Written By Patrick Kilgore And Presented By Charles Leaver Ziften CEO
A report was published called “Financiers put billions into cyber security companies” by CEO of Cybersecurity Ventures, Steve Morgan. This is not guesswork. The previous year alone, venture backed cyber security organizations raised nearly $2 billion dollars. With this increase of capital, you would be forgiven for believing that things have actually achieved their peak. But you would be incorrect …
At the midpoint of 2015, start ups in cyber security had actually already raised $1.2 billion in financing. There seems to be no end in sight when it pertains to cyber security as Morgan suggests. Leading firms like Allegis Capital have actually even raised funds (to the tune of $100M) to back cyber security innovation, exclusively.
The usual suspects are not there on the list of names. Morgan’s article states that most of the financing statements are for quick growing companies like ours. Ziften is in good company among innovators who are keeping pace with the demands of modern cyber security. While we lead the pack in constant endpoint visibility – others companies have taken distinct approaches, such as applying artificial intelligence to the fight against cyber attacks or simplifying crucial lookups to bring public key file encryption to the masses. They are all tackling a various pieces of the puzzle.
And it certainly is a puzzle. Because lots of solutions are highly specialized, collaboration is going to be critical. The need for incorporating the different components in the market for an advanced view of the issue set is clear. That’s why we developed Ziften Open Visibility ™ – to supply APIs, connectors, and indicators to incorporate endpoint context and attribution data with existing investments.
Market Vision That Is 20/20
It may seem like market saturation to the layperson but it is just the tip of the cyber security iceberg. Every day, cyber attacks become more sophisticated, finding brand-new ways to devastate customers and organizations. This list of backed companies is a testament to the notion that legacy endpoint and network security is failing. The idea of prevention is a good one, however security experts now understand that a 2 pronged strategy is needed that integrates detection and response.
You can have a 20/20 view of your security landscape, or you can keep your present blind spots. Which one do you believe will help you to sleep at night?