here's a practical example of what a user-facing security design could look like, modeled after Tessian's products:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/v1_-Security-for-Humans-Example.png" class="kg-image" alt="" loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2021/11/v1_-Security-for-Humans-Example.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2021/11/v1_-Security-for-Humans-Example.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2021/11/v1_-Security-for-Humans-Example.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/v1_-Security-for-Humans-Example.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>An interface like this is simple and elegant by design. Just because it's simple doesn't mean it's easy. Reaching this level of context is a magnificent feat of engineering and design. At minimum, the platform would need to:</p>
<ol>
<li>
<p>Establish a level of trust with the valid domain based on patterns of interaction</p>
</li>
<li>
<p>Recognize the invalid domain doesn't match an existing pattern of interaction</p>
</li>
<li>
<p>Correlate the similarity between the valid and invalid domains</p>
</li>
<li>
<p>Integrate with an email client to enable notifications to be sent to users</p>
</li>
<li>
<p>Design templates for communicating the information in user-friendly terms</p>
</li>
<li>
<p>Prompt the user with a warning when they open the email</p>
</li>
<li>
<p>Record the action the user takes</p>
</li>
</ol>
<p>And that's just a high level overview. Providing human-friendly context in near real-time is one of the most difficult things to do in technology. That's why platforms like Tessian are valuable. Context feels magical when it's implemented well.</p>
<p>Reema Jethwa, a Tessian customer from Schroders Personal Wealth, <a href="https://youtu.be/LtLKJG-AoIQ?ref=content.strategyofsecurity.com">described the user experience</a> like this:</p>
<blockquote>
<p>"I've had users personally comment on the fact that the pop-alerts are really simple to understand and quite user friendly.<br>
<br>
They've also said that these prompts happen at exactly the right time, asking them to do the right thing. These pop-ups are there when they need to be told, and it takes seconds for them to do what they need to do.<br>
<br>
From a security perspective, we're able to give those extra guardrails to colleagues... We're helping colleagues when they need it, and also not penalizing them... We're building our credibility across the organization."</p>
</blockquote>
<p>Exactly the experience we want people to have with security. Experiences like this seem like such a simple and obvious thing to do. In practice, positive user experiences with security happen so rarely that they feel magical when we see them.</p>
<h2 id="racing-with-the-machines">Racing With the Machines</h2>
<p>We <em>must</em> augment people with well-designed tools and information if we're going to reduce the number and impact of security incidents in a meaningful way. Former Google CEO Eric Schmidt describes the related macro trend as "augmented humanity." From a <a href="https://www.youtube.com/watch?v=oNsKYhOf9So&ref=content.strategyofsecurity.com">2011 speech</a> at the Digital Life Design conference:</p>
<blockquote>
<p>“The computer and the human each does something better because the other is helping.”</p>
</blockquote>
<p>MIT researchers Erik Brynjolfsson and Andrew McAfee discussed a similar concept in their <a href="https://www.amazon.com/Race-Against-Machine-Accelerating-Productivity-ebook-dp-B005WTR4ZI/dp/B005WTR4ZI/?ref=content.strategyofsecurity.com">book</a> <em>Race Against the Machine</em>. Based on research, they observed:</p>
<blockquote>
<p>Weak human + machine + better process was superior to a strong computer alone and, more remarkably, superior to a strong human + machine + inferior process.</p>
</blockquote>
<p>This observation was true across multiple fields:</p>
<blockquote>
<p>This pattern is true not only in chess but throughout the economy. In medicine, law, finance, retailing, manufacturing, and even scientific discovery, the key to winning the race is not to compete against machines but to compete with machines.</p>
</blockquote>
<p>Brynjolfsson and McAfee re-framed the traditional, FUD-based mindset that machines are going to take our jobs. This belief is accurate to an extent — some jobs will be automated — but overlooks how technology can be used to improve human performance. The authors call it "racing with the machines" and offer the following strategy for implementation:</p>
<blockquote>
<p>How can we implement a “race with machines” strategy? The solution is organizational innovation: co-inventing new organizational structures, processes, and business models that leverage ever-advancing technology and human skills.</p>
</blockquote>
<p>In our case, humans can defend against cybersecurity attacks better when computers are helping. I have previously highlighted similar commentary from Kevin Mandia:</p>
<blockquote>
<p>I believe automation, powered by AI and machine learning technologies, is the only way organizations will be able to keep up with attacks and maintain resilience. Customers are coming to this realization as well.</p>
</blockquote>
<p>Mandia was speaking about using technology to augment information security professionals; however, the central idea is the same: we can't keep up with attacks unless people and technology are working together.</p>
<p>Tessian is a modern example of how this layer of defense gets implemented. Machines analyze communications data, provide people with context when an anomalous situation is detected, and give them tools to resolve the problem without further intervention from an already taxed information security organization. That's how exactly how people and technology can work together to improve security.</p>
<p>While concluding her presentation, Jess Burn put the role of people in practical terms:</p>
<blockquote>
<p>"Even though people are a big threat to the security of your organization, they're also the engine of your business. They need to do their jobs, and it's when they try to get around policies or short-circuit those cumbersome security processes that incidents or data loss most often occur.<br>
<br>
As these security incidents arise, use those moments and consider providing contextual, in-the-moment coaching which improves their awareness and helps them make the right decisions in real-time.<br>
<br>
Make security everyone's responsibility and a daily part of their lives."</p>
</blockquote>
<p>Yes, people are responsible for a third of security incidents. Companies are also nothing without them. We need to make security easy to use.</p>
<p>Every job is not going to be automated or replaced with machines in our lifetime. A more pragmatic approach is to double down on any process or technology that makes humans more effective at security. Tessian is leading the way on this movement. It's an exciting journey to watch.</p>
]]></content:encoded>
            <category>Startups</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/v1_-Augmented-Humanity.png"/>
        </item>
        <item>
            <title><![CDATA[Cybersecurity is Going Public]]></title>
            <link>https://strategyofsecurity.com/cybersecurity-is-going-public/</link>
            <guid>6181fb850ce553003b4a449a</guid>
            <pubDate>Wed, 03 Nov 2021 13:26:06 GMT</pubDate>
            <description><![CDATA[An overview of public cybersecurity companies, trends in performance, and IPO activity within the ecosystem.]]></description>
            <content:encoded><![CDATA[<p>2021 was a banner year for cybersecurity IPOs. Despite continued economic uncertainty and market volatility, five companies directly or partially included in the cybersecurity ecosystem have gone public so far this year. Among the five was the largest cybersecurity IPO in history. That's a big year by any standard.</p>
<p>The number and size of public cybersecurity companies is a factor in the legitimization of cybersecurity as a standalone industry. The same was true of tech as a whole two decades ago. The next evolution is for segments of the tech industry to establish themselves as viable cohorts of public companies. Cybersecurity is one of those segments.</p>
<p>Thinking about cybersecurity as a relevant set of public companies is a relatively new concept for most of us. Just ten years ago, there were twelve public cybersecurity companies. The traditional paradigm was for cybersecurity companies to either be part of a larger tech company's portfolio or a startup. Standalone cybersecurity companies in public markets were relatively rare.</p>
<p>Not anymore. Today, there are 33 public cybersecurity companies listed on U.S. public stock exchanges. Cybersecurity companies aren't just going public — several of them are thriving and drive significant growth in the tech sector overall.</p>
<p>There are two objectives for this article. First, I wanted to take a broad look at the current market and recent trends for public cybersecurity companies. Second, I wanted to kick off a longer-term data project to gather and monitor meaningful data points about public cybersecurity companies over time.</p>
<h2 id="market-segmentation">Market Segmentation</h2>
<p>An important nuance about the set of public companies within the cybersecurity ecosystem is this: not all of them are <em>exclusively</em> cybersecurity companies. There are (generally) three different paradigms. The distinction is important for several reasons, one being how we classify companies that are truly "cybersecurity companies."</p>
<h3 id="pure-cybersecurity-companies">Pure Cybersecurity Companies</h3>
<p>Pure cybersecurity companies offer exclusively cybersecurity products and/or services. This type of company is indisputably part of the cohort of public cybersecurity companies.</p>
<p>A few examples are CrowdStrike, Okta, and SentinelOne. The products and services offered by this type of company are fully within the scope of cybersecurity. They are also independent companies and products with their own listings on public stock exchanges. None are currently part of a larger tech company or owned by a private equity firm.</p>
<h3 id="hybrid-companies">Hybrid Companies</h3>
<p>Some companies are "hybrids" — a combination of two or more traditional industries. This type of company is debatably part of the cohort of public cybersecurity companies. Opinions vary, sometimes based on financial data, and sometimes based on perception and beliefs.</p>
<p>A few examples are Cloudflare, Sumo Logic, and Splunk. Cloudflare is a combination of networking and cybersecurity. Sumo Logic and Splunk are a combination of application monitoring and security operations. Significant parts of their product portfolio and revenue come from cybersecurity, and part comes from other industries.</p>
<h3 id="large-tech-companies">Large Tech Companies</h3>
<p>Several large, diversified tech companies have significant cybersecurity product portfolios and revenue. This type of company is not directly part of the cohort of public cybersecurity companies. However, they generate significant revenue and impact the cybersecurity ecosystem in significant ways due to their size and scale.</p>
<p>The examples are what you'd expect: Microsoft, Oracle, Google, Amazon, and Cisco. Earlier this year, Microsoft announced it had <a href="https://www.microsoft.com/security/blog/2021/01/27/microsoft-surpasses-10-billion-in-security-business-revenue-more-than-40-percent-year-over-year-growth/?ref=content.strategyofsecurity.com">crossed $10 billion</a> in cybersecurity revenue with 40% year-over-year growth. Cisco is primarily known for its networking business, but the company's security segment has generated <a href="https://www.fool.com/investing/2021/09/21/cisco-sees-80-billion-cybersecurity-opportunity/?ref=content.strategyofsecurity.com">$3.4 billion of revenue</a> in 2021. Oracle, Google (both Google Cloud and <a href="https://chronicle.security/?ref=content.strategyofsecurity.com">standalone security bets</a>), and Amazon all have large sets of cybersecurity products and revenue.</p>
<p>Large, publicly-traded professional services firms like Accenture and Booz Allen Hamilton could also be considered part of this set of large companies for different reasons. Both primarily offer consulting services with significant revenue both inside and outside of cybersecurity.</p>
<h2 id="current-trends">Current Trends</h2>
<p>Several trends are occurring within the set of public cybersecurity companies that exist today. The trends highlighted here are beyond any individual company — they're macro-level observations about the market itself. Most are positive with a few cautionary notes.</p>
<p>This analysis makes heavy use of data and research Momentum Cyber's canonical <a href="https://momentumcyber.com/intel/?ref=content.strategyofsecurity.com">Cybersecurity Market Review</a> series, including the visuals. The firm's intel is a go-to resource for anyone wanting to take a deep dive into cybersecurity business data and trends.</p>
<h3 id="growth-in-number-and-size-of-ipos">Growth in Number and Size of IPOs</h3>
<p>Growth in the number and size of cybersecurity IPOs has increased significantly in the past decade. From Momentum Cyber:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/momentum-cyber-ipo-trend.png" class="kg-image" alt="" loading="lazy" width="2000" height="1123" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2021/11/momentum-cyber-ipo-trend.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2021/11/momentum-cyber-ipo-trend.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2021/11/momentum-cyber-ipo-trend.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w2400/2021/11/momentum-cyber-ipo-trend.png 2400w" sizes="(min-width: 720px) 720px"></figure><p>There were twelve public cybersecurity companies in 2011. The count currently stands at 33, including the companies listed on the slide and other activity since the report was produced in Q2 2021. This list now includes ForgeRock, who <a href="https://strategyofsecurity.com/p/forgerock-ipo/">IPO'ed in September</a>. Mandiant has also replaced FireEye as part of their divestiture and <a href="https://strategyofsecurity.com/p/mandiant-and-the-future-of-cybersecurity-professional-services/">re-focusing on professional services</a>.</p>
<p>CrowdStrike currently holds the highest valuation among companies focused purely on cybersecurity. The company is valued at roughly $60 billion. Cloudflare has a relatively equal valuation and could also be considered the leader depending on your classification of this "hybrid" company.</p>
<p>SentinelOne became the <a href="https://www.cnbc.com/2021/06/30/sentinelone-soars-in-first-trade-as-highest-valued-cybersecurity-ipo.html?ref=content.strategyofsecurity.com">largest cybersecurity IPO</a> in history earlier in 2021. The company went public at a valuation of nearly $11 billion. A notable trend is that SentinalOne's IPO nearly doubled the previous mark — CrowdStrike set the previous record for largest cybersecurity IPO at a <a href="https://www.bizjournals.com/sanjose/news/2019/06/12/crowdstrike-ipo-crwd.html?page=all&ref=content.strategyofsecurity.com">$6.7 billion valuation</a> in 2019.</p>
<h3 id="valuation-and-hype">Valuation and Hype</h3>
<p>The entire public cybersecurity market is hyped. It's hard to quantify "hype" precisely. Generally speaking, it's a combination of growth, revenue, and momentum.</p>
<p>One tangible indicator of hype is revenue multiples — the relationship between a company's actual revenue and valuation:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/Momentum-Cyber---2020-2021-YoY-Revenue-Multiples.png" class="kg-image" alt="" loading="lazy" width="1247" height="701" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2021/11/Momentum-Cyber---2020-2021-YoY-Revenue-Multiples.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2021/11/Momentum-Cyber---2020-2021-YoY-Revenue-Multiples.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/Momentum-Cyber---2020-2021-YoY-Revenue-Multiples.png 1247w" sizes="(min-width: 720px) 720px"></figure><p>In general, public cybersecurity companies have high revenue multiples. Their revenue multiples increased significantly in the past year — 22.3% at the median and 65.5% among the leaders.</p>
<p>There are four clear outliers (highlights above are mine). You could interpret the data this way: in an already hyped market, there are four <em>very</em> hyped public cybersecurity companies — Cloudflare, CrowdStrike, Zscaler, and Okta.</p>
<p>Hype is mostly a good thing, so take this data as a positive indicator overall for cybersecurity companies. Markets and hype cycles are fickle, though. If the market leaders start to miss their (admittedly high) expectations consistently, it could impact perception of the entire market. For now, all is well, especially for companies who are growing at a high rate.</p>
<h3 id="growth-and-value">Growth and Value</h3>
<p>The Momentum Cyber team couldn't have put it better: <em>"Public markets today are focused on growth."</em> This chart shows the correlation between revenue growth and stock price for public cybersecurity companies:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/momentum-cyber-revenue-growth-value.png" class="kg-image" alt="" loading="lazy" width="2000" height="1124" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2021/11/momentum-cyber-revenue-growth-value.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2021/11/momentum-cyber-revenue-growth-value.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2021/11/momentum-cyber-revenue-growth-value.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/momentum-cyber-revenue-growth-value.png 2000w" sizes="(min-width: 720px) 720px"></figure><p>Companies on or above the line saw their stock price and overall company valuations go up higher than the industry average in proportion to the revenue they earned. Companies below the line were lower than the industry average. In other words, the market punished them for lower growth.</p>
<p>Taking a step back: why is growth so important for cybersecurity companies? Because nearly all of them operate at a loss — that is, they spend more than they earn to build their products and invest in the sales and marketing required for growth. They do this to reach a scale where revenue is large and sustainable, then maintain or reduce operating expenses to become profitable.</p>
<p>Problems arise if companies are investing heavily in product, sales, and marketing without seeing revenue growth in return. This is a tenuous position to be in because it typically means (a) issuing more stock, (b) taking on more debt from loans, or (c) going out of business, a.k.a. being labeled a "going concern." For the majority of pure cybersecurity companies, growth means survival.</p>
<h3 id="high-growth-vs-low-growth">High Growth vs. Low Growth</h3>
<p>There is a significant distinction between the fortunes of "high growth" and "low growth" cybersecurity companies. A quick glance at this visual gets the point across clearly:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/momentum-cyber-high-low-growth-multiples.png" class="kg-image" alt="" loading="lazy" width="2000" height="1116" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2021/11/momentum-cyber-high-low-growth-multiples.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2021/11/momentum-cyber-high-low-growth-multiples.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2021/11/momentum-cyber-high-low-growth-multiples.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w2400/2021/11/momentum-cyber-high-low-growth-multiples.png 2400w" sizes="(min-width: 720px) 720px"></figure><p>The classification of high vs. low growth is somewhat imprecise. It doesn't really matter for the strategic point that we need to observe here. Understand that public markets invest heavily in companies growing at a fast rate, and less in companies who aren't growing as much.</p>
<p>What does this mean for a person working in cybersecurity? Companies with revenue growth at or below the median have greater potential to be acquired or change their strategic direction.</p>
<p>Among the "low growth" companies, there are already examples of strategic changes in 2021:</p>
<ul>
<li>
<p>Proofpoint was <a href="https://www.reuters.com/technology/thoma-bravo-take-cybersecurity-firm-proofpoint-private-123-bln-deal-2021-04-26/?ref=content.strategyofsecurity.com">acquired and taken private</a> by Thoma Bravo, a private equity firm.</p>
</li>
<li>
<p>Mandiant's <a href="https://www.mandiant.com/company/press-releases/fireeye-announces-sale-of-fireeye-products-business-to-symphony-technology-group?ref=content.strategyofsecurity.com">decision to divest FireEye</a> and focus on professional services.</p>
</li>
<li>
<p>McAfee's <a href="https://www.mcafee.com/enterprise/en-us/about/newsroom/press-releases/2021/20210727-01.html?ref=content.strategyofsecurity.com">sale of the company's enterprise business</a> to Symphony Technology Group (STG).</p>
</li>
</ul>
<p>Expect this trend to continue, particularly the acquisition and consolidation of "low growth" companies by private equity firms.</p>
<h3 id="value-in-the-future">Value In the Future</h3>
<p>In this analysis, we've been looking at ten year trends for public cybersecurity companies. Ten years is a long time, but it's not <em>that</em> long from the perspective of public markets. A quick comparison can give some perspective on the size and stage of public cybersecurity companies relative to other public markets.</p>
<p>As of Q2 2021, the valuation of the public cybersecurity companies included in Momentum Cyber's data was $425.8 billion. Last week, Tesla hit a <a href="https://techcrunch.com/2021/10/25/tesla-1-trillion-market-cap/?ref=content.strategyofsecurity.com">valuation of $1 trillion</a> after 11 years as a public company. In other words, Tesla's company valuation is over two times higher than every public cybersecurity company combined.</p>
<p>The comparison is admittedly unfair (Tesla is an extremely hyped company) and certainly wasn't meant to diminish the importance of public cybersecurity companies. It's just interesting to see the variance and compounding in valuations among companies within a relatively similar time scale.</p>
<p>The hope and promise for public cybersecurity companies is in the value they will create in the future. Peter Thiel described this phenomenon in <em>Zero to One</em>:</p>
<blockquote>
<p>You’ve probably heard about “first mover advantage”: if you’re the first entrant into a market, you can capture significant market share while competitors scramble to get started. That can work, but moving first is a tactic, not a goal. What really matters is generating cash flows in the future, so being the first mover doesn’t do you any good if someone else comes along and unseats you. It’s much better to be the last mover – that is, to make the last great development in a specific market and enjoy years or even decades of monopoly profits.</p>
</blockquote>
<p>This is what happens in early markets. It's important to understand that for many of the current public cybersecurity companies, most of the value they create will be in the future. Their current revenue, growth, and metrics matter to some extent. It's more important to look at the market from a long-term view. Identifying the last movers — the companies who will be enduring financial successes for decades to come — is the perspective we want to have.</p>
<h2 id="public-cybersecurity-company-data">Public Cybersecurity Company Data</h2>
<p>This is the beginning of a project to gather and track relevant information about public cybersecurity companies over time. My goal is to give you some data and tools to understand and follow these companies as they grow and expand. You can find the initial set of data here:</p>
<figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://strategyofsecurity.com/p/public-cybersecurity-companies/"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Public Cybersecurity Companies</div><div class="kg-bookmark-description">Information about publicly-traded cybersecurity companies.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://strategyofsecurity.com/p/favicon.png" alt=""><span class="kg-bookmark-author">Strategy of Security</span><span class="kg-bookmark-publisher">Cole Grolmus</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/10/Twitter-Card-1.png" alt="" onerror="this.style.display = 'none'"></div></a></figure>]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/11/v1_-Cybersecurity-Going-Public.png"/>
        </item>
        <item>
            <title><![CDATA[Observations About the Cybersecurity Ecosystem in 2021]]></title>
            <link>https://strategyofsecurity.com/observations-about-the-cybersecurity-ecosystem-in-2021/</link>
            <guid>617615cf8a2ef90048fe0e6c</guid>
            <pubDate>Mon, 25 Oct 2021 12:57:00 GMT</pubDate>
            <description><![CDATA[Predictions and opportunities I observed from mapping the cybersecurity ecosystem.]]></description>
            <content:encoded><![CDATA[<p>Sometimes the best insights come during periods of reflection. I have had some time to think about what I learned and observed when building the <a href="https://colegrolmus.com/cybersecurity-ecosystem?ref=content.strategyofsecurity.com">cybersecurity ecosystem mapping</a>. I wanted to share some commentary that builds upon the ecosystem mapping itself.</p>
<p>I received a lot of good feedback from people about the project. I learned and observed a lot while building it — sometimes without fully realizing what my thoughts meant or seeing the dots I'd connected.</p>
<p>The original ecosystem mapping project was a rote analysis about the structure of the ecosystem. It was built to hold up against the test of time. Endurance necessarily means looking beyond near-term events and focusing on long-term patterns. I wasn't intentionally analyzing anything — just trying to create as accurate of a structure and framework for the ecosystem as I could.</p>
<p>The objective here is different: this is my interpretation on what's happening in the cybersecurity ecosystem we're all living in today. As with any projections, it's speculative in nature. There is likely to be disagreement and discourse — but that's what makes predictions interesting.</p>
<p>First, I'll cover a few observations about the ecosystem as a whole and the process of mapping it. The remainder is observations and commentary on individual categories. Not everything in the full ecosystem mapping is covered — just relevant insights I thought were worth sharing.</p>
<h2 id="ecosystem">Ecosystem</h2>
<h5 id="the-cybersecurity-ecosystem-is-broader-than-people-realize-including-people-who-work-in-cybersecurity">The cybersecurity ecosystem is broader than people realize, including people who work in cybersecurity.</h5>
<p>The cybersecurity ecosystem was difficult to model. What makes modeling difficult is how enormous the ecosystem is. It feels even more enormous when one of your primary objectives is completeness.</p>
<p>The subtly ironic part about the enormity is how large it seems to professionals with years of experience in cybersecurity. I heard this reaction from other people, and I experienced it myself.</p>
<p>After working in cybersecurity for over a decade, I thought I had a good grasp on all of its parts. Wrong. Maybe this was hubris, or just a false sense of certainty. Whatever the cause, the big takeaway is this: understand and accept that the full scope of cybersecurity is beyond any single person's comprehension.</p>
<h5 id="industry-mappings-are-relatively-inconsistent">Industry mappings are relatively inconsistent.</h5>
<p>I did not realize how inconsistent existing industry mappings were before doing my own. This isn't a knock against the people who made them — it's an observation about how different and subjective each of our views about the same ecosystem are. Every mapping has similarities — in fact, they're all more similar than different. However, the differences that exist occur in important ways.</p>
<p>At a macro level, most mappings were focused on the commercial aspects of the ecosystem. The approach makes sense for the investors and professional services firms who built them. However, it excludes a large portion of the ecosystem that isn't a product or a company.</p>
<p>For example, no mappings included cyber crime as an industry segment. As we <a href="https://www.bleepingcomputer.com/news/security/us-links-52-billion-worth-of-bitcoin-transactions-to-ransomware/?ref=content.strategyofsecurity.com">recently learned</a>, ransomware alone has <em>at least</em> $5.2 billion in economic activity. Sure, it's an illicit business, but billions of dollars moving around can't be ignored. Like it or not, cyber crime is part of the cybersecurity ecosystem just like predators and diseases are part of the natural ecosystem.</p>
<p>At a micro level, there are lots of relationships and nuances among companies and industry segments that are hard to account for. As I said in the <a href="https://strategyofsecurity.com/p/mapping-the-cybersecurity-ecosystem/">introductory article</a>, the mapping requires a degree of judgment. People name and group the industry categories differently, sometimes in bizarre and confusing ways.</p>
<p>For example, some companies were grouped in a way that made them appear to be competitors when they are not. This occurred a lot in larger categories like access control, security operations, and infrastructure security. Companies aren't truly competing against one another until granular levels of the mapping.</p>
<p>It was also difficult to fit some companies or products into one industry segment. This happened with larger companies who have a portfolio of products (e.g. Cisco) or products that span multiple categories (e.g. platform shift from EDR to XDR). This is partially caused by category integration, which I'll cover next.</p>
<h5 id="there-are-opportunities-in-both-category-creation-and-integration">There are opportunities in both category creation and integration.</h5>
<p>Some of the best opportunities for new companies, products, services, and more will come from ecosystem categories that are either loosely defined or completely undefined in the current map. Early stage opportunities and investments need to break the mold, so to speak.</p>
<p>Much of the innovation that has happened in recently IPO'ed companies was from category integration. For example, early movers Palo Alto Networks and CrowdStrike effectively created the now-popular XDR category by merging endpoint protection with other areas of detection, response, and network security. More opportunities still exist in category integration.</p>
<p>Another set of opportunities exists in category creation. The next great innovations will come out of the white space between the categories we recognize today. A pseudonymous Twitter user summarized this opportunity well:</p>
<blockquote>
<p>"If your InfoSec program consists of magic quadrant leading tools and meeting compliance reqs, then your InfoSec program is 100% known and understood by your advisories." —<a href="https://twitter.com/snorkel42/status/1450497697241309190?s=20&ref=content.strategyofsecurity.com">@snorkel</a></p>
</blockquote>
<p><a href="https://www.monad.security/?ref=content.strategyofsecurity.com">Monad</a> is one example of a product that I believe created a category. Another good example is <a href="https://www.tessian.com/?ref=content.strategyofsecurity.com">Tessian</a> with their concept of "Human Layer Risk Management." Companies like these didn't fit cleanly into an existing category without being forced. They're creating new categories by solving problems other products aren't.</p>
<p>Remember: the map is not the territory. The cybersecurity ecosystem is dynamic enough that no mapping can accurately represent what's happening in real-time. Some of the best opportunities lie in undiscovered areas outside the map.</p>
<h2 id="access-control">Access Control</h2>
<h5 id="cloud-based-authentication-companies-appear-to-have-won-the-authentication-the-market-everything-else-is-a-feature-not-a-product">Cloud-based authentication companies appear to have won the authentication the market. Everything else is a feature, not a product.</h5>
<p>Established companies like Okta, Ping Identity, and ForgeRock have essentially won the cloud authentication category. The companies are now public and have been around long enough to establish market leadership.</p>
<p>Less mature and/or emerging categories like adaptive authentication, MFA, etc. are all features, not companies. For example, it's unlikely another standalone MFA company like Duo Security is going to happen again. The next generation of behavioral-based MFA companies are facing an uphill battle. Their best case scenario is to create a good product and get acquired.</p>
<p>There is likely more consolidation that will happen at the product level. As pre-IPO companies plateau on growth and run out of funding, tech and talent acquisitions will occur. There are still plenty of problems to be solved in this category. However, a lot of the problem-solving is going to be done by the established companies buying smaller companies to round out their product portfolios.</p>
<h5 id="companies-in-the-access-control-ecosystem-are-going-to-further-consolidate-and-compete-with-one-another">Companies in the access control ecosystem are going to further consolidate and compete with one another.</h5>
<p>Access control is an interesting market because it includes a range of companies, from high-performing public SaaS companies to startups to open-source projects. My overarching belief is that most categories in this market have matured, and more consolidation is going to happen.</p>
<p>So far, large companies like Okta, Ping Identity, SailPoint, CyberArk, ForgeRock, etc. have been able to grow to the point of IPO without significant competition with each other. This isn't going to continue much longer. One example: Okta is building a Privileged Access Management product to compete with CyberArk.</p>
<p>Low-competition growth in this market happened because the mega-trends of cloud computing and digital transformations created enough opportunities for multiple new products and companies to grow. The recently IPO'ed companies are now large enough that it's harder to sustain growth. However, they all need to grow in order to reach profitability.</p>
<p>This inevitably means more competition, expansion into new product categories, and consolidation of entire companies. I wouldn't be surprised if larger tech companies start acquiring companies in this space. If a company as large as Slack can be bought, anything in cybersecurity is fair game.</p>
<h5 id="if-a-disruptive-company-gets-created-within-customer-identity-ciam-its-not-going-to-be-competing-head-on-with-the-fundamentals">If a disruptive company gets created within Customer Identity (CIAM), it's not going to be competing head-on with the fundamentals.</h5>
<p>The market for fundamental Customer Identity (CIAM) platforms is under control by Okta, ForgeRock, Ping Identity, and other later-stage startups. Competing head-on with these products is a mistake.</p>
<p>Arguably, <a href="https://segment.com/?ref=content.strategyofsecurity.com">Segment</a> was one of the most innovative and disruptive customer identity companies. They had a good exit because they did something different within the category that wasn't being done by companies focused on authentication and traditional needs. As it turns out, customer data management was a big deal.</p>
<p>Any companies who hope to do something similar need to follow the Segment model and address an adjacent need. The window in this market is closing, but there is likely still time. Many companies have yet to move from home grown customer identity solutions. New companies and new digital commerce experiences are being created all the time. There are still problems to address.</p>
<h5 id="biometrics-are-potentially-disruptive-but-fighting-inertia">Biometrics are potentially disruptive but fighting inertia.</h5>
<p>Biometrics are an interesting part of the access control ecosystem, only because there is a lot of upside (with proportional downside, especially at a societal level).</p>
<p>The two ways biometrics companies can be disruptive are:</p>
<ul>
<li>
<p>Introducing biometrics into a business process or workflow that didn't have them before (e.g. <a href="https://www.clearme.com/?ref=content.strategyofsecurity.com">Clear</a> with airport security)</p>
</li>
<li>
<p>Inventing completely new tech (i.e. hardware companies with large R&amp;D investments)</p>
</li>
</ul>
<p>The dilemma with biometrics companies is that some of the new tech either isn't feasible or won't be adopted quickly enough. Their biggest competitors are inertia and lagging consumer preferences.</p>
<p>I still hold out hope that the futuristic world we've seen in fiction can (safely and securely) be played out. Biometrics are a big part of that future.</p>
<h2 id="application-security">Application Security</h2>
<h5 id="supply-chain-security-is-a-big-problem-without-enough-solutions">Supply chain security is a big problem without enough solutions.</h5>
<p>A lot of attention is being paid to supply chain security based on lessons learned from recent high profile attacks. This is a difficult problem to manage given the inherent complexities and chaotic nature of software dependencies.</p>
<p>There are also conflicting incentives. Companies need to move faster than ever, which means relying on the work of others (i.e. use open-source packages or APIs instead of building every component). There is also more risk than ever by introducing a greater number of external dependencies into your code and environment.</p>
<p>There are multiple recent examples of dependencies gone awry:</p>
<ul>
<li>
<p>Login failures from consumer SaaS applications using Facebook social authentication when Facebook went down.</p>
</li>
<li>
<p>Widespread SMS data vulnerabilities caused by telecom carrier reliance on Syniverse.</p>
</li>
</ul>
<p>Help is on the way, and it can't come fast enough. Companies like <a href="https://phylum.io/?ref=content.strategyofsecurity.com">Phylum</a> and <a href="https://cloudsmith.com/?ref=content.strategyofsecurity.com">CloudSmith</a> are building innovative solutions. Many more are needed.</p>
<h5 id="the-full-devops-pipeline-matters-to-security-now">The full DevOps pipeline matters to security now.</h5>
<p>The CI/CD process was largely ignored by security processes and controls until the SolarWinds breach. This was an easy mistake to make because it seems reasonable to focus on securing code that is being written. The assumption that follows is code is safe from modification during and after the build process. SolarWinds taught us we can't make that assumption anymore.</p>
<p>There's more nuance, though — security issues in code and configs are important, but the build artifacts and deployment processes need to be secure, too. Perfectly secure code doesn't help you if an attacker can swap in malicious code during or after the build process and get it deployed to production.</p>
<p>There are a lot of exciting opportunities related to DevSecOps and DevOps security at large. DevSecOps is having a well-deserved moment as a result of the increased attention on security in the DevOps pipeline. Existing tools will gain traction, and new ones will emerge.</p>
<h5 id="application-security-testing-products-can-never-be-too-good">Application security testing products can never be too good.</h5>
<p>Realistically, no application security testing product is going to be able to detect every vulnerability. That creates an interesting dynamic: even the best products aren't perfect.</p>
<p><a href="https://snyk.io/?ref=content.strategyofsecurity.com">Snyk</a> is the darling of application security testing right now, but there is plenty of room left for other products to be valuable. A few examples of value are catching more vulnerabilities, helping to expedite remediation, or better coverage of emerging programming languages and frameworks.</p>
<p>For people seeking opportunities, application security is the market that keeps on giving. Technologies change. New threats emerge. Techniques to mitigate them adapt. There is always a need for new products if they're effective.</p>
<h5 id="web-application-firewalls-waf-and-adjacent-features-are-consolidating">Web Application Firewalls (WAF) and adjacent features are consolidating.</h5>
<p>Cloudflare changed the game. A whole set of adjacent web application security and network security categories are now coming together in unified platforms and services.</p>
<p>The consolidation roughly includes WAFs, API security, bot protection, rate limiting, DDoS protection, and more. Any product at the intersection of networking and security is up for grabs now.</p>
<p>This is a good example of winning a market through consolidation. It used to be painful to implement and manage all the products needed to secure an organization's web applications. Platforms like Cloudflare came along and simplified everything.</p>
<h2 id="infrastructure-security">Infrastructure Security</h2>
<h5 id="infrastructure-security-is-going-to-be-consumed-by-cloud-security">Infrastructure security is going to be consumed by cloud security.</h5>
<p>The products and industry segments in the legacy infrastructure security ecosystem are being rebuilt in a cloud-first way. Companies like <a href="https://www.wiz.io/?ref=content.strategyofsecurity.com">Wiz</a>, <a href="https://bridgecrew.io/?ref=content.strategyofsecurity.com">BridgeCrew</a>, and more are building the infrastructure security products we've always wanted but weren't able to have until ubiquitous cloud infrastructure platforms gained critical mass.</p>
<p>Some of the good ideas from cloud security might trickle down into on-premise infrastructure security. However, the trickle-down effect may not be significant enough to create large companies. It seems more likely that companies will migrate most or all of their infrastructure to the cloud faster than the next generation of on-premise infrastructure security companies can be built.</p>
<h5 id="security-architecture-is-interesting-again">Security architecture is interesting again.</h5>
<p>Zero Trust and secure access service edge (SASE) are popular topics in cybersecurity. Product companies don't hold back on marketing their products as the solution. However, Zero Trust and SASE are both architecture concepts at their core.</p>
<p>The difficult part about architecture is planning and implementation. Tools to address specific problems within the architecture guidelines exist (e.g. adaptive authentication for Zero Trust). Understanding and implementing the architecture is not as well understood.</p>
<p>Confusion creates opportunities. Products could help, but this is more likely an opportunity for new professional service offerings.</p>
<h2 id="mobile-security">Mobile Security</h2>
<h5 id="mobile-security-is-clearly-needed-but-constrained-by-device-manufacturers">Mobile security is clearly needed but constrained by device manufacturers.</h5>
<p>Pegasus and a recent slew of iOS zero-day exploits validated the importance of mobile security. The challenge for those seeking opportunities to help is the limited access and customization made available by device manufacturers.</p>
<p>Mobile operating systems don't have the flexibility and openness of PC-based operating systems. They're more tightly controlled by device manufacturers. App stores are also tightly controlled — there's not much an external individual or company can do to help make them more secure. Our collective fate is in the hands of the device manufacturers.</p>
<p>A recent example is Google <a href="https://techcrunch.com/2021/10/11/google-pulls-stalkerware-ads-that-promoted-phone-spying-apps/?ref=content.strategyofsecurity.com">cracking down</a> on stalkerware ads. Enforcement actions like this have to be done by the device manufacturers and their platforms, not private companies.</p>
<p>The surface area for opportunities in this category aren't likely to expand any time soon. The control of device manufacturers has begun relaxing every so slightly with recent lawsuits. We're still a long way away from open ecosystems and clear opportunities for external security products.</p>
<h2 id="privacy-and-data-protection">Privacy and Data Protection</h2>
<h5 id="opportunities-in-privacy-are-largely-restricted-by-the-pace-and-quality-of-legislation">Opportunities in privacy are largely restricted by the pace and quality of legislation.</h5>
<p>More privacy legislation is needed (domestically and globally), but there is a lack of competent legislators in the world to create thoughtful legislation. Realistically, the best we can hope for in the near term is localized clones of GDPR, possibly with minor improvements. The worst case is <em>much</em> worse: politically-motivated censorship.</p>
<p>Unfortunately, some of the most pressing problems in privacy, censorship, and content moderation can only be solved by large tech companies like Facebook and Twitter. They have large, specialized teams of their own and don't need to spend much time looking externally for solutions, even if they should.</p>
<p>A potential exception is qualified people from large tech companies (with an understanding of the problems they face) who leave and build a company. Without good regulation to guide the market, the people with the best chance of creating a positive impact are likely the ones who understand the problems and nuances from the inside.</p>
<h5 id="privacy-tech-will-struggle-with-adoption-if-its-voluntary-to-use">Privacy tech will struggle with adoption if it's voluntary to use.</h5>
<p>There were several interesting companies and products in the areas of Consumer Liberty and Privacy By Design. Unfortunately, adoption is likely going to lag in companies who don't face specific legislation or other incentives that encourage them to embrace these products.</p>
<p>Incentives are especially important in Consumer Liberty. For the idea of a personal data economy to work, the current incentive structure and economic model needs to be completely flipped. Consumers have to demand compensation for sharing their data. Companies collecting large amounts of consumer data also have to be willing to pay for it.</p>
<p>Consumer understanding of privacy and data protection isn't anywhere close to a point where this can happen. Without legislation to explicitly flip the incentive structure, private citizens alone aren't likely to make this category a viable reality.</p>
<p>Privacy-focused developer tools and the concept of Privacy By Design have a better chance of adoption in the near-term. As discussed earlier, DevSecOps is gaining traction quickly. Privacy-focused dev tools are very closely related and are already making their way into the workflows of forward thinking dev teams.</p>
<h2 id="professional-services">Professional Services</h2>
<h5 id="we-need-better-talent-marketplaces-for-cybersecurity">We need better talent marketplaces for cybersecurity.</h5>
<p>Cybersecurity has systemic hiring and staffing issues that a new generation of talent marketplaces could help fix. There is an opportunity to do this well. It would make a huge difference if someone could.</p>
<p>The best options available today are marketplaces controlled by large consulting firms. Good roles are available; however, quality varies. More importantly, the platforms lack the polish and efficiency of consumer-grade marketplaces. We need new solutions.</p>
<p>In a world where an increasing number of people want flexibility and independence, tools for the creator economy are being built, and full-time employment is less stable than ever, we need to rethink our approach. Now is the time for the labor market in cybersecurity to be redefined in a way that works for both people and companies.</p>
<h5 id="the-pace-of-private-equity-firms-acquiring-consolidating-and-reselling-boutique-cybersecurity-consulting-firms-will-accelerate">The pace of private equity firms acquiring, consolidating, and reselling boutique cybersecurity consulting firms will accelerate.</h5>
<p>This trend is already happening in other verticals within professional services. Recent data shows the trend starting to happen in cybersecurity. Momentum Cyber reported <a href="https://momentumcyber.com/cybersecurity-market-review-h1-2021/?ref=content.strategyofsecurity.com">41 security-related transactions</a> for professional services firms in the first half of 2021 alone.</p>
<p>Large consulting firms are investing significant resources into growing their cybersecurity consulting practices. Their growth engine is largely inorganic: they're actively acquiring boutique consulting firms. Large firms simply don't have the time or agility to start every new service offering from scratch.</p>
<p>Private equity firms play an important role in this acquisition cycle. Many small firms are able to develop a solid book of business but need professional help in non-core areas of their business. A recurring theme is a firm with solid technical skills, deep loyalty from a small number of customers, and limited marketing presence. Challenges with internal operations often follow. Private equity firms can bring the business expertise to professionalize a small firm's branding, marketing and sales, and operations, enabling efficient and profitable growth.</p>
<p>Private equity firms also have the potential to create larger consulting firms with enough scale, strategy, and specialization to succeed as public companies — modeling after firms like Mandiant to <a href="https://strategyofsecurity.com/p/mandiant-and-the-future-of-cybersecurity-professional-services/">create the future</a> of cybersecurity professional services. Expect to see more private equity involvement in the cybersecurity professional services category.</p>
<h2 id="security-operations">Security Operations</h2>
<h5 id="security-operations-is-an-underrated-area-of-need-in-cybersecurity">Security operations is an underrated area of need in cybersecurity.</h5>
<p>Every operator in the industry is painfully tapped out and overworked right now. Many attacks happen on weekends and holidays. Nobody gets a meaningful break. We're in a vicious and unsustainable cycle.</p>
<p>Part of the solution is better use of automation and tools. The limited number of people we have available need to be as highly leveraged and augmented as possible. Broadly speaking, this is the job of security operations.</p>
<p>We already have many of the frameworks, processes, and tools we need. The challenge is using them. People and companies who can deliver highly functional workflows, processes, and true automation have tremendous opportunities in front of them. As <a href="https://twitter.com/SwiftOnSecurity?ref=content.strategyofsecurity.com">Swift on Security</a> so clearly stated:</p>
<blockquote>
<p>"Enterprise security is just operational excellence in action."</p>
</blockquote>
<p>World class security operations is the basis for making this a reality.</p>
<h5 id="security-orchestration-automation-and-response-soar-is-interesting-but-still-ambiguous">Security Orchestration, Automation and Response (SOAR) is interesting but still ambiguous.</h5>
<p>SOAR is one of the most interesting and promising categories in cybersecurity. Many products and services have entered the fray recently. However, the exact definition of SOAR as a category remains ambiguous for many people.</p>
<p>It seems likely to go in two directions:</p>
<ul>
<li>
<p>Generalized automation platforms for cybersecurity (e.g. the Zapier of cybersecurity)</p>
</li>
<li>
<p>Embedded automations within tools in other categories (e.g. low-code IAM workflows, incident response workflows, etc.)</p>
</li>
</ul>
<p>A practical example: vulnerability management and remediation is labor-intensive. Companies have a difficult time keeping up with remediation, particularly for lower risk issues. <a href="https://vulcan.io/?ref=content.strategyofsecurity.com">Vulcan</a> helps to automate the remediation process by prioritizing risks, creating remediation workflows, and making tactical remediation processes systematic. Augmenting a common but arduous process like vulnerability management can reduce a lot of the burden on security operations teams.</p>
<p>This is the promise of SOAR. The category is still relatively nascent. It needs some time to develop and mature. The potential benefits are clear, though — and the most opportunistic cybersecurity teams will be using this new generation of tools to build industry leading security operations capabilities.</p>
<h5 id="extended-detection-and-response-xdr-is-brutally-competitive">Extended Detection and Response (XDR) is brutally competitive.</h5>
<p>A clear area of category integration is the consolidation of Endpoint Detection and Response (EDR) and adjacent endpoint categories into Extended Detection and Response (XDR). This trend has been building and has now become mainstream.</p>
<p>As I have <a href="https://strategyofsecurity.com/p/yc-s21-cybersecurity-startups/">previously said</a>, it's a market that many large companies have entered:</p>
<blockquote>
<p>XDR is a newer approach to threat detection and response, thus a newer market. Larger cybersecurity product companies are also developing XDR products, including Palo Alto Networks, Cisco, Barracuda, Cynet, and more. It's an emerging market that hasn't been won yet.</p>
</blockquote>
<p>The XDR product space is challenging because there are multiple stages to the product. Some products focus on integrations (e.g. CrowdStrike's XDR partnership <a href="https://www.linkedin.com/posts/mpatel7518_crowdstrike-is-evolving-endpoint-security-activity-6853758278699241473-32fB?ref=content.strategyofsecurity.com">announcement</a>), others focus on threat intelligence, response workflows, search, and more. There isn't a clear and dominant leader yet.</p>
<p>At this point, it's difficult to say which products is going to win or why. Eventually, the leaders will reach feature parity among their products. Then, the race to win the market will come down to adoption and momentum.</p>
<h5 id="economically-viable-threat-intelligence-would-be-valuable">Economically viable threat intelligence would be valuable.</h5>
<p>There is a lot of threat intelligence available; however, it varies in relevance, price, and quality. Industry leaders like Mandiant are good at producing threat intelligence, but they haven't been able to do it profitably yet. Running a full-stack threat intelligence operation is expensive.</p>
<p>It would be valuable if a company or organization can standardize threat intelligence data or otherwise shift the cost model of gathering threat intelligence to one that's more financially sustainable. It's possible that threat intelligence itself will always be a loss leader (so to speak), and profits are to be made through adjacent products and services that make use of the information.</p>
<p>Regardless, high quality threat intelligence is extremely valuable. Low quality information is wasteful at best, and detrimental at worst. Filtering through the noise and increasing signal in an economical way is a significant opportunity.</p>
<h2 id="web3-and-blockchain">Web3 and Blockchain</h2>
<h5 id="web3-and-blockchain-are-a-wildcard">Web3 and Blockchain are a wildcard.</h5>
<p>The most nascent part of the entire cybersecurity ecosystem was Web3 and blockchain security. It was challenging to map this category at a detailed level — the technologies are so new and moving so quickly that few people truly understand what this part of the ecosystem really looks like.</p>
<p>I found a <a href="https://medium.com/1kxnetwork/organization-legos-the-state-of-dao-tooling-866b6879e93e?ref=content.strategyofsecurity.com">good mapping</a> of decentralized autonomous organization (DAO) tooling after I published the initial version. DAOs are only part of the story, so more thought is needed to paint a clear picture of the entire category.</p>
<p>At an abstract level, you could think of Web3 as an overlay on top of the entire cybersecurity ecosystem. A new generation of tools will potentially be needed for every category: identity for Web3, regulation for Web3, application security for Web3, and so on. This category is a wildcard in the truest sense of the word: literally anything could happen.</p>
]]></content:encoded>
            <category>Ecosystem</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/10/v1_-Ecosystem-Observations-2021.png"/>
        </item>
        <item>
            <title><![CDATA[Recapping the Okta Showcase21 Event]]></title>
            <link>https://strategyofsecurity.com/recapping-the-okta-showcase21-event/</link>
            <guid>616da9788a2ef90048fe0dfc</guid>
            <pubDate>Mon, 18 Oct 2021 17:23:47 GMT</pubDate>
            <description><![CDATA[A few takeaways about people, product, and growth from Okta's Showcase21 event.]]></description>
            <content:encoded><![CDATA[
<!--kg-card-begin: html-->
<div class="alert">
    <strong>Note:</strong> This article originally appeared as a <a href="https://twitter.com/colegrolmus/status/1450141609094365184?ref=content.strategyofsecurity.com">Twitter thread</a>. Minor updates were made to formatting and paragraphs to make the content more readable as a standalone article.
</div>
<!--kg-card-end: html-->
<p>Last week's Showcase21 event gave us a glimpse into the future of Okta and Auth0. A few takeaways about people, product, and growth.</p><h2 id="people">People</h2><p>The Auth0 acquisition and recent hiring have brought Okta a wealth of executive talent.</p><p>Auth0 CEO Eugenio Pace was impressive, as usual. There aren't many founders with the range to discuss broad trends about the future of identity and write code in a demo.</p><p>The amount of talented people Okta gained in the acquisition of Auth0 might be even more important than Auth0's product or customers. Yes, acquisitions come with vesting schedules. People can and will leave. From the outside in, the team still looks committed to the mission.</p><p>New CTO Sagnik Nandy's B2B and B2C experience at Google is a valuable hire. Okta has the deepest executive team in the market. The additions of Nandy, Susan St. Ledger, Pace, and Matias Woloski to existing Okta founders Todd McKinnon and Frederic Kerrest is a world-class group of people.</p><h2 id="product">Product</h2><p>Okta's Workflows product has a lot of unrecognized potential. It's now available as a standalone product with freemium entry options.</p><p>Automation is an under-appreciated area of need in Identity and Access Management. IAM is fraught with manual processes. There are companies with 100+ person teams to perform manual identity administration tasks.</p><p>To say that IAM needs help with workflow automation is a massive understatement. Workflows is a potentially differentiating product for Okta.</p><p>The long-term bet is whether generic automation products will win, or embedded automation within platforms like Okta is a better approach. Many companies use generic RPA tools for automating identity tasks. A purpose-built product like Workflows could be more effective.</p><p>The roadmap for Workflows is to use the product as a basis for integrations. Anyone will be able to create public workflows and make them available within Okta integration network — think Zapier for Okta. This has a lot of upside for both Okta and the ecosystem.</p><p>The (implied) message was clear about the combination of Okta and Auth0's products: be patient. The combination is still in the early days. If you attended the event expecting to see clarity or demos of a unified product, you'd be disappointed. It's a long term game.</p><p>Okta and Auth0 have two of the best products in their respective market segments. That's a good problem to have, but it's challenging to address. Despite previous mentions about combined mockups, there's no hurry to show anything yet. A totally reasonable approach.</p><p>The event had major feature announcements for both products.</p><ul><li>Okta: workflows, custom admin roles, branding, device authorization grants</li><li>Auth0: multi-cloud, organizations, actions</li></ul><p></p><p>Don't expect the company to let up while the long-term product strategy gets worked out.</p><p>The announcement about native multi-cloud deployment for Auth0 is more impactful than it seems. I've <a href="https://strategyofsecurity.com/p/forgerock-ipo/">previously talked about</a> on-premise deployments being a competitive advantage for ForgeRock:</p><blockquote>There will be a customer base of large enterprises for the foreseeable future. Some companies can't, or simply won't, move to cloud identity providers. Ironically, this might be ForgeRock's biggest competitive advantage: being the "anti-SaaS" platform. Despite its late push to enter the cloud identity market, maintaining the option of on-premise deployments gives ForgeRock an advantage over pure SaaS products like Okta and Auth0. This advantage only holds in scenarios where customers demand an on-premise implementation, but it's an advantage nonetheless.</blockquote><p>The option to deploy private instances of Auth0 on AWS or Azure isn't quite the same flexibility as ForgeRock, but it's close. This will be "good enough" for some customers who want the appearance of control but don't care about hosting the product in their own data centers.</p><p>A message that continued to be clear is when and how to choose one product over another:</p><ul><li>If you need a polished product that addresses many use cases, choose Okta.</li><li>If you're a dev-focused team who wants flexibility and customization, choose Auth0.</li></ul><p></p><h2 id="growth">Growth</h2><p>Todd McKinnon and Eugenio Pace discussed some updated numbers about TAM and the companies' combined metrics:</p><ul><li>"A $30B TAM might actually be conservative."</li><li>The combined businesses have $400m ARR in CIAM revenue</li><li>Overlap in customers is only 2%</li></ul><p></p><p>The customer identity market still has a long way to go. This is where much of the upside for growth likes for the combined Okta and Auth0 organization. At $400m in revenue, it's already a good business. The future upside and potential could be much, much higher.</p><p>Okta's investment and commitment to Field Operations is a strategic move that hasn't been widely discussed. From Todd McKinnon: </p><blockquote>"We're building out the largest field operation in the market."</blockquote><p>A bold statement that breaks from the traditional paradigm of partnerships. Okta is building a full-stack Field Operations team instead of over-relying on channel partners to fuel growth: integrated marketing, sales, onboarding, customer success, and retention. This strategy is expensive to build but differentiating and sustainable if it works.</p><p>Long term, Okta's competitive advantage is trust. Sagnik Nandy made a statement that summarizes Okta's competitive moat perfectly:</p><blockquote>"Trust has to be earned, and lots of people trust Okta." </blockquote><p>Trust takes a long time to gain, and Okta is starting to reap the benefits.</p>]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/10/v1_-Okta-x-Auth0-Showcase21.png"/>
        </item>
        <item>
            <title><![CDATA[Mandiant and the Future of Cybersecurity Professional Services]]></title>
            <link>https://strategyofsecurity.com/mandiant-and-the-future-of-cybersecurity-professional-services/</link>
            <guid>61560dc0cff496003d17dea4</guid>
            <pubDate>Mon, 04 Oct 2021 17:03:35 GMT</pubDate>
            <description><![CDATA[Exploring Mandiant's path forward after FireEye, building productized services at scale, and the future of cybersecurity professional services.]]></description>
            <content:encoded><![CDATA[<p>FireEye <a href="https://www.mandiant.com/company/press-release/mandiant-confirms-name-change-fireeye-inc-mandiant-inc?ref=content.strategyofsecurity.com">relaunched as Mandiant</a> today, making it one of a select few publicly-traded professional services firm focused exclusively on cybersecurity. Mandiant's strategy going forward is interesting on multiple levels, including the company's own prospects and the future of the broader cybersecurity professional services industry.</p>
<p>Mandiant <a href="https://www.fireeye.com/company/press-releases/2021/fireeye-announces-mandiant-relaunch-at-cds-2021-trade-as-mndt.html?ref=content.strategyofsecurity.com">announced the sale</a> of FireEye for $1.2 billion to Symphony Technology Group (STG) on September 22, 2021. The move marked the end of a seven year relationship between FireEye and Mandiant. FireEye acquired Mandiant for $1 billion in 2014, a fateful move that eventually led to Mandiant and Founder/CEO Kevin Mandia leading and eventually divesting FireEye.</p>
<h2 id="mandiants-dilemma">Mandiant's Dilemma</h2>
<p>Selling FireEye seemed inevitable. Revenue and product innovation from FireEye's products stagnated for years despite massive growth from other companies within the cybersecurity ecosystem. From <a href="https://www.crn.com/slide-shows/security/10-things-to-know-about-the-1-2b-fireeye-mandiant-split/?ref=content.strategyofsecurity.com">CRN</a>:</p>
<blockquote>
<p>FireEye’s product business has struggled for several years due to the persistence of legacy, on-premises appliance-based technology. Revenue for the company’s product business fell to $540.9 million in 2020, down 3 percent from $557.8 million a year earlier. That’s despite the surge in cybersecurity spending that accompanied the rapid shift to remote work at the onset of the COVID-19 pandemic.</p>
</blockquote>
<p>I understand why FireEye's acquisition of Mandiant made sense at the time. The firms were frequently collaborating on deals. The product-services relationship was mutually beneficial. Mandiant's growing reputation and revenue made it an attractive addition to FireEye's business. Both sides likely expected to pull each other into opportunities exclusively, establishing a dominant pairing in the market.</p>
<p>Mandiant continued to grow and differentiate itself in breach response and threat intelligence services. Meanwhile, FireEye wasn't able to maintain its market leadership in the transition from its on-premise hardware and software business to a modern SaaS model.</p>
<p>Fast-moving competitors like CrowdStrike and SentinelOne took over the endpoint protection market that FireEye was pivoting towards. Gartner's <a href="https://www.microsoft.com/security/blog/2021/05/11/gartner-names-microsoft-a-leader-in-the-2021-endpoint-protection-platforms-magic-quadrant/?ref=content.strategyofsecurity.com">Magic Quadrant for Endpoint Protection Platforms</a> says it all:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/10/gartner_edr_2021.png" class="kg-image" alt="" loading="lazy" width="1388" height="1454" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2021/10/gartner_edr_2021.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2021/10/gartner_edr_2021.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/10/gartner_edr_2021.png 1388w" sizes="(min-width: 720px) 720px"></figure><p>FireEye has been relegated to a niche player in the market, far behind CrowdStrike and the other leaders and visionaries.</p>
<p>The disconnect in the combined strategy of FireEye and Mandiant was this: it's difficult to grow both a product (FireEye) and a services business (Mandiant) at the same time. Especially when your CEO (Kevin Mandia) started the services business.</p>
<p>A company with equally strong product and services businesses is not the traditional paradigm — not in cybersecurity, and not in the broader tech industry. Two models have been proven to work:</p>
<ul>
<li>
<p>Product companies with subservient services businesses</p>
</li>
<li>
<p>Services companies with small or non-existent product businesses</p>
</li>
</ul>
<p>Okta is an example of the former. Their primary business is SaaS-based identity and access management products. Their professional services business supports implementation of the products — basically serving as an extension of customer success.</p>
<p>Accenture is an example of the latter. Their primary business is professional services — people to deliver work, typically billed by the hour. Their revenue from <a href="https://www.accenture.com/us-en/services/software-engineering/commercial-software?ref=content.strategyofsecurity.com">software products</a> pales in comparison to revenue from services.</p>
<p>FireEye's <a href="https://www.fireeye.com/blog/products-and-services/2020/12/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html?ref=content.strategyofsecurity.com">breach in late 2020</a> certainly didn't help, and may have accelerated the process. A major breach at a company who specializes in threat intelligence and incident response clearly raises skepticism in the market.</p>
<p>A $1.2 billion return for the sale of FireEye's products isn't what Mandiant had hoped for. FireEye's valuation was at a low revenue multiple. A lot of money has been spent acquiring companies to modernize FireEye's product portfolio. Unfortunately, this was probably the best Mandiant could do given the circumstances.</p>
<p>FireEye's future is likely a blend with STG's other recent acquisitions of <a href="https://www.rsa.com/en-us/company/news/rsa--emerges-as-independent-company?ref=content.strategyofsecurity.com">RSA</a> and <a href="https://www.mcafee.com/enterprise/en-us/about/newsroom/press-releases/2021/20210727-01.html?ref=content.strategyofsecurity.com">McAfee's enterprise business</a>. As private equity does, the eventual result will be a rationalized conglomeration of products from each of the companies operating under a reasonably efficient and profitable corporate entity. That's not the focus here — Mandiant's future as a standalone cybersecurity professional services company is much more interesting.</p>
<h2 id="challenges-for-traditional-professional-services-firms">Challenges for Traditional Professional Services Firms</h2>
<p>Mandiant's decision to remain a publicly-traded company as a professional services firm is somewhat of an anomaly, especially in cybersecurity. Most cybersecurity professional services firms are private companies — even multi-billion dollar practices like PwC, Deloitte, and EY.</p>
<p>Cybersecurity professional services firms are traditionally private for several reasons. A big one is their business model. Unlike SaaS companies, professional services firms have minimal recurring revenue. They have to manage their sales pipeline and grind out new project wins continuously. Reputation and scale matter, but future stability and growth have an element of inherent instability.</p>
<p>For much of the industry, profit margins vary widely and fluctuate based on billable rate pressures and market demand for service offerings. Highly competitive or commoditized services frequently end up in a race to the bottom: which firm can deliver the service for the lowest price?</p>
<p>The winners are at the margins. Large, reputable firms with strong brands and broad service offerings have incredibly robust profitability. They're some of the most reliable and resilient businesses on the planet. The other winners are firms like Mandiant: clear leaders in a specific area of expertise.</p>
<p>Mandiant has <a href="https://www.usatoday.com/story/tech/2015/05/20/fireeye-mandiant-carefirst/27659481/?ref=content.strategyofsecurity.com">dominated breach investigations and threat intelligence</a> for over a decade. They have led or participated in nearly all the high profile breaches in recent memory: Target, Sony Pictures, JP Morgan Chase, Anthem, SolarWinds, Colonial Pipeline, and more. It's hard to be more dominant than Mandiant has been within a competitive industry segment like breach response services.</p>
<p>The Achilles' heel and barrier to growth for professional services firms is development of software products to compliment and diversify services revenue. All the leverage in a traditional professional services business comes from labor, the <a href="https://www.navalmanack.com/almanack-of-naval-ravikant/find-a-position-of-leverage?ref=content.strategyofsecurity.com">oldest form of leverage</a> there is. People alone don't scale. They have marginal costs of replication — to get more done, you need to hire and pay more people. So, that's what traditional firms do:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">We are proud to be increasing our workforce and betting on technology to better advise our clients. More on <a href="https://twitter.com/hashtag/TheNewEquation?src=hash&ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">#TheNewEquation</a> via <a href="https://twitter.com/WSJ?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">@WSJ</a>. <a href="https://t.co/shQPCrb44A?ref=content.strategyofsecurity.com">https://t.co/shQPCrb44A</a></p>— PwC US (@PwCUS) <a href="https://twitter.com/PwCUS/status/1407052988598849540?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">June 21, 2021</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>This is where Mandiant's strategy gets interesting. They're not immune to the limitations of labor leverage, but they're taking specific actions to increase leverage with code and media.</p>
<p>Mandiant is creating leveraged workers by augmenting and scaling them with tech. They're also applying specific knowledge from people in the field investigating and responding to breaches to make their tech even more leveraged. It's a mutually reinforcing cycle of product and service development with profound implications, if successful.</p>
<h2 id="mandiants-current-status">Mandiant's Current Status</h2>
<p>The Mandiant of today is a perplexing case study. The company is widely recognized as the leader in large-scale breach responses and threat intelligence. They have focused on growth, investing heavily in R&amp;D, sales, and marketing. This has created challenges with profitability, particularly compared to their traditional, privately-held peers in the professional services industry.</p>
<p>Mandiant is a significantly smaller company after selling FireEye. Services revenue (Mandiant Solutions) was $113.9 million in Q2, or roughly a $450-500 million business annually. For context, Mandiant's revenue is slightly higher than companies like SailPoint and CyberArk and significantly lower than large, billion-dollar cybersecurity consulting firms like Accenture, PwC, and Deloitte.</p>
<p>On the surface, Mandiant is a niche company. They don't offer many services compared to their larger peers. Their strategy is to be excellent at the narrow set of things they do. From Kevin Mandia in the <a href="https://www.fool.com/earnings/call-transcripts/2021/08/06/fireeye-feye-q2-2021-earnings-call-transcript/?ref=content.strategyofsecurity.com">Q2 2021 earnings call</a>:</p>
<blockquote>
<p>And right now, what I see when you have an alignment of strategy, you get a focus. The folks that will be on a go-forward basis on Mandiant will be, I think, way more productive selling things like we're No. 1 in intelligence, we're No. 1 in incident response.<br>
<br>
We're creating a automated defense based on our No. 1 intelligence and our No. 1 breach intelligence. With focus will come better results.</p>
</blockquote>
<p>Identifying the <a href="https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf?ref=content.strategyofsecurity.com">Chinese APT-1 espionage unit</a> and the <a href="https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html?ref=content.strategyofsecurity.com">SolarWinds breach</a> are two of the most significant accomplishments in modern cybersecurity history. This is exactly Mandiant's dilemma: the company hasn't been able to <a href="https://personalmba.com/value-capture/?ref=content.strategyofsecurity.com">capture enough of the value</a> they've created through research and innovation.</p>
<p>Mandiant has consistently struggled with profitability, losing $64.6 million in the last quarter alone. Again, from CRN:</p>
<blockquote>
<p>However, from a profitability perspective, Mandiant’s operating losses barely budged, coming in at $183 million in 2020. Conversely, in the product business, FireEye recorded operating income of $27.8 million in 2020, improved from a $26.8 million operating loss in 2019.</p>
</blockquote>
<p>However, the company's revenue growth is good. They reported 26% year-over-year growth in the consulting business and a 19% ARR for the subscription software/intel business. It just takes a lot of spend on R&amp;D, sales, and marketing to make their growth happen.</p>
<p>The challenge with focusing on breach response services is that the size, scope and frequency of breaches is erratic and unpredictable — truly feast or famine for a service provider. In the past, Mandiant has <a href="https://fortune.com/2016/08/05/fireeye-stock-feye-earnings/?ref=content.strategyofsecurity.com">cited volatility</a> as a reason for missing earnings expectations:</p>
<blockquote>
<p>“While our services personnel are responding to more attacks this year than prior years, the scope and scale of these attacks is simply different,” FireEye (FEYE) CEO Kevin Mandia said on a quarterly earnings call Thursday afternoon. “The average duration and size of each incident response engagement was smaller than in years past.” Rather than having to respond to attacks on “thousands and thousands and thousands” of computers, he added, “suddenly, we’re doing forensics and deep-diving [on] four machines or five machines.”</p>
</blockquote>
<p>The company's thinking on the impact of volatility is clearly evolving towards adaptability. Kevin Mandia discussed a revised stance in the Q2 earnings call:</p>
<blockquote>
<p>...let's just say we have world peace overnight and there's no inbound IRs, we can repurpose every one of those people, for the most part, to strategic services or red teaming and all the skills are overlapped.<br>
<br>
So that's the good news with incident response consultants. They can play free safety and pretty much do any of the services that we have.</p>
</blockquote>
<p>There is a lot of room for debate about whether this is accurate or not. I generally agree, assuming there is adequate demand and sufficient rates to support repurposing incident response people on adjacent projects. How Mandiant handles this is relevant, but it's also minutiae on the wider scale of their strategy going forward.</p>
<p>The interesting part of Mandiant's future strategy is building leverage with code and intel. This is where we start to get a glimpse inside the mind of Kevin Mandia, one of the leading experts in the world on breach response and threat intelligence:</p>
<blockquote>
<p>I believe automation, powered by AI and machine learning technologies, is the only way organizations will be able to keep up with attacks and maintain resilience. Customers are coming to this realization as well, and momentum for Mandiant Advantage continues to build.<br>
<br>
...<br>
<br>
The combination of increasing threats and a growing shortage of cybersecurity skills means in-house teams are overworked, and they may lack the expertise or visibility to manage their security controls and security posture.</p>
</blockquote>
<p>He's absolutely right. A practical example:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Is there any place that isn’t understaffed and desperately trying to hire more infosec people?<br><br>I have never seen the situation more dire in my 20-year career, and I’m surprised it’s not being widely recognized as a slowly-approaching disaster.</p>— April King 🌀 (@CubicleApril) <a href="https://twitter.com/CubicleApril/status/1443299640795877379?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">September 29, 2021</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>The combination of continuous threats and a shortage of cybersecurity skills is a real problem — perhaps the most significant problem we face today as cybersecurity professionals. Kevin Mandia described how Mandiant intends to address this gap in the <a href="https://www.fool.com/earnings/call-transcripts/2021/04/27/fireeye-feye-q1-2021-earnings-call-transcript/?ref=content.strategyofsecurity.com">Q1 2021 earnings call</a>:</p>
<blockquote>
<p>...a lot of people that I talked to wish they had Mandiant experts sitting in their SOC and staring at every alert.<br>
<br>
We can't offer that. That doesn't scale. But one thing we can do is create a system that learns, it thinks, and it can do the minimization as if it was us.</p>
</blockquote>
<p>The tech world has a term for this: productized services. Building systems to augment and automate human functions in a function like cybersecurity is an interesting experiment. It's also one of the largest attempts at building productized services at scale. This could have a profound impact on the professional services market for cybersecurity.</p>
<h2 id="productized-services-at-scale">Productized Services at Scale</h2>
<p>Productized services are an emerging trend in the creator economy and across tech. Dru Riley's coverage in <a href="https://trends.vc/trends-0060-productized-services/?ref=content.strategyofsecurity.com">Trends #0060 — Productized Services</a> is a great starting point. From the report:</p>
<blockquote>
<p>Productized services offer services at a fixed price with a clear scope and timeline.<br>
<br>
Freelancers are like personal chefs who cook everything for everyone. Productized services are like restaurants with a menu.</p>
</blockquote>
<p>Productized services are intended address the labor leverage problem faced by traditional professional services companies:</p>
<blockquote>
<p>Productized services help you move from selling time to outcomes. You can build systems instead of billing hours.</p>
</blockquote>
<p>The concept of productized services is based on the idea of a value ladder — a progression from low volume, high labor services to low labor, high volume products with greater leverage. Applying a <a href="https://twitter.com/jackbutcher/status/1246092731639836672?s=20&ref=content.strategyofsecurity.com">model from Jack Butcher</a>, an example of Mandiant's value ladder looks like this:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/10/v1_-Mandiant-Productized-Services.png" class="kg-image" alt="" loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2021/10/v1_-Mandiant-Productized-Services.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2021/10/v1_-Mandiant-Productized-Services.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2021/10/v1_-Mandiant-Productized-Services.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/10/v1_-Mandiant-Productized-Services.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>Mandiant's strategy aligns exactly to the productized services model. From Kevin Mandia:</p>
<blockquote>
<p>We are also building our expertise and intelligence into the modules of the Mandiant Advantage platform to extend our expertise and reach far beyond the number of customers we can reach through services alone.</p>
</blockquote>
<blockquote>
<p>...using Mandiant Automated Defense is like having a team of Mandiant experts right there in your security operations center.</p>
</blockquote>
<blockquote>
<p>We all know that almost every single human skill over time is going to be replicated by machine intelligence, and that's what we're doing here.</p>
</blockquote>
<p>Mandiant is turning low volume, high labor services (breach response and threat intelligence) into low labor, high volume products (the Mandiant Advantage SaaS platform). A specific example of how this strategy is being executed:</p>
<blockquote>
<p>...we launched our ask an expert capability across our endpoint platform. And this provides customers instant access to Mandiant experts when they need immediate help.</p>
</blockquote>
<p>Productized services in action at public company scale. This model has worked for independent consultants and smaller firms. The Trends.vc report highlights several success from across tech, none of which have reached the size and scale of Mandiant yet. Mandiant's attempt is one of the largest ever.</p>
<p>If productized services are the future of professional services, Mandiant's transformation will be leading the way. Can they pull it off? It's definitely possible. A few hints from Kevin Mandia tell us why.</p>
<p>First, an explanation about the complimentary and mutually reinforcing innovation cycle between Mandiant's services and solutions businesses:</p>
<blockquote>
<p>The two parts of our Mandiant business, services and solutions, are interdependent and complement each other. Our consultants are technology-enabled by the Mandiant Advantage platform, allowing them to scale their productivity, and our technology is expertise-enabled with our frontline intel and experience. In combination, this allows us to deliver our expertise at scale whenever and however customers need it. Going forward, we plan to continue building on our Mandiant Advantage strategy, automating human tasks and applying machine learning to create a super analyst: a technology that thinks, learns and makes recommendations to make our customers more secure.</p>
</blockquote>
<p>It's a powerful idea in theory, and harder to execute in practice. Mandiant's innovation cycle has multiple dependencies:</p>
<ul>
<li>
<p>The technology has to be good enough and current enough to truly enable and scale the productivity of consultants. Consultants aren't more productive or effective if they don't use the tech.</p>
</li>
<li>
<p>Consultants have to execute on sharing their frontline expertise the product managers and engineers building the technology platform. Knowledge goes to waste if it isn't shared within the organization.</p>
</li>
<li>
<p>Product managers and engineers have to build and iterate the product quickly to codify the intel and expertise they receive from the field. Leverage doesn't happen if knowledge isn't incorporated into the product timely.</p>
</li>
</ul>
<p>Operationalizing this model is going to be challenging. It's incredibly valuable if it works, though — especially in cybersecurity, a field that's facing an unprecedented set of global threats.</p>
<p>Second, some commentary from Q1 about Mandiant's competitive moat and and greenfield opportunities with Mandiant Advantage:</p>
<blockquote>
<p>But at the end of the day, that's what creates the halo effect is the knowledge itself, not the event, and we just happen to be at the front row seat for it...Getting demand in Advantage, what I see there is it's greenfield. I don't believe it's ever existed where you can plug a technology in and it's like adding a thousand experts to your network.<br>
<br>
...to make Mandiant Advantage work, here's the moat for it...you have to have a global intel capability, and we have that. We're in over 20 countries. We speak over 30 languages.<br>
<br>
You have to own the front lines, and we have that, where we did over a thousand investigations last year. And a lot of people think, oh, investigations are tactical. They're absolutely strategic. It's how you get a front-row seat to all the threats that are circumventing the safeguards of today, so we can, with Mandiant Advantage, with our international intelligence team, and our breach intelligence that we're getting every single day, we can feed it to products that just don't learn, don't think, can adapt, too static, which is the majority of security products today because they simply don't have the knowledge and the intelligence that we have as we clean up the messes left behind from a lot of these products.<br>
<br>
...So [for] Mandiant Advantage, the greenfield opportunity is to automate that expertise in that intel and bring it to you at machine speed.<br>
<br>
...if you're going to test your security, you've got to do with real threats and real knowledge. You can't just be, hey, I made software that can simulate a threat. Well, where do you get the content for it? We've got the content.</p>
</blockquote>
<p>When Mandiant is the first to discover a piece of threat intelligence, their knowledge is exclusive — you literally can't get it anywhere else. If their specific knowledge about threat intelligence can be quickly operationalized within a scaled technology platform and made available to every customer, it's incredibly valuable.</p>
<p>Third, Kevin Mandia clearly has strong conviction about their competitive advantage in threat intelligence:</p>
<blockquote>
<p>...we prefer having first-hand knowledge of the intelligence that we produce.<br>
<br>
The only way to get that firsthand intelligence is to have hundreds of responders out there on the front lines...<br>
<br>
...90% of the time, it seems like every time I see a headline, we're on the ground responding firsthand...I'm not getting distracted by what other folks are doing.<br>
<br>
On any given day, one company may be on the front lines with intel, other companies don't have. All I know is we were structured and it's strategically important to respond to security breaches to have the best intel. So that's what we did. And then to augment that, we have nearly 300 threat analysts that speak over 30 languages in over 25 countries.<br>
<br>
I am confident that, that doesn't exist in the private sector anywhere else. So if somebody wants to say they're in a threat intelligence business, I'd be interested in how -- do they have a global infrastructure doing collections like we do?</p>
</blockquote>
<p>Mandiant's threat intelligence unit is a heavy duty operation. This commentary starts to give you an idea about why their R&amp;D spending is so high —&nbsp;it's not cheap to deploy hundreds of highly paid threat analysts globally, rapidly analyze their findings, and disseminate them to thousands of customers. Mandiant is making one of the largest attempts ever at executing a productized services strategy. Something like this can be done by governments in the public sector, but they're not bound by profits like Mandiant is in the private sector.</p>
<p>Finally, some commentary about the idea of placing value in outcomes:</p>
<blockquote>
<p>First, nobody cares how you provide the outcome as long you provide it. Right? ...what I would want to buy, is the outcome of saying, if I've got Mandiant Automated Defense, regardless of how we deliver it, even -- whether we deliver 99% tech or 92% tech, but it'll be a lot of tech, I would just want the outcome that I feel safe, and that's what we want to provide.</p>
</blockquote>
<p>Productized services are the solution to Mandiant's profitability issues. So far, they haven't been able to earn enough revenue from professional services to offset their massive spending on R&amp;D, sales, and marketing. If they can shift their customers' mindset to focus on value and outcomes, they have a chance at capturing more profits from the value they provide.</p>
<p>Safety and security are things people and companies value. <a href="https://hbr.org/2016/08/a-quick-guide-to-value-based-pricing?ref=content.strategyofsecurity.com">Value-based pricing</a> is the way Mandiant can move beyond hourly rates — trading time for money —&nbsp;to subscription-based revenue with little to no marginal cost of replication.</p>
<h2 id="what-the-future-holds">What the Future Holds</h2>
<p>Building a successful productized services business to address an important societal issue like cybersecurity attacks is an interesting problem to solve. In the process, Mandiant may also revolutionize the delivery model for professional services in the industry.</p>
<p>A shift towards productized services is bound to happen, especially in cybersecurity. Too many incentives are aligned: labor shortages, budget constraints, speed of delivery, and never-ending fear are a recipe for innovation. The question is whether Mandiant will be the company to execute this strategy and successfully capture the value.</p>
<p>Mandiant's productized services model has to start showing results quickly. If it doesn't, investors are going to view Mandiant as just another professional services firm with underperforming profitability.</p>
<p>Their transformation is high risk, high reward. If the transition doesn't work out, their failure is going to create a giant opening for opportunistic service providers to disrupt Mandiant's dominance in breach responses and threat intelligence.</p>
<p>I wouldn't be surprised to see Mandiant take the company private so they can step out of the public spotlight and scrutiny like other large cybersecurity consulting firms. Going private could give them the time and capital they need to build a productized services strategy at scale.</p>
<p>The clock has started now, and it's going to be an interesting journey to follow.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/10/v1_-FireEye-_-Mandiant.png"/>
        </item>
        <item>
            <title><![CDATA[Mapping the Cybersecurity Ecosystem]]></title>
            <link>https://strategyofsecurity.com/mapping-the-cybersecurity-ecosystem/</link>
            <guid>615334cfcff496003d17ddc5</guid>
            <pubDate>Wed, 29 Sep 2021 16:44:10 GMT</pubDate>
            <description><![CDATA[An introduction to the cybersecurity ecosystem mapping project. It's time to reframe our view of cybersecurity and move our thinking from industries to ecosystems.]]></description>
            <content:encoded><![CDATA[<p>This was supposed to be a post, and it turned out to be a project. Wrapping your mind around everything happening today in cybersecurity, privacy, and risk is a daunting task, to say the least.</p>
<p>From private industry to nation states, startups to public companies, security analysts to executives, the scale and diversity of people and information has grown almost beyond comprehension.</p>
<p>We shield ourselves from the confusion and abundance out of necessity. It's easy to follow the allure of over-specialization — to focus on a narrow set of interests and stills, tuning out the rest of the noise. Yet, the path towards understanding requires a connection to the whole; an awareness of where our path fits into the network of domains in cybersecurity.</p>
<p>Having the information and tools to navigate the cybersecurity ecosystem is the path towards clarity. It's how we can truly make a difference and reach our own versions of professional success. By reading this article, I hope you've found your way to a new tool and set of information that can benefit you for years.</p>
<p>Consider this project a new starting point. Another increment derived from the work of many others. Errors, disagreements, omissions, and revisions are inevitable. There is no right way to define an ecosystem so large and dynamic. This is my current opinion, and my opinion is malleble.</p>
<p>If you want to skip straight to the mapping, you can find it <a href="https://strategyofsecurity.com/p/cybersecurity-ecosystem/">here</a>. The rest of this post explains the reasoning behind how and why I created the mapping. It's focused on a particularly important concept: thinking in ecosystems instead of industries.</p>
<hr>
<h2 id="thinking-in-ecosystems">Thinking in Ecosystems</h2>
<p>A few words commonly used for broad economic categorizations are: industry, market, sector, landscape, mapping, and others. All of these words are accurate to an extent. However, thinking in terms of ecosystems helps navigate the vastness of cybersecurity.</p>
<p>Precision matters because of the mindset I'm encouraging you to think from. <a href="https://stratechery.com/2015/the-funnel-framework/?ref=content.strategyofsecurity.com">Stratechery's definition</a> of ecosystems is a good starting point:</p>
<blockquote>
<p>An ecosystem is a web of mutually beneficial relationships that enhances the value of all of the participants.</p>
</blockquote>
<p>"Ecosystem" is a metaphor that comes naturally (it's literally derived from nature). It's also a good model for representing something so dynamic and inter-related. The topology of an ecosystem is also important: think of it like a web, not a hierarchy.</p>
<p>Professor James F. Moore is responsible for the seminal work on business ecosystems, developed at Harvard Business School in the 1990s. His famous <a href="https://hbr.org/1993/05/predators-and-prey-a-new-ecology-of-competition?ref=content.strategyofsecurity.com">Harvard Business Review article</a> describes the mindset of business ecosystems:</p>
<blockquote>
<p>To extend a systematic approach to strategy, I suggest that a company be viewed not as a member of a single industry but as part of a business ecosystem that crosses a variety of industries. In a business ecosystem, companies coevolve capabilities around a new innovation: they work cooperatively and competitively to support new products, satisfy customer needs, and eventually incorporate the next round of innovations.</p>
</blockquote>
<p>Thinking in ecosystems also embraces nature of the times we're living in. From the <a href="https://sloanreview.mit.edu/article/the-myths-and-realities-of-business-ecosystems/?ref=content.strategyofsecurity.com">MIT Sloan Management Review</a>:</p>
<blockquote>
<p>The shift to ecosystems thinking challenges the very idea of “industry” that we inherited from the industrial revolution — a discrete set of broadly similar players competing to produce a common end product in a vertically integrated fashion. The coming decades will likely see the further spread of ecosystems, with companies coevolving in temporary clusters of semifluid relationships, spanning traditional industry boundaries. We should therefore be wary of inadvertently applying assumptions from more classical environments or overgeneralizing from a handful of well-known precedents. Instead, we should adopt an ecosystems perspective and consider the specific strategic choices we face, based on our particular situation, aspirations, and capacities.</p>
</blockquote>
<p>Like every (non-monopolistic) industry from the industrial era, there are competitive forces within cybersecurity. Companies compete for business. Employers compete for talent. Industry segments grow, consolidate, mature, and decline. All the normal traits of a mature industry.</p>
<p>From a business perspective, participants in the cybersecurity ecosystem have relatively good parity. There are few truly dominant companies or organizations to be found anywhere in the ecosystem — no Google of cybersecurity, so to speak. There are no full-stack, one size fits all cybersecurity products or platforms. We solve our problems through a combination of solutions.</p>
<p>There's more to the story, though. The industrial era is gone, replaced by an information era that gives leveraged individuals nearly as much power as enterprises or nation-states. This shift gives rise to new forms of warfare, threats, and attackers. Ecosystems aren't all full of happiness and mutually beneficial interactions among participants — especially not in cybersecurity.</p>
<p>What's unique about cybersecurity is the destructive, predatory nature that lies beneath the surface. Criminals commit fraud and steal money. Organized crime rings hold data for ransom and sell illicit goods on the dark web. Nation-states attack one another.</p>
<p>The cybersecurity ecosystem inherently includes an element of conflict and warfare. It's more like the savannah than some of its bougie tech contemporaries. An ecosystem in the truest sense of the word.</p>
<p>You could even think of cybersecurity as an ecosystem <em>of</em> ecosystems. Within the broader cybersecurity ecosystem, there are smaller ecosystems at various evolutionary stages. Endpoint protection is relatively mature. Cloud security is newer and less mature. Web3 security is emergent to the point it's barely on the radar.</p>
<p>Change is happening, and it's unrelenting. Again, from James F. Moore:</p>
<blockquote>
<p>I anticipate that as an ecological approach to management becomes more common—as an increasing number of executives become conscious of co-evolution and its consequences—the pace of business change itself will accelerate. Executives whose horizons are bounded by traditional industry perspectives will find themselves missing the real challenges and opportunities that face their companies. Shareholders and directors, sensing the new reality, will eventually remove them. Or, in light of the latest management shifts, they may have already done so.</p>
</blockquote>
<p>This is the importance of ecosystems, particularly in cybersecurity. Thinking in terms of ecosystems may even be one of the deciding factors in determining the cybersecurity leaders of tomorrow.</p>
<hr>
<h2 id="mapping-the-cybersecurity-ecosystem">Mapping the Cybersecurity Ecosystem</h2>
<p>Mapping the cybersecurity ecosystem is a daunting task that relies heavily on the work of others. This work is almost purely derivative — a <a href="https://en.wikipedia.org/wiki/Meta-analysis?ref=content.strategyofsecurity.com">meta-analysis</a> of various references.</p>
<p>The rationalization of different thoughts and approaches for defining cybersecurity has a lot of value in itself. When discrepancies or subtle nuances existed, I had to stop and think carefully about how to resolve them. We all don't use the same terms, and our perception is guided by our own experiences in cybersecurity.</p>
<p>Stitching together multiple mappings also helped to account for omissions and variances in scope between different iterations. This wasn't the fault of the authors — it's just the difference between looking at an industry versus a broader ecosystem.</p>
<p>Creating an ecosystem mapping requires a degree of judgment. This inevitably means you'll have different opinions about various classifications, definitions, and examples. This is just one iteration — with your help, I hope to make it more accurate in future iterations.</p>
<p>On the issue of completeness, I'll just say that I certainly forgot things. Any omissions were unintentional — either oversimplification on my part or blind spots I'm not aware of. Another area I hope to improve upon.</p>
<p>I hope you find this project helpful, either as a tool to communicate your value in the ecosystem or as a model to understand how your work fits in. Cybersecurity is at an exciting point in time, and I'm looking forward to seeing how this fast-moving ecosystem continues to evolve.</p>
<figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://strategyofsecurity.com/p/cybersecurity-ecosystem"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Cybersecurity Ecosystem</div><div class="kg-bookmark-description">A mapping of the cybersecurity ecosystem. The mapping includes visuals, definitions, and examples of each part.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://strategyofsecurity.com/p/favicon.png" alt=""><span class="kg-bookmark-author">Cole Grolmus</span><span class="kg-bookmark-publisher">Cole Grolmus</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://strategyofsecurity.com/p/favicon.png" alt="" onerror="this.style.display = 'none'"></div></a></figure>]]></content:encoded>
            <category>Ecosystem</category>
            <category>#popular</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/09/v1_-Cybersecurity-Ecosystem-Mapping.png"/>
        </item>
        <item>
            <title><![CDATA[ForgeRock's IPO, Identity Crisis, and Path Forward]]></title>
            <link>https://strategyofsecurity.com/forgerock-ipo/</link>
            <guid>6147a6064df958003e407387</guid>
            <pubDate>Mon, 20 Sep 2021 12:45:00 GMT</pubDate>
            <description><![CDATA[ForgeRock had a long and arduous journey toward its IPO: 11 years, $233.7 million in funding, and three CEOs. This is a deeper look at ForgeRock's path to IPO and post-IPO trajectory.]]></description>
            <content:encoded><![CDATA[<p>ForgeRock ($FORG), an identity and access management startup, IPO'd on Thursday, September 16, 2021. The IPO occurred quickly (ForgeRock's S-1 was filed on August 23, 2021) amid relatively low fanfare among public investors and within the cybersecurity industry. The stock did well in early trading, <a href="https://www.marketwatch.com/story/forgerock-shares-rise-44-on-first-day-of-trading-271631809161?ref=content.strategyofsecurity.com">up 44%</a> after its first day.</p>
<p>History will likely consider this a good, but not great, exit for the 11 year old company. ForgeRock IPO'd at a <a href="https://www.reuters.com/article/forgerock-ipo-idUSL4N2Q92GB?ref=content.strategyofsecurity.com">~$2 billion valuation</a>. It raised $233.7 million in venture capital funding across five rounds. The return for investors is roughly 8x.</p>
<p>The company's road to an IPO has been a long and arduous one. Living in the shadow of Okta, a decacorn and pioneer of pure SaaS businesses, is a difficult existence. Life won't get any easier for ForgeRock a public company in a competitive access management market.</p>
<p>The story of ForgeRock boils down to its growth prospects, late entry into the cloud identity market, and reliance on third party partnerships for growth.</p>
<h2 id="revenue-growth-and-metrics">Revenue, Growth, and Metrics</h2>
<p>S-1 filings are usually interesting because they disclose details of a non-public company's financials for the first time. ForgeRock's <a href="https://www.sec.gov/Archives/edgar/data/1543916/000119312521254144/d127368ds1.htm?ref=content.strategyofsecurity.com#toc127368_14">S-1 filing</a> was no exception — they had provided little financial transparency other than periodic disclosures of revenue in the past two years.</p>
<p>Coincidentally, the timing of ForgeRock's S-1 filing and Okta's Q2 earnings release, which I <a href="https://strategyofsecurity.com/p/okta-auth0-q2-2021-results/">covered in detail</a> last week, make for an interesting point-in-time comparison. Okta's disclosure of Auth0's financials for the first time adds an additional dimension to the mix.</p>
<p>The punch line is this: Okta has significantly outperformed ForgeRock financially in the decade since the companies were founded. Okta started in January 2009. ForgeRock was founded in February 2010. This 13 month difference inextricably links the companies and their financial performance, particularly since they are competing in the same market.</p>
<p>Auth0 has matched or outperformed ForgeRock on several financial metrics despite being founded in early 2013, roughly three years after ForgeRock. Its $6.5 billion valuation at the time of acquisition was a substantially greater exit than ForgeRock's ~$2 billion IPO. Current growth metrics also have Auth0 on a much higher trajectory than ForgeRock going forward.</p>
<p>A comparison of core financial metrics says a lot about the historical performance and growth trajectory of each company. It's difficult to do a direct comparison since many numbers are opaque or based on forecasts. However, a few interesting comparisons are:</p>
<ul>
<li>
<p><strong>Revenue:</strong> ForgeRock is slightly smaller than Auth0 in terms of revenue. Okta is a significantly larger company than both with nearly 6x greater revenue. <sup class="footnote-ref"><a href="#fn1" id="fnref1">[1]</a></sup></p>
</li>
<li>
<p><strong>Revenue Growth:</strong> ForgeRock's revenue growth is good but inconsistent. This is attributable to many nuanced factors that markets ultimately don't care about. Okta's 50% growth rate is staggering, especially because its revenue is already ~6x higher than ForgeRock. <sup class="footnote-ref"><a href="#fn2" id="fnref2">[2]</a></sup></p>
</li>
<li>
<p><strong>Customer Retention:</strong> ForgeRock's customer retention is good, but still 14% lower than Auth0 and 9% lower than Okta. This number factors in both customer retention and growth, so it's not necessarily surprising for Auth0 and Okta to have a higher NRR given their strong growth rates. <sup class="footnote-ref"><a href="#fn3" id="fnref3">[3]</a></sup></p>
</li>
<li>
<p><strong>Large Customers:</strong> Despite ForgeRock's reputation as an enterprise identity company, Okta has over 6x more large customers. Auth0 is typically regarded as a bottoms-up company with minimal enterprise sales effort. Their count of large customers is slightly more than ForgeRock. <sup class="footnote-ref"><a href="#fn4" id="fnref4">[4]</a></sup></p>
</li>
<li>
<p><strong>Net Losses:</strong> All three companies are losing a decent amount of money. However, ForgeRock is currently losing nearly as much money as Okta, a larger company with a larger growth rate. <sup class="footnote-ref"><a href="#fn5" id="fnref5">[5]</a></sup></p>
</li>
</ul>
<p>To be fair, Okta and Auth0 are anomalies in the broader SaaS market. Unfortunately for ForgeRock, sharing an industry with them is tough — metaphorically similar to growing up in a family with a sibling who is an Olympian and another who is an esteemed neuroscientist.</p>
<p>ForgeRock has done a commendable job building itself into a strong performer and carving out a place in the broader identity and access management market. An IPO is a major accomplishment no matter the circumstances. The addition of another standalone cybersecurity company in public markets is a major win for the industry. The comparisons between ForgeRock and Okta are inescapable, though — and have likely become too substantial to overcome barring a major stumble by Okta.</p>
<h2 id="forgerocks-identity-crisis">ForgeRock's Identity Crisis</h2>
<p>Even with the achievement of an IPO, ForgeRock faces an identity crisis that has been lingering for years. In short, the company is in a position of being all things to all customers in the identity market. Cloud or on-premise? <em>Sure.</em> Workforce or customers? <em>Yep, we do that.</em> Open or closed source? <em>Yeah, about that...</em> ForgeRock's products are the metaphorical kitchen sink of the identity and access management industry — a tool for everything, but not a clear leader of anything yet.</p>
<p>To understand the nature of the problem, we need to rewind back to the origins of the company and its open source technology platform. ForgeRock's core product, Access Management, is based on OpenSSO, an open source project released by Sun Microsystems in late 2008. ForgeRock's <a href="https://web.archive.org/web/20131208031933/http://www.h-online.com/open/news/item/Oracle-kills-OpenSSO-Express-ForgeRock-steps-in-939634.html">origin as a company</a> occurred because Oracle ended support for OpenSSO in February 2010 after acquiring Sun:</p>
<blockquote>
<p>OpenSSO Express has been removed for download from Oracle's website, leaving users of the community version of what was Sun's single sign-on platform to either, build their own version from source code, or to go to a third party. Norwegian company ForgeRock has stepped in and released OpenAM, based on OpenSSO source code.</p>
</blockquote>
<p>ForgeRock's Directory Services platform is also <a href="https://web.archive.org/web/20131207220940/http://www.h-online.com/open/news/item/ForgeRock-announces-OpenDJ-LDAP-directory-service-1099809.html">based on an open source project</a> from Sun. The company's other core products were developed internally and not based on Sun products.</p>
<p>The confusion starts with ForgeRock's status as an open vs. closed source company. ForgeRock was firmly an open source company from the start, making the following declaration on their <a href="https://web.archive.org/web/20100204201947/http://www.forgerock.com/">original website</a> back in February 2010:</p>
<blockquote>
<p>“We will work and contribute in the Open Source Community as 1st class citizen.” Lasse Andresen, CEO, ForgeRock</p>
</blockquote>
<p>Six years later, ForgeRock silently <a href="https://forum.forgerock.com/topic/community-edition/?ref=content.strategyofsecurity.com">separated open source and commercial development</a>. The current model for open source is <a href="https://forgerock.github.io/?ref=content.strategyofsecurity.com">Community Editions</a>, essentially end-of-life versions of prior open source projects maintained by ForgeRock. Community Editions include the four core products: Access Management, Identity Management, Directory Services, and Identity Gateway. Recently developed products like Identity Governance and Autonomous Identity are not currently available.</p>
<p>Beginning as a company built from open source and pivoting to essentially a closed source platform is a curious turn of events. It's also a move typically frowned upon by the open source community. A majority of ForgeRock's customers are large enterprises. These organizations aren't the type to run unsupported open source software — they're paying for licenses and support.</p>
<p>The most logical explanation I can think of is that ForgeRock's continued investment in product development and new product launches over more than a decade finally reached a tipping point. The company may have believed their contributions were more valuable than the original open source code and contributions made by the open source community. A viewpoint like this would make it easier to rationalize a change to proprietary development and an (essentially) closed source licensing model.</p>
<p>The next point of confusion is about ForgeRock's target market. The company has marketed itself as a leader in Customer Identity (CIAM) for most of its existence. Based on revenue, this CIAM is a market Okta now leads by a wide margin. I covered this last week when analyzing Okta's Q2 results:</p>
<blockquote>
<p>Finally, McKinnon mentioned a state many people in the industry aren't aware of. Okta has the largest CIAM revenue of any company in the industry:<br>
<br>
"We talked about 30 -- about 33% of our ACV, roughly about $1 billion of ACV, it's $330 million roughly. And that's the biggest CIAM vendor by far. It's not even close if you look at the other competitors. It's hard to tease apart some of the platform guys, but the point competitors is not even close."<br>
<br>
By comparison, the <em>total</em> annual recurring revenue for Ping Identity and ForgeRock are $279.6 million and $155 million, respectively. Revenue for both companies includes a mix of workforce and customer identity. Okta's CIAM revenue alone is at least $50m larger than its close competitors. Okta is leading the CIAM market, but the competition in this emerging market is far from over.</p>
</blockquote>
<p>The first CIAM-related marketing content appeared on its website <a href="https://web.archive.org/web/20140208053550/http://forgerock.com/news-articles/forgerock-introduces-industrys-first-identity-relationship-management-platform/">in 2013</a>, then known as "identity relationship management." Despite the marketing and sales focus on CIAM, future product development continued to reflect the needs of both the workforce and customer markets. ForgeRock's newest major products, Identity Governance and Autonomous Identity, are almost exclusively workforce-focused products.</p>
<p>This is exactly the problem: customer identity and workforce identity are distinctly different markets with different needs. It's challenging but possible to offer products for both markets (as Okta does). This strategy comes at the risk of diluting the products and features for both markets. In ForgeRock's case, the Identity Management and Identity Governance products are both examples of this limitation. Neither product is as mature as SailPoint, a company who focused specifically on workforce identity management. ForgeRock may resolve this problem over time as the products mature; however, they need to be the market leader in <em>something</em> if they're going to be successful as a public company.</p>
<p>The final point of confusion is around ForgeRock's identity as a SaaS company. Despite statements in the S-1 filing about being a "next-generation cloud identity company," ForgeRock is a new entrant into that specific market. The initial version of its Identity Cloud Platform was <a href="https://www.forgerock.com/about-us/press-releases/forgerock-simplifies-identity-management-launch-forgerock-identity-cloud?ref=content.strategyofsecurity.com">launched</a> in November 2019, a decade after Okta's debut as a cloud identity product and two years after Okta's IPO. The "enterprise-grade" SaaS offering <a href="https://www.forgerock.com/blog/forgerock-identity-cloud-gets-even-better?ref=content.strategyofsecurity.com">debuted</a> in September 2020.</p>
<p>This confusion plays out from a technical perspective in ForgeRock's S-1 filing:</p>
<blockquote>
<p><strong>Our differentiated SaaS architecture facilitates strong customer data protection and high performance.</strong> Our proprietary tenant isolation approach is designed to enhance individual customers’ data security and sovereignty. We have improved upon a typical multi-tenant SaaS architecture by never commingling customer data with each other.</p>
</blockquote>
<p>The S-1 mentions tenant isolation multiple times and highlights several benefits — all valid ones. It glosses over an important nuance, though: ForgeRock essentially had no other choice but to use this tenant isolation approach. ForgeRock's technology was built for on-premise deployments. Re-architecting the platform to function as a true multi-tenant SaaS application is a serious and expensive undertaking.</p>
<p>Put differently, ForgeRock's SaaS model is <em>"we will deploy an instance of ForgeRock and host it for you instead of you hosting it yourself."</em> The product you get from ForgeRock's Identity Cloud is exactly what you'd get if you hosted the product in your own data center or private cloud. There are advantages to isolating tenants, especially at enterprise scale. However, it's relevant to note this architectural decision wasn't intentional — it was a consequence of moving their on-premise applications to the cloud.</p>
<p>ForgeRock's S-1 filing did not disclose the breakdown in revenue between cloud vs. on-premise subscription revenue, so it's hard to get an accurate picture about the success of the cloud platform. The timing alone is telling: to launch a SaaS offering over a decade after a large competitor and one year before an IPO is conspicuously late in the game. ForgeRock didn't necessarily want to be in the cloud identity business, but the competitive landscape and shifting technology trends gave them no other choice.</p>
<h2 id="reliance-on-third-parties">Reliance on Third Parties</h2>
<p>ForgeRock's business has a unique trait: the company is reliant on third parties (partners, alliances, distributors, etc.) to sell their product. The company does have a large sales and marketing team; however, many of its large enterprise deals get done with the help of partners.</p>
<p>Partnerships and alliances are so important to their business that it was highlighted as a key driver of growth in the S-1:</p>
<blockquote>
<p><strong>Partner and alliance leverage.</strong> Continue to capitalize on key strategic partnerships and alliances, such as our alliances with global system integrators, or GSIs, including Accenture, Deloitte, and PwC, to win new business.</p>
</blockquote>
<p>CEO Fran Rosch shared additional details about the trend of revenue growth driven by third parties while <a href="https://www.crn.com/news/security/forgerock-ceo-rosch-on-ipo-this-is-a-really-exciting-market-?ref=content.strategyofsecurity.com">debriefing on Thursday's IPO</a>:</p>
<blockquote>
<p>ForgeRock boosted its share of new annual recurring revenue (ARR) sourced through leads originating from channel partners from just 15 percent in 2018 to 31 percent in 2019 and 44 percent in 2020. The company has capitalized on the engagement SIs like Accenture, Deloitte and PwC have with large enterprises early in the procurement process as part of their digital transformation projects, he said.</p>
</blockquote>
<p>Global System Integrator (GSI) partnerships are the unspoken driver of ForgeRock's success. Large GSIs have supported ForgeRock for years because the product is primarily deployed on-premise and requires consulting hours to implement. This isn't the case with other pure cloud identity platforms like Okta.</p>
<p>An upward trend in leads originating from channel partners isn't necessarily a good thing. Yes, it drives pipeline and revenue growth. However, it also creates reliance and reduces the company's ability to drive revenue growth on its own. In a perfect world, a majority of ForgeRock's growth would be driven by its own sales teams and marketing efforts. That's not the case here at all. Worse, the consequences of reversing the trend of partner reliance without a plan for independently driving sales is a bad situation.</p>
<p>The reliance is somewhat mutual — GSIs sell consulting services, and revenue is higher for complex, on-premise implementations. The mutual reliance is important enough that Accenture Ventures invested in ForgeRock's most recent <a href="https://techcrunch.com/2020/04/21/forgerock-nabs-93-5m-for-its-id-management-platform-gears-up-next-for-an-ipo/?ref=content.strategyofsecurity.com">Series E round</a> and serves as a <a href="https://www.forgerock.com/about-us/investors?ref=content.strategyofsecurity.com">formal advisor</a> to ForgeRock's board. ForgeRock needs GSIs to grow, and GSIs need ForgeRock to win large system implementation projects. However, GSIs are far more diversified and resilient in terms of projects and vendor relationships. ForgeRock needs GSIs more than GSIs need ForgeRock.</p>
<p>ForgeRock's own professional services business is immaterial: $4.26 million in annual revenue (just 3.3% of total revenue) at the end of the company's 2020 fiscal year. The company talked about expanding its services business in the S-1; however, the focus appears to be on customer success and not full-scale implementation projects.</p>
<p>Large consulting firms are massively influential in the enterprise software market. ForgeRock's success in partnering with them years ago as a startup was quite possibly one of the main reasons they reached an IPO. However, partner relationships are fickle. The tides can change quickly. Seemingly overnight, partners move on to the next big thing, and sales pipelines dry up.</p>
<p>ForgeRock understands this risk and clearly stated it in the S-1:</p>
<blockquote>
<p>We also may not achieve anticipated revenue growth from our partners if we are unable to attract and retain additional motivated partners, if any existing or future partners fail to successfully market, resell, implement or support our platform or offerings for their customers, or if they represent multiple providers and devote greater resources to market, resell, implement and support the products and solutions of other providers. For example, some of our partners also sell or provide integration and administration services for our competitors’ products, and if such partners devote greater resources to marketing, reselling and supporting competing products, our business, financial condition, and results of operations could be adversely affected.</p>
</blockquote>
<p>At this point, ForgeRock is essentially locked into its parter-driven distribution model. Put differently, much of their future growth is beholden to others. The company doesn't have many options other than to accept the risk and try to keep its partners happy and engaged. Top-down sales models work — they're just more complicated and tumultuous when powerful third parties are involved.</p>
<h2 id="forgerocks-future-as-a-public-company">ForgeRock's Future as a Public Company</h2>
<p>After the glory of an IPO wears off, reality as a public company sets in. ForgeRock has a place as a public company in the competitive identity and access management market. The question is whether its financial performance can meet the expectations of investors.</p>
<p>There will be a customer base of large enterprises for the foreseeable future. Some companies can't, or simply won't, move to cloud identity providers. Ironically, this might be ForgeRock's biggest competitive advantage: being the "anti-SaaS" platform. Despite its late push to enter the cloud identity market, maintaining the option of on-premise deployments gives ForgeRock an advantage over pure SaaS products like Okta and Auth0. This advantage only holds in scenarios where customers demand an on-premise implementation, but it's an advantage nonetheless.</p>
<p>Now on its third CEO, ForgeRock is competing against founder-led companies who are have the potential to become generationally great companies — some of the best SaaS companies of our time. Exponential growth is unforgiving, and the multipliers aren't on ForgeRock's side. Its growth numbers are still good, though, and they have a chance to be a reliable performer as a public company if they can maintain these growth rates for an extended run.</p>
<p>If ForgeRock stumbles as a public company, especially if growth lingers, I wouldn't be surprised to see the company taken private by a private equity fund. It's equally possible that the market is large enough to support the value ForgeRock brings. For now, an IPO is a meaningful milestone that's worth celebrating as an industry.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="fn1" class="footnote-item"><p>ForgeRock's revenue for the most recent six months was $84.8 million, roughly $170 million if applied to a full year. Auth0's Q2 revenue was $38 million with a projection of $200 million for the current fiscal year. Okta's projected annual revenue is $1.05 billion, excluding the projected $200 million for Auth0. <a href="#fnref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="fn2" class="footnote-item"><p>ForgeRock's revenue grew by 53.2% in the most recent six months; however, growth for the last full fiscal year was 22.1%. Auth0's revenue growth wasn't reported, but Annual Contract Value (ACV) growth was 63% in Q2. Okta is projecting 50% revenue growth for its full fiscal year. <a href="#fnref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="fn3" class="footnote-item"><p>ForgeRock's Net Retention Rate (NRR) for the most recent six months was 113% and consistently in that range for the past two years. Auth0 and Okta had a NRR of 127% and 122% in Q2. <a href="#fnref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="fn4" class="footnote-item"><p>ForgeRock had 353 large customers (customers with greater than $100,000 annual revenue) as of June 30, 2021. Auth0 had 375 large customers as of Q2. Okta had 2,225 (excluding Auth0) as of Q2. <a href="#fnref4" class="footnote-backref">↩︎</a></p>
</li>
<li id="fn5" class="footnote-item"><p>ForgeRock's net loss was $73.3 million for the most recent six months, a significant improvement over the prior period. Auth0's net loss was $150 million, which was abnormally high because it included several one-time expenses related to the acquisition. Okta is projecting losses of up to $119 million for their current fiscal year. <a href="#fnref5" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>

<!--kg-card-begin: html-->
<div class="alert">
<strong>Disclosure:</strong> While at PwC, I worked on a team that established a Joint Business Relationship (JBR) between ForgeRock and PwC. Aside from a general familiarity with ForgeRock's business, the information used for this article was researched from publicly available sources (primarily ForgeRock's S-1 filing).
</div>
<!--kg-card-end: html-->
]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/09/v2_-ForgeRock-IPO.png"/>
        </item>
        <item>
            <title><![CDATA[Okta and Auth0: Results, Challenges, and Opportunities]]></title>
            <link>https://strategyofsecurity.com/okta-auth0-q2-2021-results/</link>
            <guid>613f743033abf3003e0188b3</guid>
            <pubDate>Mon, 13 Sep 2021 16:56:53 GMT</pubDate>
            <description><![CDATA[A look inside the story of Okta and Auth0 shortly after the acquisition closed. Thoughts on how Okta can capitalize on the excitement and opportunity of an industry-changing acquisition and overcome the chaos, confusion, and risk that comes with it.]]></description>
            <content:encoded><![CDATA[<p>Okta is one of the cybersecurity companies who has been making the biggest moves in 2021. This article was prompted by their Q2 earnings release on September 1st, 2021; however, it's also an interesting time to go beyond the quarterly results and take a deeper look at Okta as a business.</p>
<p>The earnings discussion was more impactful than usual. It was the first time (and perhaps only time) Okta has disclosed detailed revenue and metrics about Auth0 since the acquisition closed on May 3rd. The company's executives also went deep into their integration strategy for Auth0, customer segmentation, customer identity, and entry into the Identity Governance and Privileged Access Management markets.</p>
<p>This is a longer article as it's my first time covering Okta on this site. It's an exciting time for Okta and Auth0. There has been a lot going on with the companies, and their financial results speak for themselves. The journey is still early, though, and the companies face many obstacles on their path towards winning the identity and access management market.</p>
<h2 id="revenue-growth-and-metrics">Revenue, Growth, and Metrics</h2>
<p>Before we get into Okta's longer term strategic outlook, let's take a quick look at revenue, growth, and relevant long-term financial metrics. First, a few comments about the general state of the company's financials.</p>
<p>Okta has a fairly significant amount of long-term debt, currently $1.96 billion. The company has $2.47 billion in short-term assets (mostly cash). The company is also experiencing an abnormally high amount of stock sales by company executives and insiders. The combination of high debt, high operating losses, and stock divestitures from company insiders concerns some investors and analysts — invariably impacting Okta's stock price.</p>
<p>Strategically, the important part is this: Okta is one of the best and most reliable public SaaS companies out there. Losses and debt are characteristic of a growing company still in its early stages. It's not surprising for executives to sell stock for liquidity, especially because some have been with the company since it was founded over 11 years ago. Barring a mega-transaction on the scale of Salesforce buying Slack, Okta isn't going anywhere.</p>
<p>The Q2 2021 earnings results are impressive. Revenue growth for the quarter was 57%, a staggeringly high number for a company of this size and scale. Net Revenue Retention (NRR) was nearly as impressive: 124% for Okta, and 127% for Auth0 during the previous 12-month period. Net Revenue Retention (NRR) measures how well companies retain (and grow) customers. A rate of 100% or greater is considered good for a company with both SMB and enterprise customers.</p>
<p>For the full fiscal year, Okta is forecasting 50% (yes, 50%!) revenue growth year over year. Not surprisingly, they're paying for this growth with high operating losses:</p>
<blockquote>
<p>Given our strong Q2 results, we are raising our revenue outlook for the full year. For the full-year fiscal '22, we now expect total revenue of $1.243 billion to $1.250 billion, representing growth of 49% to 50% year over year. We also now expect non-GAAP operating loss of $119 million to $114 million and non-GAAP net loss per share of $0.77 to $0.74, assuming average weighted shares outstanding of approximately 147 million.</p>
</blockquote>
<p>50% year over year revenue growth is impressive for any company, and especially for a company the size of Okta. However, they're going to have to keep growing at close to this pace to overcome their operating losses and repay substantial debt over time.</p>
<p>One final (and anecdotal) aside, more about goodwill and intangibles than financials: Okta was recently <a href="https://www.okta.com/resources/analyst-research-the-forrester-wave-identity-as-a-service-for-enterprise-q3-2021/?ref=content.strategyofsecurity.com">named a leader</a> in the Identity as a Service market by Forrester. This is only significant because of Okta's complete dominance of this analyst ranking year after year. They own this market, and they essentially have no close competitors. As early investor Ben Horowitz says, "They have become <em>the</em> Cloud Identity company."</p>
<h2 id="okta-and-auth0s-customer-segments">Okta and Auth0's Customer Segments</h2>
<p>Unpacking the magic behind both Okta and Auth0's growth starts with understanding the companies' customer bases.</p>
<p>On the earnings call, Okta CEO Todd McKinnon gave a detailed overview of customer segments for both businesses and broke down the additional customers Okta gained by acquiring Auth0. This information trickled out slowly during the call, ending with a fairly clear picture of customer numbers.</p>
<p>The story starts at the top with enterprise accounts and contracts:</p>
<blockquote>
<p>Our total base of customers now stands at over 13,000. Okta stand-alone added 750 customers, which is a record for any quarter. Also included in the base is the addition of 1,650 Auth0 customers, net of common customers. Our total base of $100,000-plus average contract value customers, or ACV, now stands at over 2,600.</p>
</blockquote>
<p>Next, the story continues to self-service subscriptions and free accounts:</p>
<blockquote>
<p>Auth0 has an incredible base of over 13,000 paying self-service subscriptions. What's more, there are currently over 40,000 active free subscriptions being utilized by developers on the Auth0 platform.</p>
</blockquote>
<p>Finally, the punch line about why Auth0's self-service and free accounts matter:</p>
<blockquote>
<p>I think that at a high level, when you think about the customer mix and the contribution, I'll just call out that they're the same in a lot of ways, but they're different in a pretty significant way, which is they have this groundswell of free developer accounts and they have the -- Auth0 has this group of self-service, basically, essentially month-to-month credit card customers, which is revenue, but it's also, more importantly, it's a potential upsell avenue. So they have -- Auth0 business gets a lot of momentum from developers trying the product, using it maybe in a hobby, side project and then bring it to work and they start with a project at work where it's a month-to-month credit card. And then all of a sudden, a few quarters later, it's used in a real customer-facing initiative or an internal system that's really important. And then all of a sudden, it's upgraded to a material year-long contract.</p>
</blockquote>
<p>This is an especially interesting explanation because it captures Auth0's business model in a nutshell. Essentially, Auth0's customer base looks like this:</p>
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/09/v1_-Auth0-Customer-Hierarchy.png" class="kg-image" alt="" loading="lazy" width="1921" height="1080" srcset="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w600/2021/09/v1_-Auth0-Customer-Hierarchy.png 600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1000/2021/09/v1_-Auth0-Customer-Hierarchy.png 1000w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/size/w1600/2021/09/v1_-Auth0-Customer-Hierarchy.png 1600w, https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/09/v1_-Auth0-Customer-Hierarchy.png 1921w" sizes="(min-width: 720px) 720px"></figure><p>Importantly for Okta in the acquisition, Okta and Auth0 only had 300 common B2B and enterprise customers at the top of the pyramid. The bottom two layers (and their potential conversion to larger accounts) was basically untouched.</p>
<p>Another incredible detail about Okta's user numbers: they don't have <em>that</em> many customers, relatively speaking. Last week, Jason Lemkin of SaaStr shared some interesting data about customers, Annual Recurring Revenue (ARR), and Annual Contract Value (ACV) for public SaaS companies:</p>
<figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Average public SaaS company has 33,000 customers<br><br>Average public mid-market SaaS company has 12,000 customers<br><br>And this is at $440,000,000 in ARR<br><br>That's really not that many customers. So much more to close.  <br><br>Such big TAMs. <a href="https://t.co/eTRkH5bI6W?ref=content.strategyofsecurity.com">pic.twitter.com/eTRkH5bI6W</a></p>— Jason ✨BeKind✨ Lemkin ⚫️ (@jasonlk) <a href="https://twitter.com/jasonlk/status/1435351005361627139?ref_src=twsrc%5Etfw&ref=content.strategyofsecurity.com">September 7, 2021</a></blockquote>
<script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>Okta wasn't listed, so it's informative to compare the numbers discussed in their Q2 earnings call with the data from SaaStr. At a forecasted revenue of $1.25 billion this year, Okta is roughly the size of HubSpot in terms of revenue. However, HubSpot has 114,000 customers generating its $1+ billion in revenue. As a result, ACV is relatively low at $9,649 per customer.</p>
<p>Okta didn't provide a specific ACV; however, they did mention over 2,600 customers paying more than $100,000 pear year. This implies a much higher ACV for Okta, and also the key to their continued growth: adding new $100k/year annual customers and growing revenue from existing customers over the $100k mark.</p>
<h2 id="the-race-to-win-customer-identity">The Race to Win Customer Identity</h2>
<p>The mission set forth by Okta in previous quarters (and reiterated on this call) is clear: win the Customer Identity (CIAM) market.</p>
<p>Aside from eliminating a strong competitor, acquiring Auth0 was about Customer Identity. Todd McKinnon said it himself on the call: <em>"A real core of this [Auth0 acquisition] is owning the CIAM market."</em></p>
<p>McKinnon outlined the breakdown of revenue coming from Customer Identity (CIAM) and Workforce (employees, contractors, and other third parties within a company):</p>
<blockquote>
<p>CIAM now represents over one-third of total ACV and grew at 54%. Within this, Okta stand-alone CIAM ACV grew 49%, and Auth0's ACV grew 63%. Workforce ACV now represents just under two-thirds of total ACV and grew 37%.</p>
</blockquote>
<p>These are interesting breakdowns. Okta is fairly balanced between workforce and customer identity segments. Both are growing quickly, but 49% growth for Okta's CIAM business is large. More importantly, Auth0 is going to end up being a great acquisition if it continues growing CIAM ACV anywhere close to a 63% rate.</p>
<p>McKinnon had an interesting insight about the CIAM market:</p>
<blockquote>
<p>So the way it breaks down is that this $30 billion TAM is really a couple of separate TAMs. There's a very -- like very customized or developer-focused, fine-grain control, control every pixel, every bit and byte. That's the market that Auth0 is very well suited to go after.<br>
<br>
Then there's the more tightly integrated to -- you might have a company that's doing customer identity, but it's maybe more B2B...It's less development and code per se, and it's more policy and they want a low-code environment, that's where the Okta CIAM platform really excels.</p>
</blockquote>
<p>Looking at the CIAM market in two separate segments helps explain how both Okta and Auth0 can continue to function and grow as standalone products while they integrate operations and technology.</p>
<p>Finally, McKinnon mentioned a state many people in the industry aren't aware of. Okta has the largest CIAM revenue of any company in the industry:</p>
<blockquote>
<p>We talked about 30 -- about 33% of our ACV, roughly about $1 billion of ACV, it's $330 million roughly. And that's the biggest CIAM vendor by far. It's not even close if you look at the other competitors. It's hard to tease apart some of the platform guys, but the point competitors is not even close.</p>
</blockquote>
<p>By comparison, the <em>total</em> annual recurring revenue for Ping Identity and ForgeRock are $279.6 million and $155 million, respectively. Revenue for both companies includes a mix of workforce and customer identity. Okta's CIAM revenue alone is at least $50m larger than its close competitors. Okta is leading the CIAM market, but the competition in this emerging market is far from over.</p>
<h2 id="entering-the-identity-governance-and-privileged-access-management-markets">Entering the Identity Governance and Privileged Access Management Markets</h2>
<p>As discussed in previous quarters, Okta is entering both the Identity Governance (IGA) and Privileged Access Management (PAM) markets. I'm revisiting the topic here as it's the first time I've covered Okta on this site.</p>
<p>Okta entering the Identity Governance (IGA) and Privileged Access Management (PAM) markets is a big deal. These markets are traditionally owned by two of Okta's contemporary peers — IGA by SailPoint, and PAM by CyberArk. Along with Ping Identity, these identity-focused companies essentially grew up together and IPO'ed at roughly similar times.</p>
<p>Okta has competed with Ping Identity in the Access Management market since the beginning. Announcing a move into the adjacent IGA and PAM markets is a signal that Okta isn't going to be content with its original place in the Identity and Access Management market — it wants the whole thing.</p>
<p>Okta's COO, Frederic Kerrest, had an interesting take on entering the PAM and IGA markets:</p>
<blockquote>
<p>It's not as though we're sitting in an ivory tower coming up with great ideas, although we do, do that from time to time. But this is actually one where the customers have been saying for some time, "Hey, will you give me a modern PAM solution? Will you give me a modern IGA solution? I want something new. I don't want to buy it from the legacy vendors of yesteryear." And I think that's a great opportunity for us. So a lot of pipeline already built up.</p>
</blockquote>
<p>This anecdote summarizes the opportunity and the perspective of many Okta customers well: Okta is the modern identity platform, and customers want it to be a full platform they can use for everything related to identity and access control.</p>
<p>The real proof is in the results, though. Building IGA and PAM solutions from the ground up isn't a trivial undertaking, especially with formidable competitors like SailPoint and CyberArk. It also doesn't mean customers will abandon their previous investments in IGA and PAM and move to Okta right away. Okta isn't going to instantly steal these markets — entering them is a long term play.</p>
<h2 id="integrating-the-companies-going-forward">Integrating the Companies Going Forward</h2>
<p>As expected, a fair amount of time on the earnings call was spent discussing the integration of Okta and Auth0 going forward. Most of the discussion was focused on operational and financial integration. Technical integration was lightly covered and leaves a lot of open questions for me.</p>
<p>First, a brief step back to comment on Okta's acquisition strategy. The acquisition happened before I started writing, so I wanted to address it. Okta's decision to acquire Auth0 essentially came down to this: Auth0 was Okta's most legitimate long-term competitor. The best strategic move for Okta was to eliminate Auth0 before the company grew to a point where it was a strong competitor or became too expensive to acquire. $6.5 billion is a steep price at a high multiple, but that's a small price to pay for long term ownership of a large market.</p>
<p>Todd McKinnon made a few comments about the market on the earnings call:</p>
<blockquote>
<p>So there's the qualitative, there's the quantitative in terms of the strategic priority of the combined entity...And the first thing is we only have 300 overlapping customers...if it was just about like two competitors going after the same small pie, you would have had a way more overlap in terms of customers or at least the competitive pipeline, and we haven't seen that materialize.</p>
</blockquote>
<p>This statement is accurate <em>right now</em>, but I don't expect it would have remained true going forward. Okta and Auth0 didn't compete much historically because Auth0 is a much smaller company, and cloud identity is still a growing market. Fast-forward 5 or 10 years, and these companies would have been fierce competitors in a mature market if an acquisition wouldn't have happened.</p>
<p>Yes, there are many other reasons and benefits for acquiring Auth0: respected leaders, innovative technology, minimal customer overlap, and so on. Okta leadership waxed poetic about Auth0 throughout the entire call, and for good reason — Auth0's numbers are excellent. You won't hear either company's leaders talking about eliminating a competitor, even though doing so was likely the primary driver.</p>
<p>Operationally, the open question was <em>how</em> Okta would choose to operate Auth0. Would they integrate the company and its platform into Okta, or operate it as a standalone company? The answer is clear — they're going to integrate:</p>
<blockquote>
<p>On the financial question, first and foremost, we're really excited about Auth0, obviously, as you can tell by our commentary today. But I think maybe the fundamental point is really around how we're going to run them. If we were running them as a separate entity, which as you've heard today, we're running as a product unit, things are becoming integrated from a G&amp;A perspective, from a sales perspective, but if say, and let's pretend that wasn't happening, we would run it just like we ran Okta back then, where we balanced growth and profitability. And you've seen that in the results for years.<br>
<br>
But since we are bringing everything together, having a product unit, having sales being pulled together, and then G&amp;A being pulled together, now there won't be a relevant compare, but if there was that situation, it would be run just like we did, run ourselves back three, four, five years ago, where we focused on growing the business while also doing -- while also expanding margins over time.</p>
</blockquote>
<p>Essentially, the Okta leadership team already knows how to grow and operate a cloud identity company. They could just use the same playbook with Auth0 and do it all over again, but that's not the strategy here. They believe an integrated company and technology platform is more valuable than running the companies separately.</p>
<p>Financially, the impact of integrating Okta and Auth0 was both obvious and acute — they're spending a lot of money running both companies. As summarized by Okta's interim CFO on the call:</p>
<blockquote>
<p>Total operating expenses grew 76%. The growth in expenses is primarily attributable to Auth0. With the addition of over 900 Auth0 employees, total headcount now stands at over 4,100 employees. Opex was lower than expected primarily because we are operating more effectively together with Auth0 than previously expected.</p>
</blockquote>
<p>This type of increase in operating expenses is eye-opening; however, it makes sense in the case of Okta and Auth0. Their goal as a combined company is going to be cutting operating expenses and operating more efficiently at scale.</p>
<p>They wasted no time starting down that path. The most explicit operational integration announced was the combination of Okta and Auth0's sales organizations:</p>
<blockquote>
<p>We've made the decision to accelerate the timeline for integrating the sales organizations under Susan St. Ledger's leadership to the beginning of the new fiscal year in February. This move will allow the unified sales team to sell both platforms and benefits customers by providing more options to meet their unique use cases.</p>
</blockquote>
<p>This move isn't surprising whatsoever, especially after seeing the data and discussion about Auth0's success with bottom-up customer acquisition. The exact number of sales employees at Auth0 wasn't mentioned, but I doubt they had many people given the bottom-up growth model and relatively small number of enterprise accounts.</p>
<p>I expect it's going to be confusing for Okta's unified sales team to help customers sort out which platform to use. Okta and Auth0 both have their individual strengths and differences, but a lot of features are similar. They're similar enough that it would even be challenging for a technical person to explain and rationalize the differences (myself included). It's even harder for a sales person.</p>
<p>Todd McKinnon made a telling comment on this topic during the call, mentioning <em>"...we want to keep flexibility on how we package and sell and position the products."</em> His comment was in the context of assigning revenue; however, it easily could be representative of the inevitable challenges that are likely to come from the early stages of integration. Expect confusion in messaging and deal structuring until Okta rationalizes its approach for the stand-alone Okta platform and Auth0.</p>
<p>McKinnon later commented more specifically on the overall integration efforts:</p>
<blockquote>
<p>It's also very important as we keep executing through the rest of this year that we get the integration going. We mentioned the sales integration, getting that synergy going, and making sure we take this from initial success, keep the momentum going to this long-term future, where we are really this one-stop-shop for all these identity choices and compelling leader in the market for customers.</p>
</blockquote>
<p>This integration is still in the early stages, as you'd expect only months after close. There's still a long way to go.</p>
<p>Technically, there is another significant challenge at hand — rationalizing and integrating the company's technology platforms. Again, it's very early. From Todd McKinnon:</p>
<blockquote>
<p>What I saw this past week was the first mockups and the first concepts of what deep integrated products could look like in the future, it was very cool. These are just — the teams have just started to work together.</p>
</blockquote>
<p>Auth0 is a younger company built on a newer technology stack. It has fewer products and features. Okta is a more mature company with an older tech stack. It has more products and more features, some coming via smaller acquisitions in the past.</p>
<p>Auth0 has been successful and built its developer following because it's a well-built and well-documented product. Its user experience and developer experience are equally great. Monkeying with a platform this pristine carries risk: developers are a notoriously finicky bunch with little tolerance for hiccups or other inconveniences. Problems are bound to occur in an integration this complex —&nbsp;will Okta drive away its coveted developer customers? The success of the Auth0 acquisition largely hangs on the answer to this question.</p>
<p>A $6.5 billion price tag to acquire Auth0 is expensive for Okta. With a high price comes high expectations. Auth0 is expected to generate $200 million of Annual Recurring Revenue (ARR) by the end of Okta's (current) 2022 fiscal year. To reach the value it's expected to return, this acquisition can't fail. The most likely reason it <em>could</em> fail is a delayed or poorly executed technical integration.</p>
<p>Longer term, the upside for a combined Okta and Auth0 is high — particularly if they execute well across the board. I expect them to succeed based on Okta's strong track record of execution. Time will tell, and there's still a long way to go.</p>
]]></content:encoded>
            <category>Public Companies</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/09/v2_-Okta-x-Auth0-Q2-Earnings-Feature-1.png"/>
        </item>
        <item>
            <title><![CDATA[Y Combinator's Summer 2021 Cybersecurity Startups]]></title>
            <link>https://strategyofsecurity.com/yc-s21-cybersecurity-startups/</link>
            <guid>61378ab3446c75003b0873e4</guid>
            <pubDate>Tue, 07 Sep 2021 17:07:01 GMT</pubDate>
            <description><![CDATA[Analyzing opportunities and challenges for the seven cybersecurity companies in Y Combinator's Summer 2021 batch.]]></description>
            <content:encoded><![CDATA[<p>Y Combinator hosted its semi-annual Demo Day (now two days) last week, from August 31st to September 1st. Seven cybersecurity companies were among the 374 companies in the Summer 2021 batch:</p>
<ul>
<li>
<p><strong>Cloudanix:</strong> Cloud security for multi-cloud environments.</p>
</li>
<li>
<p><strong>ContraForce:</strong> AI-powered Extended Detection and Response (XDR) for SOCs.</p>
</li>
<li>
<p><strong>Keyri:</strong> Passwordless authentication for developers.</p>
</li>
<li>
<p><strong>Malloc:</strong> Spyware detection and prevention for mobile.</p>
</li>
<li>
<p><strong>PlusIdentity:</strong> Privileged access management for startups.</p>
</li>
<li>
<p><strong>Protego:</strong> Chargeback recovery for Latin American companies.</p>
</li>
<li>
<p><strong>StandardCode:</strong> Child identity verification APIs for developers.</p>
</li>
</ul>
<p>This article takes a deeper look at the seven cybersecurity companies, their opportunities, and their challenges going forward.</p>
<h2 id="reviewing-y-combinators-cybersecurity-investment-history">Reviewing Y Combinator's Cybersecurity Investment History</h2>
<p>It's well understood now that Y Combinator has a successful track record of investing in B2B and enterprise companies. They've long since overcome the stigma of being a consumer-only investor.</p>
<p>Y Combinator is a <a href="https://news.crunchbase.com/news/y-combinator-biggest-startups-gone-public-airbnb-doordash/?ref=content.strategyofsecurity.com">massively successful</a> early stage startup investor. To understand the future of cybersecurity tech startups, it's instructive to look at the companies coming out of the program as early as Demo Day.</p>
<p>Y Combinator's volume and success with investing in cybersecurity startups is a bit more tenuous than its overall B2B portfolio. YC has funded <a href="https://www.ycombinator.com/companies/?industry=Security&ref=content.strategyofsecurity.com">55 cybersecurity companies</a> since its first batch in 2005. <a href="https://www.sift.com/?ref=content.strategyofsecurity.com">Sift</a> (formerly Sift Science) is the most successful company so far, a unicorn valued at over $1 billion and ranked 42nd on <a href="https://www.ycombinator.com/topcompanies/?ref=content.strategyofsecurity.com#private_companies">YC's top companies list</a>. Other ranked companies include:</p>
<ul>
<li>
<p><a href="https://salt.security/?ref=content.strategyofsecurity.com">Salt Security</a>, an API security platform, is ranked 65th.</p>
</li>
<li>
<p><a href="https://vanta.com/?ref=content.strategyofsecurity.com">Vanta</a>, an automated compliance platform, is ranked 71st.</p>
</li>
<li>
<p><a href="https://veriff.com/?ref=content.strategyofsecurity.com">Veriff</a>, an identity verification company, is 95th.</p>
</li>
<li>
<p><a href="https://www.proxy.com/?ref=content.strategyofsecurity.com">Proxy</a>, an authentication platform, is ranked 110th.</p>
</li>
</ul>
<p>YC's cybersecurity funding has increased in recent batches. They have funded 19 cybersecurity companies in the four batches since the beginning of 2020. That's an average of 4.75 companies per batch and 34.5% of the total cybersecurity investments in the history of YC.</p>
<h2 id="analysis-of-the-summer-2021-batch">Analysis of the Summer 2021 Batch</h2>
<h3 id="cloudanix">Cloudanix</h3>
<p><a href="https://www.cloudanix.com/?ref=content.strategyofsecurity.com">Cloudanix</a> is a cloud security platform specifically focused on larger, multi-cloud, multi-region, and multi-environment deployments. The founders have cloud and cybersecurity experience at both startups and enterprises from previous roles at Pantheon, Gigya, SAP, Moody's, and McKesson. Aside from YC, no funding has been reported to date.</p>
<p>The product solves a problem of scale: managing security in large cloud deployments is gnarly, particularly with multiple engineers using multiple regions or different cloud platforms altogether. This complexity is part of the reason why companies are frequently in the news for breaches due to cloud environment misconfigurations.</p>
<p>The Cloudanix platform does a lot for an early stage startup: account monitoring, rule-based audit and compliance checks, event monitoring, IAM account authorization reporting and remediation, and configuration (drift) management. Any one of these features on its own could potentially be a product.</p>
<p>The platform offers "recipes", which are pre-built leading practices for configuring cloud services. For most non-security companies, it's difficult and time-consuming to keep up with leading practices for detailed cloud security configurations. Recipes are a helpful starting point — think of them like an 80/20 solution for comprehensively checking up on your cloud environment configurations and quickly remediating well-known issues.</p>
<p>Cloud security is still a new and rapidly evolving domain within the cybersecurity ecosystem. The opportunity for Cloudanix is to become the go-to platform for companies with large cloud deployments to manage security. Cloudanix has two potential paths for growth. They could choose to focus on breadth and continue to build on the multiple features in the product — truly achieving the vision of a single platform for cloud security. Alternatively, they could discover rapid growth within one (or a few) specific areas within the platform's broad feature set and choose to focus on those.</p>
<h3 id="contraforce">ContraForce</h3>
<p><a href="https://www.contraforce.com/?ref=content.strategyofsecurity.com">ContraForce</a> is an Extended Detection and Response (XDR) product that uses AI to augment response. The platform pulls security data from multiple integrations to analyze for threat detection and response. Both founders have experience with cybersecurity products and managed service providers at McAfee and Armor. Building an XDR product is a natural next step from their background. Aside from YC, the only funding reported has been an <a href="https://www.bizjournals.com/dallas/inno/stories/news/2021/02/02/contraforce-moves-hq-to-mckinney.html?taid=6040d9d6f52f320001733a08&utm_campaign=trueanthem&utm_medium=trueanthem&utm_source=twitter">economic development grant</a>.</p>
<p>The company is solving a significant problem: operating a SOC is hard, and SOC analysts have the impossible task of sifting through thousands of events to find threats. They need augmentation to eliminate false positives and increase the speed which they identify and respond to real threats. Faster responses to qualified threats is valuable — you can never respond too quickly.</p>
<p>XDR is a newer approach to threat detection and response, thus a newer market. Larger cybersecurity product companies are also developing XDR products, including Palo Alto Networks, Cisco, Barracuda, Cynet, and more. It's an emerging market that hasn't been won yet.</p>
<p>One of the main challenges for a data-intensive product like ContraForce is integrations. The company has built several integrations already, starting with a Microsoft-focused approach and expanding outward to other cloud platforms and apps. The effort to add integrations will be ongoing and a potential source of competitive advantage if ContraForce can add integrations quickly.</p>
<p>Aside from integrations, the company's challenges are likely to be product and pricing. The product needs to be significantly better than the existing XDR products built by larger cybersecurity product companies. ContraForce also needs to avoid being priced out of the market if larger companies reduce prices or bundle their XDR products with enterprise licensing deals.</p>
<p>The XDR market is an exciting problem domain with lots of potential. ContraForce has the opportunity to define itself as a premium, go-to product in the market if it can differentiate its integrations and features — particularly AI.</p>
<h3 id="keyri">Keyri</h3>
<p><a href="https://keyri.co/?ref=content.strategyofsecurity.com">Keyri</a> is a developer-focused authentication platform with a proprietary, device-based authentication protocol. The product is also focused on ease of use for end users.</p>
<p>The founders both have varied experiences, including investment banking, software engineering, and cryptocurrency. A founder developed an early version of the authentication technology used by Keyri at Duke University:</p>
<blockquote>
<p>At the Duke Institute for Brain Sciences, I built a bulletproof HIPAA-compliant authentication layer for distributed supercomputing clusters. Keyri leverages the asymmetric cryptography architecture of that system, combined with the ubiquitous biometrics sensors on smartphones, to bring frictionless, extremely secure authentication to consumer web platforms.</p>
</blockquote>
<p>Aside from YC, no funding has been reported to date.</p>
<p>The security and ease of use for authentication is one of the most widely discussed problems in cybersecurity — a persistent and challenging set of habits to break. Passwords have a well-documented set of problems. Magic links aren't great, either. Both mechanisms work, though, and they're commonly understood by technical and non-technical users.</p>
<p>Authentication products have constant tension between standards and proprietary tech. Keyri is the latter — one of their primary value propositions is a proprietary authentication layer that promises both increased security and improved ease of use.</p>
<p>Developer-focused authentication platforms have a proven track record with Auth0's <a href="https://techcrunch.com/2021/03/03/okta-acquires-cloud-identity-startup-auth0-for-6-5b/?ref=content.strategyofsecurity.com">$6.5 billion acquisition</a> by Okta. Developer adoption was a significant reason why Auth0 gained traction and reached the level of valuation it did at the time of acquisition.</p>
<p>The biggest challenge Keyri is likely inertia — "good enough" versus a more advanced, user-friendly solution. Keyri also faces well-funded competition, including Transmit Security, Trusona, and other traditional authentication platforms.</p>
<p>Keyri can grow quickly if they're able to gain developer adoption. Auth0 followed this strategy, as have other developer-focused products in adjacent markets. The same thing needs to happen here. They can potentially become a big company if the product captures and changes a user behavior trend from passwords to a more modern authentication approach.</p>
<h3 id="malloc">Malloc</h3>
<p><a href="https://mallocprivacy.com/?ref=content.strategyofsecurity.com">Malloc</a> is company focused on building privacy technology, the first being a free consumer mobile app for Android. Antistalker detects when applications use the camera or microphone on your smartphone to identify spyware placed by stalkers or other adversaries. The founders are three accomplished women with Ph.D.s in artificial intelligence and cybersecurity. A €100,000 pre-seed investment is listed on CrunchBase.</p>
<p>Spyware is a huge societal problem that has been in the news a lot recently due to <a href="https://www.washingtonpost.com/investigations/interactive/2021/nso-spyware-pegasus-cellphones/?ref=content.strategyofsecurity.com">Pegasus</a> infiltrating media and government officials. Smaller scale stalkers have been targeting individual victims for years. It's hard to overstate the value of reliable spyware detection.</p>
<p>Malloc is solving technically challenging problem because their products are limited by the APIs that smartphone device manufacturers make available to them. Proving the concept using Android and releasing a consumer app was a good strategic choice as the company is getting started.</p>
<p>The strategic challenge for Malloc is which direction to take the company after the Antistalker consumer app. The founders appear to have both aspirations and qualifications well beyond development of consumer mobile apps. Consumer-focused privacy apps is a large market if they choose to continue this course. Malloc could also focus exclusively on most prominent enterprise, government, media companies (the Palantir approach) to help defend against spyware like Pegasus. Either path has the potential to be a large company.</p>
<h3 id="plusidentity">PlusIdentity</h3>
<p><a href="https://www.plusidentity.com/?ref=content.strategyofsecurity.com">PlusIdentity</a> is a password manager for shared logins and other credentials. The founders are both from Harvard. Aside from YC, no funding has been reported to date.</p>
<p>The company's target market is focused: <em>"we’re building the best password manager for startups."</em> They started by building a Slack app, a logical choice because startups live in Slack. Next comes a browser extension, then outward expansion of the product from there.</p>
<p>Managing passwords, secrets, and privileged access is a continuous problem in cybersecurity. Compromise of these credentials is a common cause for breaches.</p>
<p>Password management for startups is a bigger problem than many people realize. Startups are prone to bad practices because they originate as small, cash-strapped teams focused on growth and viability over security.</p>
<p>Despite their size, tech startups have a lot of passwords and secrets to protect. Most tech startups have to protect at least the following, and often more:</p>
<ul>
<li>
<p>Cloud infrastructure keys</p>
</li>
<li>
<p>Multiple API keys</p>
</li>
<li>
<p>Source code keys</p>
</li>
<li>
<p>Admin console passwords</p>
</li>
<li>
<p>Test account passwords</p>
</li>
<li>
<p>Shared SaaS application and social media passwords</p>
</li>
</ul>
<p>This is why startups are the starting point for the larger problem PlusIdentity wants to solve. It's best for startups to start with good password management practices early — especially if the solution is fast, affordable, and native to the platforms they're already using. The risk of <em>not</em> establishing good password management practices is fairly high for startups who do find traction: the problem manifests itself until it's too late to be fixed.</p>
<p>PlusIdentity's strategy is to grow with startups:</p>
<blockquote>
<p>"Our goal is to become every YC company's password manager, then grow with our users to eventually become the security &amp; identity backbone of fast growing tech companies."</p>
</blockquote>
<p>The strategy is viable and has worked for many companies, Stripe being the most famous example. For this strategy to work, the company needs to get other startups to adopt early. Once the product is entrenched, PlusIdentity needs to grow and scale its features to the point customers don't want to switch to CyberArk or other enterprise-grade password management tools when they become larger companies.</p>
<p>The biggest challenge PlusIdentity faces is the threat of substitutes: personal password managers like 1Password, Dashlane, and others. Their product needs to have enough appeal to make the upside of scaling with PlusIdentity higher than switching to other tools. The cutover from a personal password manager to PAM tools like CyberArk is a major undertaking. This makes it more likely startups will retain the password manager they start with long after they hit scale.</p>
<p>PlusIdentity's opportunity is to fill a large and important opportunity in the market. There is a relatively large gap in the spectrum of products between personal password managers (like 1Password) and enterprise-grade privileged access management platforms (like  CyberArk). If their strategy of targeting startups is successful, PlusIdentity can be a big company.</p>
<h3 id="protego">Protego</h3>
<p><a href="https://www.protegosolutions.io/?ref=content.strategyofsecurity.com">Protego</a> makes a platform to help companies in Latin America defend against chargebacks. Both founders are alumni of Rappi, a <a href="https://en.wikipedia.org/wiki/Rappi?ref=content.strategyofsecurity.com">massive startup</a> based in Colombia. They worked on anti-fraud, Know Your Customer (KYC), and chargebacks — exactly the domain Protego is in. Aside from YC, no funding has been reported to date.</p>
<p>A quick refresher on chargebacks from <a href="https://en.wikipedia.org/wiki/Chargeback?ref=content.strategyofsecurity.com">Wikipedia</a>, as chargebacks are a somewhat adjacent topic to cybersecurity:</p>
<blockquote>
<p>A chargeback is a return of money to a payer of some transaction, especially a credit card transaction.</p>
</blockquote>
<p>The payer is most commonly an individual consumer. A chargeback reverses a money transfer from the consumer's bank account, line of credit, or credit card. The chargeback is ordered by the bank that issued the consumer's payment card.</p>
<p>Legislation enabling chargebacks is well-intentioned: it protects consumers against false charges and identity theft. However, this protection comes at an expense to merchants. People commit fraud by falsely requesting charges to be reversed, among other abuses of chargeback laws. According to Protego, chargebacks cost LatAm companies $19 billion per year. This number will increase as more transactions move online.</p>
<p>Protego's product currently addresses a specific step in the chargeback process for merchants: automating chargeback disputes. According to the 2014 Cybersource Fraud Benchmark Report, 60% of chargebacks are disputed with a 41% success rate. Put differently, only 2.5 in 10 chargebacks are successfully disputed by merchants — low odds. A product like Protego is clearly appealing to merchants if it can increase the odds of success and reduce the time spent submitting disputes. It's even more appealing that Protego only gets paid when chargebacks are successfully resolved.</p>
<p>Protego reminds me a bit of <a href="https://www.brex.com/?ref=content.strategyofsecurity.com">Brex</a> — a situation where the founders are clearly domain experts building in the domain their company exists. They have an opportunity to be a large company if their product can demonstrate measurable success in chargeback disputes. The company also has an opportunity to address more of the chargeback problem space, for example: preventive measures to block purchases likely to result in chargebacks.</p>
<h3 id="standardcode">StandardCode</h3>
<p><a href="http://standardcode.io/?ref=content.strategyofsecurity.com">StandardCode</a> is an API used by developers to verify the age of children and obtain parental consent for use of online services. The founders are HomeJoy alumni, a Y Combinator S10 company founded by former YC Partner Adora Cheung. The company lists three investors on their website (including YC). Funding amounts have not been disclosed.</p>
<p>The product operates in a bigger market than you might intuitively expect. As of 2021, there are <a href="https://www.childstats.gov/americaschildren/tables/pop1.asp?ref=content.strategyofsecurity.com">74.1 million children</a> in the United States and <a href="https://www.humanium.org/en/children-world/?ref=content.strategyofsecurity.com">2.2 billion children</a> globally. More importantly, the <em>age</em> which children start using technology is an accelerating trend that's relevant to StandardCode's growth potential. I didn't use any internet platforms until I was 12 years old (growing up in the 1990s). Today, 60% of children <a href="https://www.pewresearch.org/internet/2020/07/28/childrens-engagement-with-digital-devices-screen-time/?ref=content.strategyofsecurity.com">started using smartphones</a> before age 5, and 31% started before age 2. This trend has been further accelerated by the COVID-19 pandemic and increased use of EdTech and gaming services.</p>
<p>Child data privacy laws like <a href="https://en.wikipedia.org/wiki/Children's_Online_Privacy_Protection_Act?ref=content.strategyofsecurity.com">COPPA</a> and <a href="https://www.clarip.com/data-privacy/gdpr-child-consent/?ref=content.strategyofsecurity.com">GDPR-K</a> present an interesting dilemma for tech companies. Laws set requirements for collection and handling of personal information from children under a certain age (age varies by law). Collection usually requires verifiable consent from a parent. Tech companies typically solve this by prohibiting children under a certain age (usually 13) from using their services. Exclusion is one solution, but <a href="https://data.worldbank.org/indicator/SP.POP.0014.TO.ZS?ref=content.strategyofsecurity.com">25% of the world's population</a> is under age 15. A product that makes it easier for companies to reach this group of users while increasing safety and compliance is clearly valuable.</p>
<p>For StandardCode, it doesn't matter how often or how long children are playing games or using apps. It matters how many <em>total</em> children are active online and how many <em>different</em> apps they are trying. Every time a new child comes online or an existing child tries a new app, there is a new need for identity verification and consent. That's a huge opportunity.</p>
<p>StandardCode can become a large company if they capture the market for child identity verification and parental consent among developers. Success is becoming the Stripe of this market. StandardCode could potentially become an even larger company if they're able to expand the product outward to other types of verification and consent, either among children or other population segments.</p>

<!--kg-card-begin: html-->
<div class="alert">
<strong>Disclosure:</strong> A startup I previously co-founded interviewed for Y Combinator twice. We were reimbursed for travel expenses. Y Combinator was not an investor in the company.
</div>
<!--kg-card-end: html-->
]]></content:encoded>
            <category>Startups</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/09/YC-S21-Feature.png"/>
        </item>
        <item>
            <title><![CDATA[Welcome to Strategy of Security]]></title>
            <link>https://strategyofsecurity.com/welcome-to-strategy-of-security/</link>
            <guid>61295b4e39241f003b844657</guid>
            <pubDate>Fri, 27 Aug 2021 21:50:52 GMT</pubDate>
            <description><![CDATA[Strategy of Security's mission is to provide perspectives for modern cybersecurity professionals. Its purpose is to help you find your way to the top of the field — however the journey looks for you.]]></description>
            <content:encoded><![CDATA[<p><em>"I'm going to write"</em> — four words I've wanted to say for two decades. I wasn't ready to say them due to the fear and uncertainty of creating in public under my own name. No more. It's time.</p>
<p>In the famed words of <a href="https://astralcodexten.substack.com/p/still-alive?ref=content.strategyofsecurity.com">Scott Alexander</a>:</p>
<blockquote>
<p>"With malice towards none, with charity towards all...let us begin anew the joyful reduction of uncertainty wherever it may lead us."</p>
</blockquote>
<p>Welcome to Strategy of Security. I'm glad you're here.</p>
<h2 id="what-is-strategy-of-security">What is Strategy of Security?</h2>
<p>Strategy of Security is a publication that analyzes the business and strategy of cybersecurity. It's written by me, Cole Grolmus.</p>
<p>My mission with Strategy of Security is to provide perspectives for modern cybersecurity professionals. The purpose is to help you find your way to the top of the field — however the journey looks for you. Together, we'll do our part in shaping an industry and solving some of our time's biggest challenges.</p>
<p>My work happens through writing, visuals, and data. I believe in the power of mixed media. Using the right form of communication is the most effective way to share ideas.</p>
<p>Expect the majority of the content you see on Strategy of Security to be positive and constructive. We need new and different voices in an industry where fear and negativity are predominant. Any criticism will have positive intent. Productive discourse moves the industry forward.</p>
<p>To start, I'm writing free long-form articles weekly with daily short-form commentary on social media. More is planned after I'm comfortable my work is unquestionably valuable to you.</p>
<h2 id="which-topics-will-strategy-of-security-cover">Which topics will Strategy of Security cover?</h2>
<p>I create within the boundary of subjects I'm competent about and topics you find valuable. My goal is context: thoughtful perspectives applicable to your work and life in cybersecurity.</p>
<p>I get inspiration from a broad range of creators and publications. A few direct influences are <a href="https://stratechery.com/?ref=content.strategyofsecurity.com">Stratechery</a> (Ben Thompson), <a href="https://twitter.com/visualizevalue?ref=content.strategyofsecurity.com">Visualize Value</a> (Jack Butcher), and <a href="https://2pml.com/?ref=content.strategyofsecurity.com">2PM</a> (Web Smith). You may notice reflections of their style as I work to establish my own unique voice.</p>
<p>A few of the topics you can expect to see on Strategy of Security are:</p>
<ul>
<li>
<p><strong>Industry analysis:</strong> Analysis of broad trends, events, and news across the cybersecurity industry and ecosystem. You'll elevate your attention from news and headlines to the themes and trends that matter most.</p>
</li>
<li>
<p><strong>Company analysis:</strong> Analysis of specific cybersecurity companies and products, ranging from public companies to startups. You'll discover new companies and business opportunities before others recognize them.</p>
</li>
<li>
<p><strong>Abstract thinking:</strong> Explanations of concepts, theories, and principles relevant to cybersecurity leaders and operators. You'll gain a new mindset and timeless ways of thinking.</p>
</li>
<li>
<p><strong>Interviews and case studies:</strong> Discussions and deep-dive studies. You'll learn from the most interesting people, companies, and events in the industry.</p>
</li>
</ul>
<p>A few nuances about topics you should <em>not</em> expect to see covered on Strategy of Security:</p>
<ul>
<li>
<p><strong>Breaking news:</strong> Although I plan to cover some news, don't expect me to break any. Existing media does an outstanding job of breaking and reporting news timely. I'm interested in the depth and broader impact of events. This requires extra time to analyze.</p>
</li>
<li>
<p><strong>Technical financial analysis:</strong> You won't see quantitative financial analyses on technical investment topics for companies I cover. Professional financial analysts are far more capable at covering companies for investors. My coverage is strategic in nature: I explain the strategy, value, and impact to you as a person working in cybersecurity.</p>
</li>
<li>
<p><strong>Software development:</strong> You may periodically see code or demos. You shouldn't expect to see fully-baked apps, detailed breakdowns of exploits, or other highly technical content. I write code and previously built a commercial SaaS application. However, programming isn't among my best skills.</p>
</li>
</ul>
<p>The content I produce will evolve, as with anything new. My objective to provide you with the maximum value possible will never change.</p>
<h2 id="who-is-this-for">Who is this for?</h2>
<p>The tagline for Strategy of Security is "Perspectives for the modern cybersecurity professional." I chose this tagline because I believe we're entering a new era. Cybersecurity is becoming mainstream: ubiquitous in culture, broadly understood, and fundamental to modern businesses.</p>
<p>A new class of people is leading the transformation. <em>"The modern cybersecurity professional"</em> is an ideal — a metaphorical representation of the combined skills, interests, and values of the people I've been fortunate to encounter in my work.</p>
<p>I have a long-held belief that cybersecurity will become an increasingly cross-functional discipline. The ecosystem will grow to include new people: those with a balance of business acumen, technical acumen, and global acumen.</p>
<p>Modern cybersecurity professionals are dimensional. They're people who possess both deep expertise and the range to understand, discuss, and apply adjacent concepts. They’re inclusive and welcoming of new people and ideas. You could call them polymaths — people with a wide range of interests both inside and outside of cybersecurity.</p>
<p>Defining the modern cybersecurity professional is about acknowledging emerging and non-traditional roles in the ecosystem. There is an important place for individuals who understand cybersecurity in context of business, strategy, and the world at large. If you identify as this type of person, Strategy of Security is for you.</p>
<h2 id="why-me">Why me?</h2>
<p>I have spent the last two decades studying, apprenticing, and executing cybersecurity work. I am both an operator and analyst, not a journalist. I have been working in cybersecurity and tech since I was old enough to legally hold a job. Before that, it was play.</p>
<p>I intend to continue consulting and advising in addition to writing. In the <a href="https://hunterwalk.medium.com/why-a-paid-newsletter-wont-be-enough-money-for-most-writers-and-that-s-fine-the-multi-sku-f41daa074cdb?ref=content.strategyofsecurity.com">words of Hunter Walk</a>, Strategy of Security is one of multiple SKUs I'm working on. I believe in the mutual reinforcement of practice, experience, and study. I started this project because it's a useful (and perhaps unique) combination of the skills and experience I've been so fortunate to gain in my career.</p>
<p>I read from a broad range of timeless leaders. I'm current with contemporary creators. My work to embody the ideal of a modern cybersecurity professional is continuously in progress.</p>
<p>I have a few of the formal industry credientials, if you care about those: I'm a CISSP and CISA. I also earned an MBA from a leading business school.</p>
<p>If you'd like to learn more about me, have a look at the <a href="https://strategyofsecurity.com/p/about">about page</a> or <a href="https://www.linkedin.com/in/colegrolmus/?ref=content.strategyofsecurity.com">connect on LinkedIn</a>.</p>
<h2 id="whats-next">What's next</h2>
<p>I have started writing weekly articles and posting daily social media content on Twitter. I will expand social media platforms and update the publishing schedule over time. This process is under no set schedule. Quality takes priority over frequency.</p>
<p>If you'd like to stay updated, you can subscribe to receive emails when new articles are published. You can also follow Strategy of Security on Twitter at <a href="https://twitter.com/intent/follow?screen_name=strategyofsec&ref=content.strategyofsecurity.com">@strategyofsec</a> and me personally at <a href="https://twitter.com/intent/follow?screen_name=colegrolmus&ref=content.strategyofsecurity.com">@colegrolmus</a>.</p>
<p>Thank you for reading — I'm looking forward to making this one of the best possible uses of your time.</p>
]]></content:encoded>
            <category>Announcements</category>
            <enclosure length="0" type="image/jpeg" url="https://storage.ghost.io/c/ab/2a/ab2aa77e-39bd-44e8-9ccb-d55a2093edde/content/images/2021/08/v3_-Welcome-to-Metasecurity-1.png"/>
        </item>
    </channel>
</rss>