the super 70 - digital guardian · critical technology. emerging cloud-centric security vendors,...
TRANSCRIPT
Cybersecurity, Data Management & Comm InfrastructureFEBRUARY 2018
FOR DISCLOSURE AND FOOTNOTE INFORMATION, REFER TO JMP FACTS AND DISCLOSURES SECTION.
THE SUPER 70 THE HOTTEST PRIVATELY HELD CYBERSECURITY, DATA MANAGEMENT, AND COMM INFRASTRUCTURE COMPANIES
Erik Suppiger [email protected]
(415) 835-3918
Patrick Walravens [email protected]
(415) 835-8943
Greg McDowell [email protected] (415) 835-3934
Michael Berg [email protected] (415) 835-3914
Copyright: iStock/zhudifeng
Cybersecurity, Data Management & Comm Infrastructure
1
TABLE OF CONTENTS
Executive Summary ................................................................................................................................. 3
Top Trends and Technological Changes ................................................................................................. 4
Funding Trends ..................................................................................................................................... 11
Index by Venture Capital Firm .............................................................................................................. 17
Actifio ..................................................................................................................................................... 23
Alert Logic .............................................................................................................................................. 24
Alienvault ............................................................................................................................................... 25
Arxan ..................................................................................................................................................... 26
Aryaka ................................................................................................................................................... 27
Avast ...................................................................................................................................................... 28
BeyondTrust .......................................................................................................................................... 29
Big Switch Networks, Inc. ...................................................................................................................... 30
Bitglass .................................................................................................................................................. 31
Bitsight Technologies ............................................................................................................................. 32
Centrify .................................................................................................................................................. 33
Checkmarx ............................................................................................................................................ 34
CloudPassage ....................................................................................................................................... 35
Cloudian ................................................................................................................................................ 36
Cloudflare .............................................................................................................................................. 37
Code42 .................................................................................................................................................. 38
Cohesity ................................................................................................................................................. 39
Core Security ......................................................................................................................................... 40
Countertack ........................................................................................................................................... 41
CrowdStrike ........................................................................................................................................... 42
Cumulus Networks ................................................................................................................................. 43
Cybera ................................................................................................................................................... 44
Cybereason ........................................................................................................................................... 45
Cylance .................................................................................................................................................. 46
Datera .................................................................................................................................................... 47
Digital Guardian ..................................................................................................................................... 48
Dome9 Security ..................................................................................................................................... 49
Duo Security .......................................................................................................................................... 50
eero ....................................................................................................................................................... 51
Endgame ............................................................................................................................................... 52
ExtraHop ................................................................................................................................................ 53
Fidelis Cybersecurity ............................................................................................................................. 54
Firemon ................................................................................................................................................. 55
ForgeRock ............................................................................................................................................. 56
HackerOne ............................................................................................................................................ 57
Cybersecurity, Data Management & Comm Infrastructure
2
iboss ...................................................................................................................................................... 58
Illumio .................................................................................................................................................... 59
Ivanti ...................................................................................................................................................... 60
Kaminario .............................................................................................................................................. 61
knowbe4 ................................................................................................................................................ 62
Kudelski Security ................................................................................................................................... 63
Lieberman Software ............................................................................................................................... 64
Lookout .................................................................................................................................................. 65
Malwarebytes ........................................................................................................................................ 66
Metaswitch Networks ............................................................................................................................. 67
Netskope ............................................................................................................................................... 68
Optiv ...................................................................................................................................................... 69
Phishme ................................................................................................................................................. 70
Ping Identity ........................................................................................................................................... 71
Pivot3 ..................................................................................................................................................... 72
RedSeal ................................................................................................................................................. 73
RiskIQ .................................................................................................................................................... 74
Rubrik .................................................................................................................................................... 75
Scality .................................................................................................................................................... 76
SentinelOne ........................................................................................................................................... 77
Silver Peak Systems .............................................................................................................................. 78
Skybox Security ..................................................................................................................................... 79
Solarflare Communications .................................................................................................................... 80
StackPath .............................................................................................................................................. 81
Tanium ................................................................................................................................................... 82
Tenable .................................................................................................................................................. 83
Tufin ....................................................................................................................................................... 84
vArmour ................................................................................................................................................. 85
Vectra Networks .................................................................................................................................... 86
Veeam ................................................................................................................................................... 87
Venafi .................................................................................................................................................... 88
Watchguard ........................................................................................................................................... 89
Webroot ................................................................................................................................................. 90
WhiteHat Security .................................................................................................................................. 91
Zerto ...................................................................................................................................................... 92
Analyst Biographies ............................................................................................................................... 93
Covered Public Companies Mentioned .................................................................................................. 95
Cybersecurity, Data Management & Comm Infrastructure
3
EXECUTIVE SUMMARY
Welcome to the fourth annual JMP Securities Super 70 report (formerly named Fast 50 and Super 60).
In this report, we highlight what we believe to be the hottest, most strategically positioned private
companies in the Cybersecurity, Data Management & Communications Infrastructure industries.
For the book’s cover, we selected a photograph of the Great Wall of China because we think it is
analogous to the current state of IT infrastructure in many respects. The Great Wall was a powerful
infrastructure solution that profoundly changed security, communications, and commerce throughout its
many centuries of operation. However, the Great Wall lacked the flexibility to remain useful in modern
times as it does not easily support new functionality, it is expensive to maintain, and it lacks mobility.
As a result, much of the Wall has been destroyed or is in a state of decay.
Similarly, aging IT infrastructure from just a few years ago which lacks the flexibility to support new
functionality and is expensive to maintain has rapidly become obsolete as a renaissance in IT has
disrupted many IT paradigms. More specifically, the advent of cloud, mobile, virtualization, Internet of
Things (IOT), and many other new technologies have placed demands on systems that legacy solutions
simply cannot meet. Undertaking the onerous task of modernizing IT infrastructure not designed for the
new era is a futile task, similar to upgrading the Great Wall. And while both the Great Wall and legacy IT
infrastructure can be patched and repaired to portray the image of security and robustness, they will
never be able to meet modern day needs. We see the sunrise on the cover as representative of a new
day and age for cybersecurity, data management, and networking technologies, which when
implemented can create a dynamic, strong, and secure IT infrastructure.
Similar to building the Great Wall, the road ahead for members of our Super 70 will often be
treacherous and challenging, and only those with the strongest foundations will sustain and thrive.
However, in our opinion, the need to improve IT infrastructure now is apparent with the dramatic
increase in funding from 2016. We believe a global adoption of digital transformation has worked in the
favor of strong privately-held companies by increasing the rate of innovation and accelerating the pace
of deployments for next-generation infrastructure technologies in enterprises across all industries. In our
view, this has created opportunities for next-gen vendors to succeed as the demand for technologies at
the forefront of innovation becomes ever greater.
In addition, we believe the agility of our Super 70 companies to iterate new products and respond to
changing technology dynamics position them well to take share from incumbents. With a strong
operational foundation and sustainable technological differentiation, we believe our Super 70
companies are disrupting the technology titans that have dominated the legacy landscape, but lack the
vision, agility, or perseverance to adapt to current market trends. As a result, we think our Super 70
companies are better positioned than ever before to dominate global markets in the long term.
Cybersecurity, Data Management & Comm Infrastructure
4
TOP TRENDS AND TECHNOLOGICAL CHANGES
Cybersecurity
Several trends emerged in 2017 which led to a recovery in cyber security spending during the year,
demonstrating a strong recovery from a weak 2016. We believe the healthy growth rates in 2017
(especially compared to 2016) were driven by a few factors, highlighted by further awareness of
breaches at the executive and board levels. As hackers continued to develop more sophisticated attack
protocols, there were several ubiquitous threats to cyber security in 2017, including: phishing attacks,
ransomware, and business email compromise (BECs). The attacks in 2017 were some of the largest
the cyber security world has ever seen, from the Equifax data breach of over 145 million customers, to
WannaCry, which infected more than 400,000 machines, to the Uber breach, where key executives
were exposed for not disclosing a massive breach in 2016. These public-facing breaches have shed
light on the need to secure IT infrastructure across a perpetually growing surface area, especially with
the rapid adoption of cloud architectures, IoT devices, mobile devices, and virtual technologies. We also
think many organizations delayed some spending in 2017 as IT teams sifted through regulatory
requirements from the impending implementation of the General Data Protection Regulation (GDPR) in
Europe. However, we believe GDPR will provide a catalyst for 2018 as companies begin spending on
projects to achieve or maintain compliance with the new regulations.
There was a much healthier spending environment in cybersecurity in 2017; a trend we believe will
endure in 2018. With the strong spending level, we think several trends that emerged in 2017 will
continue to meaningfully impact the market in 2018, highlighted by IPO activity, technology
convergence, and vendor consolidation. With cybersecurity budgets still tightly restricted and monitored,
IT teams must continue to do more with less. In response, technology vendors are committing more
resources to developing platforms that can be easily deployed, but are also highly automated, requiring
less human capital to operate. However, as more established vendors develop broad platform solutions,
the market will likely demand broadly integrated product portfolios, which we believe will lead to
increased vendor consolidation in 2018.
While we think there will be significant technology convergence and vendor consolidation with
established security vendors, we see a handful of strong emerging companies that are well positioned
to take their next-gen technologies mainstream. In our view, some of the emerging market opportunities
where vendors have developed highly-differentiated technologies include next-gen endpoints, identity
and access management (IAM), application and cloud security, and network security. In Figure 1 we
detail key trends that gained momentum in 2017, which, in our opinion, will continue to shape the
market in 2018.
Cybersecurity, Data Management & Comm Infrastructure
5
FIGURE 1. Top Trends in Cybersecurity
Source: JMP Securities LLC and Company Reports
Key technology changes in cybersecurity
Rapid adoption of next-generation endpoint. Emerging vendors further established positions in the
endpoint market in 2017, with six vendors in our Super 70 generating revenues of $100M+. We believe
these private vendors are developing innovative technologies in areas where large incumbent vendors
are behind the curve. In our view, vendors that are able to leverage both endpoint detection and
remediation (EDR) and endpoint protection capabilities (EPP) will be the ones to gain the most traction
in 2018. Several vendors, such as CrowdStrike and Cylance have already made significant strides in
the use of machine learning (ML) to optimize their EDR capabilities for enterprise-grade endpoint
protection, while Malwarebytes and Avast have made similar strides on the consumer and SMB side.
All of these vendors have attained revenues >$100M with double-digit revenue growth in 2017. We feel
these vendors will need to continue to utilize their advanced technologies and growing scale to maintain
disruption in a market where entrenched endpoint vendors, such as Symantec, McAfee, Trend Micro,
and Sophos compete, and large network-based security vendors, such as Palo Alto Networks, Check
Point, FireEye, Fortinet, and Cisco are using their tight customer relationships and brand awareness to
leverage a footprint with their own solutions.
Identity and Access Management (IAM) at the core. As hackers contend with advancements in
threat protection, they are increasingly exploiting human vulnerabilities through the use of email
phishing attacks. Identity and access management is a group of technologies used to protect user
identities, and IAM has broadly become central to security architectures. Two primary forms of
protection are privileged account management (PAM) and (encryption) certificate management,
highlighted by vendors such as BeyondTrust and Venafi, with the former achieving >$100M in revenues
and both companies growing revenue in the double-digits.
We believe the majority of breaches use compromised privileged accounts, and a rapidly growing
proportion of breaches use forged certificates. Emerging vendors are developing broader IAM platforms
or are partnering with other point solutions, to provide a suite of integrated IAM capabilities. For
example, Centrify, a vendor with revenues >$100M and growing >25%, provides a suite of services,
including ID-as-a-Service (IDaaS), PAM and enterprise mobility management (EMM). We think these
emerging vendors are well positioned to grow in 2018 as digital transformation forces customers to
seek next-generation IAM solutions.
Continued rise of Next‐Gen Endpoints Private endpoint vendors continuing to gain significant market share.
IAM is the New Core of the Security Stack Identity is becoming a central part of cybersecurity as the perimeter disappears
Securing the Cloud Rapid adoption of cloud services means it must be secured.
Platform Consumption Growing cutomer preferene to have a one stop shop solution.
Simplified Products With strict budgets security products must be easy to manage with low OpEx
Securing an Expanding Edge IoT and mobile devices are expanding exponentially raising new security requirements.
Gaining Visibility & Control Massive public breaches and growth in data demonstrate necessity to see entire network.
Cybersecurity, Data Management & Comm Infrastructure
6
Securing applications and the cloud. As companies embrace digital transformation, the development
of software is central to their value proposition, and securing software applications has become
business critical. The advent of the DevOps model has resulted in software development becoming an
agile process, with extremely rapid development cycles, which requires security to be an integral
component of the development process. As a result, application security vendors, such as Checkmarx
with revenues of more than $50 million, are benefiting from accelerating demand for solutions that
embed security into the development process.
With the rapid adoption of cloud hosting services, such as AWS, Microsoft Azure, and Google Cloud,
the need to secure cloud content and deliver it in a reliable and secure manner has surfaced as a
critical technology. Emerging cloud-centric security vendors, such as CloudPassage, Dome9 Security,
and vARMOUR, have experienced sharp demand, and more established application security vendors,
such as Alert Logic, with revenues >$100 million, have seen the cloud services portion of the business
drive growth.
Securing the delivery of data has also become a central aspect of ensuring that the content gets to the
end user with content distribution network (CDN) vendors, such as StackPath, differentiating their
transport service from security services. These vendors offer denial of service (DDoS) protection with
web app firewall (WAF) capabilities, and they leverage a global footprint to build an extensive
knowledge base of threat intelligence.
Gaining visibility & control. Virtually all major attacks occur over an extended period, with the
breaches typically going undetected for 3-6 months. Visibility into suspicious activity has been impeded
by increasing IT complexity as organizations embrace cloud architectures, mobile devices,
virtualization, and an array of other technologies that require separate tools and procedures for
management. Accordingly, visibility across networks, endpoints, data centers, and applications has
become a key focus for large organizations which have global networks with endpoints numbering in
the tens to hundreds of thousands.
Tanium, which has revenues of well over $100 million, has tackled the visibility problem by developing a
lightweight agent on the endpoint which has enabled it to attract several hundred of the largest
organizations in the world, and has propelled Tanium to become a standard in the financial services
industry.
Other emerging vendors, such as FireMon, RedSeal, Skybox, and Tufin, each of which are projecting
revenues of at least $50 million in 2018, use analytics to provide visibility into the customer’s security
infrastructure. Similarly, vendors such as Tenable and AlienVault analyze log data from an array of IT
devices to provide broad visibility into breach activity and to prioritize suspicious activity. Vendors such
as ExtraHop and Vectra focus on network traffic flows to identify suspicious activity in real time and to
provide context around the activity. The need for visibility and control gained considerable momentum in
2017, and we believe all of the vendors noted have strong prospects in 2018.
Cybersecurity, Data Management & Comm Infrastructure
7
Networking
Network requirements are continually evolving, driven by several IT trends, including migration toward
the cloud and adoption of new networking architectures. To accommodate rapid architectural changes,
we believe networks are shifting toward more open and programmable solutions. In tandem with a
broader trend toward subscription-based pricing models, organizations are increasingly demanding new
consumption models for networks which limit capital expenditures (capex). In addition, network
administrators are seeking new architectures that simplify deployment and operations.
FIGURE 2. Top Trends in Networking
Source: JMP Securities LLC and Company Reports
Key technology changes in networking
SD-WAN gaining traction. Enterprise data center networking has improved significantly, driven by
more efficient architecture offerings from companies such as Arista Networks. Enterprises are moving
from rigid and difficult-to-manage, three-tier network architectures to flatter "leaf-spine" architectures
that require significantly lower management overhead. Enterprises are now seeking to gain the same
operational efficiencies and cost savings with broader internet connections by deploying software-
defined WAN (SD-WAN) solutions. SD-WAN offerings enable enterprises to augment traditional private
MPLS networks with cheaper public internet bandwidth, which is particularly useful for distributed
enterprises that have several branch offices. Managing internet connections to branch offices can be
highly complex and often requires significant management overhead. SD-WAN centralizes the
management of WAN services, typically using a cloud, dramatically simplifying management. There are
several SD-WAN vendors targeting the space, and our due diligence suggests there are a few that have
rapidly reached impressive scale. Given the highly-attractive ROI associated with SD-WAN, adoption
has accelerated as enterprises have gained comfort with reliability of the offering.
Networking vendors continue to move to security. As highlighted in our report last year, we believe
networking vendors are increasingly leveraging their position to deliver advanced analytics and data
security. We think rapid growth in both the data analytics and security markets is motivating networking
vendors to bolster monitoring capabilities, and increasingly, to position their products as security
solutions. A number of our Super 70 networking companies have significantly evolved product offerings
to better address analytics and security use cases, and we believe these companies will continue to
shift focus to these areas. Larger networking incumbents are also emphasizing security capabilities as
key differentiators, and we expect these vendors to continue to disproportionately invest in their security
practices through organic R&D investment and/or strategic M&A.
Move to Software Enterprises are demanding software/services and consumption based pricing in place of h/w in order cut capex and TCO.
Migration to Subscription Pricing Vendors are shifting their business models to offer subscription pricing, even in scenarios involving hardware-based deployments.
Positioning for Growth in Security Network vendors are increasingly positioning their products as security solutions in order to gain exposure to the security market.
Bolstering Traffic Analytics Network vendors are leveraging their position in the network to deliver increased monitoring and analytics capabilities.
Evolution of WAN Optimization WAN optimization is evolving beyond improving application communications to improving broadband and cloud performance.
Network Function Virtualization (NFV) Service Providers are virtualizing network devices (i.e routers) in order to contain costs and increase flexibility.
Adoption of Private Cloud Private cloud adoption is expanding and converged infrastructure makes it manageable for mid and large enterprise accts.
Open Source is Growing The open source community has grown rapidly, and enterprises have become more dependent on open source software.
High Performance Networks Applications are migrating to more distributed architectures which creates a need for very high-speed connectivity.
Cybersecurity, Data Management & Comm Infrastructure
8
As an example, Gigamon, which is traditionally known as a network packet broker (NPB) company, has
shifted its business to security. We also note that Cisco has bolstered its security practice and has
suggested that security is a top priority in terms of investment. We expect this trend to continue to play
out in 2018.
Adoption of cloud is an agent for change. The adoption of the cloud is driving a paradigm shift in
networking. For public cloud providers, the network must be highly available, scalable, and simple to
administer. These requirements are driving increased adoption of data center architectures that
integrate with multiple vendor solutions (“open”) and are programmable. In the enterprise, IT
organizations are attempting to replicate the cloud delivery model internally by building private clouds,
which are essentially public clouds residing inside the corporate data center. Both public and private
clouds require re-architecting the network to achieve automation, ease of use, and faster time-to-
market. These needs are influencing demand for networking technologies that promote increased
automation and limit total cost of ownership (TCO).
Enterprises also need better access to cloud services directly from remote and branch offices (ROBO).
Today, traffic from ROBOs is typically backhauled to the corporate data center over an expensive
MPLS link, increasing cost and introducing latency. SD-WAN vendors are seeking to improve this issue
by enabling ROBOs to directly access cloud data centers over public broadband links.
Cybersecurity, Data Management & Comm Infrastructure
9
Data management
The $40B data management market remains in a state of constant disruption. It continues to shift
toward next-generation vendors as enterprises increasingly demand better performance, flexibility,
agility, and total cost of ownership (TCO). New architectures and business models are reshaping the
way data management is procured and deployed. While the shift to hyperscale public cloud persists,
next-generation data management vendors continue to post robust growth rates, highlighting the large
opportunity in on-premise data center infrastructure. Hyperconverged infrastructure (HCI) has taken
center stage in the primary storage market, and all-flash arrays (AFAs) are quickly becoming the de-
facto standard for three-tier architectures.
As in the primary storage market with HCI and AFA, we see a similar, if not more pronounced,
disruption ramping in the secondary storage market in 2018. There are several startups targeting this
space, and we believe the technical differentiation between vendors remains relatively significant. In our
opinion, startup vendors in this category will seek to dramatically improve data management by
breaking down silos associated with traditional secondary storage environments, such as
backup/recovery, archiving, application test/development, and analytics. We continue to see new
entrants with rapid growth emerge in the secondary storage market, whereas the primary storage
market seems to be consolidating around category leaders.
FIGURE 3. Top Trends in Data Management
Source: JMP Securities LLC and Company Reports
Key technology changes in data management
Below we describe what we see as the most significant technological changes occurring in the data
management industry. In our view, these trends are driving the need for new infrastructure deployment
models, and facilitating market demand for innovative technologies.
Secondary storage is being disrupted. Much of the innovation in the storage market over the last decade has been in primary storage, with vendors such as Nimble Storage, Pure Storage, Nutanix, and XtremIO coming to market with innovative offerings that disrupted the status quo. However, the secondary storage market has largely been untouched. Up until the past five years, the secondary storage market had not seen significant innovation since the introduction of Data Domain in the early 2000s. However, several startups targeting secondary data management have come to market, often led by highly successful industry veterans in the data center infrastructure space. In our view, there is significant white space in the secondary storage market, especially for vendors with strong cloud integration stories.
Hyperconverged Infrastructure Hyperconverged took center stage in 2016 with the IPO of Nutanix and we believe the market will remain in hypergrowth mode.
Flash is Becoming the De‐Facto Standard Coined the year of all‐flash, 2017 has proven to be a strong year for AFA adoption ‐ flash for secondary storage is on the horizon.
Renaissance of Secondary Storage Enterprises are rethinking secondary storage which is driving strong growth for several startups targeting this category.
Weaving a Fabric With Public Cloud Storage vendors are taking advantage of the demand for public cloud by providing an easier on‐ramp to cloud from on‐premise.
Ransomware Driving Demand for Backup The proliferation of ransomware in FY17 has driven corresponding demand for backup and business continuity.
The Trend to SW‐Only Offerings Storage vendors are evolving their hardware offerings to deliver software‐only versions, which are growing in popularity.
Object Storage Rapid growth in unstructured data, combined with the new innovations have driven an expanded interest in object storage.
Migration to Cloud Next‐gen storage players are building products that are better suited for cloud adoption, giving them an advantage in the cloud era.
Disruption from Dell/EMC Acquisition Channel checks suggest there have been early indications of disruption in the EMC channel, creating opportunity for competitors.
Improving Data Services for Test/Dev Attaining copies of data for application test and development is a challenge ‐ several startups are looking to solve this.
Cybersecurity, Data Management & Comm Infrastructure
10
Providing a fabric between on-premise and cloud. Another key trend is the growing demand for integration between on-premise data centers and public cloud services, particularly as offered by hyperscalers, such as AWS and Azure. One of the biggest barriers to cloud adoption is the challenge of migrating data and applications to the cloud from on-premise data centers. Data has gravity - as evidenced by Amazon's Snowball program, which utilizes full-size shipping trucks to transport data stored on physical storage devices. Application migration can be uncertain and time-consuming, as cloud infrastructure utilizes dissimilar interfaces and software to manage applications. Enterprises are also wary of vendor lock-in as cloud providers make it challenging to move data off of their cloud once it has been moved there, according to our checks. Our discussions indicate that most mid-to-large enterprises will leverage a hybrid cloud architecture, with both on-premise and cloud. Based on this assumption, we believe there will be strong demand for solutions that can bridge the two architectures.
Several vendors are attempting to address this need by providing a fabric that seamlessly delivers data and workloads between on-premise and public cloud. VMware announced this capability in 2016 by making vSphere available in AWS (general availability in the back half of 2017). NetApp has been delivering its data fabric solution for the past year, and Nutanix offers seamless application mobility between on-premise and cloud. Within our Super 70 group, there are several private companies that highlight cloud migration as a core competency. While monetization strategies are still evolving, we believe the vendor(s) that lead in providing this fabric will elevate their strategic relevance and significantly increase their total market opportunity. In our view, providing a fabric positions the vendor(s) to layer on additional data services that run across both on-premise and cloud. We look for progress in this category as a key factor in assessing the long-term growth potential of our Super 70 vendors and in our public company coverage universe.
Software-only becomes more important with cloud adoption. We have seen software continue to play a larger role in the data center infrastructure space. Vendors are beginning to morph hardware-based solutions into software-only offerings. While enterprises continue to demand integrated hardware solutions, the cloud is making software-only more attractive. Enterprises are increasingly utilizing x86 servers to perform data management functionality, with the underlying software provided by ISVs. This is especially prevalent in the HCI space. Nutanix has shifted to a software-only business model, and SimpliVity (acquired by HPE in February 2017) has moved well over 50% of its business to a software-only model. Longer term, we think a strong software-only offering will become more important as cloud adoption increases. Enterprises want a common management interface between on-premise and public cloud. In order to provide this functionality, vendors need to offer viable software-only solutions that can run consistently across on-premise and cloud application environments. In our view, vendors that have proven their ability to run on standard x86 at scale will have an advantage as cloud migration efforts continue.
Improving data services for application developers. Technology users, whether enterprise or consumer, have come to expect a rapid pace of application development from their vendors. Accordingly, application developers are striving to dramatically increase the speed at which they develop and test new features and applications. One of the most significant bottlenecks of application development is the delivery of data services for developers. Simply delivering copies of production data to developers requires significant changes to the underlying infrastructure, increasing costs, and hampering test/development speed. In line with the DevOps movement, data management vendors are attempting to streamline data delivery to application developers, so that they are able to more rapidly develop, test, and deploy applications.
Cybersecuriity, Data Mana
t
f
agement & Co
FUNDING T
Funds raised
In total, our Su
that were add
included in las
companies rai
adjusting for th
FIGURE 4.
Source: Compa
Commensurate
peak levels in
C4Q16. Fundin
at levels well a
Pulse indicate
C4Q17, with si
C1Q16-C1Q17
companies rem
funding.
mm Infrastruc
TRENDS
d
uper 70 compa
ded to the list
st year’s report
sed $1,033M,
he additional co
. Super 70 Fu
any reports, crunchb
e with funding
C3Q15, but fe
ng levels than
above the peak
es global fundi
imilarly high lev
7. We believe
maining private
cture
nies raised ~$
this year. The
t. This amount
and up slight
ompanies.
undraising, 2
base.com
for our Super 7
ell sharply in C
increased rapid
k in 2015. Mor
ing for venture
vels in C2Q17
e a portion of
e longer than i
1,638M in 201
e remaining $
t is up significa
tly from 2015
2013-2017 ($
70 companies,
C4Q15 and co
dly until C2Q17
re specifically,
e-backed com
and C3Q17, a
f the elevated
n previous yea
7, $261M of w
1,377M was r
antly from 201
where the gro
in millions)
we believe ve
ontinued declin
7 and they rem
the data from
panies increas
after hovering in
d funding in 2
ars and compl
which came from
raised by com
6, where our s
oup raised $1,
nture capital fu
ning until it rea
mained elevated
CB insights an
sed to a high
n a range of $2
2017 resulted
eting large rou
m new compan
mpanies that w
selected group
438M, even a
undraising grew
ached a bottom
d through C2H
nd KPMG Vent
of $47 billion
24-$31 billion fr
from later-sta
unds of late-sta
11
nies
ere
p of
fter
w to
m in
17,
ture
n in
rom
age
age
Cybersecurity, Data Management & Comm Infrastructure
12
FIGURE 5. Quarterly Global Fundraising Trends, 2016-2017
Source: PwC and CB Insights (data provided by CB Insights)
By year, fundraising has grown significantly since 2012, reaching peak levels in 2017, and rebounding
from a down year in 2016.
FIGURE 6. Global Fundraising Trends, 2012-2017
Source: PwC and CB Insights (data provided by CB Insights)
Cybersecuriity, Data Mana
f
A
agement & Co
Given the incr
anticipate that
number of job
from 33 at the
are sub-scale a
more widely av
Total fundraisin
handful of larg
raised by the S
FIGURE 7.
Source: crunchb
As far as fund
2017, data ma
For a more gra
1) endpoint se
security, 5) da
endpoint secu
($337M in 201
management
breakout.
mm Infrastruc
reased funding
it will remain
openings for t
e end of 2016.
and have limite
vailable.
ng increased in
ge capital raise
Super 70 comp
. Ten Larges
base.com, Compan
draising by cate
nagement com
anular view, w
ecurity, 2) ident
ata manageme
rity in 2017 (c
16), $158 in IA
($311M in 20
cture
g in 2017, hir
elevated as lo
the companies
Due to a reac
ed resources w
n 2017, even a
es for our Sup
anies in 2017,
t Amounts R
ny reports
egory, security
mpanies raised
we have segme
tity and access
ent, and 6) n
compared to $
AM ($0 in 2016
16), and $119
ring across the
ong as fundin
s in our report
ccelerating fun
will be able to re
after adjusting f
per 70 compan
according to c
Raised by the
y companies in
$345 million, a
ented our Supe
s management
etworking. Wit
$200M in 201
6), $150M in n
9M in network
e Super 70 ha
g is available.
last year incre
ding environm
emain in growt
for the addition
nies. Figure 7
crunchbase.com
e Super 70 in
n our Super 70
and networking
er 60 companie
t, 3) network se
thin the group
6), $494M in
network securi
king ($186M in
as continued t
More specific
eased to 35 at
ment, we believ
h mode, as fun
nal companies,
shows the ten
m and compan
n 2017
0 report raised
g companies ra
es into six cate
ecurity, 4) app
p, companies
application an
ity ($0 in 2016
n 2016). See
to climb, and
cally, the avera
t the end of 20
ve companies t
nding has beco
and there wer
n largest amou
y press release
$1,217 million
aised $119 milli
egories, includi
lication and clo
raised $415M
nd cloud secu
6), $345M in d
Figure 8 for
13
we
age
017
that
ome
re a
unts
es.
n in
on.
ng:
oud
M in
urity
ata
the
Cybersecurity, Data Management & Comm Infrastructure
14
FIGURE 8. 2017 Funding by Category ($ in millions)
Source: JMP Securities LLC and Company Reports
FIGURE 9. Company Distribution by Category
Source: JMP Securities LLC and Company Reports
494415
150 158
345
119
0
100
200
300
400
500
600
Application and CloudSecurity
Endpoint Security Network Security Identity and AccessManagement
Data Management Networking
Security
Endpoint Security Application and Cloud Security
Avast Fidelis Alert Logic Illumio
Code42 Lookout Arxan KnowBe4
Countertack Malwarebytes BitGlass Kudelski Security
Cybereason SentinelOne BitSight Netskope
Cylance Tanium CheckMarx Phishme
Digital Guardian Webroot CloudPassage RiskIQ
Endgame Dome9 Security Stackpath
HackerOne vArmour
iBoss Whitehat
Network Security Identity and Access Management
Alien Vault Skybox BeyondTrust Ivanti
Cloudflare Tenable Centrify Lieberman
Extrahop Tufin Core Security Optiv
Firemon Vectra Crowdstrike Ping Identity
Redseal Watchguard Duo Venafi
Forgerock
Networking
Aryaka Eero
Big Switch Networks Metaswitch
Cumulus Silver Peak
Cybera Solarflare
Data Management
Actifio Pivot3
Cloudian Rubrik
Cohesity Scality
Datera Veeam
Kaminario Zerto
Cybersecurity, Data Management & Comm Infrastructure
15
Revenue range
For each of our Super 70 companies, we have included an estimate of 2017 revenues in the ranges of
<$25 million, $25-$50 million, $50-$100 million, and >$100 million. Many of our Super 70 companies
are SaaS companies with rapid growth, thus billings can be much higher than revenues.
FIGURE 10. Number of Super 70 Companies by Revenue Range
Source: JMP Securities LLC and Company Reports
FIGURE 11. Super 70 Companies by Revenue Range, 2017
Source: JMP Securities LLC and Company Reports
>$100 million $50‐$100 million $25‐$50 million <$25 million Not Disclosed
Alert Logic Actifio Arxan Big Switch Eero
Avast ExtraHop BitSight BitGlass
BeyondTrust Fidelis Cloudian Datera
Centrify Alienvault CloudPassage Dome9
Cloudflare Aryaka Countertack HackerOne
CrowdStrike CheckMarx Cumulus Lieberman Software
Cylance Code42 Cybera vArmour
Duo Security Cohesity Cybereason
ForgeRock Core Security Endgame
Ivanti Digital Guardian iBoss
Kaminario Firemon Illumio
Kudelski Security KnowBe4 Pivot3
Malwarebytes Lookout RedSeal
Metaswitch Netskope Scality
Optiv Phishme SentinelOne
Ping RiskIQ Vectra
Silver Peak Rubrik
StackPath Skybox
Tanium Solarflare
Tenable Tufin
Veeam Venafi
Watchguard WhiteHat
Webroot Zerto
1
7
16
23 23
0
5
10
15
20
25
Not Disclosed <$25M $25‐$50M $50‐$100M >$100M
Cybersecurity, Data Management & Comm Infrastructure
16
In our view, the increasing adoption of new data center architectures and the cloud is driving demand
for solutions that are purpose-built for today’s IT environments. As a result, innovative startup vendors
are well positioned to take share from slower moving incumbents with outdated architectures. We view
our Super 70 companies as some of the most innovative and promising in networking, security, and
storage. As the market shifts, we believe these companies will have a strong opportunity to represent
the next-generation of IT infrastructure vendors.
We hope this report is helpful. Please feel free to reach out to our team with any questions.
The JMP Securities Cybersecurity, Data Management, and Communications Infrastructure team.
Erik Suppiger [email protected]
415-835-3918
Patrick Walravens [email protected]
415-835-8943
Greg McDowell [email protected]
415-835-3934
Michael Berg [email protected]
415-835-3914
Cybersecurity, Data Management & Comm Infrastructure
17
INDEX BY VENTURE CAPITAL FIRM
83 North ExtraHop BlackRock Funds
Actifio Illumio Illumio
Zerto Lookout Blackstone
ABRY Partners Tanium Cylance
Stackpath Andy Bechtolsheim BPI France
Accel Partners Datera Scality
Cohesity Appian Ventures Broadband Tower, Inc.
CrowdStrike Ping Identity Scality
ForgeRock Argonaut Private Equity Brookline Venture Partners
Illumio Pivot3 Digital Guardian
Lookout Artis Ventures Capital One
Netskope Cohesity Cylance
SentinelOne Silver Peak Systems Capricorn Investment Group
Tenable Ascent Venture Partners Tegile
Vectra Fidelis Cybersecurity Carmel Ventures
Webroot August Capital Skybox
Accton Technology Tegile Catalyst Investments
Big Switch Networks Avista Partners Tufin
Adams Street Partners Ping Identity CE Ventures
Cybera Baidu Kaminario
Adara Ventures CloudFlare Chrysalis Ventures
AlienVault Battery Ventures Cybera
Advanced Technology Ventures Cohesity CID Group
Actifio Cumulus Networks Big Switch Networks
Alcatel‐Lucent RiskIQ CIRTech Fund
CounterTack Zerto Kaminario
Aldrich Capital Partners Benchmark Capital Cisco
Optiv Duo Security Citi Ventures
PhishMe HackerOne Tanium
Altos Ventures Skybox City National Bank
White Hat Security CloudPassage Claritas Capital
AME Cloud Ventures Silver Peak Systems Cybera
Vectra Networks Bessemer Venture Partners CM Capital Investments
Andreessen Horowitz Endgame Columbia Capital
Actifio Optiv Endgame
Cumulus Networks PhishMe Core Capital Partners
Cybersecurity, Data Management & Comm Infrastructure
18
INDEX BY VENTURE CAPITAL FIRM
Zerofox EDF Ventures Scality
Correlation Ventures Arxan Garage Tech Ventures
AlienVault Edgemore Capital White Hat Security
Courian Corporation Endgame Gencast Ventures
Core Security EPIC Ventures Zerofox
Covera Ventures EQT Ventures Datto
Alert Logic HackerOne Illumio
Cross Creek Fairhaven Capital Partners Ping Identity
Tegile CounterTack General Electric Pension Trust
CRV Digital Guardian Digital Guardian
Cybereason Fidelity Ventures Geodesic Capital
Zerto Cloudian Netskope
CVC Capital Partners CloudFlare Tanium
Avast Malwarebytes Georgian Partners
DAG Ventures Ping Identity RiskIQ
Vectra Networks First Round GGV Capital
Data Collective eero AlienVault
Illumio Formation 8 Globespan Capital Partners
SentinelOne Illumio Kaminario
Deutsche Telekom Capital Partners Fortinet Goldman Sachs
Aryaka Centrify Cloudian
Lookout Foundation Capital CounterTack
DFJ ForgeRock iboss
Cylance Venafi Lookout
DHVC Founders Equity Partners Google Capital
Cohesity Cylance CloudFlare
Dragoneer Investment Group Francisco Partners CrowdStrike
HackerOne Metaswitch Duo Security
Draper Fisher Jurveston WatchGuard Granite Hill Capital Partners
Ping Identity Frank Slootman SentinelOne
Draper Nexus Rubrik Greylock Partners
Cylance Franklin Templeton Actifio
Duff Ackerman & Goodrich LLC Tanium Lookout
Silver Peak Systems Future Fund Rubrik
Dunrath Capital Bitglass Silver Peak Systems
Arxan Galileo Partners Skyhigh Networks
Cybersecurity, Data Management & Comm Infrastructure
19
INDEX BY VENTURE CAPITAL FIRM
Harmony Partners Cloudian Cylance
Zerto Venafi Ping Identity
Highland Capital Partners InterWest Partners Kleiner Perkins Caufield & Byers
Malwarebytes Aryaka AlienVault
Zerofox Pivot3 Endgame
Horizon Ventures Investor Growth Capital Lazarus
White Hat Security White Hat Security Kaminario
HP Ventures Iris Capital Dome9
Scality Scality Leapfrog Ventures
IA Ventures IVP Red Seal
Vectra Networks Rubrik Legend Ventures
Icon Ventures Zerto Arxan
Redseal J&W Seligman Lightspeed Venture Partners
ICONIQ Capital Silver Peak Systems CloudPassage
Netskope JP Morgan Netskope
Idinvest Partners Illumio Rubrik
Scality Jackson Square Ventures Skybox
Index Ventures AlienVault LLR Partners
Big Switch Networks JAL Ventures Digital Guardian
Centrify Dome9 Lockheed Martin
eero Jerry Yang Cybereason
Lookout Illumio Madrona Venture Group
Inflection Point Ventures JMI Equity ExtraHop
Fidelis Cybersecurity Code42 Marc Benioff
Innovation Network Corporation of Japan White Hat Security HackerOne
Cloudian John Thompson Illumio
Insight Venture Partners Illumio Mark Leslie Ventures
CheckMarx Rubrik Rubrik
Tenable Khosla Ventures Marker LLC
Veeam Big Switch Networks Tufin
Institutional Venture Partners Cylance Maryland Venture Fund
AlienVault Datera Fidelis Cybersecurity
Tanium Lookout MassMutual
Intel Capital Rubrik Digital Guardian
AlienVault Vectra Networks RiskIQ
Big Switch Networks KKR MATH Venture Partners
Cybersecurity, Data Management & Comm Infrastructure
20
INDEX BY VENTURE CAPITAL FIRM
Red Seal HackerOne Pinnacle Ventures
Mayfield Fund Zerofox Dome9
Centrify Next47 Silver Peak Systems
Webroot CounterTack Pitango Venture Capital
Menlo Ventures Digital Guardian Kaminario
eero Nexus Venture Partners PJC
Scality Aryaka Fidelis Cybersecurity
Mercury Fund North Bridge Venture Partners Playground Global
Alert Logic Acitfio eero
Meritech Capital Partners Norwest Venture Partners Pradeep Sindhu
CloudPassage Bitglass Datera
ExtraHop NTT Docomo Presidio Ventures
ForgeRock Centrify Aryaka
Tegile Ofer Hi‐Tech Providence Equity Partners
Mesirow Financial CheckMarx Skybox
Pivot3 Omnes Capital Qualcomm Ventures
Mithril Capital Management Scality Cloudflare
Lookout OnPoint Technologies Cohesity
Mitsui Global Investment CounterTack Lookout
CounterTack Opus Capital QuestMark Partners
Kaminario Dome9 Venafi
Mofet Technology Fund Origin Partners Rackspace
Skybox Venafi CrowdStrike
Mohr Davidow ORR Partners Radar Partners
Aryaka Dome9 Duo Security
Morgan Stanley OVP Venture Partners Razor's Edge Ventures
Lookout Red Seal CounterTack
Morgenthaler Ventures Paladin Capital Group Red Abbey Venture Partners LP
Big Switch Networks Arxan Zerofox
MSD Capital LP Endgame Redpoint Ventures
Big Switch Networks Optiv Big Switch Networks
Musea Ventures PhishMe Duo Security
CloudPassage Pelion Venture Partners eero
Neotec Capital Riesgo Venafi SentinelOne
AlienVault Pine River Capital Management LP Rembrandt Venture Partners
New Enterprise Associates Tegile Skybox Security
Cybersecurity, Data Management & Comm Infrastructure
21
INDEX BY VENTURE CAPITAL FIRM
RTP Ventures CounterTack Webroot
Zerto Social Capital Technology Venture Partners
S3 Ventures Netskope CloudFlare
Pivot3 SoftBank TechOperators
Salesforce Ventures Cybereason Endgame
CheckMarx Dome9 TenEleven Ventures
Skyhigh Networks Solstice Capital CounterTack
Samsung Ventures Arxan Cylance
Centrify Sound Ventures Ping Identity
Datera SentinelOne Tenaya Capital
Netskope Spark Capital CloudPassage
Ping Identity Cybereason Kaminario
Sasquehanna Growth Equity Special Situations Funds Skyhigh Networks
Skybox Security Digital Guardians The Westly Group
Sequoia Capital Split Rock Partners SentinelOne
Cohesity Code42 Thrird Point Ventures
Cumulus Networks Startup Capital Ventures Aryaka
Kaminario White Hat Security SentinelOne
Metaswitch Networks Sumeru Equity Partners Thomvest Ventures
Skyhigh Networks Cybera Skyhigh Networks
Shasta Ventures Summit Partners Tiger Global Management
CloudPassage Avast Actifio
eero RiskIQ SentinelOne
Sigma Partners Sutter Hill Ventures Top Tier Captial Partners
AlienVault Red Seal AlienVault
Centrify SV Angel Endgame
Silicon Valley Bank Cumulus Networks Cumulus Networks
Kaminario Sway Ventures Toronto Dominion Bank Group
Ping Identity T. Rowe Price Digital Guardian
Silver Lake Waterman Tanium TPG
Big Switch Networks TDF Ventures Tanium
Venafi Arxan Triangle Peak Partners
Sinewave Ventures Technology Crossover Ventures Ping Identity
SentinelOne Actifio Trident Capital
Singtel Innov8 Datto AlienVault
Bitglass ExtraHop Arxan
Cybersecurity, Data Management & Comm Infrastructure
22
Trinity Ventures
Aryaka
Cohesity
TriplePoint Capital
Big Switch Networks
True Ventures
Duo Security
Tudor Equity Growth
Fidelis Cybersecurity
Union Square Ventures
CloudFlare
Venrock
Redseal
Veritas Capital
BeyondTrust
VMware
W Capital Partners
Ping Identity
Warburg Pincus
CrowdStrike
Waterwood Group
Kaminario
Welsh, Carson, Anderson & Stowe
Alert Logic
Western Digital Capital
Cohesity
Wing Venture Capital
Cohesity
Cumulus Networks
Wipro Ventures
Vectra Networks
XT Investments
Checkmarx
INDEX BY VENTURE CAPITAL FIRM
Cybersecurrity, Data Manaagement & Co
ACTIFIO
Founded: 200Revenue: $50 Company Supartners in moapplications ainfrastructure, cloud. Actifio centric, SLA-dit more econofor any use, an Products/Sercopy data alloallows for theavailability is backup and lothe same prodClone, LiveClo Key Officers:Ash Ashutosh Jim SullivanDevelopment David Chang –Brian Reagan Edward Durkin Board of DireAsh Ashutosh Peter Levine –Rick Kimball –Bob Hower – AJit Saxena – FErez Ofer – 83Bill Burgess – Headcount: 3 Open PositioU.S. based: 16International: 1Sales: 15 Other: 15
omm Infrastruc
09 0M-$100M
ummary: Actifiore than 37 couand infrastructu
enabling dramreplaces siloe
driven approachmically, and usnytime, anywhe
rvices: Actifio wing for high aDevOps proccomplimented
ong-term retentduction data, aone, or Restore
– Founder & Cn – Preside
– SVP of Solut– CMO
n – CFO
ectors: – Founder & C
– Andreessen H– Technology CAdvanced Tech
Founding CEO,3North North Bridge V
380
ns: 30 6 14
cture
www.ac781.790
o helps over untries around ure. Actifio’s Vmatic improvemed data managh that lets custse it when andere.
uses micro-viravailability and cess to be stred with dedupliction. The platfoallowing IT ade operations.
CEO ent, Cloud
ions Developm
CEO, Actifio Horowitz Crossover Venhnology Partne Netezza
Venture Partne
ctifio.com 0.7500
2,700 global the world virtu
Virtual Data Pments in busigement applictomers captured where they n
rtualization tecdata protectio
eamlined with cation and co
orm replaces sdministrators to
Business
ment
tures ers
ers
CCEHIBSV To K83AAGNTeT
Sou
33W
enterprise cusualize their dataPipeline™ techness resiliency
cations with a e data from proneed. The resu
chnology on itn on a single shigh availabilit
ompression algiloed systems o easily manag
Competition: Commvault
MC Hitachi Data SysBM ymantec
VMware
otal Funding:
Key Investors: 3North
Advanced TechAndreessen HorGreylock PartneNorth Bridge Ve
echnology Croiger Global Ma
urce: Company w
33 Wyman StreWaltham, MA 02
stomers and sa, just as they
hnology decouy, agility, and radically simp
oduction applicult is enterprise
ts VDP platforstorage platformty and ease ogorithms that with a single pge workflows t
stems (HDS)
$211M
nology Partnerrowitz ers enture Partnersossover Ventureanagement
website, all reven
2
eet 2451
service providevirtualized theples data fromaccess to th
ple, applicationations, manag
e data available
rm, to virtualizm. The platformof backup. Hig
allow for easphysical copy othrough Mount
rs
s es
nues are CY-17
3
er ir m e
n-e e
e m h y
of t,
Cybersecurity, Data Management & Comm Infrastructure
24
ALERT LOGIC
Founded: 2002 Revenue: >$100M
www.alertlogic.com 713.484.8383
1776 Yorktown, Suite 150 Houston, TX 77056
Company Summary: Alert Logic provides a holistic SaaS solution for comprehensive application security in cloud and hybrid environments. In contrast to point solutions from competitors, Alert Logic offers a full suite of services that secure the entire application environment, regardless of where the applications reside. The company’s partner network of cloud-hosting providers allows customers to seamlessly add on security services in a highly scalable and easily consumed manner. A key driver of growth has been Alert Logic’s purpose-built security services for AWS, which in just a few years has become a large portion of the company’s bookings. The growth of the business has been driven by cloud adoption by customers, which is predicted to be the majority of the company’s business shortly. Products/Services: With Alert Logic, customers receive a full suite of services, including advanced security tools to monitor the infrastructure of the user’s network, vulnerability management for AWS, a fully outsourced and managed SaaS delivery model, and integrated 24/7 security operations center services to monitor and provide guidance. Although most often seen in cloud environments, Alert Logic can be deployed in any environment, including on-premise. Key Officers: Gray Hall – Chairman & CEO Blake Allen – SVP and General Counsel Misha Govshteyn – SVP, Products & Marketing Tim Alguire – CFO Prabuddha Biswas – CTO Dave Colesante – COO Greg Davis – EVP Global Sales & Field Marketing Tom Veronie – CIO Marc Willebeek-Lemair – Chief Strategy Officer Board of Directors: Gray Hall – Chairman & CEO, Alert Logic Tony de Nicola – Co-President, Welsh Carson Mike Donovan – GP, Welsh Carson Jim Lewandowski – Former CEO, FireMon Raymond Ranelli – Senior Operating Executive Steve Munford – Former CEO, Sophos Headcount: ~700 Open Positions: 40 U.S. based: 20 International: 20 Sales: 3 Other: 37
Competition: Imperva Splunk SecureWorks TrendMicro Total Funding: $387M Key Investors: Covera Ventures Mercury Fund OCA Ventures Welsh, Carson, Anderson & Stowe
Source: Company website, all revenues are CY-17
Cybersecurity, Data Management & Comm Infrastructure
25
ALIENVAULT
Founded: 2007 Revenue: $50M-$100M
www.alienvault.com 650.713.3333
1875 S. Grant St., #200 San Mateo, CA 94402
Company Summary: AlienVault provides a cost efficient and simple unified threat detection and compliance management solution for the mid-market. The company’s Unified Security Management products (USM) leverage device monitoring and event management, along with other security technologies to provide a comprehensive threat detection and management solution with a single pane of glass that takes only 10 minutes to run. In recent years, AlienVault has developed an inside sales organization focused on driving high-velocity sales. The sales model has enabled AlienVault to cost-effectively target the mid-market, while other vendors have struggled to serve the market economically. The company also leverages an MSSP (Managed Security Service Provider) channel that is growing rapidly, with over 100 MSSP partners. AlienVault experienced organic growth of ~55% in CY17. Products/Services: AlienVault offers two USM products: USM Appliance for on-premise, and USM Anywhere for cloud and on-premise environments. The USM Appliance is an all-in-one platform designed to provide Day One protection against today’s security threats. The USM Appliance can easily and quickly identify threats and respond by continuously delivering threat intelligence from the AlienVault Labs Security Research Team and its Open Threat Exchange (OTX), while providing essential security aspects. Last year AlienVault launched a cloud and on-premise product called USM Anywhere which has grown rapidly, as it is highly scalable and centralizes five security capabilities in a single console. It also provides a continuous stream of intelligence from the AlienVault Labs Security Research Team and OTX to update the user with the newest data. The USM Anywhere platform leverages AlienApps, modular software components integrated into the platform that extend, orchestrate, and automate functionality between the security controls in the USM Anywhere console and other third-party security tools. Key Officers: Barmak Meftah – President & CEO Andy Johnson – CFO Roger Thornton – CTO Rita Selvaggi – CMO Marcus Bragg – Chief Revenue Officer John McLeod – Chief Information Security Officer Shanel Vandergriff – SVP, Marketing Board of Directors: J. Alberto Yépez – Chairman, MD, Trident Capital Ted Schlein – MD, Kleiner Perkins Caufield & Byers Barmak Meftah – President & CEO, AlienVault Glenn Solomon – Partner, GGV Capital Alberto Gomez – Managing Partner, Adara General Peter Pace – Former Chairman of the Joint Chiefs of Staff, U.S. Armed Forces Kenneth Goldman – Former CFO, Yahoo! John M. Jack – Partner, Andreessen Horowitz Headcount: ~400 Open Positions: 38 U.S. based: 23 International: 15 Sales: 18 Other: 20
Competition: HP IBM LogRhythm Splunk Intel-McAfee Total Funding: $118M Key Investors: Adara Ventures Correlation Ventures GGV Capital Intel Capital Institutional Venture Partners Jackson Square Ventures Kleiner Perkins Caufield & Byers Neotec Capital Riesgo Sigma Partners Top Tier Capital Partners Trident Capital
Source: Company website, all revenues are CY-17
Cybersecurity, Data Management & Comm Infrastructure
26
ARXAN
Company Summary: Arxan provides application security and solves complex management problems that arise from edge devices running in untrusted environments. Mobile, Javascript, and open IoT platform applications are especially vulnerable to code-based attacks, subsequently causing IP and licensing risk. In addition, Arxan also seeks to secure desktop applications from computer-based cyber hacks and protect servers beyond the traditional firewall. Arxan’s technology is currently running on over 500 million devices worldwide. Products/Services: Arxan delivers a variety of security products, including mobile, IoT, desktop, Javascript, and server security. These products protect a company’s brand by eliminating the possibility of IP and licensing attacks and securing valuable data. The technology protects the code by making it tamper-resistant and tamper-aware. It is also very resilient against continual attacks, as it is able to self-repair. Arxan’s application protection is highly-scalable and easily customizable to each user’s needs. Key Officers: Joe Sander – CEO Dick Davidson – CFO James Love – Sr. VP WW Sales Sam Rehman – CTO Board of Directors: Alex Gounares – CEO, Polyverse Corp Tom Heiser – Advisor, TA Associates Alex Melamud – Advisor, TA Associates Tom Mendoza – Vice Chairman, NetApp Joe Sander – CEO, Arxan Kenneth Schiciano – Advisor, TA Associates Headcount: 120 Open Positions: 19 U.S. based: 14 International: 5 Sales: 0 Other: 19
Competition: WhiteCryption Total Funding: Acquired by TA Associates in 2013 for $132M Key Investors: Dunrath Capital EDF Ventures Legend Ventures Paladin Capital Group Solstice Capital TDF Ventures Trident Capital
Founded: 2001 Revenue: $25M-$50M
www.arxan.com Phone not listed
650 California St., Ste 2750 San Francisco, CA 94108
Source: Company website, all revenues are CY-17
Cybersecurrity, Data Manaagement & Co
ARYAKA
Founded: 200Revenue: $50 Company Susolutions to pcloud service to deploy expethe global avato provide enteffective. Keyglobalization o Products/Serdelivery, and cnetwork, elimithan 20 carrieas-a-Service, Delivery-as-a-as well as firew Key Officers:Shawn FarshcAshwath NagaAidan Cullen –Vikas Garg – SGary SevountsRandolph Barr Board of DireShawn FarshcAshwath NagaRam Gupta – Naren GuptaPartners Fred Wang – GJim Smith – GKhaled Nasr –Shawn Cheria Headcount: ~ Open PositioU.S. based: 9 International: 5Sales: 2 Other: 12
omm Infrastruc
09 0M-$100M
ummary: Aryaprovide WaaS provides highlyensive WAN opailability of broaterprise class sy drivers incluof enterprise or
rvices: Aryakacloud access wnating the neers for bandwidtNetwork-as-a-
Service. Aryakwalls within bra
chi – President araj – Founder – CFO SVP of Engines – CMO r – Chief Secur
ectors: chi – President araj – FounderNon-Executive
a – Co-Foun
GP, Trinity VenP, Mohr David
– Investor, Intern – Investor, T
~300
ns: 14
5
cture
www.ary650.862
ka utilizes its (WAN-as-a-Se
y reliable and fptimization appadband serviceservice that is ude the adopganizations.
a’s network inwith reliable, sed for hardwarth across its gl-Service, Webka also offers aanches.
& CEO & CTO
ering & Operat
rity Officer
& CEO, Aryak& CTO, Aryaka
e Chairman der, Nexus V
ntures ow rWest Partners
Third Point Ven
yaka.com .8045
private netwoervice) and to fast applicationpliances or builes and its propprovisioned an
ption of cloud
ntegrates the secure, and dere and dedicatlobal network ab Application a hardware de
tions
ka a
Venture
s tures
ComAkaAT&SpriVeri Tota KeyDeuThirInteMohNexPresTrinT Ve
Sourc
18Sa
ork to offer cloreplace tradit
n performance,ld private netw
prietary SD (sond monitored i and SaaS a
benefits of Wedicated conneted links. The and key serviceDelivery-as-a-
evice that repla
mpetition: amai &T int izon
al Funding: $1
y Investors: utsche Telekomrd Point VenturrWest Partners
hr Davidow Venxus Venture Pasidio Ventures
nity Ventures entures
e: Company web
800 Gateway Dan Mateo, CA 9
oud-based WAtional MPLS. T, thereby elimin
works. The comftware-definedn real time anapplications, a
WAN optimizatiectivity into a s
company partes include WA-Service, and aces traditiona
120M
m Capital Partnres s ntures
artners
bsite, all revenue
2
Dr., Suite 200 94404
AN optimizatioThe company’nating the neepany leverage) WAN netword is highly cosalong with th
ion, applicatiosingle intelligentners with moreN OptimizationIP Applicatio
l Cisco routers
ers
es are CY-17
7
n s d s k st e
n nt e
n-n s,
28
AVAST
Founded: 198Revenue: >$1 Company Suaccessing themonitors data engine that prfiles every moThe company industry acroshealthy EBITD Products/SerProtection Pluprovides zero-company systeand wants of tprotection prod Key Officers:Vincent StecklRene-H. BlenzGlenn Taylor –Robin Selden Detlef SteinmeAlan RassabySecretary Board of DireJohn G. SchwErwin Gunst –Ulf Claesson –Warren FinegoDirector, VodaVincent StecklOndřej Vlček –Eduard KučeraPavel Baudiš –Lorne SomervCVC Capital PSiddharth PaPartners Scott Collins – Headcount: ~ Open PositioU.S. based: 6 International: 4Sales: 3 Other: 45
88 100M
mmary: Avast internet safe from over 400
rocesses unmaonth. As a resu
acquired AVGss platforms anDA margin in th
rvices: For busus, Endpoint P-day protectionems from a mathe business. Aducts.
ler – CEO z – CFO – Chief of Staff– CMO
etz – CIO y – General
ectors: arz – Chairman
– Former COO,– Partner, BLR old – Former Gafone Group ler – CEO, Ava– EVP & GM Ca – Founder, A– Founder, Avaville – Partne
Partners atel – Senior
– MD, Summit P
~1,550
ns: 48
42
Cy
www.ava+420.27
t is one of the and easy. The
0 million users. atched volumeult, Avast is abG Technologiesnd provided Ave low-60% ran
sinesses, Avasrotection Suite
n in each of itsanagement perAvast also offe
f
Counsel & C
n and CEO, Vis SAP & Partners
Group Strategy
ast Consumer, AvasAvast ast r and Head o
r MD, CVC
Partners
ybersecurity, D
ast.com 74.005.777
largest brandse company pr The company
es of data incluble to block aps in 2016, whivast with a stronge.
st offers four me, and Endpoins products. Avarspective, allowers internet sec
Company
sier
y and BD
st
of TMT,
Capital
ComKasWeMcASopMicNor Tot KeyCVCSum
Source: Comp
Data Managem
PiNu
s in cyber secrimarily serves y leverages a cuding 200 billiopproximately 3.ch gave Avast
onger AI produ
main products: Ent Protection Sast offers verswing the produccurity and mob
mpetition: spersky ebroot Afee phos crosoft rton
tal Funding: $
y Investors: C Capital Partnmmit Partners
pany website, all
ment & Comm
krtova 1737/1Ausle 140 00 Cz
curity, with a mconsumers an
cloud-based mon URLS and .5 billion attackt the largest us
uct. Avast has
Endpoint ProteSuite Plus. Thesatility in its impcts to be tailorebile security as
100M
ners
ll revenues are C
m Infrastructure
A Prague 4 zech Republic
mission to makend it constantlachine learning300 billion newks each monthser base in thealso reported a
ection, Endpoine company’s Aplementation oed to the needs home networ
CY-17
e
e y g w h. e a
nt AI of s k
Cybersecurrity, Data Manaagement & Co
BeyondTru
Founded: 198Revenue: >$1 Company Suon privileged BeyondTrust omanagement BeyondTrust cmore effectiveEBITDA margover half of thmarkets, we bis increasing it Products/Sermanagement management integration acrcontrol while suites to meet
Key Officers:Kevin Hickey Maurice HeiblBryce HancocBrad Hibbert –David Allen – Brendan Ever Board of DireNot Listed Headcount: 4 Open PositioU.S./Canada International: Sales: 2 Other: 11
omm Infrastruc
ust
85 100M
mmary: Sinceaccess managoffers increase(VM) and PA
can deliver moely prioritize riins. The comp
he Fortune 100believe the comts investment in
rvices: Beyond(VM) solution platform, Bey
ross PAM andmaximizing cocompliance an
: – President & Cum – COO
ck – CFO – CTO VP, Engineerin
rs – SVP of Sa
ectors:
400
ons: 13 based: 13 0
cture
www.bey480.405
being acquiregement (PAM)d integration a
AM, through iore granular reisk. While drivpany’s solutions0. While Beyonmpany is increan developing m
dTrust offers anamed Retina
yondInsight. Bed VM solutionsompany producnd ensure prop
CEO
ng les, Americas
yondtrust.com.9131
ed by Veritas C, in addition to
across disparatts manageme
eporting and eaving strong gros are used by
ndTrust has sigasing its focus market-leading
a PAM solutioa, which are tieeyondTrust is
s to reduce insctivity. The co
per security pra
CoCACenCybDelQuRap Tot$31 KeyVer
Sourc
50Ph
Capital, Beyondo bolstering intte monitoring sent platform. Wase of manageowth, BeyondTover 4,000 cu
gnificant exposon the PAM mPAM features/
n named Powed together us
the only secsider risks, enaompany also oactices.
mpetition: A ntrify berArk ll alys pid7
tal Funding: A10M in Septem
y Investors: ritas Capital
e: Company web
090 North 40th hoenix, AZ 850
dTrust has incrtegration acros
solutions, such With an integement, helpingTrust maintainustomers worldsure to both themarket. We thin/functionality, in
werBroker, andsing the compacurity companyabling increaseoffers auditing
Acquired by Vember 2014
bsite, all revenue
2
St., #400 018
reased its focuss its productsas vulnerabilitrated platform
g enterprises tons very healthdwide, includinge PAM and VMnk the compann particular.
a vulnerabilitany’s integratedy to offer tighed visibility andand protectio
eritas Capital fo
es are CY-17
9
s s. y
m, o y g
M y
y d ht d n
or
Cybersecurity, Data Management & Comm Infrastructure
30
BIG SWITCH NETWORKS, INC.
Founded: 2010 Revenue: <$25M
www.bigswitch.com 650.322.6510
3965 Freedom Circle #300 Santa Clara, CA 95054
Company Summary: Broadly considered one of the pioneers of software-defined networking (SDN), Big Switch Networks is taking hyperscale networking design concepts developed by Web 2.0 leaders and developing solutions for the broader enterprise, cloud provider, and service provider markets. By combining commodity OEM/ODM Ethernet switch hardware (“bare metal switches”) with Big Switch’s SDN software, customers are able to better automate data center operations and reduce costs. Products/Services: Big Switch provides SDN software solutions for data center networks. The company’s product strategy is two-pronged, with products (Big Monitoring Fabric) that provide visibility across physical and virtual SDN environments and products (Big Cloud Fabric) that create SDN switching fabrics designed to dramatically improve network agility, management, and cost. Big Monitoring Fabric delivers granular visibility into network flows for monitoring tools, from vendors such as Riverbed, and provides integration into security solutions, such as FireEye and Symantec. Big Monitoring Fabric can direct traffic to security devices such that enterprises are able to maximize total cost of ownership (TCO) of their security investments. Key Officers: Douglas Murray – CEO Wendell Laidley – VP, Finance & CFO Kyle Forster – Co-founder Prashant Gandhi – VP, Product Management & Chief Product Officer Gregg Holzrichter – VP, Marketing and CMO Susheel Chitre – VP, Business Development Joe Palazola – VP, WW Operations Jeffrey Wang – VP, Engineering Board of Directors: Douglas Murray – CEO, Big Switch Networks Bruce Armstrong – Operating Partner, Khosla Ventures Kyle Forster – Co-Founder, Big Switch Networks Bill Meehan – Lecturer, Stanford University Graduate School of Business Gary Morgenthaler – Partner, Morgenthaler Mike Volpi – Partner, Index Ventures Dan Warmenhoven – Former CEO, NetApp Headcount: 115 Open Positions: 33 U.S. based: 27 International: 6 Sales: 5 Other: 28
Competition: Cumulus Networks Gigamon Juniper Networks Total Funding: $119M Key Investors: Accton Technology CID Group Index Ventures Intel Capital Khosla Ventures MSD Capital LP Morgenthaler Ventures Redpoint Silver Lake Waterman TriplePoint Capital
Source: Company website, all revenues are CY-17
Cybersecurrity, Data Manaagement & Co
BITGLASS
Founded: 201Revenue: >$2 Company Su(CASB) solutioplatform allowdetect and reapplication. Products/Seracross multiplethreats, and wto unauthorizeprotocols on dabide by comp Key Officers:Rich CampagnAnurag Kahol Andrew UrushAnoop BhattacChris Chan – SMike SchurichDean Hickman Board of DireForest BasketAssociates Matthew HowVenture PartneScott Sandell Enterprise Ass Headcount: 1 Open PositioU.S. based: 11International: 1Sales: 6 Other: 6
omm Infrastruc
13 25M
ummary: Bitglaon to ensure s
ws enterprises espond to ma
rvices: Bitglase applications
wipe data from aed users or haata streaming
pliance policies
na – CEO – CTO
hima – SVP, Fincharjya – ChiefSVP, Engineert – VP, Producn-Smith – SVP
ectors: t – General Pa
ward – Managers (NVP) – Managing G
sociates
00
ns: 12 1 1
cture
www.bitg408.337
ass was foundsecurity while to protect cor
alicious activity
s’s real-time Cin the cloud, many compromisacks to safely between applic
s.
nance f Scientist ring ct Management, WW Field Op
artner, New En
ing Partner, N
General Partne
glass.com .0190
ded in 2013 toadopting any
rporate data ony, enforce po
CASB softwarmonitor outbounsed devices thrsecure user d
cations through
t perations
nterprise
Norwest
er, New
ComNetSMicrSky Tota KeyFutuNewNorwSing
Sourc
67Ca
o deliver its Ctype of cloud n both managlicies, and se
re allows entend data traffic, rough in-line dedata. Enterprish CASB, allow
mpetition: Skope rosoft
yHigh
al Funding: $8
y Investors: ure Fund w Enterprise Aswest Venture Pgtel Innov8
ce: Company web
75 Campbell Teampbell, CA 95
Cloud Access Sapp on any d
ged and unmaecure data wit
erprises to secalert the user tetection. CASB
ses can enforcing companies
80M
ssociates Partners (NVP)
bsite, all revenue
3
ech Parkway 5008
Security Brokedevice. Bitglassnaged devicesthin any SaaS
cure their datato any detected
B also respondce their securits to successfull
)
es are CY-17
1
er s’ s, S
a d s y y
32
BITSIGHT T
Founded: 201Revenue: $25 Company Sumfourth-party vperformance, credit score, Bsecure enterpdevelops scordsicover single Products/Serwhich generatproduces dailybased on extesingle points othe user. Lastvarious nation Key Officers:Tom Turner – Nagarjuna VenPhilip GladstoFrancisco FonEric Fischer – Stephen BoyeBrian Cohen –Dave Fachetti Board of DireDavid Aronoff Partners Venky GanesaMichael Duffy Brendan HannGlenn SolomoNagarjuna VenTom Turner – Shaun McConBoard, BitSighStephen Boye Headcount: 3 Open PositioU.S. based: 21International: 3Sales: 5 Other: 19
TECHNOLO
11 5M-$50M
mmary: BitSigvendors, as and assess ag
BitSight’s securprise. The secres for every e points of failu
rvices: BitSighte objective any security ratinernally observaof failure, identitly, BitSight offal government
CEO & Presidnna – CPO & Cne – Chief Arch
nseca – CEO ofSVP, Sales
er – CTO, Co-fo– CFO
– SVP, Strateg
ectors: – General Par
an – MD, Menlo– CEO, Barkly
nigan – Entrepeon – MP, GGV nna – CPO, BitCEO, BitSight
nnon – Execuht er – CTO, BitSig
300
ns: 24 1 3
Cy
OGIES
www.bits617.245
ht has an innovwell as und
ggregate risk writy ratings rangurity rating is company in e
ure and develop
t offers three dnd quantifiable gs through ana
able and non-inify fourth-party fers Sovereign organizations.
ent Co-founder hitect f AnubisNetwo
ounder
gic Partnership
rtner, Flybridge
o Ventures y eneur Capital tSight
utive Chairman
ght
ybersecurity, D
sighttech.com.0469
vative approacderwrite cyberwith objective age from 250-90established v
existence, withp sovereign se
distinct producmeasurement
alyzing existingntrusive data a
connections aSecurity Ratin
.
orks
ps
e Capital
n of the
ComDellMetLocRsa Tota KeyGGVMenFlybGlobLibeComSing Sourc
Data Managem
12Ca
ch to mitigate crinsurance poand actionable00, with a high
via observable only public d
ecurity ratings a
cts, highlighted ts of a compang security incid
and methods. Band generate dngs to determin
mpetition: l (RSA) tricStream kPath
am
al Funding: $9
y Investors: V Capital nlo Ventures bridge Capital Pbespan Capitaerty Global mmonwealth Cagtel Innov8
ce: Company web
ment & Comm
25 Cambridgepambridge, MA
cybersecurity risolicies, benche security ratingher score repre
data, meanindata. BitSight at the national l
by BitSight Seny’s security pdents and pracBitSight Discovynamic, actionne the cyberse
95M
Partners l Partners
apital Ventures
bsite, all revenue
m Infrastructure
park Dr., #204 02140
sk for third- andmark securirtgs. Similar to a
esenting a moreng that BitSighis also able tolevel.
ecurity Ratingsperformance. ctices which arever can uncovenable reports foecurity levels o
s
es are CY-17
e
d y a e
ht o
s, It e
er or of
Cybersecurrity, Data Manaagement & Co
CENTRIFY
Founded: 200Revenue: >$1 Company Sumsize and largemid-market. Cwith its platforcustomers to e Products/SerSuite, which iproduct that inaccess, lifecycshared passwaccess requescomprehensivaccess, passw Key Officers:Tom Kemp – CPaul Moore – Adam Au – CoTim Steinkopf Rhonda ShantGary Taggart –Bill Mann – SV Board of DireArthur PatterPartners Pete Solvik – MRobin Vasan –Mike Volpi – G Headcount: 3 Open PositioU.S. based: 23International: 0Sales: 10 Other: 13
omm Infrastruc
04 100M
mmary: Centrie enterprises. R
Centrify embracrm. Centrify seensure full prot
rvices: Centrifyncludes both ncludes single cle manageme
word managemst, and app pase platform, w
word managem
Co-founder & CCo-founder & C
o-founder & SV– CFO
tz – CMO – SVP, WW Sa
VP, Products &
ectors: rson – Foun
MD, Jackson S– Partner, Mayf
GP, Index Ventu
340
ns: 23 3 0
cture
www.cen669.444
ify offers IdentiRoughly 10%
ces the market rves four main
tection across a
y offers three pthe Identity ansign-on capab
ent and enterprment, adaptivessword manag
with an additioment, and auditi
CEO CTO
VP, Engineering
ales & CPO
ding Partner,
Square Venturefield Fund ures
ntrify.com .5200
ity and Accessof its businesstrend toward v
n enterprise ideall corners.
products ─ Idend Privilege Sbilities, adaptivrise mobility m
e MFA for endgement. The Seonal identity cng.
g
, Accel
es
ComCybForgMicrOktaPing Tota KeyAccFortIndeMayDocSamJack
Source: C
33Sa
s Management s is with SMBsvendor consolidentities: privileg
entity Service, ervices. The I
ve multi-factor management. T
dpoints, securerver Suite syn
consolidation,
mpetition: berArk geRock rosoft a g Identity
al Funding: $9
y Investors: cel Partners tinet ex Ventures yfield Fund como Capital Inmsung Venturekson Square V
Company website
300 Tannery Wanta Clara, CA
(IAM) solutionss, and 20-30%dation, which cged, workforce
Privilege Servdentity Serviceauthentication
The Privilege Sre remote accnthesizes both adaptive MFA
94M
nc. Investment Co
Ventures
e, all revenues a
3
Way 95054
s aimed at mid% is done in thecan be achievede, partners, and
ice, and Servee is a full-suite (MFA) for ap
Service includecess, privilegedproducts into a
A for privileged
orporation
are CY-17
3
d-e d d
er e p s d a d
34
CHECKMA
Founded: 200Revenue: $50 Company Sumapplications avapplication layeliminating thetransferred froextreme simplbeen growing Products/Seranalyzer that requires no chundreds of ksecure coverapatching multiits competitorstime to focus o Key Officers:Emmanuel BeMaty Siman – Alex RoichmaShmuel ArvatzMoshe LerneCorporate DevRafi Bhonker –Yael Ben ToviNir Livni – VP, Board of DireJohn True – GDavid (Dede) Mofet TechnolEmmanuel BeMaty Siman – Headcount: ~ Open PositioU.S. based: 1 International: 1Sales: 5 Other: 15
ARX
06 0M-$100M
mmary: With available, Checyer. Checkmare timely cost ofom one langualicity and easyrevenues in th
rvices: The Cxcovers 20 cod
configuration tknown code v
age. The “Bestple vulnerabilits, by reviewingon the real issu
enzaquen – CEFounder & CTn – Chief Softwz – CFO er – SVP, velopment – SVP, Global m – VP, Huma, Products
ectors: GP, Cultivation
Goldschmidt –logy Fund
enzaquen – CEFounder & CT
~400
ns: 20
19
Cy
www.che917.470
a growing markkmarx providerx allows devef fixing code aftage to another,y adoptability, e high-double d
xSAST platformding and scripto scan any lvulnerabilities, t Fix Location”ties at a single g only new coue of fixing vuln
O TO ware Architect
Product Strat
Sales an Resources
Capital – Former MP &
O, CheckmarxTO, Checkmarx
ybersecurity, D
eckmarx.com.9501
ket trend towares secure applielopers to identer it has alread, serving the nCheckmarx is digits.
m is Checkmarxting languagesanguage. CxSand ensures
” algorithm cut point. CxSAST
ode that has nonerabilities befo
tegy &
& CEO,
x x
ComHPVeraSyn TotaVen KeyInsigOfeSaleNaio
Source
Data Managem
140 EParam
rd securing theication testing ntify security isdy been writtenneeds of all de
the thought le
x’s flagship pros, the latest deSAST is able
compliance wts costs and timT has scanningot been previoore an applicat
mpetition:
acode noptics
al Funding: $nture Partners o
y Investors: ght Venture Par Hi-Tech esforce Ventureot Ventures
e: Company web
ment & Comm
E. Ridgewood Amus, NJ 07652
e increasingly land additionalssues while thn. The technoloevelopers. Witheader in the m
oduct, serving aevelopment tec
to comprehewith industry rme greatly by g capabilities 8
ously scanned,ion goes into p
$92M - Acquiron June 15, 20
artners
es
bsite, all revenue
m Infrastructure
Ave., Ste 4152
arge number ol security at thehey write codeogy can also beh the platform’
market, and ha
as a static codechnologies, andnsively identif
regulations anidentifying and
80% faster tha reducing sca
production.
red by Insight015
es are CY-17
e
of e
e, e s s
e d y d d n n
t
Cybersecurity, Data Management & Comm Infrastructure
35
CLOUDPASSAGE
Founded: 2009 Revenue: $25M-$50M
www.cloudpassage.com 800.838.4098
180 Townsend St., Third Floor San Francisco, CA 94107
Company Summary: CloudPassage’s Halo service provides fast and scalable security and compliance automation. The company offers solutions across public and private clouds, virtual machines, servers and containers. The Halo platform is able to support DevOps speed and scale up to massive cloud deployments. Its robust APIs are easy to integrate so end-users can customize policies for managing workloads. Products/Services: CloudPassage Halo is an on-premise and cloud solution comprised of three packages that can be purchased separately or in combination: Halo Protect, Halo Segment, Halo Detect. Halo Protect reduces the software attack surface of workloads by ensuring proper security configuration, discovering software vulnerabilities, and controlling administrative access. Halo Segment reduces the network attack surface through traffic discovery, host firewall orchestration, and multi-factor network authentication. Halo Detect alerts IT admins if any workloads have been compromised by monitoring whether important files have changed and important server log files. Recently, the company released Container Secure, which provides full lifecycle security and compliance across all container deployments. Key Officers: Robert Thomas – CEO Carson Sweet – Co-founder & CTO Vitaliy Geraymovych – Co-founder & SVP, Advanced Engineering David Appelbaum – CMO Bernard Batang – SVP, Operations Steve Shevick – CFO Sohail Perekh – EVP, Engineering Mark Stephenson – EVP, Sales Board of Directors: Kevin Harvey – Founder, Benchmark Capital Larry Link – Former SVP WW Sales, Palo Alto Networks Brian Melton – MD, Tenaya Capital Ravi Mhatre – Founder & MP, Lightspeed Venture Partners Jason Pressman – Investor, Shasta Ventures Carson Sweet – CTO, CloudPassage Robert Thomas – CEO, CloudPassage Headcount: ~140 Open Positions: 7 U.S. based: 7 International: 0 Sales: 0 Other: 7
Competition: Cisco Illumio vArmour VMware Total Funding: $115M Key Investors: Benchmark Capital Lightspeed Venture Partners Meritech Capital Musea Ventures Shasta Ventures Tenaya Capital
Source: Company website, all revenues are CY-17
36
CLOUDIAN
Founded: 201Revenue: $25 Company Susolve the issuplatform uses globally. Its Hytelecom compand surveillanc Products/Serto start small platform has uwithin the medAPI, enterprisdeveloped forappliance, a sfrom the AWS Key Officers:Michael Tso –Gary OgasawaJon Ash – VP,Jon Toor – CMHiroshi Ohta –Shinya Motoha Board of DireMichael Tso –Hiroshi Ohta –Johnathan EpsGregory BryanKen YasunagaEvan Powell – Headcount: 1 Open PositioU.S. based: 13International: 2Sales: 1 Other: 14
N
11 5M-$50M
mmary: Cloudue of the hypthe AWS S3 Ayperstore is theanies in the woce and security
rvices: Cloudiaand grow to h
use cases acrosdia and entertases are able tor S3 environmsoftware-only smarketplace.
Co-founder & ara – VP, Engi, WW Sales MO – Co-founder &ashi – COO, Ja
ectors: Co-founder &
– Co-founder &stein – Moneytnt – Intel a – Aqau Scien– CloudByte, In
10
ns: 15 3 2
Cy
www.clo650.227
dian provides aer-growth of u
API which has be leading prodorld, as well asy.
an HyperStore undreds of petss many vertic
ainment sector.o take advant
ments. Customsolution deploy
CEO neering
Japan Presideapan
CEO Japan Presidetree KK
nce Corporationc.
ybersecurity, D
oudian.com .2380
a highly scalabunstructured dbeen widely aduct in mobile m
s use cases in
utilizes a scaletabytes simply
cals, highlighted. By leveragingtage of a broa
mers can deployed on x86 se
ent
ent
n
ComCarDellIBMNetAScaSwif Tota KeyFideGoldInnoInte
Source: Co
Data Managem
17Sa
ble and affordadata. Cloudian’dopted and is famessaging platbiotech resear
e-out architectuy by adding stod by a recent wg the interoperaad set of storaoy Cloudian aervers, and me
mpetition: ingo l/EMC
M (Cleversafe) App
ality ftstack (RedHa
al Funding: $7
y Investors: elity Internationdman Sachs ovation Networl Capital
ompany website,
ment & Comm
77 Bovet Rd., San Mateo, CA 9
able object sto’s S3 native samiliar to softwtforms for somrch, media and
ure which enaborage nodes. Twin for a major ability of Cloudage features tas an integratetered-use sof
at)
79M
nal Limited
rk Corporation
all revenues are
m Infrastructure
Suite #450 94402
orage system tostorage service
ware developerme of the largesd entertainment
bles enterpriseThe HyperStoretelevision show
dian’s native Sthat have beeted on-premisftware procured
of Japan
e CY-17
e
o e s
st t,
s e w 3 n e d
Cybersecurity, Data Management & Comm Infrastructure
37
CLOUDFLARE
Founded: 2009 Revenue: >$100M
www.cloudflare.com 888.993.5273
101 Townsend Street San Francisco, CA 94107
Company Summary: Cloudflare provides a CDN service that protects websites from all manner of attacks, while simultaneously optimizing performance. The company connects more than 7 million sites over a network with 15 terabytes of capacity that spans 137 data centers in 58 countries. The company’s differentiated performance and security services have enabled Cloudflare to rapidly emerge as a key leader in the delivery of web content as it serves more traffic than Twitter, Amazon, Apple, Instagram, Bing, and Wikipedia combined. More specifically the company eliminates the need for customers to use 3rd party solutions, such as physical or virtual appliances, by providing its own value-added performance services which accelerate customer applications, enhance mobile content delivery and ensures application reliability. Similarly, Cloudflare’s security services organically provide protection against distributed denial of service (DDoS) attacks, prevents customer data breaches and blocks malicious bot abuse. The company serves customers ranging from the small enterprise to the Fortune 500 with notable customers including Cisco, Nasdaq and LogMeIn. Products/Services: Cloudflare offers a range of products to provide secure CDN capabilities. On the CDN side, it has a core CDN service, as well as web optimization, Argo smart routing for reducing internet latency, and Cloudflare Stream to combine video, encoding, global delivery, and player functions. Additionally, the company offers a range of security products to ensure safe delivery of its content. These products include distributed denial of service (DDoS) protection, rate limiting, web app firewall (WAF), SSL/TLS decryption, and an analytics platform on top of everything. Key Officers: Matthew Prince – CEO & Co-founder Lee Holloway – Lead Engineer & Co-founder Michelle Zatlyn – User Experience & Co-founder Thomas Seifert – CFO Board of Directors: Bryan Roberts – Partner, Venrock Carl Ledbetter – Managing Director, Pelion Venture Partners Matthew Prince – CEO, Cloudflare Michelle Zatlyn – Founder and Head of User Experience, Cloudflare Scott Sandell – Partner, New Enterprise Associates Headcount: 575 Open Positions: 121 U.S. based: 79 International: 42 Sales: 36 Other: 85
Competition: Akamai Technologies Amazon Web Services F5 Networks Imperva (Incapsula) Limelight Networks StackPath Total Funding: $182M Key Investors: Baidu Fidelity GV Greenspring Associates Microsoft Ventures New Enterprise Associates Pelion Venture Partners Qualcomm Ventures Union Square Ventures Venrock
Source: Company website, all revenues are CY-17
38
CODE42
Founded: 200Revenue: $50 Company Suhas evolved toyears, Code4enterprise maonly the last 3will exit the cendpoint backsecurity, compincreasing prepositioned to c Products/Serbacking up daand manage eand control. Wcase of a dispurposes of m Key Officers:Joe Payne – PTim Connor – Rick Orloff – CJohn Durant –Karen Pisha –Steve Buege –Ann Fellman –Mike Robbins Board of DirePing Li – GeneHarry Gruner Partner, JMI EMichael GormMike Stankey Joe Payne – PMatthew Dorn Headcount: > Open PositioU.S. Based: 3International: 0Sales: 3 Other: 28
01 0M-$100M
mmary: Origino become a br2 has significarket, protecting-4 years, the cconsumer busik-up for sevepliance, and moevalence of rancontinue growin
rvices: Code42ata to the cloudendpoint data
With the Code4aster and pro
meeting policy a
President & CECFO
CSO – CTO – Customer Suc– SVP/GM, Edu– Marketing SV– WW Sales S
ectors: eral Partner, Ac
– Founder &Equity an – MD, Split – Vice Chairm
President & CEquast – Co-fou
>400
ns: 31 1 0
Cy
www.cod844.333
nally an endporoader singularantly expandeg Mac, Windowompany deriveiness over the
eral use casesonitoring, protensomware as ang its enterpris
2’s core producd or on-premisvia a centraliz
42 platform, IT tecting data d
and compliance
EO
ccess SVP ucation & SMB
VP SVP
ccel Partners & Managing G
Rock Partnersan, Workday
EO, Code42 under, Code42
ybersecurity, D
de42.com .4242
oint backup cor security SaaS
ed its product ws, and Linux es the bulk of ite coming years, including decting more thaa top attack vese business.
ct, CrashPlan, e. CrashPlan o
zed managemeusers can ens
during migratioe, and impleme
B
General
s
ComHPEDellSymIBM Tota KeyAccJMI NewSpli
Source: Compa
Data Managem
100 WashMinneapol
ompany for coS platform for tofferings and OS. After ente
ts business frors. Code42 al
device migratioan 47,000 orgaector, we believ
allows enterproffers IT adminent console, sigsure business cons. IT adminsenting policies i
mpetition: E l/EMC
mantec M
al Funding: $1
y Investors: cel Partners
Equity w Enterprise Ast Rock Partner
any website, all r
ment & Comm
ington Ave. S.,lis, MN 55401
nsumers and the enterprise. driven its focering the enterm enterprise clows enterprison, endpoint anizations worlve Code42 is p
rises to protectnistrators the agnificantly incrcontinuity by re
s can also minin real time.
138M
ssociates rs
revenues are CY
m Infrastructure
, Ste. 2000
SMBs, Code42. In the last fewcus toward thrprise market iustomers and
ses to leveragebackup/restoredwide. With theparticularly we
t endpoint dataability to protecreasing visibilitestoring data ine data for the
Y-17
e
2 w e n it e e, e ll
a, ct y n e
Cybersecurrity, Data Manaagement & Co
COHESITY
Founded: 201Revenue: $50 Company Suhardware apptest/developmsolutions. Cohenterprises to We believe thcustomers to sprawl has ena Products/Serto data proteDataPlatform helps companaccelerate appline and out oSnapTree fearemote replica Key Officers:Mohit Aron – FPatrick RogeManagement Vineet AbrahaRob Salmon –Apurv Gupta –Seamus HennMark Parrinello Board of DireMohit Aron – FBill Coughran Gaurav Garg –Dan Warmenh Headcount: > Open PositioU.S. based: 46International: 2Sales: 25 Other: 41
omm Infrastruc
Y
13 0M-$100M
ummary: Cohepliance to conent, file sharehesity’s hypercbetter leverage
he company isleverage a faabled rapid gro
rvices: Cohesitection on its Duses a web sc
nies extend theplication develoof line, as weture. It comes
ation.
Founder & CEOers – VP M
am – Engineerin– COO – Chief Architecnessy – CFO o – Worldwide
ectors: Founder & CEO– Sequoia Cap– Wing Venturehoven – Forme
>300
ns: 66 6 20
cture
www.coh855.926
esity combinensolidate secoes, and analytconverged plae public cloudss well position
abric across prowth since ship
ty leverages aDataPlatformcale-out architeeir data to the opment. The s
ell as taking as with built-in
O Marketing &
ng U.S.
ct
Sales
O, Cohesity pital es r CEO, NetApp
hesity.com .4374
es a web-scaleondary storageytics, eliminatintform significa
s, such as AWSned to benefit rivate and pubpping the comp
a hyperconvergproduct. Sittinecture to consopublic cloud, g
storage fabric uan unlimited nu
integrations w
Product
p
ComComDellNetARubVeeVeri Tota KeyAccArtisBattDHVQuaSeqTrinWin
Source: Comp
30Sa
e distributed e environmentng the secondantly simplifiesS, for archival,
from hybrid cblic clouds. Thpany’s first prod
ged product to ng on top of olidate second
gain insight anduses deduplicaumber of snap
with the public
mpetition: mmvault l/EMC App
brik eam itas
al Funding: $1
y Investors: cel Partners s Ventures tery Ventures VC alcomm Venturquoia Capital nity Ventures ng Venture Cap
pany website, all
00 Park Avenuean Jose, CA 95
file system wts, such as ddary storage s data protectiotiering, and discloud adoptionhe growth of sduct in 2015.
deliver a simphyperconverg
dary data and wd visibility into
ation and comppshots and clocloud, with th
160M
res
pital
ll revenues are C
3
e, Suite #800 5110
with a standarddata protectionsilos of legacon, and allowsaster recoveryn as it enablesecondary dat
plified approacged nodes, theworkflows. Thidark data, and
pression both iones using thehe ability to do
CY-17
9
d n, y s y. s a
h e s d n e o
40
CORE SEC
Founded: 199Revenue: $50 Company Sucomprehensivmanagement (insight and reeliminate thresignificantly exwith prioritizedtheir security decisions. TheMost recently IAM, and threcontrol. Products/Serdetection, andcalled the Actcustomers careporting. Thisthe user accetake a more co Key Officers:Jeff Kukowski Chris Sullivan Rohit Khana –Jeff Nolan – CKeith Graham Nick Mansour Stephen Newm Board of DireNot Listed Headcount: 2 Open PositioU.S. based: 19International: 1Sales: 11 Other: 22
CURITY
96 0M-$100M
ummary: Coree platform of s(IAM), vulnerabesponse. Coreats, while maixtended its add infrastructure
posture, ande company’s bit announced a
eat manageme
rvices: Core Sd actionable instionable Insigh
an automate ms cuts remediaess and infrastromprehensive
– CEO – CISO
– SVP, CustomCMO
– CTO – CRO
man – VP, Prod
ectors:
215
ns: 33 9 14
Cy
www.core678.304.4
e Security hassecurity functiobility managem Security offeintaining contin
dvanced netwoe vulnerabilities gain context
business is coma merger with Sent leading cap
Security’s offersight and resp
ht Platform. Bymanual procesation time, reduructure vulneraand predictive
er Success
duct Managem
ybersecurity, D
esecurity.com 4500
s consolidatedonality. The co
ment (VM), netwrs threat-awarnuous complia
ork security cas, organizationt and intelligemprised of 45%SecureAuth Copabilities with
rings are brokeponse, all of why sharing intelsses using couces risk, and ability perspecapproach to sa
ment
ComCybFireRedSkyRisk TotaCou KeyCou
Source: C
Data Managem
1000 HolcoRoswell, GA
d several secuompany has offwork detection re technology ance. Core’s 2apabilities. By ns generate a ence to make% IAM and 55%orp., which will SecureAuth le
en into four chich are manaligence across
onsistent data,ultimately sec
ctives. Core Seafeguarding cr
mpetition: berArk eEye dSeal ybox kIQ
al Funding: Acurion Corporatio
y Investors: urian Corporatio
Company websit
ment & Comm
omb Woods PkwA 30076
urity acquisitionferings in idenand response,to help identif
2016 acquisitiocombining reamore compreh better secur% VM and netcombine Core
eadership in a
categories: IAMaged by a cents various secu, prioritization
cures critical asecurity enablesritical data and
cquired by on, December
on
te, all revenues a
m Infrastructure
wy, Ste. 401
ns to create tity and acces and actionablfy, secure, andon of Damballaal-time analytichensive view oity remediatiotwork detectione Security’s VMadaptive acces
M, VM, networtralized consoleurity disciplines
methods, andssets from bots enterprises toassets.
2015
are CY-17
e
a s e d a s
of n
n. M,
s
k e s, d h o
Cybersecurrity, Data Manaagement & Co
COUNTERT
Founded: 200Revenue: $25 Company Suactionable inteand remediatefocus to a platwith MSSPs. allows the comthe security m Products/Serhelps security as attacks udifferentiates ithan taking snPRO is a mem Key Officers:Neal CreightonJim Harrison –Michael Davis Raj DodhiawaMike DeskewieMatt AddingtoWilliam Ronca Board of DireWilliam J. FalloNeil CreightonPaul L. CirielloJeff Karras – MJack Kerrigan Headcount: 8 Open PositioU.S. based: 6 International: 0Sales: 0 Other: 6
omm Infrastruc
TACK
07 5M-$50M
ummary: Couelligence into ee attacks that btform approachCounterTack’s
mpany to offer arket that we b
rvices: Counteteams unders
unfold, bringinitself from comapshots at a p
mory forensics t
n – CEO – CFO
– CTO la – CPO es – VP, NA Sn – EVP Feder
a – VP, Internat
ectors: on – Retired A
n – CEO, Counto – Managing GMD, Singtel Inn– MD, Razor’s
85
ns: 6
0
cture
www.cou855.893
unterTack provendpoint attackbreach the endph. CounterTacks 2015 acquisincreased scal
believe differen
erTack’s flagshstand what behg real-time,
mpetitors by pepoint in time, astool, and the Th
ales and Chanral Business tional Sales
dmiral terTack
GP, Fairhaven nov8 s Edge Venture
untertack.com.5428
vides organizaks so users capoint. The comk has a lean hesition of ManTability and in-m
ntiates the com
hip product, thhaviors are occforensic-level
ersistently colles well as coverhreatScan PRO
nnels
Capital
es
ComCarCrowCyb Tota KeyAlcaFairGoldMitsNexOnPRazSingTen
Source: Compa
10W
ations with aan prevent kno
mpany’s strategeadcount, augmTech Cyber Smemory threat pany’s solution
he CounterTaccurring on work
data directlyecting endpointrtly running on O is a subscrip
mpetition: bon Black wdStrike
bereason
al Funding: $9
y Investors: atel-Lucent rhaven Capital dman Sachs sui Global Invesxt47 Point Technolozor's Edge Vengtel Innov8 nEleven Ventur
any website, all r
00 Fifth Ave., FWaltham, MA 02
ttack context,own attacks asgy has evolvedmented by stroolutions Internanalysis – a un
n.
ck Endpoint Tkstation and se
y to the endt data through the endpoint. T
ption-based end
92M
Partners
stment
gies tures
res
revenues are CY
4
First Floor 2451
visibility, ands well as detecfrom a big datang partnership
national (MCSInique service i
Threat Platformerver endpointpoint. Sentinesensors rathe
The Respondedpoint scanner
Y-17
1
d ct a s I) n
m, s el er er .
42
CROWDST
Founded: 201Revenue: >$1 Company Suwas founded advanced anintelligence to across more thprotection, detintelligence froincident respoincluding the The company’and 3 of the 10 Products/Serlightweight agresponse (EDRefficiency, andSearch Engineengine for orga
Key Officers:George Kurtz –Shawn Henry Dmitri AlperovBurt Podbere –Colin Black – CJohanna FlowAmol Kulkarni Board of DireGerhard WatzGeorge Kurtz –Denis O’LearyCary Davis – MSameer GandJoseph Landy Joe Sexton – RGodfrey Sulliv Headcount: 7 Open PositioU.S. based: 56International: 9Sales: 20 Other: 47
TRIKE
11 100M
mmary: Crowdin 2011 with
alytics. Todayanalyze and c
han 170 countrtection and remom the companonse services attack on the ’s broader cus0 largest comp
rvices: CrowdSgent on the eR), managed thd scalability, ae, which companizations to id
– Co-founder, – President of
vitch – Co-found– CFO COO er – CMO – SVP, Engine
ectors: inger – Former– President & C
y – MP, EncoreMD, Warburg Phi – Partner, A– Co-CEO, W
Retired Presidean – Chairman
700
ns: 67 6 9
Cy
www.cro855.461
dStrike pioneea vision for e
y the compancorrelate over 7ries. CrowdStrimediation as wny’s machine le
team that haDemocratic N
stomer base inpanies by reven
Strike Falcon isendpoint to dehreat hungtingall in a single piles all collectedentify malware
President, & CServices & CSder & CTO
eering
r CSO, McAfeeCEO, CrowdSt
e Financial PartPincus Accel PartnersWarburg Pincus
ent, AppDynamn, Splunk
ybersecurity, D
owdstrike.com.9795
ered the next gend-point secuny uses soph78 billion eventke has develop
well threat huntiearning. Crowds successfully
National Commncludes 5 of thnue worldwide.
s a cloud-deliveeliver next-gen, and threat ilteintegrated so
ed threat data e more easily,
CEO SO
e trike tners
mics
ComEMCBit 9FireInteSymPaloTan Tota KeyAccGooRacWar
Source: C
Data Managem
15440 LIrvine, C
eneration end-urity that levehisticated macts per day fromped a comprehng all of whichdStrike has alsy researched s
mittee during the 10 largest fi
ered endpoint pneration antivielligence. Falcoolution. CrowdS
by the agent allowing them
mpetition: C/RSA 9
eEye/Mandiant l/McAfee
mantec o Alto Networksnium
al Funding: $2
y Investors: cel Partners ogle Capital ckspace rburg Pincus
Company website
ment & Comm
Laguna CanyonCA 92618
-point security eraged cloud tchine learning
m millions of sehensive platformh leverage diffeso developed aseveral high-phe 2016 presidinancial institut
protection prodirus, endpoint on provides proStrike also offinto a compreto stay ahead o
s (Cyvera)
281M
e, all revenues a
m Infrastructure
n Rd., Ste 250
market when technology ang and artificiaensors deployedm that perform
erentiated threa market leading
profile breachedential electiontions worldwide
duct that uses adetection and
otection, speedfers the Falcohensive searcof attackers.
re CY-17
e
it d al d s
at g s
n. e
a d
d, n h
Cybersecurity, Data Management & Comm Infrastructure
43
CUMULUS NETWORKS
Founded: 2010 Revenue: $25M-$50M
www.cumulusnetworks.com 650.383.6700
185 E. Dana Street Mountain View, CA 94041
Company Summary: Cumulus Networks is a developer of Linux operating system software that runs on top of industry standard networking hardware that is used in web-scale data centers. The company is enabling data center networks to benefit from the same economics and innovation that Linux enabled in the server industry. The architecture has been adopted by many hyper-scale service providers but has not been economical for traditional enterprise organizations. Notalby, the architecture provides significant operational benefits such as network automation and Cumulus is developing software applications that will run on its switches, such as telemetry. Cumulus is deployed on over one million switch ports across a global network of more than 800 customers, including one-third of the Global 50. Dell is a strong partner, providing integrated switching hardware to 175 customers and taking the platform to market globally. Cumulus’s largest vertical market is telecom service providers and other verticals include healthcare, financial services, and SaaS providers. Products/Services: Cumulus Linux is an open network operating system that allows customers to automate, customize, and scale using web-scale principles. It is a flexible open network operating system that sits on top of bare metal switches. NetQ is a telemetry-based fabric validation system that ensures proper network behavior, allows for web-scale operations, and seamlessly integrates with Cumulus Linux for a closed loop solution. Its most recent product, Cumulus Express is a turnkey solution to put the Cumulus Linux OS on network to allow for web-scale networking. Key Officers: Josh Leslie – CEO JR Rivers – Co-founder & CTO Ami Bandani – VP, Marketing Andrew Harding – VP, Products Jim McNicholas – CFO Dinesh Dutt – Chief Scientist Shrijeet Mukherjee – VP, Engineering Ron DiBiase – VP, Sales Sandy Palicio – VP, HR Board of Directors: Josh Leslie – CEO, Cumulus Networks JR Rivers – Co-founder & CTO, Cumulus Networks Nolan Leake – Co-founder, Cumulus Networks Peter Levine – GP, Andreessen Horowitz Scott Tobin – GP, Battery Ventures Alex Benik – Partner, Battery Ventures Bill Coughran – Partner, Sequoia Capital Lisa Edgar – MD, Top Tier Partners Headcount: 130 Open Positions: 8 U.S. based: 8 International: 0 Sales: 1 Other: 7
Competition: Arista Networks Cisco Juniper Networks Total Funding: $129M Key Investors: Andreessen Horowitz Battery Ventures Sequoia Capital SV Angel Top Tier Capital Partners Wing Venture Capital Telstra Ventures
Source: Company website, all revenues are CY-17
Cybersecurity, Data Management & Comm Infrastructure
44
CYBERA
Founded: 2001 Revenue: $25M-$50M
www.cybera.com 866.429.2372
9009 Carothers Parkway, Suite C5 Franklin, Tennessee 37067
Company Summary: Cybera offers an SD-WAN solution that is differentiated by its ability to deliver applications and services to remote sites. The company offers devices that connect to Cyber’s cloud and can be managed by Cybera or by the customer. Applications provided include firewall, antivirus, and user provisioning. The platform is designed to enable customers to operate their own applications on the network. Cybera secures enterprise-grade network applications and services accessible to all distributed locations - large or small. No matter how many sites a customer may have, implementing the company’s solution is faster, easier and costs less than conventional WANs. Cybera expanded to edge operations for business continuity so applications and connected devices do not have to be limited to basic business and can include IoT devices, surveillance, guest services as well as a wide variety of third-party applications. Products/Services: Cybera’s SD-WAN operates as a secure application network overlay that consolidates multiple network functions over any new or existing network connection. Cybera utilizes a customer premise device (CPE) at the customer site, which then connects to its points of presence (POPs) deployed across the globe, with the entire solution being managed remotely in the Cybera cloud. The SD-WAN operates as a secure applications network overlay that allows customers to consolidate multiple network functions over a low-cost broadband connection. This lowers network complexity and costs and significantly reduces the number of network devices and connections needed at each site. Key Officers: Andrew Lev – CEO Cliff Duffey – President & Founder Jon Howard – CFO Kristen Hudson – VP, Business Process and PMO Jeff Manning – EVP, Worldwide Sales Ron Robinson – SVP, Sales Jayesh Patel – SVP, Business Development Board of Directors: Andrew Lev – CEO, Cybera Cliff Duffey – President & Founder, Cybera Paul Mercadante – MD & Co-founder, Sumeru Equity Partners Ajay Shah – Senior Operating Partner, Sumeru Equity Partners Sanjeet Mitra – MD & Co-founder, Sumeru Equity Partners Ellen Carnahan – Principal, Machrie Enterprises George H. Spencer – Consultant, Adams Street Partners Headcount: 130 Open Positions: 10 U.S. based: 10 International: 0 Sales: 1 Other: 9
Competition: Cisco Cloudgenix Juniper VeloCloud Viptela Total Funding: $38M Key Investors: Adams Street Partners Chrysalis Ventures Claritas Capital Sumeru Equity Partners
Source: Company website, all revenues are CY-17
Cybersecurrity, Data Manaagement & Co
CYBEREAS
Founded: 200Revenue: $25 Company Suuses endpointcapabilities, Ca single maliciThe companyinformation to struggle with d Products/Sersensors. Sensproductivity. Tcan be deployCybereason Hcontinuously gHunting Enginmalware and scope of the Engine. It intemalicious tools Key Officers:Lior Div – CEOYossi Naar – CYonatan StriemMike Volpe – CSam Curry – CIsrael Barak – Andy Byron – Scott Ward – CShai Horovitz –Emmy Linder – Board of DireNot Listed Headcount: 3 Open PositioU.S. based: 13International: 1Sales: 1 Other: 22
omm Infrastruc
SON
06 5M-$50M
mmary: Cybet data and mac
Cybereason is aious operation,’s platform findreveal an ent
detecting a thre
rvices: Cyberesors on every
The company’s yed in as little
Hunting Enginegrows strongerne recognizes blateral movemattack. The c
errogates everys and tactics.
O & Co-foundeCVO & Co-founm-Amit – CTO CMO Chief Security O
CISO Chief RevenueCFO – CEO Cybere– Global Head
ectors:
300
ns: 23 3 10
cture
www.cyb855.695
ereason offers chine learningable to correlat providing enteds a single coire campaign a
eat and quickly
ason defends endpoint silenttechnology sta
e as 24 hourse. It rememberr, smarter, andbehaviors that ent. It connectustom-built in-y endpoint by
r nder & Co-founder
Officer
e Officer
eason Japan of Operations
bereason.com.8200
a real-time atto detect and
te multiple relaerprises the coomponent of anand shut it dowbuilding a com
complex IT systly monitor thearts hunting ims. All data fromrs, relates, andd more effectiveven the mos
ts seemingly u-memory grapasking 8 milli
ComCrowCylaInteSenSymTan Tota KeyCRVLocSoftSpa
Source: Co
20Bo
ttack detectionremediate thre
ated activities antext necessarn attack and cwn. Even the
mplete attack st
stems with a se entire environ
mmediately; no m the sensorsd connects pave. Using mac
st sophisticatedunrelated or beh is the heartion questions
mpetition: wdStrike ance l/McAfee
ntinelOne mantec nium
al Funding: $1
y Investors: V kheed Martin tBank
ark Capital
mpany website,
00 Clarendon Soston, MA 0211
n and responseats. Because across the attary to remediateconnects it to most talented tory.
simple deploymnment without rule-writing is
s is constantly ast and presenchine learning d AV cannot, inenign events tot of the Cyberper second, 2
189M
all revenues are
4
Street 16
se platform thaof its detectiock lifecycle into
e with precisionother pieces oanalysts would
ment of endpoinimpacting userequired. And relayed to th
nt activities andalgorithms, the
ncluding fileleso reveal the fureason Hunting24/7 to uncove
e CY-17
5
at n o
n. of d
nt er it e d e s ll g
er
Cybersecurity, Data Management & Comm Infrastructure
46
CYLANCE
Founded: 2012 Revenue: >$100M
www.cylance.com 88-802-9358
18201 Von Karman Ave., Suite #700 Irvine, CA 92612
Company Summary: Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. The technology is deployed on over ten million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions. The company is certified to replace traditional anti-virus solutions provided by larger players, such as Symantec and McAfee. After shipping product for just over three years, Cylance has garnered over 3,800 customers, and in 2017 revenue grew 177%. Products/Services: CylancePROTECT is 100% predictive and prevents cyberattacks from being successful by providing a proactive security posture with higher efficacy than traditional antivirus. CylancePROTECT leverages artificial intelligence, algorithmic science, and machine learning to provide seamless and silent pre-execution attack prevention that is 99.9% effective with zero reliance on signatures, the cloud, or reputation lookups. Lightweight agent uses only 1-3% of PC processing power - 10 times fewer system resources than traditional endpoint security solutions - to provide superior, preventive protection. Key Officers: Stuart McClure – Founder & CEO Ryan Permeh – Founder & Chief Scientist Rahul Kashyap – Global CTO Daniel Doimo – President & COO Brian Robins – CFO Malcom Harkins – Chief Security and Trust Officer Vina Leite – Chief People Officer John Giacomini – EVP, Global Sales, Operations Shaun Walsh – SVP, Marketing Christopher Bray – SVP/GM Consumer Board of Directors: Alex Doll – Founder & Managing Partner, TenEleven Ventures Patrick Heim – CISO & Operating Partner, ClearSky Security Fund Mark Bailey – Co-founder & MD, DFJ Growth Brian Contos – CISO & VP Security Strategy, Verodin Headcount: 800 Open Positions: 72 U.S. based: 63 International: 9 Sales: 28 Other: 44
Competition: CrowdStrike Intel/McAfee Invincea Palo Alto Networks Cisco Symantec Tanium Cybereason Carbon Black Total Funding: $177M Key Investors: Blackstone Capital One DFJ Draper Nexus Founders Equity Partners Khosla Ventures KKR TenEleven Ventures
Source: Company website, all revenues are CY-17
Cybersecurrity, Data Manaagement & Co
DATERA
Founded: 201Revenue: <$2 Company Suimproves perfElastic Data Farrays, and opWith Datera, sstorage that applications anmake changesluminaries And Products/Serpremise clouddelivers elasticunprecedentedmanagement performance a Key Officers:Marc FleischmNic Bellinger –Flavio SantoniEric Soli – CFOAshok RajagManagement Claudio FleineMitch Seigle –Bill Rozas – HBill Borsari – H Board of DireBrian Byun – PDong-Su Kim –Eric Wolford –Marc FleischmNic Bellinger – Headcount: 1 Open PositioU.S. based: 2 International: 0Sales: 0 Other: 2
omm Infrastruc
13 25M
mmary: Daterformance and Fabric is softwperational agilitscale-out stora
adapts to dnd network infrs based on busdy Bechtolshei
rvices: Datera s, for enterprisc block storaged scale-out csolution uniqu
at web-scale ec
mann –Co-foun– Co-founder &i – Chief RevenO gopalan –
er – Co-founder– Chief Marketin
ead of EngineeHead of System
ectors: Partner, Khosla– VP, Samsun
– Partner, Accemann – Co-foun– Co-founder &
00
ns: 2
0
cture
www.dat650.384
ra offers an indecreases la
ware that enablty of hyperscaleage vendors ardynamic businrastructure servsiness requiremm (co-founder
Elastic Data Fses running bote for enterprisecapability to huely built for conomics and o
der & CEO & CTO nue Officer
Head of
r & Architect ng Officer ering
ms Engineering
a Ventures g Ventures l Partners
nder & CEO, D& CTO, Datera
tera.io/ .6366
novative data atency relative les users to lee cloud infrastrre provided caness demandsrvices in the daments. Datera of Arista) and
Fabric is a simth legacy and nes and service handle today’son-premise c
operations.
Product
g
atera
ComDellNetASca Tota KeyAndKhoSamPrad
Sour
2811 MisSanta Cl
management to traditional
everage the hiructures runnin
apacity manages. The compatacenter and his funded by toPradeep Sindh
mple, scalable bnew applicationproviders in a s digital workclouds that de
mpetition: l/EMC App
ality
al Funding: $4
y Investors: dy Bechtolsheimosla Ventures msung Venturedeep Sindhu
rce: Company we
ssion College Bara, CA 95054
architecture th storage platfgh performancng on commodement tools to pany’s platformhas the ability top-tier VCs as whu (co-founder
block storage ns. Datera Elassingle softwarekloads, it is elivers enterpr
40M
m
s
ebsite, all revenu
4
Blvd., 4th Floor4
hat dramaticallforms. Datera’ce of traditionadity x86 servers
enable flexiblem understandto automaticallwell as industrof Juniper).
solution for onstic Data Fabrie platform. Witthe only dat
rise applicatio
ues are CY-17
7
r
y s al s. e s y y
n-c h a n
48
DIGITAL G
Founded: 200Revenue: $50 Company Suincludes data Originally a DLits strategy to only platform consolidation p Products/Servisibility and wcompatible witGuardian platfThe platform’sfunctionality fois controlled bpolicies, alerts Key Officers:Ken Levine – PSteve BuonauDouglas BaileyConstance StaDave Karp – CDavid McKeouTom Hamilton Mark Stevens Board of DirePaul Ciriello –Partners Hugh WarrenCoolidge Anandh Hari –David Stienes Thomas NaugDirector, CenSchool of Bus Headcount: 4 Open PositioU.S. based: 3 International: 9Sales: 2 Other: 10
UARDIAN
03 0M-$100M
ummary: Digitloss preventi
LP-focused vendeliver a broadthat encompaspoint of agent f
rvices: Digital widening the th many operaform uses real-s functions inor endpoint, neby a web-baseds, and reports.
President & CEito – CFO y – Chief Strateack – CMO Chief Product Ough – EVP, Glo
– SVP, Engine– SVP, Global
ectors: – Managing G
n – Trustee,
– MD, GE Asse– Partner, LLR
ghton – Profeter for PE/Eniness
445
ns: 12
9
Cy
www.dig781.788
tal Guardian oon (DLP) andndor targeting der platform thasses best-in-clfunctionality.
Guardian’s aaperture to inating systems, -time analytics clude Data V
etwork, cloud ad management
EO
egy Officer
Officer obal Field Opseering l Services
GP, Fairhaven
Loring, Wo
et ManagementR Partners essor and Exntrepreneurship
ybersecurity, D
gitalguardian.co.8180
offers a compd endpoint detthe high end oat applies to a lass DLP and
agent is deplonclude system- including Winto defend sen
Visibility and Cand discovery, t console whic
Capital
olcott &
t
xecutive p, Tuck
ComForcInteSym Tota KeyBrooFairGenLLRMasNexSpeToro
Sourc
Data Managem
om 86W
prehensive dattection and reof the market, Dwider range ofEDR, Digital
oyed at the ke-level data to ndows, Linux, sitive data from
Control, Advanand several adh enables cust
mpetition: cepoint l/McAfee
mantec
al Funding: $1
y Investors: okline Venture rhaven Capital neral Electric PR Partners ssMutual xt47 ecial Situations onto Dominion
ce: Company web
ment & Comm
60 Winter StreeWaltham, MA 02
ta protection esponse (EDRDigital Guardiaf customers. BGuardian hope
ernel level, endetect malwa
Mac, and Virtum insider and onced Threat Pdd-on modulestomers to crea
138M
Partners Partners
Pension Trust
Funds Bank Group
bsite, all revenue
m Infrastructure
et, Suite 3 2451
platform whicR) technologiesan has morphedBy providing thees to provide a
nabling deepeare. It is highlual. The Digitaoutsider threatsProtection, DLPs. The platformate and manage
es are CY-17
e
h s. d e a
er y
al s. P m e
Cybersecurrity, Data Manaagement & Co
DOME9 SE
Founded: 201Revenue: <$2 Company Supublic cloud. vulnerabilities,provides autom Products/Sercompliance, aAzure. The plafor a completeto visualize thbest security p Key Officers:Zohar Alon – CRoy Feintuch –Tamir PokornyEyal Fingold –Suda SrinivasaJim Sortino – V Board of DireAvery More – Dan Avida – FRoy Feintuch –Andy SchwabeZohar Alon – C Headcount: ~ Open PositioU.S. based: 4 International: 7Sales: 1 Other: 10
omm Infrastruc
ECURITY
10 25M
ummary: DomeThe compan
, secures remomated security
rvice: The Domnd governanceatform provide
e suite of tools eir security too
practices in the
CEO & Co-foun– CTO & Co-foy – CFO – VP, R&D an – VP, MarkeVP, WW Sales
ectors: Venture Partne
Former CEO, E– CTO, Dome9echer – VP BuCEO, Dome9
~50
ns: 11
7
cture
www.dom877.959
e9 Security is y’s security p
ote access, andthat offers visi
me9 Arc is a coe for businesses network secfor effective seols, detect and cloud.
nder ounder
eting & Alliances
er, Menlo Ventlectronics for Im9 s Dev, Softban
me9.com .6889
the leading cplatform created centralizes pobility into the p
omprehensive es in the publiccurity, advanceecurity in the pd deter risks a
es
ures maging
nk
ComvArmTwisClou Tota KeyJALLazaOpuORRPinnSoft
Source:
70Mo
cloud security es a strong olicy managempublic cloud and
SaaS platformc cloud, whethed IAM protecti
public cloud. Thnd threats, an
mpetition: mour Networksstlock udPassage
al Funding: $2
y Investors: L Ventures arus Israel Oppus Capital R Partners nacle tBank
: Company webs
01 Villa Streetountain View, C
management wall that prev
ment for the entd across all bra
m that offers viser the customeon, and a comhe platform allod meet compli
s
29M
portunities Fun
site, all revenues
4
CA 94041
service for thevents zero-daterprise. Domeanches.
sibility, securityer uses AWS ompliance engineows businesseiance using the
nd
s are CY-17
9
e y 9
y, or e s e
Cybersecurity, Data Management & Comm Infrastructure
50
DUO SECURITY
Founded: 2010 Revenue: >$100M
www.duo.com 866.760.4247
123 N. Ashley St., Suite 200 Ann Arbor, MI 48104
Company Summary: Duo Security provides cloud-based, trusted access including two-factor authentication for companies of all sizes. Duo’s authentication solution is differentiated by its ease of use, with most customers getting the service up and running in one day. The company is benefiting from explosive growth in demand for securing user identities, as attackers are increasingly targeting individuals. Roughly half of its business comes from displacing legacy solutions, but Duo is also expanding its market with new users. Notably, Duo makes authentication more viable for mid-market users, a segment of the market that is increasingly attacked by cyber threats. Duo is experiencing explosive growth as it has achieved triple digit growth in the past several years. Products/Services: Duo Security offers a comprehensive security solution that uses two-factor authentication to confirm the identity of the user and the health of their device before they connect to an on-premise or cloud-based application. The platform also enables the user to enforce stricter use and access policies, allowing customers to tailor it to their specific environment. For trustworthy devices, Duo uses Endpoint Remediation to allow the user to block any malicious devices from accessing data through application deployment. It can also be used to require users to update their software to ensure the utmost protection.
Key Officers: Dug Song – CEO & Co-founder Jon Oberheide – CTO & Co-founder Raffaele Mautone – CIO Syndey Carey – CFO Paul DiMarzo – EVP, Corporate Development Lisa Paul – VP, Customer Success Jim Cyb – SVP, Worldwide Sales Jeff Wiss – VP, Corporate Marketing Board of Directors: Not Listed Headcount: 600 Open Positions: 88 U.S. based: 84 International: 4 Sales: 35 Other: 53
Competition: EMC/RSA Symantec Intel CA Vasco Okta Total Funding: $119M Key Investors: Radar Partners True Ventures Benchmark Google Ventures Redpoint Ventures
Source: Company website, all revenues are CY-17
Cybersecurrity, Data Manaagement & Co
EERO
Founded: 201Revenue: NL
Company Sumdeliver powerfoffs. eero alloexperience. Alneed to be plueasy setup an Products/Sersoftware and eero is the mconnectivity. Inetwork in thevisibility into thothers. The ee Key Officers:Nick Weaver –Nate HardisonAmos SchallicOlivier Adler – Board of DireNot Listed Headcount: 1 Open PositioU.S. based: 27International: 0Sales: 3 Other: 24
omm Infrastruc
15
mmary: eero pful mesh WiFi aows the user all that is needeugged into anyd simple use.
rvices: eero ppatches vulne
main router, wht intelligently o user’s specifiche network, chero box is highl
– Co-founder &n – Co-founderch – Co-founde– Head of Finan
ectors:
45
ns: 27 7 0
cture
www.eer415.738
provides a comacross a large
as many accesed for setup is outlet. The us
provides an erabilities, provi
hile eero Beacoptimizes the c environment. eck device usay integratable w
& CEO
r nce
ro.com .7972
mprehensive horange, enablin
ss points as nto plug the eer
ser can have fa
ntire home neiding the user
cons can be phome over tim eero has an aage, examine awith other IoT
ComNetgLumNesGooSon Tota KeyFirsIndeMenPlayRedSha
Source
50Sa
ome WiFi systeng fast interneteeded, providiro into a modeast, reliable Wi
etwork that authe best WiFi
laced around me, ensuring tapp equivalent,and fix networdevices, includ
mpetition: gear
ma st ogle nos
al Funding: $9
y Investors: t Round
ex Ventures nlo Ventures yground Globadpoint Venturesasta Ventures
e: Company web
00 Howard St.,an Francisco, C
em and router t speeds and eing a truly cus
em; eero BeacoiFi in a matter
utomatically u capabilities athe home for he fastest and which allows tk issues, and s
ding the Amazo
90M
l s
bsite, all revenues
5
#900 CA 94105
replacement toeliminating drostomizable WiFons then simplof minutes wit
pdates to newnd security. Aadditional WiF
d most resilienthe user to gaishare WiFi witon Echo.
s are CY-17
1
o p Fi y h
w n
Fi nt n h
52
ENDGAME
Founded: 200Revenue: $25 Company Sudetects and rcloud platformdetecting attachuman interveOriginally creaEndgame has Products/Sermachine-learninformation wicloud platformEDR, and expEndgame’s Aeliminate zerEndgame Malthe execution Key Officers:Nathaniel FickMark Snell – CJamie Butler –Tony Meehan Donald SaelinJon Brody – SJoann O’Conn Board of DireChris Darby – David Cowan –Arun Gupta – Lt. General KeThomas NoonTechOperatorsTed Schlein – Headcount: 1 Open PositioU.S. based: 17International: 0Sales: 9 Other: 8
08 5M-$50M
ummary: Endgremediates cyb
m to perform recks, Endgame
ention, whereasated with a focexpanded into
rvices: Througning, threat intith its stealthy
m for analysis. ploit preventio
AI-powered charo-day exploitwareScore, ceof known and u
k – CEO CFO – CTO
– VP, Engineeger – SVP & GVP, Marketing
nell – SVP, Stra
ectors: President/CEO– Partner, BesPartner, Colum
enneth Minihanan – Foundings GP, Kleiner Pe
25
ns: 17 7 0
Cy
www.end844.357
game delivers ber-attacks. Theal-time detect
offers customs competitors tus on the U.S.
o the enterprise
gh its cloud-batelligence, and
y and lightweigDelivered as an agents, Endatbot, Artemists. Machine ertified by SE Lunknown malw
ering General Counse
ategy & Ops
O, In-Q-Tel semer
mbia Capital n – MD, Palading Partner,
erkins
ybersecurity, D
dgame.com .7047
a cloud-basehe company ltion in a secur
mers the abilitytypically place . Intelligence C
e space in the l
ased platform, d real-time deght endpoint sa single agentdgame stops as, automates learning-powe
Labs and AV-Cware with 99.5%
el
n
ComCrowCybTanCarCyla Tota KeyBesColuEdgKleiPalaTecTop
Sou
Data Managem
31Ar
ed endpoint seeverages its mre and isolated
to automaticathe burden of
Community andast couple yea
Endgame deetection and r
sensors, and fet, replacing theall targeted atthe analysis
ered, signatureComparatives (% efficacy.
mpetition: wdStrike
bereason nium bon Black ance
al Funding: $1
y Investors: ssemer Ventureumbia Capital gemore Capitalner Perkins Caadin Capital GrchOperators p Tier Capital P
urce: Company w
ment & Comm
101 Wilson Blvdrlington, VA 222
ecurity platformmachine-learnid environment.ally remediate remediation on
d the Departmears.
elivers big-dataresponse. Endeeds that infoe functions of ttacks and theand remediatie-less malwa(running in Viru
111M
e Partners
aufield & Byersroup
Partners
website, all reven
m Infrastructure
d., Suite 500 201
m that covertlng engine and In addition toattacks with non the customerent of Defense
a analytics andgame collectrmation into itAV, NGAV, IR
eir componentsion process to
are preventionusTotal), block
s
nues are CY-17
e
y d o o r. e,
d s s
R, s. o n, s
Cybersecurrity, Data Manaagement & Co
EXTRAHOP
Founded: 200Revenue: $50 Company Sudiscover andpredominantlysecurity breacall applicationsthe business to
Products/Sersolution that enetwork togetenvironments,need to operadigital interact Key Officers:Arif Kareem – Jesse RothsteRaja Mukerji –Palvi Mehta – John MatthewChris Lehman Bryce Hein – S Board of DireGeorge BischoTed Coons – PMatt Mcllwain Raja Mukerji –Sujal Patel – CMark AndersoArif Kareem – Jesse Rothste Headcount: 3 Open PositioU.S. based: 47International: 2Sales: 15 Other: 34
omm Infrastruc
P
07 0M-$100M
mmary: Extra classify all
y used for perfches. Through s, hosts, clientso correlate info
rvices: The Exenables IT teaher as one in IT operations
ate more efficieions in an incre
CEO & Presidein – Co-founde– Co-founder &CFO s – CIO – SVP, WW S
SVP, Marketing
ectors: of – MD, MeritePrincipal, TCV– MD, Madron
– CCO, ExtraHoCEO, Isilon Sysn – President, CEO, ExtraHo
ein – CTO, Extr
300
ns: 49 7 2
cture
www.ext877.333
aHop delivers user, device
formance moniits original plats, and infrastruormation and m
xtraHop platfoams to view ategral delivery and security t
ently. The platfeasingly digital
ent er & CTO CCO
Sales g
ech
a Venture Groop stems Palo Alto Netw
op raHop
trahop.com .9872
real-time analye and applicaitoring but nowtform, Extraho
ucture within anmake real-time
orm is a uniqupplication serv
y system. By teams using Eform is a fundaworld.
up
works
ComComRiveOpeSplu Tota KeyAndMadMerTec
Source:
52Se
ytics and clouation behaviow it is increasinop is able to disn enterprise nedecisions to m
ue IT operatiovers, databaseharnessing wi
ExtraHop have amentally new
mpetition: mpuware erbed (OPNETenview unk
al Funding: $6
y Investors: dreessen Horowdrona Venture ritech Capital Pchnology Cross
Company websi
20 Pike Street, eattle, WA 9810
d-based machor. Originallyngly being usescover, observ
etwork. This infoove forward.
ons and secues, storage sysre data flowinthe visibility a
w way to observ
T)
62M
witz Group
Partners sover Ventures
ite, all revenues
5
Suite 1600 01
hine learning toExtrahop wa
ed for detectingve, and analyzeormation allow
rity intelligencstems, and theg through the
and insight theve and analyze
are CY-17
3
o s g e s
e e ir y e
Cybersecurity, Data Management & Comm Infrastructure
54
FIDELIS CYBERSECURITY
Founded: 2002 Revenue: $50-$100M
www.fidelissecurity.com 800.652.4020
4500 East West Highway, #400 Bethesda, MD 20814
Company Summary: Fidelis provides integrated network and endpoint security for automated detection and response. On the network security side, Fidelis offers best-in-class advanced threat protection (APT) capabilities, protecting enterprises from both inbound and outbound threats. Fidelis’ endpoint security offering correlates against its intelligence, threat reputation services, and third-party threat intelligence feeds to determine which endpoints are compromised. Fidelis also offers a broad array of incident response services to complement its protection capabilities. After having spun out of General Dynamics, the company targets the large enterprise and its customer base consists of several hundred global organizations.
Products/Services: Fidelis offers two platforms: Fidelis Network and Fidelis Endpoint. With Fidelis Network, enterprises can detect the tools and tactics of advanced attackers, including advanced malware, exploits, and command and control activity that typically bypass traditional network security systems. Fidelis Endpoint identifies compromised endpoints and automates investigation and response by eliminating time-consuming manual steps, enabling a more rapid triage of security incidents. Both platforms offer network and endpoint integration, valuable context with every alert and automated remediation. Incident response services from Fidelis are available 24/7, and include threat triage, readiness assessments, compromise assessments, SOC development, PCI assessment, and security program review.
Key Officers: John McCormack – President & CEO David Macey – SVP, WW Sales & Marketing Kurt Bertone – CTO Ian Gillott – CIO Gerald Mancini – SVP, Engineering Board of Directors: Not listed Headcount: 325 Open Positions: 4 U.S. based: 4 International: 0 Sales: 1 Other: 3
Competition: FireEye Forcepoint Intel/McAfee Palo Alto Networks Symantec Cylance Carbon Black Total Funding: $24M – Acquired by Marlin Equity Partners in May 2015 Key Investors: Ascent Venture Partners Inflection Point Ventures Maryland Venture Fund PJC Tudor Growth Equity
Source: Company website, all revenues are CY-17
Cybersecurrity, Data Manaagement & Co
FIREMON
Founded: 200Revenue: $50 Company Sufirewall managof the two. Iunderstand chautomate threa
Products/Serthat are essenManager platfpolicies, and amanages, anddetailed intellitask. The Riskuser to patch and respond defend a busin Key Officers:Satin H. MirchMatt Dean – VJim Weakley –Donald KlumbPeter Kobs – CJeremy Martin Board of DireNot Listed Headcount: Open PositioU.S. based: 11International: 0Sales: 2 Other: 9
omm Infrastruc
04 0M-$100M
mmary: FireMgement and net seeks to au
hanging compliat data analysi
rvices: FireMontial to protect cform cleans ualerts the used implements gence to IT te
k Analyzer delivthe security gato attacks in aness from any
andani – CEOVP, Product Str– SVP, Global Sb – CFO Chief Revenue
n – VP, Enginee
ectors:
ns: 11 1 0
cture
www.fire913.948
Mon pioneeredetwork securityutomate securiance policies, s.
n’s Intelligent companies fromp firewall conr on every chachange to ne
eams and autovers real-time ap. The Immedadvance. All thattack.
rategy Services
e Officer ering
emon.com .9570
the security my management rity processesprovide visibil
Security Manam the growing nfigurations to ange to netwo
etwork access omates the chinformation ondiate Insight ashese products
ComTufiPaloFortCiscChe Tota InveNot
Source
84Ov
management ssolutions for o
s by helping lity into increas
agement delivenumber of cybemaximize effi
ork access. Thand security.
hange review pn the network’sspect provides provide a co
mpetition: n o Alto Networkstinet co eckPoint
al Funding: No
estors: Listed
: Company webs
400 W. 110 Streverland Park, K
pace. The comon-premise, clonetwork and singly complex
ers several seer-attacks todaciency, validat
he Policy PlanThe Policy O
process, a pre vulnerabilities an active appmplete protect
s
ot Listed
site, all revenues
5
eet, Suite 500KS 66210
mpany provideoud, or a hybridsecurity team
x networks, and
ecurity productay. The Securittes compliancener automates
Optimizer sendeviously tedious and allows theproach to detection platform to
s are CY-17
5
s d s d
s y e s, s s e ct o
56
FORGERO
Founded: 201Revenue: >$1 Company Sulater. With itsbreakdown ofexternal (custoForgeRock hmanagement)its high growth Products/Serscale. Its capaGateway, anddevelopers to for both adminand can be intwe use these transformation Key Officers:Lasse AndreseRobert HumphTom Ammirati John FernandGlobal Ops Neil ChapmanJamie Nelson Board of DireDavid DeWalt Jonathan ScudWarren WeissBruce Golden Alex Ott – VVentures Paul Madera –Lasse AndreseArun Mathew –Dave Welsh – Headcount: 4 Open PositioU.S. Based: 38International: 3Sales: 15 Other: 61
CK
10 100M
mmary: Forges European rof 50% from inomer-facing) idas three mai, and IoT, and
h.
rvices: The Foabilities included User-Manage
shorten the timnistrators and dtegrated into aeveryday prod
n.
en – CTO & Cohrey – CMO
– SVP, Americdez – Interim
n – EVP, Indust– SVP, Global
ectors: – Former Pres
dder – Co-founs – GP, Founda
– Partner, AccVenture Partne
– Founder, Meren – Co-Found– Partner, AcceManaging Dire
450
ns: 76 8 38
Cy
www.for415.599
eRock was fouoots, the compnternational sadentities, while n market focit is the only i
orgeRock Idene Access Manaed Access, allme between dedevelopers, sol myriad of prod
ducts. The platf
o-founder
cas CEO, CFO &
tries Engineering
sident & CEO, nder, ForgeRocation Capital cel Partners er, Cross Con
ritech Capital der, ForgeRockel Partners ector, KKR
ybersecurity, D
rgerock.com .1100
nded in Norwapany has hadales and 50%many of its co
cuses: Securitdentity player
tity Platform oagement, Identil on a singulaevelopment anlving the DevOducts, includingform moves aw
& EVP,
McAfee ck
ntinental
k
ComOktaOra Tota InveAccFouMer
Source: C
Data Managem
20Sa
ay in 2010, butd early succes from domest
ompetitors focuty, CIAM (cusin the IoT spa
offers customeity Managemen
ar common pland production,
Ops problem. Tg basketballs away from an IA
mpetition: a cle
al Funding: $1
estors: cel Partners undation Capitaritech Capital P
Company websit
ment & Comm
01 Mission St., an Francisco, C
t moved to thess overseas, wtic sales. Forgus more on emstomer identitce, which has
er identity servnt, Directory Seatform. The plcreating a unifhe platform is and cars to traAM product to
140M
al Partners
te, all revenues a
m Infrastructure
Suite 2900 CA 94105
e U.S. one yeawith a revenuegeRock target
mployee identityty and accesfueled much o
vices at the IoTervices, Identitatform enablefied experiencehighly scalablensform the wafocus on digita
are CY-17
e
ar e s y. s
of
T y s e
e, y
al
Cybersecurrity, Data Manaagement & Co
HACKERO
Founded: 201Revenue: <$2 Company SuFacebook, Micostly, producallows freelanaside from thincluding Uberand Starbucks
Products/Serhackers can acode. When tcompensated HackerOne dcompanies, de Key Officers:Mårten MickosAlex Rice – CoJobert Abma –Michiel Prins –Ning Wang – CMarjorie JanieTim DaRosa –Alex Bekker – Board of DireBill Gurley – GJon Sakoda – John Hering Lookout Marten MickosAlex Rice – Co Headcount: 1 Open PositioU.S. Based: 13International: 4Sales: 6 Other: 11
omm Infrastruc
NE
12 25M
mmary: Hackecrosoft, and G
ces many falsece hackers ar
heir reward cor and Yahoo, as.
rvices: Hackerattempt to hacthe hackers fin
a minimum istributes repoelivering transp
s – CEO o-founder & CT– Co-founder – Co-founder COO & CFO
ewicz – VP, Sal– VP, Marketing
VP, Engineeri
ectors: GP, Benchmark
GP, New Ente– Founder &
s – CEO, Hacko-founder & CT
15
ns: 17 3 4
cture
www.hac669.800
erOne is the firGoogle, as ane positives, anround the worlompensation. Hand has recentl
rOne offers an k as if they w
nd such vulnerof $500 or a
orts on discovparency to the i
TO
les g ng
k erprise Associa
Executive Ch
kerone TO, Hackerone
ckerone.com .5000
rst bug bountyalternative fo
nd only occursd to constantlHackerOne haly started sellin
online producwere malicious,rabilities, theya maximum overed bugs cainternet.
ates hairman,
e
ComCobSynBug Tota InveBenDragEQTMarNew
Source: C
300 MSan Fr
y platform, founor pen (penetrs a few times y find meaning
as many largeng to the Depa
ct with over 85 finding key vreport them t
of $250,000 foalled Hacktivity
mpetition: balt nack gcrowd
al Funding: $7
estors: nchmark Capitagoneer InvestmT Ventures rc Benioff w Enterprise As
Company websit
ontgomery Strerancisco, CA 9
nded by securiration) testing.a year, wheregful vulnerabil
e companies ortment of Defe
50 programs wulnerabilities ao the companor each bug y to inform ha
74M
al ment Group
ssociates
te, all revenues a
5
eet, 12th Floor4104
ity leaders fromPen testing i
eas HackerOneities at no coson its platformnse, Lufthansa
where freelanceand bugs in they. Hackers arethey discover
ackers and the
are CY-17
7
m s e st
m, a,
e e e r. e
IBOSS
Founded: 200Revenue: $25 Company SumThe company disrupt the mahas extendedeliminates maenvironment.
Products/Sersecurity protecuses a node-supports greaperform upgraand flexible fo Key Officers:Paul Martini – Peter Martini –Christopher PaChris Kasper –Joe Cosmano Will Scola – HJason Coville –Amanda Bohn Board of DirePaul Martini – Peter Martini –Stephen KernGoldman SachFrank Fanzilli –John M. CoChairman, BaiGeorge Blank Hillel MoermInvesting, Gold Headcount: 2 Open PositioU.S. based: 58International: 1Sales: 8 Other: 51
04 5M-$50M
mmary: iboss has capitalize
arket and disp into the entenagement cos
rvices: The Diction on a com-based architeater flexibility aades and how r the needs of t
CEO & Co-fou– President & Cark – CTIO – CFO & COO– SVP, Engineead of APAC O– VP, Sales
ne – VP, Marke
ectors: CEO & Co-cha
– President, ibons – VP, Privahs – Former Glob
onnolly – Senin Capital Vent– Former CFOan – Co-hedman Sachs
220
ns: 59 8 1
Cy
www.ibo877.742
pioneered the d on the ubiqulace legacy coerprise space.ts and is able
stributed Gatemplex network, ecture which eand functionalito configure wthe enterprise.
under Co-founder
eering ServicesOperations
eting & Comm.
airman, iboss oss ate Capital In
bal CIO, Credit nior Advisor tures O, Univision ead, Private
ybersecurity, D
oss.com .6832
market for a Suitous preferenompetitors. ibo. By offering to operate mo
eway Platform detecting and
enables the cuity. The platfo
web gateway s
s
vesting,
Suisse & Co-
Capital
ComSymZscaForc Tota InveGold
Source:
Data Managem
10Bo
Secure Web Gace to move fro
oss was initiallya SaaS cloud
ore efficiently a
is a SaaS soterminating thrustomer to ha
orm allows thesecurity, makin
mpetition: mantec aler cePoint
al Funding: $3
estors: dman Sachs
Company websi
ment & Comm
01 Federal Streoston, MA 0211
ateway (SWG) om on-premisey focused on ed solution, iboand effectively
lution that proreats before thave dedicated e user to deteg the product
35M
ite, all revenues a
m Infrastructure
5
eet 10
SaaS servicese to the cloud toeducation but oss significantl
in a distribute
vides completehey occur. ibos
gateways andermine when to
highly scalabl
are CY-17
e
58
s. o it y d
e s d o e
Cybersecurity, Data Management & Comm Infrastructure
59
ILLUMIO
Founded: 2013 Revenue: $25M-$50M
www.illumio.com 669.800.5000
160 San Gabriel Dr. Sunnyvale, CA 94086
Company Summary: Illumio delivers adaptive security that works across the largest data centers and cloud computing environments, including some of the largest financial institutions. Illumio allows customers to gain live visibility, adaptive micro-segmentation, and instant encryption without dependencies on the network or hypervisor because its software is entirely decoupled from the underlying infrastructure. Adaptive segmentation filters traffic to enforce security policies, allowing performance boosts within a cloud environment. Illumio essentially delivers a local firewall that is built into the OS of every workload in the data center. Because Illumio is not beholden to the underlying infrastructure, customers can more easily implement and manage the firewall with centralized policies that are appropriate for customer environments.
Products/Services: Illumio is the only company that can deliver customers a picture of a single navigable view that crosses all data center, private cloud, public cloud environments, and all workloads and network flows. Illumination builds a live interactive map of all application dependencies. The Illumio Adaptive Security Platform (ASP) provides adaptive segmentation that adjusts to the environment in real time; coordinated enforcement of policies set in place in the workload, network, and cloud; visibility of traffic flows throughout all applications; encryption of data in motion; modeling of policy to understand a change in policy’s impact on the network and application functionality; and auto-discovery and segmentation policy recommendations. Key Officers: Andrew Rubin – Founder & CEO PJ Kirner – Founder & CTO Emily Couey – VP of People Ben Verghese – VP, Engineering Jim Yares – SVP, Global Field Operations Board of Directors: Andrew Rubin – CEO, Illumio Alan S. Cohen – CCO, Illumio Steve Herrod – MD, General Catalyst Partners John Jack – Board Partner, Andreessen Horowitz Joe Lonsdale – Founder & MD, Formation 8 John W. Thompson – Chairman of the Board, Microsoft Headcount: 200 Open Positions: 35 U.S. based: 28 International: 7 Sales: 5 Other: 30
Competition: Cisco CloudPassage RedSeal vArmour VMware Total Funding: $267.5M Investors: Accel Partners Andreessen Horowitz BlackRock Funds Data Collective Formation 8 General Catalyst J.P. Morgan Jerry Yang John W. Thompson Marc Benioff
Source: Company website, all revenues are CY-17
Cybersecurity, Data Management & Comm Infrastructure
60
IVANTI
Founded: 1985 Revenue: >$100M
www.ivanti.com 888.253.6201
698 W. 10000 South, Ste 500 South Jordan, Utah 84095
Company Summary: Ivanti arose out of the merger of HEAT Software and LANDESK in January 2017. Ivanti offers IT solutions centered on the individual user to increase productivity and maintain efficiency while diminishing IT security risk. The company focuses on organizations and prioritizing control of service delivery, simplifying the service management process, and gaining visibility into the programs and intricate networks inherent in complex organizations. Ivanti seeks to integrate people and technology to deliver the best service performance. The company’s product offering automates processes allowed for IT organizations to reallocate resources away from administrative work, thereby reducing G&A expenses. Products/Services: Over time, Ivanti has acquired new technology through HEAT and LANDESK’s respective acquisitions. Ivanti offers a suite of security products, including those for systems management, IT asset management, IT service management, improvement in the cloud, IT security solutions and patch management. The core of its focus lays in the identity and privileged asset products, and in unifying IT teams. Key Officers: Steve Daly – President & CEO Mark McBride – EVP & CFO Tom Davis – EVP & CTO Steve Morton – EVP & CMO Mitch Rowe – EVP, Global Software Sales Steve Workman – VP, Corporate Strategy & Planning Prajval Parthasarathy – GM & CPO, Cloud Products Board of Directors: Not Listed Headcount: 2,000+ Open Positions: 78 U.S. based: 36 International: 42 Sales: 23 Other: 55
Competition: Tanium Ziften Technologies CrowdStrike Carbon Black BeyondTrust ServiceNow BigFix Total Funding: $2.6B Key Investors: Not Listed
Source: Company website, all revenues are CY-17
Cybersecurity, Data Management & Comm Infrastructure
61
KAMINARIO
Founded: 2008 Revenue: >$100M
www.kaminario.com 877.982.2555
75 Second Avenue, Ste. 620 Needham, MA 02494
Company Summary: Kaminario is an all-flash array (AFA) vendor that leverages a unique storage architecture in its K2 platform to deliver flexible and cost-efficient flash storage. Kaminario’s storage arrays offer unique scaling benefits that provide customers the flexibility and agility to dynamically grow the datacenter according to their needs. Gartner rates the K2 platform the highest in three of five Critical Capabilties use cases, demonstrating the value-add of Kaminario. Because of its unique architecture, Kaminario is able to guarantee storage costs of less than $1/GB, which rivals the upfront cost of HDD-based storage systems. According to preliminary estimates from Gartner, Kaminario generated over $100 million in sales in 2017. Products/Services: Kaminario’s storage arrays are built on its Scalable Performance and Resilience Architecture (SPEAR), which is designed to harness the power of flash with storage efficiency features such as in-line selective deduplication, in-line compression, thin-provisioning, a robust RAID scheme, and highly efficient metadata management. Leveraging SPEAR, Kaminario allows enterprises to both scale-out and scale-up, enabling independent linear growth of capacity and performance according to datacenter needs. In May 2014, Kaminario introduced its fifth generation AFA named K2. Due to its SPEAR architecture, Kaminario was able to rapidly incorporate the latest and most cost-efficient SSDs into its K2 platform, which enabled the company to achieve unprecedented storage economics of less than $1/GB of usable flash capacity, for a predicted five-year savings and benefits of ~$564k. Key Officers: Eyal David – CTO Marty Sanders – CTO, North America Josh Epstein – CMO Guy Tanchuma – CFO Dani Golan – Founder & CEO Itay Shoshani – Chief Revenue Officer Reuven Losh – COO Todd Gresham – VP, Corporate Development Eyal Gordon – Chief Architect Board of Directors: Dani Golan – Founder & CEO, Kaminario Haim Sadger – Sequoia Capital Seed Fund Aaron Mankovski – Pitango Venture Capital Gil Mandelzis – Traiana, Inc. Thomas Banahan – Tenaya Captial Inc. David Fachetti, CPA – Globespan Capital Management LLC Headcount: 250+ Open Positions: 11 U.S. based: 4 International: 7 Sales: 6 Other: 5
Competition: EMC NetApp IBM HPE Hitachi Data Systems (HDS) Pure Storage Total Funding: $224.5M Key Investors: CE Ventures CIRTech Fund Globespan Capital Partners Lazarus Mitsui Global Investment Pitango Venture Capital Sequoia Capital Silicon Valley Bank Tenaya Capital Waterwood Group
Source: Company website, all revenues are CY-17
62
KNOWBE4
Founded: 201Revenue: $50 Company Suan integrated employees of how to remedwith thousandemployees. Afdropped from customers, KnQuadrant. Products/Sercore product testing for ememployees. Thresulting in a company rececomply with a Key Officers: Stu SjouwermPerry CarpentOfficer Kevin Mitnick – Board of DireNot listed Headcount: 3 Open PositioU.S. based: 36International: 3Sales: 9 Other: 30
10 0M-$100M
mmary: Foundplatform for
organizations oiate the situatids of versionsfter completing16% to 1%, de
nowBe4 is a le
rvices: KnowBis the Kevin Mployees with ahe platform thesignificant red
ently added thlong list of com
an – Founder ater – Chief Ev
– Chief Hackin
ectors:
350
ns: 39 6 3
Cy
www.kno855.566
ded in 2010 bycomputer-bas
of all types howon. The propris and unlimiteg the training, temonstrating aeader in Gartne
e4 provides a Mitnick Securit free simulated
en simulates a duction in clicke KnowBe4 C
mmon regulatio
and CEO vangelist and S
ng Officer
ybersecurity, D
owbe4.com .9234
y serial entrepsed security aw to know wheietary softwareed usage, allothe average nua high level of eer’s Security A
wide variety oty Awareness d phishing atta second phish
ks, thus improvCompliance maons and automa
Strategy
ComPhisWomPhisInsp Tota KeyGoldElep
Source: Comp
Data Managem
33Cl
penuer Stu Sjoawareness tran you are the t
e fully automateowing for comumber of userseffectiveness f
Awareness Com
f tools for its pTraining prog
ack. It is followeing attack to teving an organanager, which ated complianc
mpetition: shMe mbat Security TshLine pired eLearning
al Funding: $4
y Investors: dman Sachs phant Partners
pany website, al
ment & Comm
3 N Garden Aveearwater, FL 3
uwerman, Knoining. The platarget of a phises simulated p
mplete trainings clicking on simfor the platformmputer Based
phishing traininram, which deed up by a traiest training effiizations overaprovides temp
ce reminders.
Technologies
g
44M
ll revenues are C
m Infrastructure
e 33755
owBe4 provideatform teache
shing attack andphishing attack for enterprisemulated attack
m. With 15,000+Training Magi
g platform. Thelivers baselinining course foicacy, generall
all security. Theplates to easil
CY-17
e
s s d s e s + c
e e
or y e y
Cybersecurrity, Data Manaagement & Co
KUDELSKI
Founded: 201Revenue: >$1 Company Sumbut recently msecurity evaluexperience. Tunderstand thenvironment.
Products/SerInnovation. In blueprint to dManaged Secits cyber threacustom solutio Key Officers:Rich FennessyAndrew HowaSteve Speidel John Van BlarDavid WoodwaTom Marsnik – Board of DireNot Listed Headcount: 3 Open PositioU.S. based: 8 International: 7Sales: 2 Other: 13
omm Infrastruc
SECURITY
12 100M
mmary: The Kmoved to the U.
ation services The company he client’s sec
rvices: KudelsAdvisory, Ku
discover redunurity segment at intelligence. ons to each sec
y – CEO rd – Global CT– COO & VP,
ricum – VP, Gloard – VP, US S– VP, US Tech
ectors:
320
ns: 15
7
cture
Y
www.kud623.235
Kudelski Group S. Kudelski Setailored to the
uses a long-teurity needs an
ski Security ofdelski Security
ndancy in prodoutsources secFinally, the In
curity challenge
TO Global Ops obal MarketingSales h Services
Sourc
delskisecurity.c.2500
launched its cecurity offers Ioe customer, prerm approach nd produce an
ffers three soy will judge thducts and idecurity managemnnovation segme.
ComOptF5InteJunPalo Tota KeyNot
ce: Company web
com 50Ph
cybersecurity veoT security, peroviding a com
to client relan innovative s
olutions: Advishe resilience oentify areas wment to improvment is tailored
mpetition: iv
l/McAfee iper Networks o Alto Networks
al Funding: No
y Investors: Listed
bsite, all revenue
090 N 40 Streehoenix, AZ 850
enture in 2012n testing, and a
mpletely personationships, allosolution tailore
ory, Managedof a company’sith a lack ofve the security d to the custo
s
ot Listed
es are CY-17
6
t, Suite 450 018
in Switzerlanda wide range onalized securit
owing it to fulld to a specifi
d Security, ands cybersecuritcoverage. The blueprint usingmer to develo
3
d, of y y c
d y e g p
Cybersecurity, Data Management & Comm Infrastructure
64
LIEBERMAN SOFTWARE
Founded: 1994 Revenue: <$25M
www.liebsoft.com 800.829.6263
1875 Century Park East Ste. 1200 Los Angeles, CA 90067
Company Summary: Lieberman Software is a leader in Privileged Credential Management, providing Automated Privileged Identity Management, Secure Privileged Access Management, Orchestrated Intrusion Remediation, and Security Configuration Reporting & Repair. The company uses a continuous discovery technology to automatically detect devices and users as they log on and off a network. By knowing exactly where users are entering the network, Lieberman Software can monitor and detect potential threats and deploy account propagation to prevent service disruptions.
Products/Services: Lieberman’s RED Suite is comprised of a variety of technologies, including identity management, COM management, task management, services management, and systems management. The suite restructures a poorly built environment in minutes to deploy a safer and simpler network. It also automates privileged identity and access management to control systems and identities that are vulnerable to attacks. Finally, it creates a closed loop environment using its pre-built applications, including SIEMs, advanced analytics, and vulnerability scanners to detect and deter threats and intrusions in real time. Key Officers: Philip Lieberman – President & CEO Jack Jaffe – SVP, Sales Richard A. Weeks – VP, Channel Sales & BD Chris Stoneff – VP, Technical Management Jane Grafton – Director of Marketing Board of Directors: Not Listed Headcount: 60 Open Positions: Not Listed U.S. based: International: Sales: Other:
Competition: BeyondTrust CyberArk Thycotic Quest Software Total Funding: Not Listed Key Investors: Not Listed
Source: Company website, all revenues are CY-17
Cybersecurrity, Data Manaagement & Co
LOOKOUT
Founded: 200Revenue: $50 Company SumBluetooth techmobile securitintelligence deassesses the hto 94.5M+ appenterprise custheir networks
Products/Serpersonal deviconnected devthreat intelligedata, where teproduct, Lookoto find a devicdevice securitoperations wit Key Officers:Jim Dolce – CJohn Wilson –John Hering – Kevin MahaffeAaron CockeriMarc Jaffan – Vijaya Kaza – Santosh KrishMark Nasiff – CDeb Wolf – CM Board of DireJim Dolce – CKevin Hartz – John Hering – Jeff Jordan – GPing Li – PartnKevin MahaffeMike Volpi – PDavid Weiden Headcount: 3 Open PositioU.S. based: 21International: 8Sales: 9 Other: 20
omm Infrastruc
07 0M-$100M
mmary: Lookohnology and Nty for both coerived from aphealth of everyplication tests.
stomer insights .
rvices: Lookouces security, vices to search
ence, Lookout iens of millionsout provides 24ce if it is lost oy for enterprish SIEM and MD
EO – Chief Revenu
Co-founder & ey – Co-foundeill – Chief StratVP, Business Chief Developnan – Chief PrCOO & CFO MO
ectors: EO, Lookout CEO & Co-fouCo-founder &
GP, Andreessener, Accel Partey – Co-foundePartner, Index V
– Partner, Kho
350
ns: 29 1 8
cture
www.loo415.281
out was foundeNokia mobile ponsumers and pproximately 10y version of eve As a result, tinto corrupted
t provides threand threat in
h for all mobiles able to provi
s of people he4/7 identity theor stolen. The es deploying mDM, as well as
e Officer Executive Dire
er & CTO tegy Officer & Corp. Develo
pment Officer roduct Offier
under, EventbritED, Lookout
en Horowitz ners
er & CTO, LookVentures osla Ventures
okout.com .2820
ed in 2004 afterphones. Since
the largest e00 million mobery app on boththe company is applications o
ee key mobile sntelligence. The threats with gide best-of-breelp feed the daeft protection aendpoint secumobile product
s policy integrat
ector
opment
te
kout
ComAVGAvaCheSkyWan Tota KeyAccAndBlacIndeKhoTrilo
Source
1 FSa
r the co-foundeits founding, t
enterprises. Thbile devices anh mobile app (as often in a po
operating on em
security solutiohe company leglobal data thated security forata pool. As pnd restoration rity product prts to their wortion for organiz
mpetition: G Technologiesast eck Point Softwycure (Symantendera
al Funding: $2
y Investors: cel Partners dreessen Horowckrock ex Ventures osla Ventures ogy Ventures
e: Company web
Front Street, San Francisco, C
er discovered athe company hhe company lend it managesapplication) stoosition to provmployee device
ns: mobile endeverages a vat is updated wr personal mobpart of its perssupport, as we
rovides both iOrk force. It provzations.
s
ware ec)
282M
witz
bsite, all revenues
6
Suite 2700 CA 94111
a vulnerability ihas focused oeverages threas a dataset thaores, amountingide prospectivees connected to
dpoints securityast network o
weekly. Using itbile devices andsonal protectioell as the abilit
OS and Androidvides seamles
s are CY-17
5
n n at at g e o
y, of s d n y d s
66
MALWARE
Founded: 200Revenue: >$1 Company Sumfirst version oendpoints. Masolution amoninstalled on mmore than 10product, with recent growth
Products/Serremediate infesolutions, inclutechnologies tspecifically Mablocking, ransconsumer and
Key Officers:Marcin KleczySteven De MaMark Patton – Justin Dolly – Pedro BustamRaj Mallempat Board of DireMarcin KleczyCorey Mulloy –Alexander EckBrooke SeaweJustin SomainDoug SwansoScientific ConsGary Steele – Headcount: 4 Open PositioU.S. based: 21International: 9Sales: 12 Other: 18
EBYTES
08 100M
mmary: Marcinf Malwarebyte
alwarebytes eveg small and m
more than ¼ b,000 enterprise60% of its revhas been in th
rvices: While Mected endpoinuding a free phat work togetalwarebytes cosomware blockd enterprise ver
nski – CEO arco – SVP, Sa
VP, EngineeriChief Security
mante – VP, Tecti – SVP, Marke
ectors: nski – CEO, M– Partner, Highkelberry – COOell – Partner, Ni – Chief Securon – Foundesulting CEO, Proofpo
425+
ns: 30 1 9
Cy
www.ma800.520
n Kleczynski, Cs in 2004 in aentually went vid-sized busineillion endpointse customers. venues cominge 20-30% Y/Y
Malwarebytes wnts, the compproduct downloher to break th
ombines advancking, and explorsions and mos
les ng Officer & CIOchnology eting
Malwarebytes hland Capital O, AutoLoop EA rity Officer, SA
er & Partner,
int
ybersecurity, D
alwarebytes.org.2796
CEO of Malwaran effort to betviral as a consuesses grew orgs and the comMalwarebytesg from that serange.
was initially poany has expa
oad. The comphe attack chainced malware doit protection ist of its sales a
AP Zipline
ComSymMcAPaloFireCrowCylaSen Tota KeyFideHigh
Source
Data Managem
g 39Sa
rebytes, was 15tter protect coumer product, aganically. The cmpany has an
has had mucegment of the
opularized by itanded its cappany employs n, from pre-delidetection and reinto a single s
are online.
mpetition: mantec Afee o Alto NetworkseEye wdStrike ance ntinelOne
al Funding: $8
y Investors: elity Managemehland Capital P
e: Company web
ment & Comm
979 Freedom Canta Clara, CA
5 years old whnsumers againand over time,company’s softexpanding cus
ch success witbusiness and
ts unique abilitypability to inclu
several propriivery to post-exemediation, masolution. The c
s
80M
ent CompanyPartners
bsite, all revenue
m Infrastructure
Circle, 12th Fl.95054
en he wrote thenst malware odemand for thetware has beestomer base oh its consumethe company’
y to seamlesslude preventioetary end-poinxecution. Morealicious websitecompany offer
es are CY-17
e
e n e n
of er s
y n
nt e e s
Cybersecurrity, Data Manaagement & Co
METASWIT
Founded: 198Revenue: >$1 Company Stelecommunicadecades. It wacompany is gecore carrier nesoftware. It gehas made sevoperations into Products/Serproducts, Appbinary productThe company particularly wedeveloping unproviding HD Metaswitche’swith native dia Key Officers:Martin Lund – Graeme MacAMartin Taylor –Tom Cronan –Roger Heinz –Ian Maclean –Henock GesseAlastair Mitche Board of DireChris Mairs – Deep Shah – CJason Brein – Jim Goetz – PSteve MullaneIan Ferguson –Martin Lund – Graeme MacA Headcount: 7 Open PositioU.S. based: 5 International: 7Sales: 5 Other: 7
omm Infrastruc
TCH NETWO
81 100M
Summary: ations service as originally foeographically detwork solutionenerated revenveral key orgao Tigera.
rvices: Metaswlication product consisting of
launched its ell suited for nenified communi
voice and vids Mobile UC soaler capabilities
CEO Arthur – Execut– CTO – CFO – Chief Sales O– CMO esse – Generaell – SVP, Engi
ectors: Partner, EntrepCo-president, FPrincipal, Fran
Partner, Sequoiey – SVP & GM– Founder, MeCEO, Metasw
Arthur – EVP, M
784
ns: 12
7
cture
ORKS
www.me+44.20.8
Metaswitch providers andunded in the Uistributed both
ns, service pronue growth of ~anizational cha
witch offers Ccts, and Netwoa Session Boropen source Ietwork functioncations (UC) sdeo calling wi
olution represens for consumers
tive VP
Officer
l Counsel ineering
preneur First Francisco Partnncisco Partnersa Capital
M, VMware, Incetaswitch itch
Metaswitch
etaswitch.com8366.1177
Networks p the company
UK and it move in terms of em
ovider applicati~15%, and an Enges in the re
Core Network orking Softwarerder ControllerIMS platform fn virtualization solutions. Its Hith IM and a nts another gros and enterpris
ners s
.
ComAlcaBroaCiscEricNokSonMav Tota KeyFranSeq
Source
10En
predominantly has been in o
ed its headquamployees and cons, managemEBITDA marginecent past, inc
products, Plate. Key product(SBC) and IP
for the cloud, (NFV) environ
Hosted UC addrich suite of
owth driver as se customers.
mpetition: atel adsoft co csson kia nus venir
al Funding: U
y Investors: ncisco Partners
quoia Capital
e: Company webs
00 Church St. nfield, UK EN2
developsoperation for marters to the Bacustomers. Thement software n of 20% in FY
cluding a spin
tform productst lines includeMultimedia SuClearwater, innments. The cdresses the buadditional servit is a network
ndisclosed
s
site, all revenues
6
6BQ
software fomore than threeay Area but thee company selland networking
Y17. Metaswitcout of its SDN
s, Managemenits cloud native
ubsystem (IMS) 2014 which iompany is alsousiness marketvices. Similarl
k-based solutio
s are CY-17
7
or e e s g h N
nt e ). s o t, y n
68
NETSKOPE
Founded: 201Revenue: $50 Company Sumitigates the enforcement fapplications ana significant violations. Nemitigate risk, p Products/SerThe Netskopeplatform steerpremise and sanctioned or Index, providinwith five key locations, perfprevention (DLcapabilities to security vendo Key Officers:Sanjay Beri – Ravi Ithal – ChLebin Cheng –Krishna NarayAmol Kabe – VSteve MalmskChris Andrews Board of DireSanjay Beri – Eric Wolford –Enrique SalemArif Janmoham Headcount: 4 Open PositioU.S. based: 29International: 1Sales: 5 Other: 39
E
12 0M-$100M
ummary: Netsrisk of “Sha
for cloud appsn enterprise usnumber of file
etskope’s platfoprevent data los
rvices: Netskop Active Platformrs cloud trafficremote usersunsanctioned
ng an objectivecapabilities: 1)formance, useLP) that is condiscovered cl
ors, including F
CEO hief Architect – VP, App Engiyanaswamy – CVP, Product Makog – Chief Nets – SVP, WW S
ectors: CEO, Netskop
– Partner, Accem – Independenmed – Partner,
450
ns: 44 9 15
Cy
www.net800.979
skope enablesdow IT” by ps. The companses is 977, whies in enterpriorm delivers rss, and govern
pe is the leadem can be deplo
c for inspection. It also contcloud usage. T
e rating of ente) visibility into r actions, and ntext and app-loud service p
FireEye and Ca
ineering Chief Scientistanagement twork ArchitectSales
e l Partners nt Board MembLightspeed Ve
ybersecurity, D
tskope.com .6988
s the secure providing discony’s research ile 95% of clouse-sanctioned real-time actio
n usage well be
er in real-time coyed on-premin and analysistains decryptioThe platform aerprise’s cloud
apps, users, content; 2) de
-aware; 4) grapolicy violationsarbon Black.
t
ber entures
ComSkyImpBlueMicrWebZsca Tota KeyAccGeoICOLighSapSoc
Source:
Data Managem
27Lo
use of enterpovery and visshows that th
ud applicationscloud applica
onable contexteyond simply 'a
cloud app analse, in the clouds to provide hon capabilities also utilizes the
services. The sessions, deveep analytics
anular policy es. The platform
mpetition: yhigh Networkserva (Skyfencee Coat rosoft bsense aler
al Funding: $2
y Investors: cel Partners odesic Capital
ONIQ Capital htspeed Venturpphire Venturescial Capital
Company websi
ment & Comm
70 3rd St. os Altos, CA 94
prise cloud apsibility, analytihe average nus are not enterpations constitut that enablesallowing' or 'blo
lytics and policd, or as a hybr
holistic coverag to provide v
e Netskope Cloplatform providices, browserson user activitnforcement; anm integrates w
e)
231M
re Partners s
ite, all revenues
m Infrastructure
4022
pplications andcs, and policumber of cloudprise-ready andute data polics customers toocking' apps.
cy enforcementrid solution. Thge for both onvisibility into aoud Confidencedes enterprises, time periodsty; 3) data losnd 5) response
with an array o
are CY-17
e
d y d d y o
t. e
n-ll e s
s, s e
of
Cybersecurity, Data Management & Comm Infrastructure
69
OPTIV
Founded: 2015 Revenue: >$100M
www.optiv.com 303.298.0600
1125 17th Street, Suite 1700 Denver, CO 80202
Company Summary: Optiv is a pure-play cybersecurity systems integrator that offers a multitude of services, including identity and access management (IAM), third-party risk management, threat and vulnerability management, and managed security services. Recently, Optiv was acquired by private equity firm KKR & Co., which will enable internal expansion, global expansion and partnership expansion. IAM is its fastest growing segment of the business, but the company is still working on expanding its other products. Optiv targets mostly enterprises, and aims to be the most advanced, most trusted and most comprehensive single source for all things cybersecurity. Products/Services: Optiv serves as a cybersecurity provider for organizations by using a programmatic approach to solving clients’ needs. Its solutions include: cloud security, enterprise security architecture, advanced threat, IoT, identity, security intelligence, and third-party risk management. Within third-party risk management, Optiv offers the Optiv Evantix 5.0, a comprehensive platform to manage a customer’s entire third-party portfolio. The platform allows for visibility, consistency and integratable management of third-party applications, and visualizes how it fits into the enterprise’s system. Optiv carries a full suite of security products, allowing the customer to tailor these products to their precise needs. Key Officers: Dan Burns – CEO David Roshak – CFO Nate Brady – Chief Accounting Officer David Castignola – EVP, WW Sales Anirban (Oni) Chakravartti – SVP, WW Partner Solutions William Croutch – SVP & General Counsel Peter Evans – CMO Paul Lehman – CIO Stu Solomon – SVP, Security Solutions & Ops Board of Directors: Not Listed Headcount: 1,700 Open Positions: 100 U.S. based: 98 International: 2 Sales: 18 Other: 82
Competition: Deloitte Cyber Security IBM Security Secureworks Total Funding: Acquired by KKR & Co. on December 5, 2016 Key Investors: Not Listed
Source: Company website, all revenues are CY-17
70
PHISHME
Founded: 201Revenue: $50 Company Suchanged muchwas formed wproducts that and midmarkeand has exper Products/SerIntelligence, aemployed by user’s email pseemingly maPhishMe Intellanalysts to dfindings in plaproduct, the findings to com Key Officers:Rohyt Belani –Aaron Higbee Jim Hansen – Mel Wesley – Gordon LawsoWade Weeks – Board of DireRohyt Belani –Aaron Higbee Nick Lantuh NetWitness CoKevin Mandia Christopher St Headcount: 3 Open PositioU.S. based: 34International: 7Sales:11 Other: 30
11 0M-$100M
ummary: Overh since 2000.
with a mission totrain employee
et customers. Prienced growth
rvices: PhishMand PhishMe T1,400 enterpris
provider (ex. Oalicious mail religence eliminaissect and ide
ain English to PhishMe Triag
mpanies to add
– Co-founder &– Co-founder &COO CFO
on – SVP, Glob– SVP, Engine
ectors: – Co-founder &– Co-founder &– Former Fo
orporation – CEO, FireEyteed – MD, Pal
350
ns: 41 4 7
Cy
www.ph703.652
r 90% of hacWith the pervao help people es to have safePhishMe was tof 80% CAGR
Me offers four pTriage. The Phse and upper mutlook). It is a eceived and sates the possibentify unknownaid users in uge, automatesdress these thre
& CEO & CTO
bal Sales eering
& CEO, PhishM& CTO, PhishMounder & Pre
ye ladin Capital G
Sourc
ybersecurity, D
ishme.com .0717
ks begin with asiveness of pbecome more
fer habits. Phisthe first to mar
R.
products: PhishhishMe Simulamidmarket com button on thesend it to a sbility of a falsen threats. Phi
understanding s and orchesteats quickly an
Me Me esident,
Group
ComCar Tota KeyAldrBesPala
ce: Company we
Data Managem
16#4
spearphishingphishing in theresilient to suc
shMe currentlyrket with an au
hMe Simulatorator was its firsmpanies. The Pe email platformsecurity operate-positive by seishMe Intelligeand preventingrates the phis
nd efficiently.
mpetition: negie Mellon In
al Funding: $5
y Investors: rich Capital Passemer Ventureadin Capital Gr
ebsite, all revenu
ment & Comm
602 Village Mar400 Leesburg, V
g, and this nu cyber-attack wch attacks thro
y has around 1utomated syste
, PhishMe Repst product, whPhishMe reporm that allows ations team forending timely aence publishesg malicious thshing respons
ncubator
58M
rtners e Partners roup
es are CY-17
m Infrastructure
rket Blvd. SE VA 20175
umber has noworld, PhishMe
ough its multiple,400 enterprise
em in the cloud
porter, PhishMehich is currentlrter plugs into aa user to reporr analysis. Thealerts to humas the analystsreats. The finae and deliver
e
ot e e e d
e y a rt e n s’ al s
Cybersecurrity, Data Manaagement & Co
PING IDEN
Founded: 200Revenue: >$1 Company Suemployees anenable Ping taccess manaenterprise accwell as cloud-and it is recog Products/Serbe deployed aproving its sucsign-on in ordemonitors user ensures securenterprise’s un Key Officers:Andre Durand Patrick HardinRaj Dani – CFBrian Bell – CMSteve Shoaff – Board of DireHerald Chen –Dain DeGroff Partners Alex Doll – MaAndre Durand Blake Heston –Rob KettersonDavid Orfao – Dave Power – Headcount: 5 Open PositioU.S. based: 41International: 1Sales:4 Other: 55
omm Infrastruc
TITY
02 100M
mmary: Ping Ind partners. It o accelerate g
agement, as wcounts and it a-based and monized for its sim
rvices: Ping Idas SaaS, softwccess in large er to access dibehavior to ea
re connection tnique environm
– Chairman &g – CTO O MO – Chief Produc
ectors: – Director, Fox
– Founding P
anaging GP, Te– CEO, Ping I
– Principal, W n – MP, Fidelity
MD, General C– Partner, Fidel
550
ns: 59 1 18
cture
www.pin877.898
Identity speciawas acquired
growth. Ping Idwell as emploaddresses acceobile applicatiomplicity and sca
entity offers a ware, or both. enterprises. Thstinct employeasily identify ato the cloud, bo
ment.
CEO
ct Officer
Paine & Co. Partner, Triang
enEleven Ventudentity Capital Partne
y Equity PartneCatalyst ity Ventures
ngidentity.com.2905
lizes in Identityby private eq
dentity’s businoyee access ess managemeons. Ping Idenalability.
comprehensivThe platform ihe platform inc
ee and customeanomalous usaoth private and
le Peak
ures
ers ers
ComOkta TotaJune KeyAppAvisDraFideGenKKRSapSilicTenTriaW C
Source: Compa
10De
y Access Manauity firm Vista
ness is comprismanagement. ent for tradition
ntity’s products
ve identity-definis capable of hcludes multi-faer directories, a
age and secured public, and is
mpetition: a
al Funding: Ace 2016
y Investors: pian Ventures sta Partners per Fisher Jurvelity Ventures neral Catalyst R pphire Venturescon Valley BannEleven Venturangle Peak ParCapital Partners
any website, all r
001 17th Streetenver, CO 8020
agement (IAM)Partners in 2
sed of customPing Identity
nal enterprise s are strictly st
ned security plhandling millionctor authenticaas well as govee authenticatios highly custom
cquired by Vist
vetson
s k
res rtners s
revenues are CY
7
t 02
) for customers016 in order to
mer and partney targets largapplications a
tandards base
atform that cans of identitiesation and singleern data. It alson. The platformmizable to eac
tain
Y-17
1
s, o
er e s d
n s, e o
m h
Cybersecurity, Data Management & Comm Infrastructure
72
PIVOT3
Founded: 2002 Revenue: $25M-$50M
www.pivot3.com 512.807.2666
221 W. Sixth Street, Ste. 750 Austin, Texas 78701
Company Summary: Pivot3 improves the simplicity and economics of the enterprise datacenter with next-generation hyperconvergence infrastructure (HCI). By combining storage, compute, networking, and virtualization on commodity hardware, Pivot3’s software-defined platforms allow IT to run multiple, mixed workloads on a single infrastructure while guaranteeing performance to the applications that matter most. The company launched the latest release of its HCI platform in mid-2017 with support for NVMe and the product fueled a sharp acceleration in Pivot3’s growth. The company’s agile infrastructure bolsters performance, scale and efficiency so enterprises can keep pace with the demands of digital transformation. With over 2,000 customers in 54 countries and over 18,000 hyperconverged deployments in multiple industries such as healthcare, government, transportation, security, entertainment, education, Pivot3 has emerged as a key up-and-comer in the rapidly growing HCI market. Products/Services: Being one of the first hyperconverged players to market, Pivot3 offers a mature and proven technology and it has entrenched itself as a leading provider in the security video storage market. The company is differentiated in its ability to efficiently store data across nodes, reducing data storage costs. Its Global architecture spreads data across virtual machines (VMs), rather than requiring data residency at the VM-level, enabling increased flexibility, better data resiliency, improved scale, and data efficiency with two great software product lines, Pivot3Acuity, its HCI platform, and vStac, its storage, computing and networking virtualization platform. In addition, the NexGen platform adds hybrid and all-flash arrays, and a storage orchestration solution that enables centralized management of storage infrastructure. Key Officers: Ron Nash – CEO Bill Galloway – Founder, VP & CTO Bill Stover – VP & CFO John Spiers – EVP, Strategy Bruce Milne – VP & CMO Jamie Lerner – VP & COO Carlo Garbagnati – VP, Engineering Board of Directors: Ron Nash – Chairman & CEO, Pivot3 Steven Mitchell – MD, Argonaut Private Equity Donna Troy – Independent Board Member Al Higginson – Director, F5 Networks Brian Smith – MD, S3 Ventures Marc Zionts – CEO, Automated Insights Headcount: 210 Open Positions: 12 U.S. based: 12 International: 0 Sales: 6 Other: 6
Competition: EMC NetApp IBM Hitachi Data Systems (HDS) Nutanix SimpliVity Total Funding: $253M Key Investors: Argonaut Private Equity Interwest Partners Mesirow Financial S3 Ventures Source: Company website, all revenues are CY-17
Cybersecurrity, Data Manaagement & Co
REDSEAL
Company Suexternal attaccreating a netproactively secompliance. Rexposed if anpositioned as half commercintegrations, a Products/Serunderstandablvaluable netwonetwork devicpreviously unkpractices. Oncproviding all dwhich rates thintegrates with Key Officers:Ray Rothrock Sundar Raj – VHom BahmanyGord Boyce – Steve TimmerDr. Mike LloydBob Finley – CJulie Parrish –Kurt Van Etten Board of DireRay Rothrock Mark Achler – Tench Coxe – Bill FuncannonSteve GoldberJoe Horowitz –Rhonda MacLPete Sinclair –Robert Locke, Headcount: 1 Open PositioU.S. based: 1 International: 0Sales: 1 Other: 0
Founded: 200Revenue: $25
omm Infrastruc
ummary: RedSck path to theitwork map thatecure against RedSeal focusen attack transpa platform for ial. RedSeal hnd tailored use
rvices: RedSele and securaork assets. To
ces, computes known and misce the model details necessahe effectivenesh pre-existing s
– Chairman & VP, Product Deyar – VP, EnginSVP, Commer
rman – VP, Busd – CTO CFO – CMO n – VP, Produc
ectors: – Chairman & MD, MATH VeMD, Sutter Hil
n – MD, OVP Vrg – Partner, V– Managing GPean – CEO, M
– MD, LeapfrogSVP Corp Dev
45
ns: 1
0
04 5M-$50M
cture
Seal enables ir most valuabt shows all vuattacks as we
es on identifyinpires, allowing multi-person u
has four key aer experience.
eal’s security able by providi
do this, RedSea visual mod
sconfigured devis complete, R
ary to remediass of security osecurity system
CEO evelopment neering rcial Sales siness Develop
ct Management
CEO, RedSeaenture Partnersll Ventures Venture Partneenrock P, Icon VentureacLean Risk P
g Ventures v, Tyco Intl
ww408
organizations ble network aslnerabilities in
ell as monitorng a customer’s
the account tuse, with half oareas of focus
analytics plaing a visual meal imports thedel of the netwvices, and comRedSeal identate each one.out of 850 and
ms to help the u
pment
t
al s
ers
es Partners
ComSkyFire Tota KeyIconLeaMATOVPSuttVen
ww.redseal.net8.641.2200
So
to calculate ssets. The cothe network, wrules and con
s blast radius, to save both tof its customers in the upcom
atform makesmodel complete configuration work using pa
mpares device ctifies and priorIt also provide
d tracks securituser gain more
mpetition: ybox eMon
al funding: $7
y Investors: n Ventures pfrog VenturesTH Venture PaP Venture Partter Hill Venture
nrock
ource: Company
every possiblmpany accomwhich allows tnfigurations to an area where
time and monrs being federaming year: sc
s complex glte with all posfiles of all laye
atented algoritconfigurations ritizes networkes a Digital Rety improvemenvalue out of its
71M
s artners tners es
940 StewarSunnyvale,
y website, all reve
7
le internal andmplishes this b
he customer tconfirm polic
e they are mosey. RedSeal i
al and the othecalability, fabric
lobal networkssible paths toer 2 and layer hms, discoverto industry bes
k vulnerabilitiesesilience Score
nt. The platforms products.
rt Drive CA 94085
enues are CY-17
3
d y o y
st s
er c,
s o 3 s
st s, e
m
7
74
RISKIQ
Founded: 200Revenue: $50 Company Suscale to addremployees. Thimpact an orgunknown or unleverages a usurfaces from data or allowsgained new PassiveTotal growth of 100% Products/SerRiskIQ For Adchain, allowingcustomers areintelligently sccompliance viooffers an APIincorporated iaccurate pictu Key Officers:Elias (Lou) MaDavid Pon – CChris Kiernan Jeff Baeth – CJason Zann – Jonas Edgewo Board of DireElias (Lou) MRiskIQ Greg GoldfarbMichael BrownSteve LeightelJack Russo –Group LLP Headcount: ~ Open PositioU.S. based: 5 International: 2Sales: 3 Other: 4
09 0M-$100M
mmary: RiskIQress the challehe company pganization’s dinauthorized we
unique technolooutside a cust
s the customertechnologiesacquisition), a% Y/Y.
rvices: RiskIQ ds continuouslyg enterprises toe able to idencans and navigolations, identif solution to anto external syre of their digit
anousos – Co-fCo-founder
– Co-founder &CFO
VP, Head of Porth – VP, Engi
ectors: Manousos –
b – MD, Summin – GP, Batteryll – Principal, G– Managing P
~170
ns: 7
2
Cy
www.risk888.415
Q generates aenge of externproactively detegital assets. Tebsites and moogy that emulatomer’s firewalr to access theincluding its llowing the co
offers many dy scans and tro identify and r
ntify rogue appgates through fying zero-day access RiskIQystems. It alsoal attack surfac
founder & CEO
& CTO
Platform ineering
Co-founder &
it Partners y Ventures
Georgian PartnePartner, Comp
ybersecurity, D
kiq.com .4447
and analyzes dnal threats taects malware,The company obile applicatioates Internet ull. The compane data directlyfreemium pro
ompany to gre
distinct cloud sracks online adremove maliciops and scan kwebsites to dthreats and ma’s massive da
o offers a digitace.
O
& CEO,
ers puterlaw
ComCyvThoQuaRapTenWhiProo Tota KeyBattGeoSum
Source: Com
Data Managem
22Sa
data reflecting rgeting the enfraud, and braalso helps en
ons that were nusers and monny then uses its. Through thre
oduct called Reatly extend its
services to prodvertising as itous advertisemknown apps foetect malwarealicious behaviata set, allowial footprint ser
mpetition: veillance omson Reuters alys pid7 nable iteHat ofpoint
al Funding: $6
y Investors: tery Ventures orgian Partnersmmit Partners
mpany website, a
ment & Comm
2 Battery Streetan Francisco, C
the open webnterprise, its cand infringementerprise custonot actively monitors web ands own analytic
ee recent acquRiskIQ Comms customer ba
otect against et flows through
ments. With Risor malware. R
e, malvertisemeior on websitesng RiskIQ intervice, providing
(MarkMonitor)
65.5M
s
all revenues are C
m Infrastructure
t, 10th Floor CA 94111
b on a massivecustomers, andents, which caomers discoveonitored. RiskIQd mobile attacs to assess th
uisitions, RiskIQunity (from it
ase and realize
external threatsh the ad supplskIQ for MobileRiskIQ for Weents, fraud ans. The companelligence to beg users with a
)
CY-17
e
e d n
er Q k e Q s e
s. y
e, b d y e n
Cybersecurrity, Data Manaagement & Co
RUBRIK
Founded: 201Revenue: $50 Company Sumsearch, analythyperconvergedata with a sienables data allows for mmanagement running on its Products/Serinstant recoveone secure faAppliance is pthe cluster for functionality avwill often initiasuch as cloud Key Officers:Bipul Sinha – CArvind NithrakArvind Jain – CSoham MazumMark Smith – Kara Wilson – Board of DireBipul Sinha – CArvind NithrakArvind Jain – CSoham MazumRavi Mhatre Partners Asheem Chan Headcount: 6 Open PositioU.S. based: 85International: 4Sales: 76 Other: 50
omm Infrastruc
14 0M-$100M
mmary: Rubriktics, complianced architectureingle policy enmobility acrosore granular infrastructure, platform within
rvices: Rubrik ery, replication,abric across thpowered by a h
linear scalabilvailable acrossally replace tramigration.
Co-founder & Ckashyap – Co-foCo-founder & Vmdar – Co-founEVP Global SaCMO
ectors: Co-founder, Ru
kashyap – Co-foCo-founder, Rumdar – Co-foun
– Partner,
ndna – Partner,
650
ns: 126 5 41
cture
www.rub844.478
k offers a cloude, and copy da
e, Rubrik enabngine, consolids on-premise data retrievalallowing the m
n a half hour.
delivers a m search, analy
he data centerhyperconvergedity and perform
s RESTful APIsditional backup
CEO ounder & CTOVP Engineeringnder & Architecales & BD
ubrik ounder, Rubrikubrik nder, Rubrik
Lightspeed V
Greylock Part
brik.com .2745
d data manageata managemeles enterprises
dating disparateand cloud envl from public
most demandin
modern data mytics, archival, r and public cld system that dmance. Using As, making the sp/recovery soft
O g ct
k
Venture
tners
ComCohComDellNetAVeeVeri Tota KeyFranGreIVPJohLighMarKho
Sourc
10Pa
ement platforment to the enters to backup ane silos of secovironments by
clouds. Rubng large enterp
management pcompliance, aloud. The Rubdistributes dataAPI-first architesolution highly tware, and the
mpetition: hesity mmvault l/EMC App
eam itas
al Funding: $2
y Investors: nk Slootman ylock Partners
n Thompson htspeed Venturrk Leslie osla Ventures
ce: Company we
001 Page Mill Ralo Alto, CA 94
m that delivers drprise. Leveragnd orchestrate ondary storageutilizing a clou
brik has simpprise customer
platform that und copy data m
brik Cloud Data, metadata, anecture, Rubrik programmable
en expand to o
292M
re Partners
ebsite, all revenue
7
Rd, Building 2, 4304
data protectionging a scale-oumission critica
e. The platformud index whiclified the datars to be up and
unifies backupmanagement ita Managemennd tasks acrosmakes all of it
e. The companother use case
es are CY-17
5
n, ut al m h a d
p, n nt s s y s
SCALITY
Founded: 200Revenue: $25 Company Sumx86 servers thpay-as-you-scWith the Scalithat natively suusers against more x86 servallowing for clo Products/Serstorage. Specbroad applicaBecause Scalperformance-eoffering to proprotocols. Thedata protection Key Officers:Jérôme Lecat Giorgio Regni Philippe MechPaul Turner – Claire Forest – Board of DireMatthieu BareFrederic Le BrDouglas CarlisFrançois DulièCurt GunsenhJérôme Lecat Renaud PoulaGiorgio Regni Garrett Wong Headcount: 2 Open PositioU.S. based: 8 International: 9Sales: 3 Other: 14
09 5M-$50M
mmary: Scalityhat provide exccale cost modety RING, enterupports file, obbusiness down
vers if more stooud-scalability.
rvices: The Sccifically, Scalityation accessibity leverages x
enhancing servovide its architee RING architecn and self-heal
– CEO – Founder & Canick – CFO CMO
– Chief People
ectors: t – Partner, Idinrun – Partner, Hsle – GP, Menlège – MD, Galileimer – Partne– CEO, Scality
ard – Partner, O– CTO, Scality– Investor, HP
230
ns: 17
9
Cy
www.sca650.356
y provides softwceptional resiliel with servers frprises are ablebject, S3, and Ontime and prov
orage is needed
cality RING stoy RING providbility, hardwarex86 servers, evers as they ecture for bothcture allows foring.
CTO
Officer
nvest PartnersHoReCa.digitao Ventures leo Partners
er, Iris Capital y Omnes Capitaly Ventures
ybersecurity, D
ality.com .8500
ware-defined sence. Customefrom HPE, Dele to maximize OpenStack appvide continuityd, and the platf
orage platformdes significant e flexibility, p
enterprises areare introduce
h S3 (AWS) nar peer-to-peer
s l
ComDellIBMNetA Tota KeyBpi BroaGaliHP IdinvIris MenOm
Source:
Data Managem
55Sa
storage (SDS) ers can grow cll, Cisco, and Sstorage capab
plications. Scal. The product form automatic
turns standarbenefits to st
petabyte scalae able to use td. Recently, S
ative storage arouting and ob
mpetition: l/EMC
M (Cleversafe) App
al Funding: $9
y Investors: France adBand Towerileo Partners Ventures vest Partners Capital nlo Ventures nes Capital
Company websi
ment & Comm
55 California Stan Francisco, C
solutions that rcapacity incremSeagate or combilities with a slity RING can fis simple in th
cally rebalance
rd x86 servers torage infrastruability, and 10the most cost-Scality expandas well as Azurbject storage wi
92M
r, Inc.
ite, all revenues
m Infrastructure
7
treet, Ste. 3050CA 94108
run on standarmentally using ammodity ODMsstorage platformfully protect endat one can adds the data load
into web-scaleucture such a00% reliability-efficient and/oded its producre Blob storageith policy-based
are CY-17
e
76
0
d a s. m d d
d,
e s y. or ct e d
Cybersecurrity, Data Manaagement & Co
SENTINELO
Founded: 201Revenue: $25 Company Susolutions. Usiautomatically iSentinelOne isas an Anti-virubusiness so th Products/Serunknown threawith cloud intadvanced attaand blacklistinendpoint. By tcapabilities. Swhat is happe Key Officers:Tomer WeingaAlmog Cohen Bob Parker – CRebecca KlineNick Warner –Jeremiah GrosDavid Ginat – Ehud Shamir – Board of DireTomer WeingaAlmog Cohen Steve Westly –Matt Okco – CSameet MehtCapital PartneJustin SomainDaniel Schein Headcount: 2 Open PositioU.S. based: 15International: 1Sales: 7 Other: 19
omm Infrastruc
ONE
13 5M-$50M
ummary: Sentng real-time ain real time. Ws able to monitus (AV) solutionhat the compan
rvices: The Seats, and delivetelligence, nex
acks, and zero-ng with advanctaking this appentinelOne alsning across all
arten – CEO & – CTO & Co-foCFO e – CMO – Chief Revenussman – Chief VP, R&D
– Chief Securit
ectors: arten – Co-foun– Co-founder, – Founder, The
Co-MP, Data Cota – Managin
ers i – Chief Trust man – Individu
250
ns: 26 5 11
cture
www.sen855.868
tinelOne provianalysis it hasith a proprietaror every stagen, and since thny displaces inc
entinelOne EDers real-time foxt gen anti-virday threats in ced static prevproach, the comso provides a ro
endpoints, loc
Co-founder ounder
ue Officer of Security Str
ty Officer
nder, SentinelOSentinelOne
e Westly Groupollective ng GP, Gran
Officer, Box ual Investor
ntinelone.com.3733
ides next-gen s the capabilitry architecture e of the attack len it has steadcumbent vendo
DR continuousorensics. The srus technologya single solutio
vention to detempany is able obust manage
cal and remote,
rategy
One
p
nite Hill
ComBromCrowCarCylaMcASym Tota KeyAccDataGraRedSineSouTheThirTigeUpW
Source
60Mo
endpoint detty to detect, ithat utilizes colifecycle. In 201dily increased tors in about 80
sly monitors ensolution combiy, and whitelison. SentinelOnect and deter to provide rob
ment interface, in real time.
mpetition: mium wdStrike bon Black ance Afee mantec
al Funding: $1
y Investors: cel Partners a Collective nite Hill Capita
dpoint Venturesewave Ventureund Ventures e Westly Grouprd Point Venturer Global ManaWest Labs
e: Company web
05 Fairchild Driountain View, C
tection and reinspect, and m
ode execution o15, the companhe proportion o
0% of its deploy
ndpoints to denes true behasting to stop ne utilizes dynathreats before
bust preventione, allowing ente
110M
al Partners s es
p res agement
bsite, all revenue
7
ve CA 94043
esponse (EDRmitigate threaton the endpointny was certifiedof displacemenyments.
etect previouslvioral detectioknown threats
amic whitelisting they reach an and detectioerprises to trac
es are CY-17
7
R) s t, d
nt
y n s, g n n k
78
SILVER PE
Founded: 200Revenue: >$1 Company Suenterprises aneffective sourhardware appWAN) solutionThe adoption growth over thSD WAN businto augment orand relativelyNetworks, to in Products/SerOptimization sappliances forpolicy managewith several clto cost effectivthe industry’s hypervisor. Key Officers:David HughesDamon Ennis Chris Helfer – Eric Yeaman –John VincenzoPat Gilbreath –Shayne StubCloud Board of DireJohn CaddedGoodrich LLC Roger Evans –Robert FinoccDavid HughesAndy Rachleff Headcount: 2 Open PositioU.S. Based: 29International: 7Sales: 25 Other: 11
EAK SYSTEM
04 100M
ummary: Silvend service prorce of connecliances, but sh
ns in 2013 wheof cloud appl
he past year, aness to surpasr completely re inflexible. Silntegrate securi
rvices: Silver service. The cor creating SD-Wement, and Unloud infrastructvely create IT i
only multi-gig
s – Founder, CE– SVP, ProducSVP, Worldwid
– CFO o – SVP & CMO– VP, Sales, Nbs – VP, Se
ectors: du – Investor
– Investor, Grehio, Jr. – Priva
s – CEO, Silverf – Investor, Be
250
ns: 36 9 7
Cy
MS
www.silv408.935
er Peak deveoviders to flexictivity availablehifted its strateen its CTO anications by enllowing the com
ss its WAN optieplace traditionlver Peak parity services into
Peak offers Sompany has a WAN connectionity Boost for ature vendors tonfrastructure fo
gabit virtual so
EO & Chairmancts de Sales
O orth America ervice Provide
r, Duff Acker
eylock Partnerste Investor
r Peak enchmark Capit
ybersecurity, D
ver-peak.com.1800
lops applianceibly and secure. The compaegic focus to sd founder, Dav
nterprises has mpany to greatmization busin
nal dedicated drtners with mao Silver Peak’s
SD WAN andsuite of SD-W
ons, Unity Orcapplication acco provide an intor remote sitesolution and th
n
ers and
rman &
s
tal
ComCiscCitriClouRiveVipt Tota KeyArtisBenDuffGreJ&WPinn
Source:
Data Managem
28Sa
es and cloud-rely connect u
any initially focsoftware-definevid Hughes, asbeen the ma
tly extend its cness. Using SDdata lines, sucany security v
s products.
d hybrid solutWAN products, i
hestrator for pceleration. The tegrated platfos. For WAN ophe only produc
mpetition: co ix udGenix erbed tela
al Funding: $8
y Investors: s Ventures
nchmark Capitaf Ackerman & Gylock Partners
W Seligman nacle Ventures
Company websi
ment & Comm
860 De La Cruzanta Clara, CA
-based serviceuser sites via cused on WA
ed wide-area nssumed his po
ajor catalyst foustomer base
D-WAN, organizch as MPLS, wvendors, inclu
tions with an including Unityroviding netwocompany has
rm that organizptimization, Silcts that suppo
86M
al Goodrich LLC
s
ite, all revenues
m Infrastructure
z Blvd. 95050
es that enablthe most cost
AN optimizationetworking (SDosition as CEOor Silver Peak’and enabled itzations are ablewhich are costlding Palo Alto
optional WANy Edge Connecork visibility an also partnerezations can usever Peak offer
ort every majo
are CY-17
e
e t-n
D-O.
s s e y o
N ct d d e s
or
Cybersecurrity, Data Manaagement & Co
SKYBOX S
Founded: 200Revenue: $50 Company Sumto eliminate cprovides visibThe Skybox scompliance maverage deal s Products/Serthe entirety ofThe company and Threat Maand network dnetwork contevulnerability, a Key Officers:Gidi Cohen – FAmi Ben-Dror Lior Barak – CStewart Fox – Michelle JohnsPaula EwanichRon DavidsonRavid Circus –Moti Dror – VP Board of DireGidi Cohen – FMark HastingStrategic GrowThomas RearGrowth Headcount: 2 Open PositioU.S. based: 7 International: 1Sales: 5 Other: 18
omm Infrastruc
SECURITY
02 0M-$100M
mmary: Estabcybersecurity aility into the nesolutions allow
monitoring. Skysize over the p
rvices: Skyboxf their attack soffers six sepa
anagement andevice data withext. Granular and threat man
Founder & CEO– CIO
CFO EVP, WW Sal
son Cobb – CMh – VP of Peop – CTO and VP
– VP, ProductsP, Customer Ca
ectors: Founder & CEOgs – MD &wth rdon – MD,
250
ns: 23
16
cture
www.sky408.441
lished in 2002,attacks and pretwork, while cw for vulnerabbox is growingast year.
x Security offerurface througharate models td Security Polh vulnerability asecurity analyagement proce
O
es MO ple P, R&D are
O, Skybox & Head, Pro
Providence S
yboxsecurity.co.8060
, Skybox Securotect businesscontextualizingility and threag billings over
rs a suite of prh modeling andthat are groupelicy Managemeand threat inteytics reduce resses for comp
ovidence
Strategic
ComAlgoFireRedTufi Tota KeyBenCarLighMofProvRemSas
Source: Com
om 2077San
rity provides ses data. Using
g the threats wat managemenr 50% Y/Y and
roducts that hed prioritizing thed into two broent. The Skybolligence, puttinresponse timeplex networks m
mpetition: oSec eMon dSeal Networksn
al Funding: $2
y Investors: nchmark mel Ventures htspeed Venturfet Technology vidence Equity
mbrandt Ventursquehanna Gro
mpany website, a
7 Gateway PlaJose, Californ
ecurity manageits proprietary
with intelligencent, firewall mand has substan
elp enterprises hreats by leveloader categorieox Platform co
ng security decie and risks, mmore managea
s
279M
re Partners Fund
y Partners re Partners owth Equity
all revenues are
7
ce, Suite 200ia 95110
ement solutiony technology
e and analyticsnagement, andtially increased
better visualiz of importancees: Vulnerabilitombines firewaisions in unique
making firewalable.
CY-17
9
s it
s. d d
e e. y ll e l,
80
SOLARFLA
Founded: 200Revenue: $50 Company Susoftware and pioneer in higagainst commhighly differenreaccelerationdriver, and madoption. Products/Serto transform thsecurity. The cup to 100 Gbp Key Officers:Russell Stern –Mary Jane AbaAndre ChartraSteve Pope – Derek RobertArchitecture David RiddochMichael OfstedAhmet Housse Board of DireBandel CaranoCharles CottonRussell Stern –John Hamm – Mark Potter Enterprise Headcount: 2 Open PositioU.S. based: 4 International: 2Sales: 0 Other: 6
ARE COMM
01 0M-$100M
ummary: Solahardware thath-performance
moditized chip tiated by its so of growth in re
more recently,
rvices: Solarflahe way applicacompany offers
ps, along with it
– President & Calos – CFO nd – VP, EnginCo-founder & Cts – Co-found
h – Co-founderdahl – VP, WWein – VP, Mark
ectors: o – MP, Oak Inn – Director, C– President & CTechnology C– SVP & CT
207
ns: 6
2
Cyb
UNICATION
www.sol949.581
arflare Commut accelerates,
e, low-latency sdevelopers by
oftware, which ecent years as
as next-gene
are Communicaations use netws high-performts new applicat
CEO
neering CTO der & VP, Ha
r & Chief ArchitW Sales
eting & Strateg
nvestment Partambridge EnteCEO, Solarflar
CEO, Venture InTO, Hewlett P
bersecurity, D
NS
larflare.com .6830
unications provmonitors, and
server networky providing lowis its primary s
s the high-frequeration data c
ations developworks, effectiv
mance, low-latetion accelerato
ardware
tect
gic Dev.
tners erprise re nvestor Packard
ComBroaInteMel Tota KeyAcaAnthOak
Source: Compa
Data Managem
75Irv
vides applicati secures netw
king interface sw-cost hardwasource of reveuency trading icenter architec
ps network intevely increasing ency server adar and associate
mpetition: adcom l lanox
al funding: $3
y Investors: acia Capital Parhem Venture Pk Investment P
any website, all re
ment & Comm
505 Irvine Centvine, CA 92618
ion-intelligent work data. Thesolutions. Solarare, but the conue. Solarflarendustry becamctures gained
erface softwareapplication pe
aptors with baned software.
305M
rtners Partners artners
evenues are CY-
Infrastructure
ter Drive, #1008
networking I/Oe company is arflare competeompany is alsoe experienced ame a key marke
broad marke
e and hardwareerformance anndwidth speed
-17
e
O a s o a et et
e d s
Cybersecurrity, Data Manaagement & Co
STACKPAT
Founded: 201Revenue: >$1 Company Supresence (POmultiple securnetwork (CDNand a develosecurely and premise policifounder of Sof Products/Serseeking to incseveral securlisting, two-stesupport large-security servicenterprise clas Key Officers:Lance Crosby Sherri Russell Wen Temitim –John Cahill – VFrancisco RomNick Nelson – Steve Canale Board of DireUnknown Headcount: 2 Open PositioU.S. based: 11International: 0Sales: 0 Other: 11
omm Infrastruc
TH
15 100M
ummary: StackOPs)) to deliverity acquisitions) which offers
oper-focused cseamlessly traes in cloud enftLayer which p
rvices: The Stacrease securityity services: Dep authenticati-scale connectces are integrss security that
– Chairman & – CFO
– CTO VP, Global Salmero – COO &
Chief Strategy– CRO
ectors:
275
ns: 11 1 0
cture
www.sta877.629
kPath is buildr secure web-s that have bea wide array ofcontrol panel ansition to clo
nvironments. Tpioneered cloud
ackPath CDN wy, speed, and
DDoS mitigatioon, and securtivity and supprated into itst leverages AI d
CEO
es President
y Officer
ackpath.com .2361
ing a distribut-facing serviceeen consolidatef security serviwith API cap
oud as the cohe company isd hosting servic
was built specd scale. As a on, web applicre tokens. Stacport for enterpglobal, secure
derived from th
ComImpAka Tota KeyABR
Source: Com
20Da
ted network os to enterpriseed to form a sices, led by a w
pabilties. Stackompany allowss being spearhces and was a
ifically for entepart of its CD
cation firewall ckpath also reprise applicatioe CDN, providhe company’s g
mpetition: erva
amai
al Funding: $1
y Investors: RY Partners
mpany website,
021 McKinney Aallas, TX 75201
of data centerses. The compasingle secure cweb applicationkPath enabless enterprises theaded by Lancquired by IBM
erprises and coDN offering, St
(WAF), SSL cently acquireons.The Stackding businesseglobal sensor n
180M
all revenues are
8
Ave., #1100 1
s (i.e., point oany consists ocontent delivern firewall (WAFs customers toto replicate onnce Crosby, theM in 2013.
ontent providertackPath offerservices, blacd Highwinds to
kPath’s suite oes of all size
network.
CY-17
1
of of y
F) o
n-e
s s k o
of s
Cybersecurity, Data Management & Comm Infrastructure
82
TANIUM
Founded: 2007 Revenue: >$100M
www.tanium.com 510.704.0202
2200 Powell St., 5th Floor Emeryville, CA 94608
Company Summary: Tanium’s software collects and processes data from billions of events across endpoints in real time, providing real-time security, endpoint management, and visibility in large scale, enterprise IT environments. This allows IT managers to identify and respond to threats within seconds or minutes, as opposed to traditional requirements for hours or days. Tanium provides IT operators with 15-second visibility and control over any endpoint in even the most complex networks. With Tanium's search bar, users are able to use "plain English" (rather than scripting language) to query hundreds of thousands of endpoints in real time, allowing questions to be asked that were previously impossible at scale. The company offers a suite of modules that enables it to target market opportunities in both security and IT operations, as well as to generate significant follow-on business from its customer base of large enterprise organizations. In light of heightened security concerns and Tanium’s unique market position, the company has experienced a sharp acceleration in growth over the past three years and has grown headcount from 50 to ~500 during that time. The company has also raised over $300M in funding, despite operating on a breakeven basis. Products/Services: Tanium offers a suite of solutions, known as Tanium 7, for security and incident response, audit and compliance, and endpoint management. With Tanium's unique architecture, most communication is client-to-client rather than client-server, which dramatically simplifies large scale deployments and enables rapid response times, making decisions practically live. As a result, Tanium can be managed using a single server for up to hundreds of thousands of seats and large-scale deployments take days instead of months. Tanium offers unprecedented speed, scale, and simplicity. Key Officers: David Hindawi – Co-founder & Executive Chairman Orion Hindawi – Co-founder & CEO Chris Bream – CTO Bina Chaurasia – Chief People Officer David Damato – CSO Anirma Gupta – General Counsel Fazal Merchant – COO and CFO Charles Ross – CCO Mark Wayland – CRO Board of Directors: David Hindawi – Co-founder, Tanium Orion Hindawi – Co-founder & CTO, Tanium Steven Sinofsky – Board Partner, Andreessen Horowitz Gordon Davidison – Board Partner, Fenwick & West LLP Nathan Brill – CEO, Executive Press Morten Simonsen – Principal, Nor-Cal Invest LLC Anthony Belfiore – Chief Security Officer, Aon Maggie Wilderotter – Former CEO, Frontier Communications Headcount: ~500 Open Positions: 131 U.S. based: 120 International: 11 Sales: 27 Other: 104
Competition: CrowdStrike FireEye Intel/McAfee Symantec Total Funding: $406M Key Investors: Andreessen Horowitz Citi Ventures Franklin Templeton Investments Geodesic Capital Institutional Venture Partners TPG T. Rowe Price
Source: Company website, all revenues are CY-17
Cybersecurrity, Data Manaagement & Co
TENABLE
Founded: 200Revenue: >$1 Company Sudeveloped thewith 1.6 millioeffectively leveselling its broait achieved gromillion in 2017company alsoincreasing sale Products/SerNessus Profesvulnerability mphysical and management. SecurityCenteallowing usersmonitoring plaand prioritize v Key Officers:Amit Yoran – CRenaud DeraisJack Huffard –Steve Vintz – CJohn Negron –Jennifer JohnsDave Cole – CBrad Pollard –Stephen Riddi Board of DireAmit Yoran – CJack Huffard –Ping Li – GeneJohn Locke – Richard Wells Matt Gatto – VBrooke Seawe Headcount: ~ Open PositioU.S. based: 11International: 6Sales: 40 Other: 134
omm Infrastruc
02 100M
mmary: Tenae Nessus vulneon users, the eraged its userader suite of vuowth of more th7. Tenable serv increased its es for the fores
rvices: Tenablssional is an o
management sovirtual enviroTenable.io pri
er consolidatess to analyze d
atform that usesvulnerabilities.
Chairman & CEson – CTO & C
– President, COCFO – CRO son – CMO Chief Product O– CIO ck – General C
ectors: Chairmain & C– Co-founder aeral Partner, AcPartner, Accel– Managing D
VP, Insight ell – Audit Cha
~900
ns: 174 11 63
cture
www.ten410.872
ble provides cerability scanne
vast majority r-base and expulnerability mahan 40% for 7 ved more than sales capacity
seeable future.
le has three mon-premise sinolution. Nessusonments. Tenaoritizes risks s
s the data colldata in a cohs the company
EO Co-founder OO & Co-found
Officer
Counsel
EO, Tenable nd COO, Tenaccel
Director, Insight
air, Tenable
nable.com .0555
continuous visier, which is the
if which use panded beyondnagement soluconsecutive q24,000 custom
y, and with the
main productsgle scanner, ws can quickly able.io is its so enterprises clected by Nes
hesive mannery’s compliance
der
able
t
ComQuaRap Tota KeyAccInsig
Source:
7021 ColColumbia
ibility and risk e most widely d
the free versd its user-baseutions. The comuaretrs, generamers including addition of a C
s: Nessus, Tewhereas Nessuidentify malwaenterprise clocan patch the ssus into a sinr. The Securit
e and security p
mpetitors: alys pid7
al Funding: $3
y Investors: cel Partners ght Venture Pa
Company websi
umbia Gatewaa, MD 21046
management.deployed scannsion. Howeve to develop a rmpany recentlyating sales of m50% of the Fo
CMO, it is look
nable.io and us Manager is are and threatsoud product fbiggest vulnerngular manageyCenter CV ispolicies to dete
310M
artners
ite, all revenues a
8
ay Dr., Ste. 500
. The companner in the worlder Tenable harobust businesy announced itmore than $25ortune 500. Thking to continue
SecurityCenteran on-premise
s in a variety ofor vulnerabilitrability first. Thement consoles a continuouect weaknesse
are CY-17
3
0
y d s s s 0 e e
r. e
of y e
e, s s
84
TUFIN
Founded: 200Revenue: $50 Company Summarket, after orchestration, Tufin has the environementsincreasingly crservice deliverenvironments.that spans all Products/Sersecurity. The network changcomplex netwand manage cthree productsan organizatio Key Officers:Ruvi Kitov – CYoram GronicReuven HarrisPat Walsh – CJack Wakileh –Pamela Cyr – Kevin MaloneyOfer Or – VP, Raj Motwane –Shaily Hamen Board of DireRuvi Kitov – CReuven HarrisAlain Dobkin –Edouard CukieOhad FinkelsteYuval ShachaRonni Zehavi Team8 Cyber Headcount: 3 Open PositioU.S. based: 19International: 1Sales: 19 Other: 12
05 0M-$100M
mmary: Tufin beginning a
Tufin offers hability to stre
s. Tufin’s abiritical with the ry and regulato The companymajor industrie
rvices: Tufin’s suite accelera
ges and auditswork environmeconnectivity on s, SecureTrackon’s security po
Co-founder & Ch – VP R&D
son – Co-foundCMO – CFO SVP, Businessy – SVP, GlobaProducts – VP, Global Sahem – VP of
ectors: Co-founder & Cson – Co-found– MP, Catalyst erman – MP, Cein – Partner, Mr – Partner, Ma– Strategic A
Security
305
ns: 31 9 12
Cy
www.tuf877.270
has evolved itsas a firewall holistic networkeamline how slity to assureenterprise ado
ory compliancey has an instaes and includes
Orchestration ates service ds through autoent. It also ena
a single pane k, SecureChangolicy manageme
EO
der & CTO
s Developmental Sales
Services and SuHR
EO, Tufin der & CTO, TufInvestments
Catalyst InvestmMarker LLC arker LLC Advisor & Co-f
ybersecurity, D
fin.com .7711
s offering to tarpolicy manag
k analysis andsecurity policiee business cooption of cloude across on-prlled base of m
s some of the m
Suite providesdelivery, increamation and po
ables the user of glass. The
ge, and Securent and change
t
upport
fin
ments
founder,
ComAlgoFireInfoSky Tota KeyCataMar
Sou
Data Managem
2 OBo
rget the broadegement compd change procs are manageontinuity with d architectures remise cloud (pmore than 1,90most complex n
s the benefits ases IT agility,olicy baselines
to implement Security Policy
reApp, which we automation n
mpetition: oSec eMon blox
ybox
al Funding: $3
y Investors: alyst Investmerker LLC
urce: Company w
ment & Comm
Oliver Street oston, MA 0210
er security policpany. Within cess automatioed over a vari
a tight secuas its platform
public and priv00 large enterpnetworks in the
of IT automat, reduces the , and can opeapp-specific s
y Orchestrationwork together toneeds.
30M
nts
website, all reven
m Infrastructure
09
cy orchestratiosecurity polic
on. Specificallyety of complerity posture i
m ensures rapidvate) and hybridprise customere world.
tion for networtime spent o
erate easily in asecurity policien Suite includeo address all o
nues are CY-17
e
n y y, x s d d s
k n a s s
of
Cybersecurity, Data Management & Comm Infrastructure
85
VARMOUR
Founded: 2011 Revenue: <$25M
www.varmour.com 650.564.5100
800 W. El Camino Real #300 Mountain View, CA 94040
Company Summary: Founded in 2011, vArmour delivers agentless integrated security services to automatically discover application communications, optimize policy modeling and protect critical application and workloads across multi-clouds. vArmour’s DSS Distributed Security System is deployed across the world’s largest banks, telcos, governmental agencies, healthcare providers and retailers. Sitting as a virtual machine (VM) on top of any hypervisor, vArmour’s platform is able to see traffic flow through as well as gain application level knowledge, in addition to network information, all without a single agent. The company is currently working on making the solution easily downloadable from its website. Products/Services: vArmour offers three sets of products: security policy management, software based segmentation and microsegmentation, and cyber deception. The security policy management tool provides policy creation and maintenance across multi-clouds with full Layer 7 visibility, intent based policy templates and pre-deployment policy validation all to help understand application dependencies and accelerate and validate policy creation. Microsegmentation secures workloads and applications across all envrionments and helps enterprises become operationally efficient. Lastly, vArmour’s cyber deception product proactively defends networks, detects threats and streamlines incident response times. Key Officers: Timothy Eades – CEO Roger Lian – Co-founder and VP, Engineering Michael Shieh – Co-founder and CTO Keith Stewart – VP, Product and Strategy Marc Woolward – CTO Mark Weatherford – SVP, Chief Cybersecurity Strategist Board of Directors: Timothy Eades – CEO, vArmour Roger Lian – Co-founder, vArmour Corey Mulloy – General Partner, Highland Capital Partners David Stevens – Investor Lane Bess – COO, Zscaler Pravin Vazirani – LP, Menlo Ventures Mohsen Moazami – GP, Columbus Nova Technology Partners Meg McCarthy – EVP Ops, Aetna Gary Moore – Advisor Headcount: 100 Open Positions: 3 U.S. based: 3 International: 0 Sales: 1 Other: 2
Competition: Fortinet Checkpoint Cisco Palo Alto Networks Total Funding: $83M Key Investors: Redline Capital Menlo Ventures Highland Capital Partners Allegis Capital Columbus Nova Technology Partners Citi Ventures Telstra Ventures
Source: Company website, all revenues are CY-17
Cybersecurity, Data Management & Comm Infrastructure
86
VECTRA NETWORKS
Founded: 2011 Revenue: $25M-$50M
www.vectranetworks.com 408.326.2020
560 S. Winchester Blvd. San Jose, CA 95128
Company Summary: Vectra Networks focuses on securing the cloud and data center through its AI platform which automates real-time threat hunting to effectively detect attackers in the network before they cause damage. It has recently focused on monitoring and analyzing traffic of IoT devices, an area that previously lacked strong security and is becoming increasingly vulnerable to network breaches. Vectra services mostly enterprises and covers them holistically.
Products/Services: The Vectra AI has full visibility and can stop cyber-attacks from users and IoT devices to data centers and the cloud. Vectra AI leverages human proficiency and machine-learning to provide accurate and automated threat detection, triage and correlation across the enterprise to significantly reduce time spent finding attacks and costs. It continuously tracks data traffic on every physical or virtual host with an IP address, leaving nothing uncovered. The AI platform can seamlessly integrate into pre-existing security services and provide additional threat intelligence, yet the platform also incorporates native security for the private cloud using vSensors, Vectra’s virtual sensors, which ensure complete visibility into all traffic and all workloads and detect compromised data. The Vectra Threat Labs provide cybersecurity research that analyzes and determines the cause for unexplained phenomena. Key Officers: Hitesh Sheth – President & CEO Oliver Tavakoli – CTO Howie Shohet – CFO Kevin Moore – SVP, WW Field Operations Mike Banic – VP, Marketing Jason Kehl – VP, Engineering Kevin Kennedy – VP, Product Management Gerard Bauer – VP, EMEA Sales Board of Directors: Hitesh Sheth – President & CEO, Vectra Charlie Giancarlo – Senior Advisor, Silver Lake Partners Brad Gillespie – GP, IA Ventures Jim Messina – Founder & CEO, Messina Group Eric Wolford – Venture Partner, Accel Partners Headcount: ~130 Open Positions: 13 U.S. based: 11 International: 2 Sales: 2 Other: 11
Competition: Darktrace Cybereason Cylance CrowdStrike Total Funding: $86.5M Key Investors: Accel Partners AME Cloud Ventures DAG Ventures IA Ventures Khosla Ventures Wipro Ventures
Source: Company website, all revenues are CY-17
Cybersecurity, Data Management & Comm Infrastructure
87
VEEAM
Founded: 2006 Revenue: >$100M
www.veeam.com +41.41.766.71.31
Linden Park, Lindenstr. 16, CH-6340 Baar, Switzerland
Company Summary: Veeam offers a next-generation, virtualized backup solution that enables enterprises to modernize their data storage infrastructure. With Veeam’s Availability Orchestrator’s unique architecture, winning the Developers’ Choice Award in 2017, Veeam is able to deliver recovery time and point objectives (RTPO) of less than 15 minutes for all applications and data, compared to traditional solutions that offer RTPO of hours or days. Products/Services: Veeam Availability Suite combines the industry-leading backup, restore, and replication capabilities of Veeam Backup & Replication with the advanced monitoring, reporting, and capacity planning functionality of Veeam ONE. Veeam Availability Suite delivers an all-encompassing backup solution to reliably ensure and manage VMware vSphere and Microsoft Hyper-V environments, providing enterprises with a high availability data center. Veeam also offers an availability orchestrator to manage an enterprise’s backup and disaster recovery. Veeam’s solutions are largely sold as on-premise perpetual licenses; however, the company is increasingly migrating toward cloud-based subscription deployments. Key Officers: Peter McKay – President & Co-CEO Kate Hutchinson – CMO Jeff Giannetti – SVP, Americas Sales Olivier Robinne – SVP, EMEA Shaun McLagan – SVP, APJ Austin Martin – VP, Strategy and Planning Funda Saltuk – Chief HR Officer Board of Directors: Ratmir Timashev – Co-founder and SVP Marketing and Corporate Development, Veeam Andrei Baronov – Co-founder & Co-CEO, Veeam William H. Largent – Chairman of the Finance and Compensation Committees, Veeam Peter McKay – Co-CEO and President, Veeam Headcount: >2,000 Open Positions: 141 U.S. based: 73 International: 68 Sales: 94 Other: 47
Competition: Actifio Barracuda Networks Commvault EMC Veritas Total Funding: Largely self-funded Key Investors: Insight Venture Partners
Source: Company website, all revenues are CY-17
Source: Compa
VENAFI
Founded: 200Revenue: $50 Company Suforgery, and cyberworld. Mand governmeprotecting maenterprises rethe machines attackers are certificates, todigital commuactivities, instcybersecurity business and been growingcustomers incand UK banks Products/Servisibility, intelliSSH, IoT, anintelligence-baavailability of mof-the-box intemachine identrisk, and comp Key Officers:Jeff Hudson – Francois DeleElizabeth IrelaChristophe CuAlex Kaplunov Board of DireBill Elmore – FSkip Glass – FCarl LedbetterGreg ButterfieJeff Hudson – Headcount: 1 Open PositioU.S. based: 20International: 4Sales: 5 Other: 19
any website, all r
00 0M-$100M
mmary: Venaftheft by bad achines don’t uents spend ~$achine identitiely on an expanon their netwousing compro
o break into pnications, creaall malware amarket leadergovernment d subscription lude the top fiv
s, and four of th
rvices: The Vegence, protect
nd mobile devased automatiomachine identiegrations with tity intelligenceprehensive sup
CEO pine – CFO
and – CMO uline – VP, WWv – VP, Enginee
ectors: Founder & GP, Foundation Capr – MP, Pelion Vld – MP, SageCCEO, Venafi
80
ns: 24 0 4
revenues are CY
Cy
www.ven801.676
fi invented theguys. Human
use user name8B per year pes. It is incrending number
orks used for eomised or forgrivate, encrypt
ate their own eand remove ser in machine idepends on forrevenue by ov
ve U.S. health he top five U.S.
enafi Platform tion and automvices. Venafi con to orchestraties at machinehundreds of th
e across their pport for regula
W Field Operatioering
Foundation Capital Venture PartneCreek Partners
Y-17
ybersecurity, D
nafi.com .6900
e technology thns use usernaes and passworprotecting useredibly importaof machine id
every aspect ofged machine idted communicncrypted tunneensitive data wdentity protectr secure machver 75% Y/Y insurers, the to. retailers.
protects machmation for all typ
continuously aate rapid, corree speed and shird-party applnetworks. Thetory, legal, and
ons
apital
ers s
ComHomADCPKI Ded Tota KeyFouPeliMerNexQueInte
Data Managem
17Sa
hat protects maames and pasrds, they use mr names and pnt to protect entities to secf commerce, codentities, whic
cation so they els on enterpriswhile remainintion, securing
hine to machinwhile reachin
op five U.S. air
hine identities pes of machineassesses macective actions tcale. The Venalications allowie result is impd operational re
mpetition: me grown systeC managementconsulting – C
dicated SSH mg
al Funding: $1
y Investors: undation Capitaon Venture Pa
rcato Partners xt Equity PartneestMark Partnel Capital
ment & Comm
75 E 400 S, Sualt Lake City, U
achine identitiesswords as id
machine identitpasswords, and
machine idenure communicomputing, and
ch are made ucan eavesdro
se networks tong undetectedthe machine e communicatg cash flow brlines, four of th
by providing e identities incluhine identity rthat improve thafi Platform alsing organizatioroved cyberseequirements.
ems – internallyt systems – AP
CSS gmt - SSH Co
109M
al artners
ers ers
m Infrastructure
8
ite 300 UT 84111
es from accessdentities in thies. Companied still very littlentities becaus
cations betweemobility. Cybe
up of keys andop on sensitiveo hide maliciou. Venafi is theidentities everion. Venafi habreakeven, andhe top five U.S
comprehensiveuding SSL/TLSrisks and usehe security andso includes outons to integrateecurity, reduced
y developed PPViewX
ommunications
e
88
s, e s e e n
er d e s e y s d
S.
e S, s d t-e d
Cybersecurity, Data Management & Comm Infrastructure
89
WATCHGUARD
Founded: 1996 Revenue: >$100M
www.watchguard.com 206.613.6600
505 Fifth Avenue South, #500 Seattle, WA 98104
Company Summary: WatchGuard provides multifunction network security and wireless LAN (WLAN) solutions for small and medium-size businesses (SMBs), with leading visibility and scalability. With its highly modular platform, WatchGuard is able to rapidly add new features and modules that consistently keep its solution up to date with an ever-changing threat landscape, having deployed nearly a million appliances worldwide. Watchguard’s products are delivered as an integrated solution that is cost-effective and maximizes productivity. Products/Services: WatchGuard offers next-generation firewall (NGFW), unified threat management (UTM), and wireless LAN (WLAN) products. The company focuses on its UTM line, which includes 19 physical appliances, including three appliances with embedded wireless capabilities and four virtual appliances. Recent releases include an emerging cloud-based reporting and monitoring solution (WatchGuard Dimension), a DLP, cloud-based sandboxing modules, and wireless access point management. Key Officers: Prakash Panjwani – CEO Richard Barber – CFO Corey Nachreiner – CTO Wayson Vannatta – CIO Sean Price – SVP, WW Sales Jack Waters – SVP, Engineering Michelle Welch – SVP, Marketing Andrew Young – SVP, Product Management Shari McLaren – SVP, Customer Services and Support Board of Directors: Benjamin Ball – Founder, Francisco Partners Alex Beregovsky – MD, Vector Capital Prakash Panjwani – CEO, Watchguard Alex Slusky – Founder & Managing Partner, Vector Capital Headcount: >500 Open Positions: 37 U.S. based: 16 International: 21 Sales: 10 Other: 27
Competition: Checkpoint Cisco Dell (SonicWALL) Fortinet Total Funding: Acquired by Francisco Partners for an undisclosed amount Key Investors: Francisco Partners
Source: Company website, all revenues are CY-17
90
WEBROOT
Founded: 199Revenue: >$1 Company Sumintelligence soSMBs, where Y/Y. The compthis market. Thand as outbrexperienced o Products/Serintelligence preasy-to-managalongside othanalyzes interWebroot produother security products, inclrecently acquiWebroot’s plat Key Officers:Mike Potts – PJohn Post – CDavid BennettHal Lonas – CGary Hayslip –Chad Bacher –Melanie WilliaRyan Howe – Board of DireStan McKee –Quentin P. GaJake ReynoldsDick Williams –General Peter Mike Potts – P Headcount: 6 Open PositioU.S. based: 22International: 5Sales: 4 Other: 23
T
97 100M
mmary: Webroolutions to Busi
the company pany partners whe business haeaks, such as
overall growth o
rvices: Webrooroducts for busge, easy-to-usher security prnet data of allucts. It is also players to drivuding FlowScred Cyberflowtform and brou
President & CECFO t – Chief Reven
CTO – CISO – SVP, Producms – VP HR General Couns
ectors: – Former CFO, allivan – CEO, Ps – General Pa– Board MembPace – Retire
President & CE
600
ns: 27 2 5
Cy
www.we800.772
oot offers next-iness, Consumhas seen a strwith over 9,000as thrived thanks Wannacry aof 15% Y/Y, dis
ot delivers an asinesses and ce SaaS produ
products. The types, makingprized for its
ve their own soape, SecureA, a security anght to market i
O
nue Officer
ct Strategy
sel
Electronic ArtsPentaho artner, TCV ber d U.S. Marine O, Webroot
ybersecurity, D
ebroot.com .9383
-generation enmer, and OEM crong demand f0 managed serks to a greaterand Petya ransplaying growth
array of endpoiconsumers. Theuct that can be
BrightCloud g more than 50accuracy and olutions. Webro
Anywhere DNSnalytics compan the second h
s
Corp.
ComAVGInteMicrSymScaTren Tota KeyAccMayTec
Source: Com
Data Managem
38Br
ndpoint securitycustomers. Wefor its productsrvice providers r appreciation onsomware, mah across all ma
int protection, ne Next-Gen Ene deployed in sThreat Intellig00M decisionsrelevance andoot also offers
S Protection, any whose techhalf of CY17.
mpetition: G l (McAfee) rosoft
mantec anSafe nd Micro
al Funding: $1
y Investors: cel Partners yfield Fund chnology Cross
mpany website,
ment & Comm
85 Interlocken Croomfield, CO 8
y, network secuebroot has a prs and realized (MSPs) to del
of the security take the newsarkets.
network protecndpoint Securitseconds eithergence Platforms per day. Thisd is licensed by a suite of netand Web Sec
hnology will be
109M
sover Ventures
all revenues are
m Infrastructure
Crescent, #80080021
urity, and threarimary focus ogrowth of 35%iver products tothreat to SMBs. Webroot ha
ction, and threaty product is ar standalone om continuousls data drives ay more than 5work protectiocurity. Webroo
e integrated into
CY-17
e
0
at n
% o s, s
at n
or y ll 0 n
ot o
Cybersecurity, Data Management & Comm Infrastructure
91
WHITEHAT SECURITY
Founded: 2001 Revenue: $50M-$100M
www.whitehatsec.com 408.343.8300
3970 Freedom Cir. Santa Clara, CA 95054
Company Summary: Named as a leader in Gartner’s Application Security Testing (AST) Magic Quadrant, WhiteHat Security approaches website security through the eyes of the attacker by combining threat research professional services with a robust security testing SaaS platform. Staffing 160 people in its own dynamic threat research center, WhiteHat Security is able to validate vulnerabilities, perform research, and train developers on how to avoid coding vulnerabilities in future development. Products/Services: WhiteHat Security’s flagship product, WhiteHat Sentinel, is a SaaS platform that enables businesses to quickly deploy an application vulnerability management program at any stage of a website’s development. Leveraging WhiteHat’s Threat Research Center, teams of expert attackers assess websites to identify and report weaknesses by using a four-step approach: asset identification, vulnerability management, reporting, and protection. WhiteHat also has a Static Application Security Assessment (SAST) solution as part of the platform which scans the user’s entire source code and provides secure code to replace the faulty code they discovered, using data from its Threat Research Center. The company also offers an enterprise source code app called SCA, which decomposes an app to identify its components and determine any vulnerabilities. In Sentinel, it also includes Mobile Application Security Testing and Computer-Based Training administered by its 91M collected attack vectors archived from a scanner device. Key Officers: Craig Hinkley – CEO Terry Murphy – CFO Shivajee Samdarshi – SVP, Engineering Ryan O’Leary – Chief Security Research Officer Matthew Handler – Chief Revenue Officer Brent R. Wahl – SVP, Operations Carla Wasko – VP, People, Place & Culture Board of Directors: Peter Arrowsmith – Investor, JMI Craig Hinkley – CEO, WhiteHat John Hall – MD, Horizon Ventures Brian Mulvey – IT Team, Investor Growth Capital Ho Nam – General Partner, Altos Ventures Headcount: 320 Open Positions: 23 U.S. based: 19 International: 4 Sales: 6 Other: 17
Competition: HP IBM Qualys Veracode Total Funding: $51M Key Investors: Altos Ventures Garage Technology Ventures Horizon Ventures Investor Growth Capital JMI Equity Startup Capital Ventures
Source: Company website, all revenues are CY-17
Cybersecurity, Data Management & Comm Infrastructure
92
ZERTO
Founded: 2009 Revenue: $50M-$100M
www.zerto.com 617.993.6331
27-43 Wormwood St. #530 Boston, MA 02210
Company Summary: Zerto offers enterprise-class disaster recovery and business continuity software for virtualized data centers and cloud environments. As enterprise organizations migrate applications to virtualized or cloud-based infrastructure, traditional array-based business continuity/disaster recovery solutions frequently become more complex and difficult to scale. However, Zerto’s hypervisor-based solution is optimized for a virtual paradigm and provides greater flexibility, better asset utilization, and reduced operational and maintenance costs. The company’s DRaaS business has served as a growth engine, launching it to obtain over 5,000 customers. Products/Services: Zerto offers Disaster Recover products on-premise and in the cloud – private, public, or a hybrid of both. The company’s award-winning, hypervisor-based, replication software enables alignment for business continuity and disaster recovery plans with IT strategies. By using hypervisor-based data replication, businesses can reduce disaster recovery complexity and hardware costs and still protect mission-critical virtualized applications. Key Officers: Ziv Kedem – Co-founder & CEO Oded Kedem – Co-founder & Chief Architect Gil Levonai – CMO Paul Zeiter – President Roy Golding – CFO Shlomi Oren – SVP, Engineering Robert Strechay – SVP, Product Avi Raichel – CIO Liat Nachmani – SVP, Human Resources Board of Directors: Jacques Benkoski – Investor, USVP Oded Kedem – Co-founder & Chief Architect Zerto Ziv Kedem – Co-founder & CEO, Zerto Mark Leslie – Lecturer, Stanford Graduate School of Business, former VMware board member Erez Ofer – Partner, Greylock Partners Scott Tobin – General Partner, Battery Ventures Ken Goldman – CFO, Yahoo Headcount: 500 Open Positions: 74 U.S. based: 33 International: 41 Sales: 9 Other: 65
Competition: EMC IBM NetApp PureStorage VMware Veeam Total Funding: $130M Key Investors: 83North Battery Ventures CRV Harmony Partners IVP RTP Ventures U.S. Venture Partners
Source: Company website, all revenues are CY-17
Cybersecurity, Data Management & Comm Infrastructure
93
ANALYST BIOGRAPHIES
Erik Suppiger Managing Director [email protected] 415-835-3918
Erik Suppiger is a Managing Director and senior research analyst
covering Internet security, communications infrastructure, and storage.
Prior to joining JMP, Erik was a managing director and senior analyst at
Signal Hill Capital covering Internet infrastructure technology and
services. He was previously a managing director and senior analyst at Pacific Growth Equities and a
senior analyst at J.P. Morgan and its predecessor, Hambrecht & Quist, following the networking and
security sectors. Early in his career, Erik focused on the communications sector as a member of the
Deutsche Bank DMG Technology Group.
Erik ranked third among all stock pickers in the Software category of the 2014 StarMine Analyst
Awards. In the 2010 StarMine Analyst Awards, he ranked as the top stock picker in both the
Communications Equipment category and the Internet Software & Services category. Also in 2010,
Erik placed first in the Telecommunications Equipment category and second in the Internet &
Computer Services category in the annual “Best on the Street” analyst survey conducted by The Wall
Street Journal. In 2005, he placed second in the Communications Equipment category in the “Best
Brokerage Analysts” rankings released by Forbes.com in conjunction with StarMine.
Erik holds a B.S. in business administration from the Boston University School of Management
Patrick D. Walravens Director of Technology Research Senior Analyst, Software [email protected] 415-835-8943
Pat Walravens joined JMP Securities in November 2001 and serves as
Director of Technology Research and a Senior Research Analyst covering
Software.
Prior to joining JMP, Pat spent five years at Lehman Brothers, where he served as a Senior
Research Analyst in the equities group and a Vice President in the Technology Investment Banking
group. Previously, Pat practiced corporate law with the firm of Cooley Godward Kronish, where he
represented emerging technology companies and venture capital investors.
Pat ranked among the top three analysts in the software industry for stock picking, according to
StarMine results published in Forbes in 2007. Pat is frequently quoted and interviewed by the media,
including the Wall Street Journal, BusinessWeek, Forbes, CNBC, and Bloomberg.
Pat received an MBA from the Anderson School of Management at UCLA and a JD from the UCLA
School of Law, where he received Order of the Coif. Pat holds a BA in economics from Stanford
University, where he served as an undergraduate teaching assistant in the computer science
department.
Cybersecurity, Data Management & Comm Infrastructure
94
Greg McDowell Managing Director [email protected] 415-835-3934
Greg McDowell joined JMP Securities in December 2007 and serves as a
Managing Director in Equity Research covering Software.
Prior to joining JMP, Greg spent nine years at Oracle in various Account
Executive and Finance positions. While at Oracle, Greg was responsible for its Application solutions,
including e-Business Suite and PeopleSoft solutions, and Oracle's core technology solutions,
including database software, business intelligence software, and middleware software.
Greg received an MBA from the Smith School of Business at the University of Maryland and a BA
from the University of California at Davis.
Michael Berg Associate [email protected] 415-835-3914
Michael Berg is an Associate covering cybersecurity, data management, and
networking vendors.
-
Michael joined JMP in 2017 after working in the finance division with the CFO and VP of Finance at
biotech startup, Intarcia Therapeutics. While at Intarcia, Michael was responsible for analyzing
departmental spend and preparing reports for senior management and the board. Michael also
spearheaded a project to automate and modernize Intarcia’s expense tracking and analysis process.
Michael holds a B.S. in Finance from Cal Poly San Luis Obispo, and is a CFA level 3 candidate. We would also like to thank our intern Lindsey Dale for her significant contribution to the Super 70.
Cybersecurity, Data Management & Comm Infrastructure
95
COVERED PUBLIC COMPANIES MENTIONED
Company Ticker Rating Price Target Analyst
Alphabet Inc. GOOGL MO $1,275 Ronald Josey Amazon.com, Inc. AMZN MO $950 Ronald Josey Arista Networks ANET MO $115 Erik Suppiger Check Point Software Technologies CHKP MP NA Erik Suppiger Cisco Systems CSCO MP NA Erik Suppiger FireEye, Inc. FEYE MP NA Erik Suppiger Fortinet, Inc. FTNT MO $41 Erik Suppiger Nutanix, Inc. NTNX MO $38 Erik Suppiger Palo Alto Networks, Inc. PANW MO $175 Erik Suppiger Pure Storage, Inc. PSTG MO $19 Erik Suppiger VMware, Inc. VMW MP NA Patrick Walravens
Cybersecurity, Data Management & Comm Infrastructure
96
JMP FACTS AND DISCLOSURES
Analyst Certification: The research analyst(s) who prepared this report does/do hereby certify that the views presented in this report are in accordance with
my/our personal views on the securities and issuers discussed in this report. As mandated by SEC Regulation AC no part of my/our
compensation was, is or will be directly or indirectly related to the specific views or recommendations expressed herein. This certification
is made under the obligations set forth in SEC Regulation AC. Any other person or entity may not use it for any other purpose. This
certification is made based on my/our analysis on the date of this report’s publication. I/We assume no obligation to update this
certification to reflect any facts, circumstances or events that may subsequently come to my/our attention. Signed Erik Suppiger, Patrick
Walravens, Greg McDowell, and Michael Berg.
JMP Securities Disclosures: JMP Securities currently makes a market in the securities of Amazon.com, Inc., Arista Networks, Inc., Check Point Software
Technologies Ltd., Cisco Systems, Inc., FireEye, Inc., Fortinet, Inc., Alphabet Inc., Nutanix, Inc., Palo Alto Networks, Inc., Pure Storage,
Inc. and VMware, Inc.
JMP Securities expects to receive OR intends to seek compensation for investment banking services from Amazon.com, Inc., Arista
Networks, Inc., Check Point Software Technologies Ltd., Cisco Systems, Inc., FireEye, Inc., Fortinet, Inc., Alphabet Inc., Nutanix, Inc.,
Palo Alto Networks, Inc., Pure Storage, Inc. and VMware, Inc. in the next 3 months
JMP Securities Investment Opinion Definitions: Market Outperform (MO): JMP Securities expects the stock price to outperform relevant market indices over the next 12 months.
Market Perform (MP): JMP Securities expects the stock price to perform in line with relevant market indices over the next 12 months.
Market Underperform (MU): JMP Securities expects the stock price to underperform relevant market indices over the next 12 months.
JMP Securities Research Ratings and Investment Banking Services: (as of February 21, 2018)
JMP Rating Regulatory Equivalent
# Co’s Under
Coverage % of Total
Regulatory Equivalent
# Co’s Under
Coverage % of Total
# Co’s Receiving
IB Services
in Past 12 Months
% of Co’s With This
rating
MARKET OUTPERFORM BUY 275 62.08% BUY 275 62.08% 78 28.36% MARKET PERFORM HOLD 162 36.57% HOLD 162 36.57% 29 17.90% MARKET UNDERPERFORM SELL 6 1.35% SELL 6 1.35% 0 0% COVERAGE IN TRANSITION 0 0.00% 0 0.00% 0 8.33% RATING SUSPENDED 0 0.00% 0 0.00% 0 0%
TOTAL: 443 100% 443 100% 107 24.15%
Stock Price Chart of Rating and Target Price Changes: Note: First annotation denotes initiation of coverage or 3 years, whichever is shorter. If no target price is listed, then the target price is
N/A. In accordance with NASD Rule 2711, the chart(s) below reflect(s) price range and any changes to the rating or price target as of the
end of the most recent calendar quarter. The action reflected in this note is not annotated in the stock price chart. Source: JMP
Securities.
Cybersecurity, Data Management & Comm Infrastructure
97
JMP Disclaimer: JMP Securities LLC (the “Firm”) compensates research analysts, like other Firm employees, based on the Firm’s profitability, which
includes revenues from the Firm’s institutional sales, trading, and investment banking departments as well as on the quality of the
services and activities performed that are intended to benefit the Firm’s institutional clients. These data have been prepared by JMP
Securities LLC for informational purposes only and are based on information available to the public from sources that we believe to be
reliable, but we do not guarantee their accuracy or completeness. Any opinions and projections expressed herein reflect our judgment
at this date and are subject to change without notice. These data are neither intended nor should be considered as an offer to sell or a
solicitation or a basis for any contract for the purchase of any security or other financial product. JMP Securities LLC, its affiliates, JMP
Group LLC, Harvest Capital Strategies LLC, and their respective partners, directors, officers, and associates may have a long or short
position in, may act as a market maker for, or may purchase or sell a position in the securities mentioned herein. JMP Securities LLC
or its affiliates may be performing, have performed, or seek to perform investment banking, advisory, or other services and may have
acted as manager or co-manager for a public offering of securities for any company mentioned herein. The reader should assume that
JMP Securities LLC will solicit business from the company covered in this report. Members of our Sales and Trading Department
provide oral and/or written market opinions and trading strategies to our clients that reflect their personal opinions about stocks that are
the subject of the firm's research reports. Our research analysts discuss trading strategies with clients that sometimes reflect short-term
expectations for the price of the securities that are the subject of research reports. These trading strategies are distinct from the
analysts' fundamental rating for the stock, which is based upon the analysts' view compared to other stocks under coverage for the
relevant time period. © Copyright 2018. All rights reserved by JMP Securities LLC. JMP Securities LLC is a member of FINRA,
NASDAQ, and SIPC.
Jeffrey H. SpurrDirector of Research(415) 835-3903
RESEARCH PROFESSIONALSFINANCIAL SERVICES
Alternative Asset ManagersDevin Ryan (212) 906-3578
Brian McKenna (212) 906-3545
Commercial & Specialty FinanceChristopher York (415) 835-8965
Thomas Wenk (415) 835-8962
Consumer FinanceDavid M. Scharf (415) 835-8942
Jeff Zhang, CFA (415) 835-8948
Financial Processing & OutsourcingDavid M. Scharf (415) 835-8942
Jeff Zhang, CFA (415) 835-8948
InsuranceMatthew J. Carletti (312) 768-1784
Karol Chmiel (312) 768-1786
Investment Banks & BrokersDevin Ryan (212) 906-3578
Brian McKenna (212) 906-3545
Mortgage Operating Companies REITs: Agency, Hybrid, & Commercial MortgageSteven C. DeLaney (212) 906-3517Trevor Cranston, CFA (415) 869-4431
Mikhail Goberman (212) 906-3543Benjamin Zucker (212) 906-3529
HEALTHCARE
BiotechnologyLiisa A. Bayko (312) 768-1785
Jonathan Wolleben (312) 768-1788Jason N. Butler, PhD (212) 906-3505
Roy Buchanan (212) 906-3509Michael G. King, Jr. (212) 906-3520
Konstantinos Aprilakis, MD (212) 906-3503Michael Englander (212) 906-3540Simon Gruber (212) 906-3538
Healthcare Services & FacilitiesPeter L. Martin, CFA (415) 835-8904
Brian Riley (415) 835-8908
Medical Devices & SuppliesDavid Turkaly (212) 906-3563
John Gillings (212) 906-3564Daniel W. Stauder (212) 906-3535
Specialty PharmaceuticalsDonald Ellis (212) 906-3507
Nazibur Rahman (212) 906-3519
REAL ESTATE
Housing & Land DevelopmentPeter L. Martin, CFA (415) 835-8904Aaron Hecht (415) 835-3963
Doug Hansen (415) 835-8934
Property ServicesMitch Germain (212) 906-3546
Corey DeVito (212) 906-3525
REITs: Healthcare, Residential, & SpecialtyPeter L. Martin, CFA (415) 835-8904Aaron Hecht (415) 835-3963
Brian Riley (415) 835-8908
REITs: Diversified, Industrial, Office, & RetailMitch Germain (212) 906-3546
Corey DeVito (212) 906-3525
Residential ServicesPeter L. Martin, CFA (415) 835-8904
Aaron Hecht (415) 835-3963
TECHNOLOGY
Energy Technology & Services Industrial TechnologyJoseph Osha (415) 835-8998
Hilary Cauley (415) 835-8996
Cybersecurity, Data Management & Comm InfrastructureErik Suppiger (415) 835-3918
Michael Berg (415) 835-3914
Internet & Digital MediaRonald V. Josey III (212) 906-3528
Shweta Khajuria (415) 835-8916
SoftwarePatrick Walravens (415) 835-8943
Mathew Spencer (415) 835-8930Greg McDowell (415) 835-3934
ADDITIONAL CONTACTS
Thomas R. WrightDirector of Equities(212) 906-3599
Charles SweeneyDirector of Sales & Trading(212) 906-3573
600 Montgomery Street, Suite 1100San Francisco, CA 94111www.jmpsecurities.com
Cybersecurity, Data Management & Comm Infrastructure