Key and Emerging Players

  • MARKET - Market Analysis - Market Overview - Key and Emerging Players

    MARKET - Market Analysis - Market Overview - Key and Emerging Players

    Given the highly fragmented and diverse nature of the PACs market domain, it is not surprising that a broad range of ICT players contribute to its overall makeup. This section highlights some of the key categories of player as well as identifying key companies in each. 

    In its broadest terms, players participating in PACs are categorised into three key sub-groups in this section, with players within each of these categories profiled in more detail in this section:



    ICT Generalists 
    Given the increasing integration of PACs technologies in wider ICT infrastructure, as well as the systemic nature of cyber-related risks, it is not surprising that a relatively small number of key ICT players have a disproportionately influential role in the PACs value chain and security of overall PACs ecosystems - particularly in relation to consumer and enterprise use of ICT. Ungraciously perhaps, key industry analyst Bruce Schneier refers to this group as technology “feudalists” in a recent Harvard Business Review article, referring to the ever-increasing trust that users must now place in such technology providers (Figure 6.1) [SCH13]. When the PACs marketplace was less mature, security was sold in a more standalone manner and purchasing users bore much of the responsibility for installing it and maintaining its effectiveness. As ICT becomes more service-based around use of other infrastructures and services maintained by these key influencing third parties, users increasingly expect security for such related services to be provided “out of the box”.

    Prominent European based PACS players
    These companies are scoring highly on European ICT company ranking lists, such as the Truffle categorisation of key European software vendors . Many of these vendors compete in highly competitive mass-market PACs segments, particularly around anti-virus and malware prevention, as well as in the Firewall and UTM segments. Several of the prominent players listed here also compete in the Authentication and Access Management segments.

    Specialist PACs Vendors (Global) 

    These include prominently as leaders in global analyst evaluations for key PACs market categories in recent years. Revenues for companies vary greatly with most ranging from $100m+ up to the low billions. Given the strong link between network and security support, prominent networks players providing prominent PACs portfolios are also included here (Cisco, Checkpoint, Juniper). Larger PACs players acquired by leading ICT players (e.g. McAfee) are also included.

    Emerging PACs Players (Global)
    While it is estimated that somewhere between 1000-2000 funded product-oriented PACs startups now exist globally, a brief highlight samples some emerging PACs players developing innovative te chnologies who have been receiving particular attention in the media and in investor circles. 

    Defence Contractors
    A relatively concentrated number of large contractors serving the needs of the Defence and Intelligence buyer account for a significant amount of revenues in the overall PACs space. Such players provide highly advanced bespoke solutions to key Defence agencies.



    [SCH13] Bruce Schneier – “You Have No Control Over Security on the Feudal Internet”, Harvard Business Review, June 6 2013


    Return to Market Overview




  • MARKET - Market Analysis - Market Overview - Key and Emerging Players - Emerging PACs Players (Global)

    MARKET - Market Analysis - Market Overview - Key and Emerging Players -  Emerging PACs Players (Global)

    While it is estimated that somewhere between 1000-2000 funded product-oriented PACs startups now exist globally, Table 5.4 below briefly highlights a sample some emerging PACs players developing innovative te chnologies who have been receiving particular attention in the media and in investor circles in recent times.


    Table 5.4 – Key Emerging PACs technology vendors (Global). 

    Company Overview
    41st Parameter

    Focus: digital fingerprinting and fraud detection. Solution focussed onhelping  retailers find hackers and fraudsters. It invisibly scans the PC and creates a digital "fingerprint" of it. Even if a hacker has your credentials, if the person's not logging in from your actual PC, 41st knows it and flags those activities.

    A10 Networks

    Enables large web players and government organisations to accelerate, secure and optimise the performance of their data center applications and networks.


    Focus: privacy protected browsing. Offers software it calls the "Hotspot Shield" which gives everyone secure, anonymous, and private browsing on the Internet.


    Focus: application security. Offers a cloud platform that checks to see if an app is secure so it can't be hacked by intruders; particular emphasis on mobile apps.


    Cloud service that virtualises applications, data and content such as Office documents and PDFs on any mobile device with no configuration and zero data leakage. This reduces the possibility of the mobile device being infected by documents embedded with malware or confidential corporate data being cached on the device where it can later be compromised.


    Averail Access mobile app combines with a cloud-based management console to create a trusted environment to protect files, regardless of where they are stored. On April 1, 2014, Averail became part of MobileIron.


    Developing new endpoint security approach based on VM-based isolation approaches,  whereby vulnerable tasks (e.g a user opens an email or browses the web or shares files),  the task is isolated in a micro-virtual machine (micro-VM) which protects the rest of the system from potential malware attack.


    Delivers security controls including encryption, tokenisation, cloud data loss prevention and cloud malware detection. It also includes activity monitoring for cloud applications including Salesforce,, Chatter, Google Gmail, Microsoft Office 365 and Amazon Web Services. Perspecsys is a similar solution player in the space.

    CloudLink (AFORE)

    Focus on cloud encryption; encryption of  data-at-rest and data-in-motion and multi-tenant security

    Co3 Systems

    Focus: incident response management. Focus on post event breach reporting and supporting companies in meeting compliance obligations.


    Focussed on proactive approaches to identifying and attributing hackers. Has received much attention due to it’s aggressive stance on rooting out the hackers, as opposed to an emphasis on building defensive tech.


    Cylance's Infinity offers intelligent, predictive threat analysis of good vs. bad objects using a non-signature, non-heuristic and non-behavioral based mathematical approach.

    Marble Security

    Focus: application security. Identifies and manages the risk of Android and iOS apps that steal user identities and leak corporate data.


    Threat management platform provides security analytics and threat context for intelligence and incident response.

    Nok Nok Labs

    Develops two-factor authentication systems for desktops, mobile devices and servers.

    Shape Security

    Solution focused on making it harder for hackers to trick people into visiting malware-laced websites.

    Skyhigh Networks

    Cloud security software helps businesses secure their data in the cloud by discovering the cloud services employees are using, analysing risk and enforcing cloud security policies.


    Cloud service that helps developers build secure authentication and access control into any application, via a robust REST+JSON API or client libraries.


    Vulnerability management solution for managing security alerts and patches, recently signed high-profile contract with US Department of Defence.


    Focus: fraud prevention. provides comprehensive, context-based authentication, protecting mission-critical enterprise applications from hackers and fraudsters. ThreatMetrix™ has created a comprehensive process to create trust across all types of online transactions, guarding against account takeover, card-not-present, and fictitious account registration frauds.


    Virtualisation technology creates a separate environment called a Virtual Zone where all internet activity and programs from external devices are contained and virtualised.


    Focus: fraud detection. Does realtime phone fraud detection based on a "voice print."  The tech is popular with banks, credit card companies, and any company that still does a lot of business through call centers.


    Offers an app that gives users greater control over their mobile messages — text, pictures, audio, video — with advanced military-grade security to prevent snooping.


    Other key emerging themes and players in the privacy space are also highlighted in Table 5.5 below.


    Table 5.5 – Early-stage commercial privacy technologies – key themes

    Privacy Theme Overview Commercial Players
    Data Removal and Reduction Support users in removing data online, particular emphasis on search data, supporting “right to be forgotten” principles. SafeShephard
    Data Transparency Apps Allow users to gain transparency over social apps that are using their data and the manner of use.
    Digital Marking and Personalised Digital Footprints Supporting users in appending unique annotations and marking to key digital assets, supporting asset tracking across the internet and other systems. Eterniam
    “Off The Record” personal communications Support for email, mobile messaging, self-destructive media, and secure encryption-based communications and VPN tunnelling. Ansa, AnchorFree, SilentCircle
    Online Digital Identity Management Allow users to manage multiple digital identities online. MiiCard
    Online Reputation Management Ability for individuals and corporates/brands to track online personas an reputations – offerings typically service led.,,

    Massive PR (bought by Strixius), BrandYourself, Igniyte, DataDial, Webimax, Gadook,


     Return to Key and Emerging Players


  • MARKET - Market Analysis - Market Overview - Key and Emerging Players - Defence Contractors

    MARKET - Market Analysis - Market Overview - Key and Emerging Players - Defence Contractors

    A relatively concentrated number of large contractors serving the needs of the Defence and Intelligence buyer account for a significant amount of revenues in the overall PACs space. Such players provide highly advanced bespoke solutions to key Defence agencies, sometimes leading to technology cross-over for dual use in commercial and consumer sectors. Most of the players also have very strong breadth of security expertise, providing end-to-end security support to these most advanced PACs buyers segments. Cyber is becoming increasingly important proportionally within overall defence budget concerns, with key players targeting acquisition of smaller security players in response. Some of the key defence contractors participating in the PACs marketplace are highlighted in Table 5.6 below.

    Table 5.6 – Key players serving PACs needs in Defence and Intelligence agencies

    Company                Overview

    Airbus Defence & Space (Netherlands/France/


    European multinational aerospace and defence organisation registered in Netherlands and headquartered in Toulouse, France.  Formed based on merger of various national level Aerospace/Defence divisions in 2000, and was reorganised from it’s predecessor (EADS) in January 2014. Current restructured Airbus entity consists of three divisions – Airbus, Airbus Defense and Space and Airbus Helicopters. 

    Cyber Security interests within Airbus now fall under the Airbus Defence and Space division, based on a merger of Airbus Military, Astrium and Cassadian. Provide range of cyber defence and professional services offerings, including a European Cyber Defence Centre (CDC) SOC-based infrastructure based in Paris, Munich and Newport (Wales). Also provide a range of security appliances under the Stormshield brand, focusing on network, endpoint and data security protection. Moseo is another Airbus brand focusing on secure voice communication solutions.

    BAE Systems (UK)

    British multinational aerospace and defence player headquartered in London UK – formed by merger between Marconi and British Aerospace in 1999.  Largest operations are around supporting UK and US Defence agencies, other key markets are Australia, India and Saudi Arabia. Is one of the six largest suppliers to the US Department of Defence.   

    Strategic shift towards cyber security occured between 2008 and 2011, whereby BAE acquired five cyber security companies to offset reduced government spending on more traditional defence products such as aircrafts and tanks. Most notables acquisitions include purchase of Detica Group PLC in 2008 for £531m, and the recent acquisition of cloud security vendor Silversky in 2014 [WSJ14].

    BAE has a broad cyber and intelligence product portfolio across all elements of the PACs solution spectrum:

    Boeing Defense, Space and Security (USA)

    Core PACs capability within Boeing is based within the Defence, Space and Security company arm – with a focus on Information Security, Management and analysis; surveillance and reconaissance, secure communications. Core cyber capabilities are within the Network and Space Systems division of Boeing DSS. Cyber and Security Solutions (C&SS) division within this provides network surveillance and data analytics, cyber training and simulation, security assessments, mission assurance, and information operations capabilities to the federal, commercial, and international markets as well as cybersecurity solutions and data analytics. C&SS manages the Cyber Engagement Center (CEC), a working operations facility that brings together cybersecurity experts from across Boeing to collaborate with customers, partners, and researchers.


    Boeing’s CEC is a SOC offering aimed at supporting key critical infrastructure clients, and large scale capability on security information management and analysis. Combat Survivor Evader Locator (CSEL) is another core offering, focusing on secure over-the-horizon communication with isolated personnel.

    Booz Allen Hamilton, Inc.

    US-based management consulting firm, with 99% of revenues coming from US Federal Government agencies including Security and Defence agencies. Provide a range of cyber R&D capabilities to US Government, secure architecture and development, and a range of solutions around secure content management, intrusion detection, automated monitoring, encryption, and authentication.

    Finmecannica (Italy)

    Large Italian conglomerate with presence in over 100 countries globally, operating across seven sectors: aeronautics, helicopters, space, electronics, defence systems, transportation and construction.

    Key defence and security-related subsidiaries of Finmecannica include Selex ES (a merger of their Galileo Elsag and Sistemi businesses in 2013),  and DRS Technologies (US defence contractor purchased in 2008). Selex has significant presence in both physical and cyber security markets, providing a broad spectrum of services to military and government organisations in the latter.

    Recently launched the Cyber Security Centre of Excellence in Chieti, Italy in June 2014.

    L-3 Communications (US)

    US company that supplies command and control, communications, intelligence, surveillance and reconnaissance (C3ISR) systems and products, avionics, ocean products, training devices and services, instrumentation, space, and navigation products. Customers include the Department of Defense, Department of Homeland Security, U.S. Government intelligence agencies, NASA, aerospace contractors and commercial telecommunications and wireless customers.

    Cyber capabilities primarily located within L-3’s National Security Solutions division, providing full spectrum cyber operations across several tranches including Enterprise and Mission Information Technology, Intelligence Operations Support, and Operational Infrastructure Solutions.

    Lockheed Martin Corporation (US)

    Lockheed Martin is the largest US defense contractor, the US government’s leading systems integrator, the top federal provider of information technology and services over the past 20 years.

    Company has been successful at capturing share away from other competitors in the US Federal market and is increasingly aiming to transfer advanced Defence domain cyber expertise towards enterprise markets [FORB13] . This is reflected in it now being the second largest contractor with the US NSA in dollar terms, up from sixth place during the Bush Administration.

    Famous for pioneering the Cyber Kill Chain, an intelligence-driven security process. Also provide Palisade, an intelligence management approach geared towards large enterprise environments.

    Northrop Grumman Corporation (US)

    US Defence contractor, formed by the acquisition of Grumman by Northrop in 1994 – employs approximately 68,000 people globally at present. Provide a broad range of security capabilities across broad range of segments including Commercial and Military Aviation, Directed Energy, Health IT, Missile Defense and Naval, Navigation and Space Systems among others.

    Raytheon Company (US)

    Large scale US defence contractor and systems integrator. Has a specific cyber products division focused on providing PACs solutions for government and commercial organisations, working with professional service divisions to provide full end-to-end service support. Provide range of solutions across secure information sharing, insider threat, secure mobile, threat protection, data analytics and linux security categories in particular. 

    SAFRAN (Fra)

    Large defence contractor focussed on aircraft, rocket engines.

    Security expertise originated from acquisition of SAGEM in 2005. Speciality expertise in biometric identification (strengthened via acquisition of L-1 Identity Solutions in 2011), automated fingerprint identification systems, iris and face recognition systems, and explosive detection systems in checked luggage.

    Biometric capabilities used in LEA contexts, border control systems, road safety, and gaming terminals among other applications. 

    Thales (France)

    Large aerospace and defence player, approximately 65,000 employees with presence in 56 countries globally – and delivering cyber security products in 50 of these. Currently has approximately 1500 cyber experts.

    Thales also part of a merged entity with Raytheon (ThalesRaytheon) providing cyber attack protection for Air Operations systems in particular. 

    Cover solution expertise a broad range of physical security areas including airport security, border surveillance, critical information systems, infrastructure security and urban security. Particular expertise and market strength in securing interbank electronic transactions.

    Core services focus on cyber assurance (vulnerability assessment, audit, testing) and cyber maturity delivery (secure architecture and hosting, training and awareness, incident response).  Quintec is a key consultancy arm within Thales (, acquired in 2000 and merged with Thale’s existing cyber security expertise. 


    [FORB13], Lockheed Martin Emerging As Dominant Player In Federal Cybersecurity Market, Dec 13,

    [WSJ14] "BAE Systems Boosts Cybersecurity Arm" Wall St Journal Online,

     Return to Key and Emerging Players


  • MARKET - Market Analysis - Market Overview - Key and Emerging Players - PACs Specialists - Global

    MARKET - Market Analysis - Market Overview - Key and Emerging Players - PACs Specialists - Global


    Specialist PACs Vendors (Global)

    Table 5.3 below highlights some of the key “pure-play” PACs vendors in the space at present – particularly companies featuring prominently as leaders in global analyst evaluations for key PACs market categories in recent years. Revenues for companies vary greatly with most ranging from $100m+ up to the low billions. Given the strong link between network and security support, prominent networks players providing prominent PACs portfolios are also included here (Cisco, Checkpoint, Juniper). Larger PACs players acquired by leading ICT players (e.g. McAfee) are also included.


    Table 5.3 – Summary of key “Pure Play” PACs marketplace competitors (Global) 

    Company Overview

    Alert Logic (US)

    Founded in 2002 and headquartered in Heuston Texas, viewed as  key emerging MSSP player in Forrester analysis of key security service providers , with strong focus on cloud-based delivery model. Currently have a customer base of over 2,200 clients.

    Barracuda Networks (US)

    Publically listed and founded in 2003, provide security, networking and storage products based on network appliances and cloud services. Company went public in November 2013. Company’s security products include products for protection against email, web surfing, web hackers and instant messaging threats such as spam, spyware, trojans, and viruses. The company's networking and storage products include web filtering, load balancing, application delivery controllers, message archiving, NG firewalls, backup services and data protection. Compete in key firewall and web gateway segments but would not be viewed by market analysts as the primary pacesetters in any of these segments.

    Bluecoat (US)

    Develop hardware proxy appliances for corporate networks offering web caching, virus scanning, content filtering, instant messaging control and bandwidth management. In December 2013, Blue Coat acquired Oslo based Norman Shark, a provider of threat discovery and malware analysis solutions for enterprises, service providers and government.

    Checkpoint (Israel)

    Founded in 1993 and headquartered in Tel Aviv, Israel, renowned provider of network security, endpoint security, data security and security management solutions. Pioneered industry with development of Firewall1 and patented stateful inspection technology – and leading player in Enterprise Firewall segment. Acquired Nokia’s network security business in 2009 among other acquisitions in recent years.

    Cisco (US)

    Founded in 1984, large and prominent networks player with exceptionally broad network security portfolio. Firewall offerings sold under the Adaptive Security Appliance (ASA) firewall brand. Would not be viewed as a leading innovator in emerging next generation firewall space, but more so as a vendor selling PACs solutions in bundle with core network offerings. However company has strong market share in core PACs segments and strong and highly rated support network. Also have strong certification and training support or established and loyal user base. Have made several PACs acquisitions in recent years, most notably mobile network management player Intucell, Cognitive Security, Sourcefire and threatGRID.

    CyberArk (Israel/US)

    Founded in 1999 in Israel, with key focus on privileged account security and high value assets. Solutions deployed across over 1500 customers in 30 countries at present. Filed for IPO in June 2014.

    FireEye/Mandiant (US)

    Publicly listed US company, founded 2004, focus on network, mobile and forensics analysis for advanced attacks. Acquired Mandiant for $1bn cash + stock deal in December 2013, and intrusion detection player nPulse Technologies for $60m in May 2013.

    Fortinet (US)

    Founded in 2002, prominent firewall player, and market leader in  Unified Threat Management (UTM) appliance space, geared towards multifunction security use for small and medium enterprises in particular. Offer 40 different UTM appliance models under FortiGate brand line.  Acquired Coyote Point Solutions an Application Delivery Controller (ADC) manufacturer in March 2013.

    Imperva (US)

    Publicly listed player, founded 2002, going public with IPO in 2011.  Key strategic focus on security of data in physical and virtual data centres. Core platform branded as SecureSphere, used by over 3300 customers in 75 countries.

    Juniper (US)

    Founded in 1996, prominent player in networks and network security space, selling high performance IP solutions. Security product portfolio falls under their SRX series, with firewall offerings falling across multiple model lines (SRX, SSG, ISG and vGW).  Tends to sell security offerings in bundle with other core router and switch appliance offerings, rather than showing same level of leadership on security features compared to Checkpoint, Palo Alto and Fortinet in particular.

    Kaspersky (Russia)

    Founded in 1997, develop secure content and threat management systems and the world’s largest privately held vendor of software security products. Key player in Anti-Virus space and endpoint protection systems where it is viewed as an emerging leader, traditionally in consumer space but increasingly in enterprise markets.

    McAfee/Intel Security (US)

    Highly established and diversified security player, which became a wholly owned subsidiary of Intel in February 2011. While McAfee has traditionally competed across a wide spread of PACs subsegments, Intel are particularly focussed on driving out emerging opportunities and requirements in the hardware side of the business. McAfee has acquired several companies in recent years including Stonesoft, ValidEdge, NitroSecurity, and Sentrigo among others.

    MetricStream (US)

    Founded in 1999, leading player in the Governance, Risk and Compliance GRC space, frequently mentioned by key analysts as leader in that space.

    Modulo (Brazil)

    Founded in 1985, leading supplier of GRC solutions, current installed base of over 1000 organisations across IT GRC, ERM, BCM, Vendor, and Compliance and Risk Management. While historically the company has produced much of its revenues from services, more recently it is experiencing significant growth in its software business with 70% year-on-year growth in 2013. Established customer base in South America, increasingly targeting customers in North American region. 

    NetIQ (US)

    Founded in 1995,  management portfolio include products for performance management, security management, configuration management and change control. Its flagship products are Access Manager, AppManager, Secure Configuration Manager, Sentinel, and Identity Manager.

    Palo Alto Networks (US)

    Founded in 2005, leading player in next-generation firewall space and pure-play network security vendor. Viewed as key pioneer in firewall market, with particular stated strengths in application identification and IPS capabilities within it’s firewall functionality. Company went to IPO in 2012 and has since made a number of key acquisitions including Morta Security in January 2014 and Cyvera for $200m in April 2014.

    Proofpoint (US)

    Founded in 2002, provides SaaS and on-premises solutions for inbound email security, outbound data loss prevention, privacy protection, email encryption, electronic discovery (“eDiscovery”) and email archiving. Leading player in Secure Email Gateways and Enterprise Information Archiving market segments. Moved to IPO status in April 2012, making a number of acquisitions since them including Abaca, Amorize, Sendmail and NetCitadel. Have strong partnership links with IBM, particularly around IBM Qradar suite.

    Splunk (US)

    Founded in 2003, provide market leading solution for IT operations and application support teams around log management analytics, monitoring and advanced search and correlation. Although not a specific security specialist in that core solutions provide data analytics support across several IT contexts including application management, security and compliance, it is increasingly viewed as an option for log management in the SIEM context. Company went public in 2012, and in 2013 acquired Bugsense, a leading analytics solution for machine data generated by mobile devices.

    Symantec (US)

    Founded in 1982, prominent, diversified security player with broad portfolio in security, storage and archving solutions in particular, played a key pioneering role in commercialising anti-virus software in particular. Has struggled to maintain growth in key security sectors in recent times, and in October 2014 the company announced that it would split into two entities, with one focusing on security and the other on information management, the latter where most of the company’s R&D activity has been occuring in recent years.

    Trend Micro (Japan/US)

    Founded in 1988, leading player in security space provide broad and diversified suite of security solutions. Competes in the Threat and Breach detection space alongside FireEye, SourceFire and Palo Alto; and in the anti-virus industry against Kaspersky, McAfee, F-Secure, Panda Security, Sophos and Symantec among others.

    Trustwave (US)

    Founded in 1995 and headquartered in Chicago, company’s primary business is services for compliance, vulnerability assessment, managed security and security consulting. Its threat and research capability includes SpiderLabs, which provides research on security threats and vulnerabilities in support of service delivery and product development. Trustwave also offers a broad portfolio of security products, including secure web and email gateways, data loss prevention (DLP), a web application firewall, network access control, unified threat management (UTM), security scanning, and encryption technologies.

    Websense (US)

    Founded in 1994, headquartered in Austin Texas, one of the key players in the Secure Web Gateway (SWG) market. Also provide solutions for email, data and mobile security within their portfolio. In May 2013 was acquired by Vista Equity Partners for a total purchase price of $906m.

    WhiteHat Security (US)

    Founded in 2001 and headquartered in Santa Clara, California. Leading provider of website risk management solutions that protect critical data, ensure compliance and narrow the window of risk. WhiteHat Sentinel is the company's flagship product family, enabling automated mitigation of website vulnerabilities via integration with Web application firewalls. Sentinel currently manages thousands of websites – including sites in highly regulated industries, such as top e-commerce, financial services and healthcare companies.



     Return to Key and Emerging Players


  • MARKET - Market Analysis - Market Overview - Key and Emerging Players - PACs Specialists - Prominent European-Based PACs Players

    MARKET - Market Analysis - Market Overview - Key and Emerging Players - PACs Specialists - Prominent European-Based PACs Players

    Table 5.2 highlights some prominent European-based PACs players, with inclusion based on their appearance on the radar of key global industry analysts assessing prominent market sub-segments, as well as scoring highly on European ICT company ranking lists, such as the Truffle categorisation of key European software vendors . Many of these vendors compete in highly competitive mass-market PACs segments, particularly around anti-virus and malware prevention, as well as in the Firewall and UTM segments. Several of the prominent players listed here also compete in the Authentication and Access Management segments. 

    Table 5.2 - Notable European-based PACs technology vendors

    Company Overview

    AVG Technologies

    (Netherlands/Czech Republic)

    Founded in 1991 in Czech Republic, with headquarters now in Amsterdam, particularly targeted at anti-virus solutions for consumers and businesses across PCs and mobiles, both in freeware and paid forms. AVG solutions presently have over 187 million active users, with 1000+ employees across 11 offices globally. Acquired remote monitoring vendor Level Platforms in June 2013 – and also was ranked 32nd in European Truffle 100 list in 2013.

    Beta Systems (Germany)

    Berlin-based vendor in identity management space. Have over 1,300 customers in more than 30 countries, with most being major, international corporations and organisations that operate extensive IT systems and complex IT processes, including banks, insurance agencies, manufacturing, trade and utility companies, as well as public administrations. Is a prominent Identify Governance and Administration (IGA) vendor selling its flagship Security Access Manager (SAM) product since 1994, making SAM one of the longest-running IGA solutions from a single vendor.  Beta Systems is recovering from a difficult period in 2011, when license revenue declined sharply. Growth returned in 2012. In 2013, the company brought in a new CEO and other executives, and is investing in the product and the expansion of its sales channels, and in building an international selling presence.

    CenterTools (Germany)

    Prominent player in the endpoint encryption marketplace, with product portfolio released under the DriveLock brand, offering granular options in regulating USB and other devices along with the encryption of hard drives (FDE) and data on removable media. Company HQ in Ludwigsburg and other offices in Munich, Zurich, Vienna, Cambridge and Portland, supports customers worldwide in over 30 countries. 90% of market customer base is in Europe at present.

    Clearswift (UK)

    UK-based player with established presence in the email, web and file protection market, primarily in the U.K, Europe and Asia/Pacific; also has presence in Secure Web Gateways (SWG) market. Management overhaul in recent times is pushing company strategy towards data protection and information governance, reflected in Clearswift's Aneesya platform. Company has over 3,000 clients globally with 7m active Clearswift licences. Funded by Lyceum Capital. Approximately one-third of existing business in the UK, with remainder in mainland Europe and other global regions. Current revenues of appromimately GBP£21.1m.

    Clavister (Sweden)

    Founded in 1997 in Sweden, Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualised environments. They compete most prominently in the Unified Threat Management (UTM) space, as well as providing mobile and network security solutions for large enterprises, cloud service providers and telecom operators. Clavister has offices throughout the world and has delivered more than 150 000 installations to over 20 000 customers. Key products sold across Eagle, Lynx, Wolf and PolarBear brand categories.

    ESET (Slovakia)

    Prominent Slovakian player in anti-virus space, founded in 1992. Has global headquarters in Bratislava (Slovakia) and regional distribution centers in San Diego (U.S.), Buenos Aires (Argentina), and Singapore. ESET has offices in Sao Paulo (Brazil) and Prague (Czech Republic). Has extensive network of malware research centers spans Bratislava, San Diego, Buenos Aires, Singapore, Prague, Košice (Slovakia), Krakow (Poland), Montreal (Canada), Moscow (Russia). In April 2009, ESET offered its antivirus engine in the form of SDK, which was implemented by CYAN Networks Software GmbH in its Secure Web Gateway product line. Was ranked 34th in European Truffle 100 list in 2013, with revenues of €256m.

    Evidian (France)

    French subsidiary of Bull (in turn a subsidiary of  Atos), and is a prominent European player in identity and access management. Has user base of more than 5m in more than 900 organisations, with a presence growing rapidly beyond Europe, particularly in Japan and the US.

    F-Secure (Finland)

    Founded in 1988, anti-virus, cloud content and computer security company based in Helsinki, Finland, with strong focus on consumer security segment. Has 940 employees with 20 offices globally. Was ranked 46th in Truffle100 list in 2013, with annual revenues of €157.2m.

    Gateprotect (Germany)

    German-based pure-play security vendor, with established presence in UTM market, with key offices in Hamburg and Leipzig. Existing UTM portfolio includes nine appliances, with virtual appliances and centralised management also available. In July 2014, gateprotect was acquired by Rohde & Schwarz, a large German electronics group.

    Gemalto (Netherlands)

    Headquartered in Amsterdam, large €2bn+ player focussed on development of secure software and operating systems embedded in many kinds of device, like SIM cards, banking cards, tokens, electronic passports and ID cards. Also prominent player in Authentication market space. Majority of Gemalto's customers are in financial services, government and healthcare, and in larger enterprises. Recently acquired data security player SafeNet in high-profile acquisition worth $890m in August 2014. Ranked 28th in European Truffle 100 software list in 2013.

    iWelcome (Netherlands)

    Prominent Dutch-based identity as a service (IdaaS) vendor. Company is the result of spinoff from system integration firm Everett.  Solution provided in a dedicated single tenant delivery model to allow for customisation and customer branding. Its offering is heavily based on open-source software and includes authentication, SSO, federation, self-service registration, and user provisioning support for on-premises and SaaS applications. Is the only prominent global-level IDaaS vendor with headquarters in continental Europe at present, and has achieved early-mover advantage in that region. IdaaS cloud is European-based which is proving favourable with predominantly European customer base.

    Panda Security (Spain)

    Founded in 1990 in Bilbao Spain as Panda Software, with European focus for first 17 years followed by key steps towards international expansion in 2007, where US presence was stepped up in particular. Prominent player in anti-virus and endpoint protection segments. Ranked 52nd in Truffle European Software list in 2013, with annual revenues that year of €142m.

    SMS Passcode (Denmark)

    Danish company with focus on adaptive multi-factor authentication - solutions secure remote access systems including Microsoft, Citrix, Cisco and Juniper. SMS Passcode's customers predominate in manufacturing, natural resources, government and financial services. Nine-tenths of them are SMEs.

    Sophos (UK)

    Founded in the UK in 1985, Sophos is a prominent security vendor in the security space,  competing prominently in the UTM firewall space, as well as secure wi-fi, web and email gateway spaces. Company initially provided endpoint security before adding network and mobile security solutions to its portfolio. The Sophos UTM portfolio includes 11 models (the SG Series). Recent acquisitions include Cyberoam, another UTM vendor which includes cloud-based sandboxing, automated email encryption and integration with Sophos' MDM product. Also recently acquired US-based cloud security firm Mojave in October 2014, thereby strengthening their line of cloud solutions.  Is the highest-ranked PACs vendor in the Truffle100 European software vendor list, ranked 24th in 2013, with revenues of €315m.

    Stonesoft (Finland)

    Prominent Finnish firewall/UTM player acquired by McAfee in May 2013. Renowned for pioneering innovation in next generation firewall technology, particularly in analysing threat evasion techniques, and it is known for its well-functioning clustering and active-active options. Stonesoft firewall features that are not seen in many competitors' products, and its firewall features are both innovative against modern and advanced threats and focused on the enterprise.

    Stormshield (France)

    Subsidiary of Airbus Defence and Space, and the result of an operational merger between two French firewall vendors in 2013 (Arkoon and Netasq). Core focus on firewalls and UTM, as well as providing endpoint and data security solutions. UTM product line (Stormshield Network Security) is made of nine appliances and seven virtual appliances.

    Swivel Secure (UK)

    Swivel authentication platform, first launched in 2000, is now used by major blue chip companies as well as SME and public sector organisations. Swivel Secure’s customer base spans over 35 countries and its solution is used to secure VPN, desktops, web and Cloud-based applications. Customers vary from UK NHS Trusts to multi-national logistics organisations, pharmaceuticals companies, high street retailers, financial institutions and hardware component manufacturers.


    Return to Key and Emerging Players



Getting Started

Which type of company are you? Choose one of the options below and get a head-start.

Framework Overview

Navigate through the different parts of the Framework


Joomla! Debug Console


Profile Information

Memory Usage

Database Queries