MARKET - Market Analysis - Market Overview - Key and Emerging Players - Defence Contractors

A relatively concentrated number of large contractors serving the needs of the Defence and Intelligence buyer account for a significant amount of revenues in the overall PACs space. Such players provide highly advanced bespoke solutions to key Defence agencies, sometimes leading to technology cross-over for dual use in commercial and consumer sectors. Most of the players also have very strong breadth of security expertise, providing end-to-end security support to these most advanced PACs buyers segments. Cyber is becoming increasingly important proportionally within overall defence budget concerns, with key players targeting acquisition of smaller security players in response. Some of the key defence contractors participating in the PACs marketplace are highlighted in Table 5.6 below.

Table 5.6 – Key players serving PACs needs in Defence and Intelligence agencies

Company                Overview

Airbus Defence & Space (Netherlands/France/

Germany)

European multinational aerospace and defence organisation registered in Netherlands and headquartered in Toulouse, France.  Formed based on merger of various national level Aerospace/Defence divisions in 2000, and was reorganised from it’s predecessor (EADS) in January 2014. Current restructured Airbus entity consists of three divisions – Airbus, Airbus Defense and Space and Airbus Helicopters. 

Cyber Security interests within Airbus now fall under the Airbus Defence and Space division, based on a merger of Airbus Military, Astrium and Cassadian. Provide range of cyber defence and professional services offerings, including a European Cyber Defence Centre (CDC) SOC-based infrastructure based in Paris, Munich and Newport (Wales). Also provide a range of security appliances under the Stormshield brand, focusing on network, endpoint and data security protection. Moseo is another Airbus brand focusing on secure voice communication solutions.

www.cybersecurity-airbusds.com

BAE Systems (UK)

British multinational aerospace and defence player headquartered in London UK – formed by merger between Marconi and British Aerospace in 1999.  Largest operations are around supporting UK and US Defence agencies, other key markets are Australia, India and Saudi Arabia. Is one of the six largest suppliers to the US Department of Defence.   

Strategic shift towards cyber security occured between 2008 and 2011, whereby BAE acquired five cyber security companies to offset reduced government spending on more traditional defence products such as aircrafts and tanks. Most notables acquisitions include purchase of Detica Group PLC in 2008 for £531m, and the recent acquisition of cloud security vendor Silversky in 2014 [WSJ14].

BAE has a broad cyber and intelligence product portfolio across all elements of the PACs solution spectrum: http://www.baesystems.com/what-we-do-rus/products-&-services/cyber-&-intelligence

Boeing Defense, Space and Security (USA)

Core PACs capability within Boeing is based within the Defence, Space and Security company arm – with a focus on Information Security, Management and analysis; surveillance and reconaissance, secure communications. Core cyber capabilities are within the Network and Space Systems division of Boeing DSS. Cyber and Security Solutions (C&SS) division within this provides network surveillance and data analytics, cyber training and simulation, security assessments, mission assurance, and information operations capabilities to the federal, commercial, and international markets as well as cybersecurity solutions and data analytics. C&SS manages the Cyber Engagement Center (CEC), a working operations facility that brings together cybersecurity experts from across Boeing to collaborate with customers, partners, and researchers.

  

Boeing’s CEC is a SOC offering aimed at supporting key critical infrastructure clients, and large scale capability on security information management and analysis. Combat Survivor Evader Locator (CSEL) is another core offering, focusing on secure over-the-horizon communication with isolated personnel.

http://www.boeing.com/boeing/bds/c4isr_cyber/index.page

Booz Allen Hamilton, Inc.

US-based management consulting firm, with 99% of revenues coming from US Federal Government agencies including Security and Defence agencies. Provide a range of cyber R&D capabilities to US Government, secure architecture and development, and a range of solutions around secure content management, intrusion detection, automated monitoring, encryption, and authentication.

www.boozallen.com

Finmecannica (Italy)

Large Italian conglomerate with presence in over 100 countries globally, operating across seven sectors: aeronautics, helicopters, space, electronics, defence systems, transportation and construction.

Key defence and security-related subsidiaries of Finmecannica include Selex ES (a merger of their Galileo Elsag and Sistemi businesses in 2013),  and DRS Technologies (US defence contractor purchased in 2008). Selex has significant presence in both physical and cyber security markets, providing a broad spectrum of services to military and government organisations in the latter.

www.selex-es.com/domains/security/cyber-security-information-assurance

Recently launched the Cyber Security Centre of Excellence in Chieti, Italy in June 2014.

http://www.selex-es.com/-/chieti

L-3 Communications (US)

US company that supplies command and control, communications, intelligence, surveillance and reconnaissance (C3ISR) systems and products, avionics, ocean products, training devices and services, instrumentation, space, and navigation products. Customers include the Department of Defense, Department of Homeland Security, U.S. Government intelligence agencies, NASA, aerospace contractors and commercial telecommunications and wireless customers.

Cyber capabilities primarily located within L-3’s National Security Solutions division, providing full spectrum cyber operations across several tranches including Enterprise and Mission Information Technology, Intelligence Operations Support, and Operational Infrastructure Solutions.

www.l-3nss.com

Lockheed Martin Corporation (US)

Lockheed Martin is the largest US defense contractor, the US government’s leading systems integrator, the top federal provider of information technology and services over the past 20 years.

Company has been successful at capturing share away from other competitors in the US Federal market and is increasingly aiming to transfer advanced Defence domain cyber expertise towards enterprise markets [FORB13] . This is reflected in it now being the second largest contractor with the US NSA in dollar terms, up from sixth place during the Bush Administration.

Famous for pioneering the Cyber Kill Chain, an intelligence-driven security process. Also provide Palisade, an intelligence management approach geared towards large enterprise environments.

www.lockheedmartin.com/us/what-we-do/information-technology/cyber-security.html

Northrop Grumman Corporation (US)

US Defence contractor, formed by the acquisition of Grumman by Northrop in 1994 – employs approximately 68,000 people globally at present. Provide a broad range of security capabilities across broad range of segments including Commercial and Military Aviation, Directed Energy, Health IT, Missile Defense and Naval, Navigation and Space Systems among others. 

www.northropgrumman.com/Capabilities/C4ISR/Pages/default.aspx

Raytheon Company (US)

Large scale US defence contractor and systems integrator. Has a specific cyber products division focused on providing PACs solutions for government and commercial organisations, working with professional service divisions to provide full end-to-end service support. Provide range of solutions across secure information sharing, insider threat, secure mobile, threat protection, data analytics and linux security categories in particular.

www.trustedcs.com 

SAFRAN (Fra)

Large defence contractor focussed on aircraft, rocket engines.

Security expertise originated from acquisition of SAGEM in 2005. Speciality expertise in biometric identification (strengthened via acquisition of L-1 Identity Solutions in 2011), automated fingerprint identification systems, iris and face recognition systems, and explosive detection systems in checked luggage.

Biometric capabilities used in LEA contexts, border control systems, road safety, and gaming terminals among other applications.

www.safran-group.com/site-safran-en/security/ 

Thales (France)

Large aerospace and defence player, approximately 65,000 employees with presence in 56 countries globally – and delivering cyber security products in 50 of these. Currently has approximately 1500 cyber experts.

Thales also part of a merged entity with Raytheon (ThalesRaytheon) providing cyber attack protection for Air Operations systems in particular. 

Cover solution expertise a broad range of physical security areas including airport security, border surveillance, critical information systems, infrastructure security and urban security. Particular expertise and market strength in securing interbank electronic transactions.

Core services focus on cyber assurance (vulnerability assessment, audit, testing) and cyber maturity delivery (secure architecture and hosting, training and awareness, incident response).  Quintec is a key consultancy arm within Thales (www.quintec.com), acquired in 2000 and merged with Thale’s existing cyber security expertise. 

References:

[FORB13], Lockheed Martin Emerging As Dominant Player In Federal Cybersecurity Market, Dec 13,http://www.forbes.com/sites/lorenthompson/2013/11/12/lockheed-martin-emerging-as-dominant-player-in-federal-cybersecurity-market/

[WSJ14] "BAE Systems Boosts Cybersecurity Arm" Wall St Journal Online, http://online.wsj.com/articles/bae-systems-boosts-cybersecurity-arm-1413875358

 Return to Key and Emerging Players

 

MARKET - Market Analysis - Market Overview - Key and Emerging Players -  Emerging PACs Players (Global)


While it is estimated that somewhere between 1000-2000 funded product-oriented PACs startups now exist globally, Table 5.4 below briefly highlights a sample some emerging PACs players developing innovative te chnologies who have been receiving particular attention in the media and in investor circles in recent times.

 

Table 5.4 – Key Emerging PACs technology vendors (Global). 

Company Overview
41st Parameter

Focus: digital fingerprinting and fraud detection. Solution focussed on helping  retailers find hackers and fraudsters. It invisibly scans the PC and creates a digital "fingerprint" of it. Even if a hacker has your credentials, if the person's not logging in from your actual PC, 41st knows it and flags those activities.

www.the41.com

A10 Networks

Enables large web players and government organisations to accelerate, secure and optimise the performance of their data center applications and networks.

www.a10networks.com

AnchorFree

Focus: privacy protected browsing. Offers software it calls the "Hotspot Shield" which gives everyone secure, anonymous, and private browsing on the Internet.

www.anchorfree.com

Appthority 

Focus: application security. Offers a cloud platform that checks to see if an app is secure so it can't be hacked by intruders; particular emphasis on mobile apps.

www.appthority.com

Armor5

Cloud service that virtualises applications, data and content such as Office documents and PDFs on any mobile device with no configuration and zero data leakage. This reduces the possibility of the mobile device being infected by documents embedded with malware or confidential corporate data being cached on the device where it can later be compromised.

www.armor5.com

Averail

Averail Access mobile app combines with a cloud-based management console to create a trusted environment to protect files, regardless of where they are stored. On April 1, 2014, Averail became part of MobileIron.

www.mobileiron.com

Bromium

Developing new endpoint security approach based on VM-based isolation approaches,  whereby vulnerable tasks (e.g a user opens an email or browses the web or shares files),  the task is isolated in a micro-virtual machine (micro-VM) which protects the rest of the system from potential malware attack.

www.bromium.com

Ciphercloud

Delivers security controls including encryption, tokenisation, cloud data loss prevention and cloud malware detection. It also includes activity monitoring for cloud applications including Salesforce, Force.com, Chatter, Google Gmail, Microsoft Office 365 and Amazon Web Services. Perspecsys is a similar solution player in the space.

www.ciphercloud.com

CloudLink (AFORE)

Focus on cloud encryption; encryption of  data-at-rest and data-in-motion and multi-tenant security

www.cloudlinktech.com

Co3 Systems

Focus: incident response management. Focus on post event breach reporting and supporting companies in meeting compliance obligations.

www.co3sys.com

CrowdStrike

Focussed on proactive approaches to identifying and attributing hackers. Has received much attention due to it’s aggressive stance on rooting out the hackers, as opposed to an emphasis on building defensive tech.

www.crowdstrike.com

Cylance

Cylance's Infinity offers intelligent, predictive threat analysis of good vs. bad objects using a non-signature, non-heuristic and non-behavioral based mathematical approach.

www.cylance.com

Marble Security

Focus: application security. Identifies and manages the risk of Android and iOS apps that steal user identities and leak corporate data.

www.marblesecurity.com

NetCitadel

Threat management platform provides security analytics and threat context for intelligence and incident response.

www.netcitadel.com

Nok Nok Labs

Develops two-factor authentication systems for desktops, mobile devices and servers.

www.noknok.com

Shape Security

Solution focused on making it harder for hackers to trick people into visiting malware-laced websites.

www.shapesecurity.com

Skyhigh Networks

Cloud security software helps businesses secure their data in the cloud by discovering the cloud services employees are using, analysing risk and enforcing cloud security policies.

www.skyhighnetworks.com

Stormpath

Cloud service that helps developers build secure authentication and access control into any application, via a robust REST+JSON API or client libraries.

www.stormpath.com

Tenable

Vulnerability management solution for managing security alerts and patches, recently signed high-profile contract with US Department of Defence.

www.tenable.com

ThreatMetrix

Focus: fraud prevention. provides comprehensive, context-based authentication, protecting mission-critical enterprise applications from hackers and fraudsters. ThreatMetrix™ has created a comprehensive process to create trust across all types of online transactions, guarding against account takeover, card-not-present, and fictitious account registration frauds.

www.threatmetrix.com

Trustware

Virtualisation technology creates a separate environment called a Virtual Zone where all internet activity and programs from external devices are contained and virtualised.

www.trustware.com

Victrio

Focus: fraud detection. Does realtime phone fraud detection based on a "voice print."  The tech is popular with banks, credit card companies, and any company that still does a lot of business through call centers.

www.victrio.com

Wickr

Offers an app that gives users greater control over their mobile messages — text, pictures, audio, video — with advanced military-grade security to prevent snooping.

www.wickr.com

 

Other key emerging themes and players in the privacy space are also highlighted in Table 5.5 below.

 

Table 5.5 – Early-stage commercial privacy technologies – key themes

Privacy Theme Overview Commercial Players
Data Removal and Reduction Support users in removing data online, particular emphasis on search data, supporting “right to be forgotten” principles. SafeShephard
Data Transparency Apps Allow users to gain transparency over social apps that are using their data and the manner of use. MyPermissions.com
Digital Marking and Personalised Digital Footprints Supporting users in appending unique annotations and marking to key digital assets, supporting asset tracking across the internet and other systems. Eterniam
“Off The Record” personal communications Support for email, mobile messaging, self-destructive media, and secure encryption-based communications and VPN tunnelling. Ansa, AnchorFree, SilentCircle
Online Digital Identity Management Allow users to manage multiple digital identities online. MiiCard
Online Reputation Management Ability for individuals and corporates/brands to track online personas an reputations – offerings typically service led.

Reputation.com, Myrepp.com, Kudosreputation.com

Massive PR (bought by Strixius), BrandYourself

Secure.me, Igniyte, DataDial, Webimax, Gadook, Brand.com

 

 Return to Key and Emerging Players

 

MARKET - Market Analysis - Market Overview - Key and Emerging Players - ICT Generalists

Considering the broad ICT area where PACs technology will reside, key technology silo categories controlled by such vendors will embody various potential attack surfaces across both hardware and software technology stacks. Many of these technology silos are creating specific PACs market ecosystems in their own right, in some cases via partner ecosystems driven by core ICT influencers and supported by niche PACs players. Much user data now resides on other networks (e.g. Amazon, Facebook, Gmail and so on), and the new internet devices we use are increasingly closed and controlled by other large vendors (Apple, Amazon, Samsung etc). Other technology silos include:

• Cloud management platforms, both public and private: (e.g. Amazon, Azure, Rackspace etc.)
• Operating System Environments (Windows, OSX, Linux etc)
• Mobile devices and related OS environments (Apple iOS, Android)
• Database technologies, both proprietary and open source (Oracle, Postgres, MySQL etc.)
• Social media platforms (e.g. Facebook, LinkedIn, Twitter, Flickr, Whatsapp, etc)
• Enterprise SaaS vendors (e.g. Salesforce, Office365 live, Workday, etc)
• Emerging sensor and IoT platforms, and underlying development frameworks (e.g. Intel Gallileo, Arduino, etc) 
• Web Browers (Chrome, Internet Explorer, Safari, Firefox etc)
• Application development languages and platforms (Java, Ruby on Rails, etc)

Responsibility for maintaining security from the point device to the supporting infrastructure is managed by those vendors, with reducing input from the users being served. It is essential that such influential vendors have sufficient in-house security expertise to ensure successful delivery and integration of their solutions. Hence it is not surprising that many of these key ICT influencers are purchasing niche PACs players in an attempt to acquire the technology and skills to secure their technology real estate, and to keep up to date with emerging threats and solutions. Given that a relatively small number of vendors control vast amounts of the infrastructure we use in both personal and professional contexts it is relevant to include them in any discussion of PACs players. 
ICT Generalists competing directly in the PACs domain: Many core ICT influencers discussed above, treat PACs technologies as a core investment input towards protecting the core ICT assets underlying their own business strategy and objectives, but will not compete directly in the PACs domain. Other key influencers however will compete directly in the PACs domain, selling PACs products and services alongside other broader ICT offerings. Within this sub-group, a number of key PACs related company groups exist, for example:


ICT Consultants and System Integrators - will provide overall security governance services and solutions to their clients on a large scale, typically as part of wider ICT management and solution delivery. Players here will come from different core focus areas, for example from a vendor perspective (e.g. IBM, HP), IT Consultancy perspective (e.g. Accenture, Deloitte), or an accounts based audit/compliance perspective within which PACs is a concern (e.g. PwC, KPMG, Ernst and Young). Key consultative roles that such players provide include insuring that security investment of clients aligns with their business objectives and risk profile, developing appropriate security budgets and spending priorities, supporting business stakeholder participation and compliance initiatives, and managing necessary third-party relationships with PACs and ICT solution providers, balancing in-sourcing and outsourcing where relevant [FOR13]. Many of these players will extend to providing security managed service support. 


Managed Service Providers (MSPs) - many PACs technologies traditionally installed and managed internally by end-users are now provided and managed directly by third parties on a pay as you use basis across Infrastructure, Systems, Content and Governance solution types in PACs. Such providers are viewed as being crucial to allowing organisations to reduce capital spending on security technology and in allowing them to increase bandwidth for handling security issues within corporate IT teams. Many of the ICT consultants and systems integrators described in the previous category will also provide their own MSSP support. Many will also provide PACs managed services as part of a broader ICT managed service offering. Like in any other business, security services are increasingly being offered as a service, automated in a cloud environment, either to serve cloud operations and services or to serve traditional security needs, such as Identity as a service, Intrusion Detection and Advanced Firewall services, application firewalls, and others. 

Networks and Telecoms Players - Players with a core emphasis on networks solutions would also be heavily integrated into the PACs value chain by virtue of the fundamental need for secure networks. Also, telecoms players have traditionally invested heavily in infrastructure to protect their own core businesses, and the increasing link between security, cloud and mobility as strengthened their positioning within the PACs and wider ICT marketplaces. Many of the key telco providers provide strong security managed service and Security Operating Centre (SOC) capabilities to clients. Telco providers are also competing strongly on corporate mobility issues relating to BYOD (Bring Your Own Device) trends.

These players will include both well-known brands with international presence, alongside a much larger number of niche regional ICT players that will include PACs expertise within their overall ICT portfolio. Table 5.1 below highlights some of the key players within these categories, but globally and within Europe.

Table 5.1 - Summary of ICT Players competing directly in PACs Domain

PACs Sub-Category Key Market Partipants
ICT  Vendors, Consultants, System Integrators, Solution Providers

Key players with reach both globally and within Europe include IBMHP, Dell, Deloitte, Ernst and Young (E&Y), PriceWaterHouse Coopers, Accenture, KPMG, Wipro, CA Technologies and CSC. While regarded as a security player, Symantec’s reach in other ICT domains merit their inclusion here. Similarly Intel would have a presence in this space due to their acquisition of McAfee.  Other key players with a core European emphasis include Atos (France), CGI(Canada), and Steria (France). Several of the telcos players discussed in the Network and Telecoms players section below will also compete at the top table. 

Managed Service Providers (MSPs)

Most of the ICT Generalists above would also provide varying levels of MSP support - particularly IBM, HP, Dell, Symantec. Several of the leading telco players (e.g. AT&T, Verizon, BT, and Orange)  will also provide MSP support on a global scale.

 

Other prominent players with emphasis on European markets include  Atos (France), CGICassidian (part of EADS), Thales, Computacenter (UK), Open Systems (Switzerland), Sogeti (part of CGI), Level 3 Communications, Getronics,  Steria and Kudelski . Other key European vendors with a national specific focus include Sentor (Sweden),  United Security Providers (Switzerland), S2 Grupo (Spain) and the French telecommunications operator SFR Business Team. Other European providers renowned for niche speciality expertise within PACs include Fox-IT (Netherlands — threat detection and intelligence, and forensic response), Outpost24 (Sweden — vulnerability management), Integrity (Portugal — persistent penetration testing called Keep-It-Secure-24), Spamina (Spain — email security), Secucloud (Germany — cloud security systems), Retarus (Germany — email security) and Nixu Software (Finland — vulnerability management).

 

A broad range of other mid-tier MSSPs (i.e. with a more core core PACs emphasis exist) - key emerging player examples (predominantly US-headquartered) in a recent Forrester Research analysis [FOR2_13] include Alert Logic, Perimeter E-Security, Integralis (acquired by NTT), StillSecure, Savvvis, Network Box, Tata Communications, Vigiliant, and CompuCom.

 

Typical services provided include: APT detection and remediation, D-DoS, Email filtering, emergency response services, endpoint AV, endpoint patch management, firewall managemnet, host and network IDS/IPS management, IAM services, log management and monitoring, server patch management, SIEM managed services, threat intelligence, vulnerability testing, web application firewall, and web application monitoring.

 

Key SaaS and Cloud-based security services are led by various US based operators, but an increasing amount of European (originated) providers, including companies such as Qualys, Secunia, and Centrify.

Network and Telecoms Players

Key networks players providing strong PACs offerings within their overall networks solutions portfolios include Cisco, JuniperCheckpoint, Palo Alto Networks etc.

Most of the well-known global telcos will provide ICT/PACs consultancy and managed services support, as well as services around BYOD  and mobile device management – these include Verizon (US), AT&T and NTT among others. Key European telcos providing strong ICT consultancy, integration and managed services support include T-Systems International (Germany), Orange (France), BT Global (UK), and Vodafone (UK).

References:

[FOR13] Forrester Wave: Information Security Consulting Services, Q1 2013.

[FOR2_13] “Forrester Wave: Emerging Managed Security Service Providers”, Q1, 2013

Return to Key and Emerging Players

 

MARKET - Market Analysis - Market Overview - Key and Emerging Players - PACs Specialists - Global

 

Specialist PACs Vendors (Global)


Table 5.3 below highlights some of the key “pure-play” PACs vendors in the space at present – particularly companies featuring prominently as leaders in global analyst evaluations for key PACs market categories in recent years. Revenues for companies vary greatly with most ranging from $100m+ up to the low billions. Given the strong link between network and security support, prominent networks players providing prominent PACs portfolios are also included here (Cisco, Checkpoint, Juniper). Larger PACs players acquired by leading ICT players (e.g. McAfee) are also included.

 

Table 5.3 – Summary of key “Pure Play” PACs marketplace competitors (Global) 

Company Overview

Alert Logic (US)

Founded in 2002 and headquartered in Heuston Texas, viewed as  key emerging MSSP player in Forrester analysis of key security service providers , with strong focus on cloud-based delivery model. Currently have a customer base of over 2,200 clients.

www.alertlogic.com

Barracuda Networks (US)

Publically listed and founded in 2003, provide security, networking and storage products based on network appliances and cloud services. Company went public in November 2013. Company’s security products include products for protection against email, web surfing, web hackers and instant messaging threats such as spam, spyware, trojans, and viruses. The company's networking and storage products include web filtering, load balancing, application delivery controllers, message archiving, NG firewalls, backup services and data protection. Compete in key firewall and web gateway segments but would not be viewed by market analysts as the primary pacesetters in any of these segments.

www.barracudanetworks.com

Bluecoat (US)

Develop hardware proxy appliances for corporate networks offering web caching, virus scanning, content filtering, instant messaging control and bandwidth management. In December 2013, Blue Coat acquired Oslo based Norman Shark, a provider of threat discovery and malware analysis solutions for enterprises, service providers and government.

www.bluecoat.com

Checkpoint (Israel)

Founded in 1993 and headquartered in Tel Aviv, Israel, renowned provider of network security, endpoint security, data security and security management solutions. Pioneered industry with development of Firewall1 and patented stateful inspection technology – and leading player in Enterprise Firewall segment. Acquired Nokia’s network security business in 2009 among other acquisitions in recent years.

www.checkpoint.com

Cisco (US)

Founded in 1984, large and prominent networks player with exceptionally broad network security portfolio. Firewall offerings sold under the Adaptive Security Appliance (ASA) firewall brand. Would not be viewed as a leading innovator in emerging next generation firewall space, but more so as a vendor selling PACs solutions in bundle with core network offerings. However company has strong market share in core PACs segments and strong and highly rated support network. Also have strong certification and training support or established and loyal user base. Have made several PACs acquisitions in recent years, most notably mobile network management player Intucell, Cognitive Security, Sourcefire and threatGRID.

www.cisco.com

CyberArk (Israel/US)

Founded in 1999 in Israel, with key focus on privileged account security and high value assets. Solutions deployed across over 1500 customers in 30 countries at present. Filed for IPO in June 2014.

www.cyberark.com

FireEye/Mandiant (US)

Publicly listed US company, founded 2004, focus on network, mobile and forensics analysis for advanced attacks. Acquired Mandiant for $1bn cash + stock deal in December 2013, and intrusion detection player nPulse Technologies for $60m in May 2013.

www.fireeye.com

Fortinet (US)

Founded in 2002, prominent firewall player, and market leader in  Unified Threat Management (UTM) appliance space, geared towards multifunction security use for small and medium enterprises in particular. Offer 40 different UTM appliance models under FortiGate brand line.  Acquired Coyote Point Solutions an Application Delivery Controller (ADC) manufacturer in March 2013. 

www.fortinet.com

Imperva (US)

Publicly listed player, founded 2002, going public with IPO in 2011.  Key strategic focus on security of data in physical and virtual data centres. Core platform branded as SecureSphere, used by over 3300 customers in 75 countries.

www.imperva.com

Juniper (US)

Founded in 1996, prominent player in networks and network security space, selling high performance IP solutions. Security product portfolio falls under their SRX series, with firewall offerings falling across multiple model lines (SRX, SSG, ISG and vGW).  Tends to sell security offerings in bundle with other core router and switch appliance offerings, rather than showing same level of leadership on security features compared to Checkpoint, Palo Alto and Fortinet in particular.

www.juniper.net

Kaspersky (Russia)

Founded in 1997, develop secure content and threat management systems and the world’s largest privately held vendor of software security products. Key player in Anti-Virus space and endpoint protection systems where it is viewed as an emerging leader, traditionally in consumer space but increasingly in enterprise markets.

www.kaspersky.com

McAfee/Intel Security (US)

Highly established and diversified security player, which became a wholly owned subsidiary of Intel in February 2011. While McAfee has traditionally competed across a wide spread of PACs subsegments, Intel are particularly focussed on driving out emerging opportunities and requirements in the hardware side of the business. McAfee has acquired several companies in recent years including Stonesoft, ValidEdge, NitroSecurity, and Sentrigo among others.

www.mcafee.com

MetricStream (US)

Founded in 1999, leading player in the Governance, Risk and Compliance GRC space, frequently mentioned by key analysts as leader in that space.

www.metricstream.com

Modulo (Brazil)

Founded in 1985, leading supplier of GRC solutions, current installed base of over 1000 organisations across IT GRC, ERM, BCM, Vendor, and Compliance and Risk Management. While historically the company has produced much of its revenues from services, more recently it is experiencing significant growth in its software business with 70% year-on-year growth in 2013. Established customer base in South America, increasingly targeting customers in North American region.

www.modulo.com 

NetIQ (US)

Founded in 1995,  management portfolio include products for performance management, security management, configuration management and change control. Its flagship products are Access Manager, AppManager, Secure Configuration Manager, Sentinel, and Identity Manager.

www.netiq.com

Palo Alto Networks (US)

Founded in 2005, leading player in next-generation firewall space and pure-play network security vendor. Viewed as key pioneer in firewall market, with particular stated strengths in application identification and IPS capabilities within it’s firewall functionality. Company went to IPO in 2012 and has since made a number of key acquisitions including Morta Security in January 2014 and Cyvera for $200m in April 2014.

www.paloaltonetworks.com

Proofpoint (US)

Founded in 2002, provides SaaS and on-premises solutions for inbound email security, outbound data loss prevention, privacy protection, email encryption, electronic discovery (“eDiscovery”) and email archiving. Leading player in Secure Email Gateways and Enterprise Information Archiving market segments. Moved to IPO status in April 2012, making a number of acquisitions since them including Abaca, Amorize, Sendmail and NetCitadel. Have strong partnership links with IBM, particularly around IBM Qradar suite.

www.proofpoint.com

Splunk (US)

Founded in 2003, provide market leading solution for IT operations and application support teams around log management analytics, monitoring and advanced search and correlation. Although not a specific security specialist in that core solutions provide data analytics support across several IT contexts including application management, security and compliance, it is increasingly viewed as an option for log management in the SIEM context. Company went public in 2012, and in 2013 acquired Bugsense, a leading analytics solution for machine data generated by mobile devices.

www.splunk.com

Symantec (US)

Founded in 1982, prominent, diversified security player with broad portfolio in security, storage and archving solutions in particular, played a key pioneering role in commercialising anti-virus software in particular. Has struggled to maintain growth in key security sectors in recent times, and in October 2014 the company announced that it would split into two entities, with one focusing on security and the other on information management, the latter where most of the company’s R&D activity has been occuring in recent years. 

www.symantec.com

Trend Micro (Japan/US)

Founded in 1988, leading player in security space provide broad and diversified suite of security solutions. Competes in the Threat and Breach detection space alongside FireEye, SourceFire and Palo Alto; and in the anti-virus industry against Kaspersky, McAfee, F-Secure, Panda Security, Sophos and Symantec among others.

www.trendmicro.com

Trustwave (US)

Founded in 1995 and headquartered in Chicago, company’s primary business is services for compliance, vulnerability assessment, managed security and security consulting. Its threat and research capability includes SpiderLabs, which provides research on security threats and vulnerabilities in support of service delivery and product development. Trustwave also offers a broad portfolio of security products, including secure web and email gateways, data loss prevention (DLP), a web application firewall, network access control, unified threat management (UTM), security scanning, and encryption technologies.

www.trustwave.com

Websense (US)

Founded in 1994, headquartered in Austin Texas, one of the key players in the Secure Web Gateway (SWG) market. Also provide solutions for email, data and mobile security within their portfolio. In May 2013 was acquired by Vista Equity Partners for a total purchase price of $906m.

www.websense.com

WhiteHat Security (US)

Founded in 2001 and headquartered in Santa Clara, California. Leading provider of website risk management solutions that protect critical data, ensure compliance and narrow the window of risk. WhiteHat Sentinel is the company's flagship product family, enabling automated mitigation of website vulnerabilities via integration with Web application firewalls. Sentinel currently manages thousands of websites – including sites in highly regulated industries, such as top e-commerce, financial services and healthcare companies.

www.whitehatsec.com

 

 

 Return to Key and Emerging Players

 

MARKET - Market Analysis - Market Overview - Key and Emerging Players - PACs Specialists - Prominent European-Based PACs Players


Table 5.2 highlights some prominent European-based PACs players, with inclusion based on their appearance on the radar of key global industry analysts assessing prominent market sub-segments, as well as scoring highly on European ICT company ranking lists, such as the Truffle categorisation of key European software vendors . Many of these vendors compete in highly competitive mass-market PACs segments, particularly around anti-virus and malware prevention, as well as in the Firewall and UTM segments. Several of the prominent players listed here also compete in the Authentication and Access Management segments. 

Table 5.2 - Notable European-based PACs technology vendors

Company Overview

AVG Technologies

(Netherlands/Czech Republic)

Founded in 1991 in Czech Republic, with headquarters now in Amsterdam, particularly targeted at anti-virus solutions for consumers and businesses across PCs and mobiles, both in freeware and paid forms. AVG solutions presently have over 187 million active users, with 1000+ employees across 11 offices globally. Acquired remote monitoring vendor Level Platforms in June 2013 – and also was ranked 32nd in European Truffle 100 list in 2013.

www.avg.com/ie-en/avg-company-profile

Beta Systems (Germany)

Berlin-based vendor in identity management space. Have over 1,300 customers in more than 30 countries, with most being major, international corporations and organisations that operate extensive IT systems and complex IT processes, including banks, insurance agencies, manufacturing, trade and utility companies, as well as public administrations. Is a prominent Identify Governance and Administration (IGA) vendor selling its flagship Security Access Manager (SAM) product since 1994, making SAM one of the longest-running IGA solutions from a single vendor.  Beta Systems is recovering from a difficult period in 2011, when license revenue declined sharply. Growth returned in 2012. In 2013, the company brought in a new CEO and other executives, and is investing in the product and the expansion of its sales channels, and in building an international selling presence.

www.betasystems.com

CenterTools (Germany)

Prominent player in the endpoint encryption marketplace, with product portfolio released under the DriveLock brand, offering granular options in regulating USB and other devices along with the encryption of hard drives (FDE) and data on removable media. Company HQ in Ludwigsburg and other offices in Munich, Zurich, Vienna, Cambridge and Portland, supports customers worldwide in over 30 countries. 90% of market customer base is in Europe at present.

www.drivelock.com/Company/CompanyProfile

Clearswift (UK)

UK-based player with established presence in the email, web and file protection market, primarily in the U.K, Europe and Asia/Pacific; also has presence in Secure Web Gateways (SWG) market. Management overhaul in recent times is pushing company strategy towards data protection and information governance, reflected in Clearswift's Aneesya platform. Company has over 3,000 clients globally with 7m active Clearswift licences. Funded by Lyceum Capital. Approximately one-third of existing business in the UK, with remainder in mainland Europe and other global regions. Current revenues of appromimately GBP£21.1m.

www.clearswift.com

Clavister (Sweden)

Founded in 1997 in Sweden, Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualised environments. They compete most prominently in the Unified Threat Management (UTM) space, as well as providing mobile and network security solutions for large enterprises, cloud service providers and telecom operators. Clavister has offices throughout the world and has delivered more than 150 000 installations to over 20 000 customers. Key products sold across Eagle, Lynx, Wolf and PolarBear brand categories.

www.clavister.com

ESET (Slovakia)

Prominent Slovakian player in anti-virus space, founded in 1992. Has global headquarters in Bratislava (Slovakia) and regional distribution centers in San Diego (U.S.), Buenos Aires (Argentina), and Singapore. ESET has offices in Sao Paulo (Brazil) and Prague (Czech Republic). Has extensive network of malware research centers spans Bratislava, San Diego, Buenos Aires, Singapore, Prague, Košice (Slovakia), Krakow (Poland), Montreal (Canada), Moscow (Russia). In April 2009, ESET offered its antivirus engine in the form of SDK, which was implemented by CYAN Networks Software GmbH in its Secure Web Gateway product line. Was ranked 34th in European Truffle 100 list in 2013, with revenues of €256m.

www.eset.com

Evidian (France)

French subsidiary of Bull (in turn a subsidiary of  Atos), and is a prominent European player in identity and access management. Has user base of more than 5m in more than 900 organisations, with a presence growing rapidly beyond Europe, particularly in Japan and the US.

www.evidian.com

F-Secure (Finland)

Founded in 1988, anti-virus, cloud content and computer security company based in Helsinki, Finland, with strong focus on consumer security segment. Has 940 employees with 20 offices globally. Was ranked 46th in Truffle100 list in 2013, with annual revenues of €157.2m.

www.f-secure.com

Gateprotect (Germany)

German-based pure-play security vendor, with established presence in UTM market, with key offices in Hamburg and Leipzig. Existing UTM portfolio includes nine appliances, with virtual appliances and centralised management also available. In July 2014, gateprotect was acquired by Rohde & Schwarz, a large German electronics group.

www.gateprotect.com

Gemalto (Netherlands)

Headquartered in Amsterdam, large €2bn+ player focussed on development of secure software and operating systems embedded in many kinds of device, like SIM cards, banking cards, tokens, electronic passports and ID cards. Also prominent player in Authentication market space. Majority of Gemalto's customers are in financial services, government and healthcare, and in larger enterprises. Recently acquired data security player SafeNet in high-profile acquisition worth $890m in August 2014. Ranked 28th in European Truffle 100 software list in 2013.

www.gemalto.com

iWelcome (Netherlands)

Prominent Dutch-based identity as a service (IdaaS) vendor. Company is the result of spinoff from system integration firm Everett.  Solution provided in a dedicated single tenant delivery model to allow for customisation and customer branding. Its offering is heavily based on open-source software and includes authentication, SSO, federation, self-service registration, and user provisioning support for on-premises and SaaS applications. Is the only prominent global-level IDaaS vendor with headquarters in continental Europe at present, and has achieved early-mover advantage in that region. IdaaS cloud is European-based which is proving favourable with predominantly European customer base.

www.iwelcome.com

Panda Security (Spain)

Founded in 1990 in Bilbao Spain as Panda Software, with European focus for first 17 years followed by key steps towards international expansion in 2007, where US presence was stepped up in particular. Prominent player in anti-virus and endpoint protection segments. Ranked 52nd in Truffle European Software list in 2013, with annual revenues that year of €142m.

www.pandasecurity.com

SMS Passcode (Denmark)

Danish company with focus on adaptive multi-factor authentication - solutions secure remote access systems including Microsoft, Citrix, Cisco and Juniper. SMS Passcode's customers predominate in manufacturing, natural resources, government and financial services. Nine-tenths of them are SMEs.

www.smspasscode.com

Sophos (UK)

Founded in the UK in 1985, Sophos is a prominent security vendor in the security space,  competing prominently in the UTM firewall space, as well as secure wi-fi, web and email gateway spaces. Company initially provided endpoint security before adding network and mobile security solutions to its portfolio. The Sophos UTM portfolio includes 11 models (the SG Series). Recent acquisitions include Cyberoam, another UTM vendor which includes cloud-based sandboxing, automated email encryption and integration with Sophos' MDM product. Also recently acquired US-based cloud security firm Mojave in October 2014, thereby strengthening their line of cloud solutions.  Is the highest-ranked PACs vendor in the Truffle100 European software vendor list, ranked 24th in 2013, with revenues of €315m.

www.sophos.com

Stonesoft (Finland)

Prominent Finnish firewall/UTM player acquired by McAfee in May 2013. Renowned for pioneering innovation in next generation firewall technology, particularly in analysing threat evasion techniques, and it is known for its well-functioning clustering and active-active options. Stonesoft firewall features that are not seen in many competitors' products, and its firewall features are both innovative against modern and advanced threats and focused on the enterprise.

www.stonesoft.com

Stormshield (France)

Subsidiary of Airbus Defence and Space, and the result of an operational merger between two French firewall vendors in 2013 (Arkoon and Netasq). Core focus on firewalls and UTM, as well as providing endpoint and data security solutions. UTM product line (Stormshield Network Security) is made of nine appliances and seven virtual appliances.

www.stormshield.eu

Swivel Secure (UK)

Swivel authentication platform, first launched in 2000, is now used by major blue chip companies as well as SME and public sector organisations. Swivel Secure’s customer base spans over 35 countries and its solution is used to secure VPN, desktops, web and Cloud-based applications. Customers vary from UK NHS Trusts to multi-national logistics organisations, pharmaceuticals companies, high street retailers, financial institutions and hardware component manufacturers.

www.swivelsecure.com

 

Return to Key and Emerging Players

 

 

Getting Started

Which type of company are you? Choose one of the options below and get a head-start.

Framework Overview

Navigate through the different parts of the Framework

leeg

Joomla! Debug Console

Session

Profile Information

Memory Usage

Database Queries