SlideShare a Scribd company logo
1 of 22
Download to read offline
Q4 2018 Report
www.datasecuritytrends.com
Contents
Valuations
Deal Flow
Focus Areas
Cross-border Activity
Seller Profiles
Board of Advisors
3-6
7-11
12-14
15-17
18-21
22
3
Valuations
High valuations in the data security space is largely driven by the exceptionally strong market outlook. We are
nearing 20 billion devices that are going to be connected by 2020 and this is expanding the attack points that
hackers can use to exploit. Over 9 billion data records have been lost since 2013 and almost 5 million data
records are lost or stolen every day. Think about that – it is over 200,000 records every hour.
These numbers set the table for what is happening in the data security market. The potential, the changing
landscape and the daunting task of securing critical ideas, data and infrastructure.
Data Security Exit Value
In the private sector, multiples seem to follow a spectrum, with anti-malware and endpoint security
technologies valued relatively highly, while on-site network security tends to receive a lower valuation.
Most of the companies that based their valuations on identity and access management technologies
have valued in the five to ten times revenue range.
Data Security Public Peer Analysis
In the public sector, we see a similar trend in multiples as far as EV over sales. However, security
companies are being valued much more highly than the average when looking at their EBITDA multiples.
This is a classic indicator of a rapidly maturing market, where profits are valued over market share.
Data Security Valuation Patterns
Looking more broadly at all disclosed multiples in data security deals from 2013 to 2018 clearly
demonstrates the broad range of possible multiples. Note that a logarithmic scale is used in order to
better display all data. The highest value deals were dominated by the technologies in anti-malware,
identity and access management, and premises network security. Palo Alto Networks, Blue Coat Systems,
Splunk, and Proofpoint have all made multiple acquisitions at over 20x TTM revenue.
7
Deal Flow
No sector in the market today is untouched by digitization, whether government, finance, or healthcare, all
companies are becoming digital companies. This is exponentially expanding the attack surface for security
breaches from malware, zero-day threats and ransomware.
Whether large or small, no company is immune from the ripple effect of our globalized economy and the types
of cybercrime that are pervasive in our hyper-connected world. The M&A window shrank a bit after 2015 in
terms of the number of deals, but median deal sizes and valuations in the data security sector are continuously
climbing up.
Data Security M&A Activity
M&A in the data security space slacked off a bit after 2016 and fewer blockbuster deals were cut, despite
brisk venture funding activity. In 2017, more than 200 data security startups received venture funding.
With a flurry of new entrants looking to grab a slice of the spending, there's an equal amount of market
consolidation. The data security market has seen around 180 M&A transactions each year from 2015 to
2017, which is outpacing the market as a whole.
Deal Volume by Transaction Size
Although the number of deals in the data security sector shrank a bit, the deal size didn't get slimmer. In
2017, we saw deals getting up to the $100M-$250M range. In 2018, the number of deals in the $250M-
$1B range is significantly higher than that in years before.
Top Data Security Acquirers
Diving deeper into acquisition activity, we see fewer PEs as top acquirers in terms of deal count than we
normally would. More interestingly, there are also many non-traditional security companies as top
buyers by disclosed deal value, reflecting the increased need for the integration of security into all forms
of technology. Those mega deals include Johnson Control's acquisition of Tyco and Canon's purchase of
Axis Communications.
12
Focus Areas
The bullish M&A market for data security trends is driven by booming sectors like healthcare technology and
Internet of Things (IoT), as well as increasingly fewer acquirable independent targets as the consolidation
continues.
Disruptive data security technologies are now entering newer verticals such as connected and autonomous
vehicles, digital currency services and blockchain technology, presenting a massive opportunity and challenges
for startups and scaleups who can provide businesses with protection of their customer data and intellectual
property.
Data Security Targets' Focus Areas
Although the companies focusing on physical security and security integration services often receive
lower valuations, they dominated the number of M&A exits. Identify management and anti-malware
technologies are valued relatively highly and hotly pursued by security acquirers.
Data Security Targets' Vertical Markets
A large proportion of data security M&A targets offer solutions for transportation management, border
control, law enforcement, and correctional purposes. The banking sector also relies significantly on data
security technologies in fraud prevention, risk management, and anti-money laundering.
15
Cross-border Activity
Global data breach poses critical issues for legal departments, senior managers, and boards of companies in all
industry sectors worldwide. Increasing threats of terrorist attacks and risks of IT and communication hacks are
some of the key factors that could accelerate this sector’s growth.
The past six years have seen over 16 mega deals that exceed $1 billion dollars in value, and at least five of them
are cross-border transactions expanding from the United States to Europe and further east to Asian countries
such as Japan and South Korea.
Data Security Cross-border Transactions
About one-third of the data security deals are cross-border transactions. Broken down into their
respective origins, there is no major surprise that the United States holds the largest share of exits and
acquisitions when the United Kingdom and Canada come as second and third.
Data Security Exit Volume by Region
The United States' strength has been consistent, with 79 exits in both 2013 and 2014, and over 110 exits
each year from 2015 to 2017. In Europe, apart from the United Kingdom, France, Germany, and
Netherlands each produce a nearly equal share of the European exit volume.
18
Seller Profiles
Today’s big security players can’t keep up with the pace of innovation without filling product gaps quickly by
acquiring innovative technology and small teams. Buyers’ strategies vary: for instance, Symantec has been
balancing its security portfolio by both buying and divesting of products. It sold its website and PKI business to
DigiCert for $950 million, then used some of the proceeds to acquire two Israeli companies — Skycure, a
mobile threat defense firm, and Fireglass, an enterprise security solutions provider. Going forward, we see
companies leveraging AI for automated threat response and predictive threat intelligence as particularly
attractive targets.
Key Transactions
Phishing threat management software
Announced Date: February, 2018 Deal Value: $400M EV/S Multiple: 7.3x
AI-based security SaaS
Announced Date: November, 2018 Deal Value: $1.4B EV/S Multiple: 10.8x
Identity management & remote support
Announced Date: April, 2018 Deal Value: $739M EV/S Multiple: 6.7x
Acquired by
Acquired by
Acquired by
Mega Deals
Two-factor authentication SaaS
Announced Date: August, 2018 Deal Value: $2.35B EV/S Multiple: 18.8x
Web & network security systems
Announced Date: June, 2016 Deal Value: $4.65B EV/S Multiple: 7.8x
Intrusion detection & prevention & anti-malware
Announced Date: July, 2013 Deal Value: $2.7B EV/S Multiple: 10.7x
Acquired by
Acquired by
Acquired by
High Valuations
Israeli DAF security software
Announced Date: November, 2014 Deal Value: $198.71M EV/S Multiple: 500x
Security behavioral analytics software
Announced Date: July, 2015 Deal Value: $190M EV/S Multiple: 95x
Acquired by
Acquired by
Board of Advisors
David Levine
Senior Vice President, Corum Group Ltd.
Dave joined Corum in 2015 and has a diverse background in technology and life sciences. As an
executive and entrepreneur, Dave has been operating and investing in companies sitting at the
convergence of commerce and eCommerce as well as innovative life science businesses for over
25 years. Recently, Dave was CEO North America for Gaxsys, an eCommerce and logistics
company that is a leader in last mile logistics and fulfillment for eCommerce marketplaces.
Dave has been on both sides of the mergers and acquisitions table, having sold a life science
technology company, facilitated sell side and buy side technology transactions and has also scaled
multiple technology companies globally in the counter-intelligence, eCommerce, life sciences and
innovation intelligence markets. Dave sits on boards of numerous public and private companies,
including one that recently filed for an IPO.
Email: DavidL@corumgroup.com
Steve Jones
Senior Vice President, Corum Group Ltd.
Steve joined Corum after 25 years of executive experience in various high-tech industries with
both public and private venture-backed startups. He has extensive global experience, opening
international markets and growing sales from zero to tens of million in revenue. He has been on
the forefront of selling several companies and spinning off software divisions, highlighted by the
sale of GetFon to Alestra (AT&T Mexico). He is fluent in Spanish.
Steve was the founding CEO of Solera Networks, a real-time intrusion detection security
company. He also co-founded Auction Trust Network, an eCommerce company for online
exchanges which he sold to MediaForge (Rakuten Marketing).
Email: SteveJ@corumgroup.com

More Related Content

What's hot

Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Frank Backes
 
Digital Transformation Strategy - 4IR AI Blockchain Fintech by Dinis Guarda
Digital Transformation Strategy - 4IR AI Blockchain Fintech by Dinis GuardaDigital Transformation Strategy - 4IR AI Blockchain Fintech by Dinis Guarda
Digital Transformation Strategy - 4IR AI Blockchain Fintech by Dinis GuardaDinis Guarda
 
deloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskdeloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskDominika Rusek
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)Julie Bridgen
 
Tech M&A Monthly: What Happens If You Don’t Sell?
Tech M&A Monthly: What Happens If You Don’t Sell?Tech M&A Monthly: What Happens If You Don’t Sell?
Tech M&A Monthly: What Happens If You Don’t Sell?Corum Group
 
Accenture FinTech reports (NYC & London)
Accenture FinTech reports (NYC & London)Accenture FinTech reports (NYC & London)
Accenture FinTech reports (NYC & London)Webrazzi
 
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationCyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationBrad Deflin
 
2015 Tech M&A Monthly - Private Equity
2015 Tech M&A Monthly - Private Equity2015 Tech M&A Monthly - Private Equity
2015 Tech M&A Monthly - Private EquityCorum Group
 
I-Byte Business Services July 2021
I-Byte Business Services July 2021I-Byte Business Services July 2021
I-Byte Business Services July 2021EGBG Services
 
Tech M&A Monthly: Deal Structures Today
Tech M&A Monthly: Deal Structures TodayTech M&A Monthly: Deal Structures Today
Tech M&A Monthly: Deal Structures TodayCorum Group
 
Tech M&A Monthly: 12 Steps to a Successful Valuation
Tech M&A Monthly: 12 Steps to a Successful ValuationTech M&A Monthly: 12 Steps to a Successful Valuation
Tech M&A Monthly: 12 Steps to a Successful ValuationCorum Group
 
Cybersecurity for Marketing
Cybersecurity for Marketing Cybersecurity for Marketing
Cybersecurity for Marketing Alert Logic
 
Mapping the pii market
Mapping the pii marketMapping the pii market
Mapping the pii marketpii2011
 
Preventing Fraud and Building an End-to-End Data Science Hub at Feedzai with ...
Preventing Fraud and Building an End-to-End Data Science Hub at Feedzai with ...Preventing Fraud and Building an End-to-End Data Science Hub at Feedzai with ...
Preventing Fraud and Building an End-to-End Data Science Hub at Feedzai with ...Elasticsearch
 
Tech M&A Monthly: 15 Ways to Find Buyers
Tech M&A Monthly: 15 Ways to Find BuyersTech M&A Monthly: 15 Ways to Find Buyers
Tech M&A Monthly: 15 Ways to Find BuyersCorum Group
 
Tech M&A Monthly: Forecast 2016 - Part 2: Private Equity
Tech M&A Monthly: Forecast 2016 - Part 2: Private EquityTech M&A Monthly: Forecast 2016 - Part 2: Private Equity
Tech M&A Monthly: Forecast 2016 - Part 2: Private EquityCorum Group
 

What's hot (20)

Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109
 
Digital Transformation Strategy - 4IR AI Blockchain Fintech by Dinis Guarda
Digital Transformation Strategy - 4IR AI Blockchain Fintech by Dinis GuardaDigital Transformation Strategy - 4IR AI Blockchain Fintech by Dinis Guarda
Digital Transformation Strategy - 4IR AI Blockchain Fintech by Dinis Guarda
 
Forbes Article
Forbes ArticleForbes Article
Forbes Article
 
deloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskdeloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-risk
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)
 
Why Fintech?
Why Fintech?Why Fintech?
Why Fintech?
 
Tech M&A Monthly: What Happens If You Don’t Sell?
Tech M&A Monthly: What Happens If You Don’t Sell?Tech M&A Monthly: What Happens If You Don’t Sell?
Tech M&A Monthly: What Happens If You Don’t Sell?
 
Accenture FinTech reports (NYC & London)
Accenture FinTech reports (NYC & London)Accenture FinTech reports (NYC & London)
Accenture FinTech reports (NYC & London)
 
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationCyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop Presentation
 
2015 Tech M&A Monthly - Private Equity
2015 Tech M&A Monthly - Private Equity2015 Tech M&A Monthly - Private Equity
2015 Tech M&A Monthly - Private Equity
 
Fintech_2017
Fintech_2017Fintech_2017
Fintech_2017
 
I-Byte Business Services July 2021
I-Byte Business Services July 2021I-Byte Business Services July 2021
I-Byte Business Services July 2021
 
Tech M&A Monthly: Deal Structures Today
Tech M&A Monthly: Deal Structures TodayTech M&A Monthly: Deal Structures Today
Tech M&A Monthly: Deal Structures Today
 
HFMTech22
HFMTech22HFMTech22
HFMTech22
 
Tech M&A Monthly: 12 Steps to a Successful Valuation
Tech M&A Monthly: 12 Steps to a Successful ValuationTech M&A Monthly: 12 Steps to a Successful Valuation
Tech M&A Monthly: 12 Steps to a Successful Valuation
 
Cybersecurity for Marketing
Cybersecurity for Marketing Cybersecurity for Marketing
Cybersecurity for Marketing
 
Mapping the pii market
Mapping the pii marketMapping the pii market
Mapping the pii market
 
Preventing Fraud and Building an End-to-End Data Science Hub at Feedzai with ...
Preventing Fraud and Building an End-to-End Data Science Hub at Feedzai with ...Preventing Fraud and Building an End-to-End Data Science Hub at Feedzai with ...
Preventing Fraud and Building an End-to-End Data Science Hub at Feedzai with ...
 
Tech M&A Monthly: 15 Ways to Find Buyers
Tech M&A Monthly: 15 Ways to Find BuyersTech M&A Monthly: 15 Ways to Find Buyers
Tech M&A Monthly: 15 Ways to Find Buyers
 
Tech M&A Monthly: Forecast 2016 - Part 2: Private Equity
Tech M&A Monthly: Forecast 2016 - Part 2: Private EquityTech M&A Monthly: Forecast 2016 - Part 2: Private Equity
Tech M&A Monthly: Forecast 2016 - Part 2: Private Equity
 

Similar to Data Security Trends - Q4 2018 M&A Report

5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Renub Research
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Graeme Cross
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 
Deception Technology Market – Overview of advancements in innovation 2025
Deception Technology Market – Overview of advancements in innovation 2025Deception Technology Market – Overview of advancements in innovation 2025
Deception Technology Market – Overview of advancements in innovation 2025Arushi00
 
Top 4 Emerging Technologies to Look Out For In 2019 and Beyond.
Top 4 Emerging Technologies to Look Out For In 2019 and Beyond.Top 4 Emerging Technologies to Look Out For In 2019 and Beyond.
Top 4 Emerging Technologies to Look Out For In 2019 and Beyond.Mo Works
 
Top 4 Emerging Technologies To Look Out For
Top 4 Emerging Technologies To Look Out ForTop 4 Emerging Technologies To Look Out For
Top 4 Emerging Technologies To Look Out ForIan Yun
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxNakhoudah
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Burton Lee
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry BrianHuntMSFCPACRISC
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research TechSci Research
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperMestizo Enterprises
 

Similar to Data Security Trends - Q4 2018 M&A Report (20)

The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
2019 Hiscox Cyber Readiness Report
2019 Hiscox Cyber Readiness Report2019 Hiscox Cyber Readiness Report
2019 Hiscox Cyber Readiness Report
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Deception Technology Market – Overview of advancements in innovation 2025
Deception Technology Market – Overview of advancements in innovation 2025Deception Technology Market – Overview of advancements in innovation 2025
Deception Technology Market – Overview of advancements in innovation 2025
 
Top 4 Emerging Technologies to Look Out For In 2019 and Beyond.
Top 4 Emerging Technologies to Look Out For In 2019 and Beyond.Top 4 Emerging Technologies to Look Out For In 2019 and Beyond.
Top 4 Emerging Technologies to Look Out For In 2019 and Beyond.
 
The economics of digital identity
The economics of digital identityThe economics of digital identity
The economics of digital identity
 
Top 4 Emerging Technologies To Look Out For
Top 4 Emerging Technologies To Look Out ForTop 4 Emerging Technologies To Look Out For
Top 4 Emerging Technologies To Look Out For
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
sc_can0315_28373
sc_can0315_28373sc_can0315_28373
sc_can0315_28373
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 

Recently uploaded

04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 

Recently uploaded (20)

04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 

Data Security Trends - Q4 2018 M&A Report

  • 2. Contents Valuations Deal Flow Focus Areas Cross-border Activity Seller Profiles Board of Advisors 3-6 7-11 12-14 15-17 18-21 22
  • 3. 3 Valuations High valuations in the data security space is largely driven by the exceptionally strong market outlook. We are nearing 20 billion devices that are going to be connected by 2020 and this is expanding the attack points that hackers can use to exploit. Over 9 billion data records have been lost since 2013 and almost 5 million data records are lost or stolen every day. Think about that – it is over 200,000 records every hour. These numbers set the table for what is happening in the data security market. The potential, the changing landscape and the daunting task of securing critical ideas, data and infrastructure.
  • 4. Data Security Exit Value In the private sector, multiples seem to follow a spectrum, with anti-malware and endpoint security technologies valued relatively highly, while on-site network security tends to receive a lower valuation. Most of the companies that based their valuations on identity and access management technologies have valued in the five to ten times revenue range.
  • 5. Data Security Public Peer Analysis In the public sector, we see a similar trend in multiples as far as EV over sales. However, security companies are being valued much more highly than the average when looking at their EBITDA multiples. This is a classic indicator of a rapidly maturing market, where profits are valued over market share.
  • 6. Data Security Valuation Patterns Looking more broadly at all disclosed multiples in data security deals from 2013 to 2018 clearly demonstrates the broad range of possible multiples. Note that a logarithmic scale is used in order to better display all data. The highest value deals were dominated by the technologies in anti-malware, identity and access management, and premises network security. Palo Alto Networks, Blue Coat Systems, Splunk, and Proofpoint have all made multiple acquisitions at over 20x TTM revenue.
  • 7. 7 Deal Flow No sector in the market today is untouched by digitization, whether government, finance, or healthcare, all companies are becoming digital companies. This is exponentially expanding the attack surface for security breaches from malware, zero-day threats and ransomware. Whether large or small, no company is immune from the ripple effect of our globalized economy and the types of cybercrime that are pervasive in our hyper-connected world. The M&A window shrank a bit after 2015 in terms of the number of deals, but median deal sizes and valuations in the data security sector are continuously climbing up.
  • 8. Data Security M&A Activity M&A in the data security space slacked off a bit after 2016 and fewer blockbuster deals were cut, despite brisk venture funding activity. In 2017, more than 200 data security startups received venture funding. With a flurry of new entrants looking to grab a slice of the spending, there's an equal amount of market consolidation. The data security market has seen around 180 M&A transactions each year from 2015 to 2017, which is outpacing the market as a whole.
  • 9. Deal Volume by Transaction Size Although the number of deals in the data security sector shrank a bit, the deal size didn't get slimmer. In 2017, we saw deals getting up to the $100M-$250M range. In 2018, the number of deals in the $250M- $1B range is significantly higher than that in years before.
  • 10. Top Data Security Acquirers Diving deeper into acquisition activity, we see fewer PEs as top acquirers in terms of deal count than we normally would. More interestingly, there are also many non-traditional security companies as top buyers by disclosed deal value, reflecting the increased need for the integration of security into all forms of technology. Those mega deals include Johnson Control's acquisition of Tyco and Canon's purchase of Axis Communications.
  • 11.
  • 12. 12 Focus Areas The bullish M&A market for data security trends is driven by booming sectors like healthcare technology and Internet of Things (IoT), as well as increasingly fewer acquirable independent targets as the consolidation continues. Disruptive data security technologies are now entering newer verticals such as connected and autonomous vehicles, digital currency services and blockchain technology, presenting a massive opportunity and challenges for startups and scaleups who can provide businesses with protection of their customer data and intellectual property.
  • 13. Data Security Targets' Focus Areas Although the companies focusing on physical security and security integration services often receive lower valuations, they dominated the number of M&A exits. Identify management and anti-malware technologies are valued relatively highly and hotly pursued by security acquirers.
  • 14. Data Security Targets' Vertical Markets A large proportion of data security M&A targets offer solutions for transportation management, border control, law enforcement, and correctional purposes. The banking sector also relies significantly on data security technologies in fraud prevention, risk management, and anti-money laundering.
  • 15. 15 Cross-border Activity Global data breach poses critical issues for legal departments, senior managers, and boards of companies in all industry sectors worldwide. Increasing threats of terrorist attacks and risks of IT and communication hacks are some of the key factors that could accelerate this sector’s growth. The past six years have seen over 16 mega deals that exceed $1 billion dollars in value, and at least five of them are cross-border transactions expanding from the United States to Europe and further east to Asian countries such as Japan and South Korea.
  • 16. Data Security Cross-border Transactions About one-third of the data security deals are cross-border transactions. Broken down into their respective origins, there is no major surprise that the United States holds the largest share of exits and acquisitions when the United Kingdom and Canada come as second and third.
  • 17. Data Security Exit Volume by Region The United States' strength has been consistent, with 79 exits in both 2013 and 2014, and over 110 exits each year from 2015 to 2017. In Europe, apart from the United Kingdom, France, Germany, and Netherlands each produce a nearly equal share of the European exit volume.
  • 18. 18 Seller Profiles Today’s big security players can’t keep up with the pace of innovation without filling product gaps quickly by acquiring innovative technology and small teams. Buyers’ strategies vary: for instance, Symantec has been balancing its security portfolio by both buying and divesting of products. It sold its website and PKI business to DigiCert for $950 million, then used some of the proceeds to acquire two Israeli companies — Skycure, a mobile threat defense firm, and Fireglass, an enterprise security solutions provider. Going forward, we see companies leveraging AI for automated threat response and predictive threat intelligence as particularly attractive targets.
  • 19. Key Transactions Phishing threat management software Announced Date: February, 2018 Deal Value: $400M EV/S Multiple: 7.3x AI-based security SaaS Announced Date: November, 2018 Deal Value: $1.4B EV/S Multiple: 10.8x Identity management & remote support Announced Date: April, 2018 Deal Value: $739M EV/S Multiple: 6.7x Acquired by Acquired by Acquired by
  • 20. Mega Deals Two-factor authentication SaaS Announced Date: August, 2018 Deal Value: $2.35B EV/S Multiple: 18.8x Web & network security systems Announced Date: June, 2016 Deal Value: $4.65B EV/S Multiple: 7.8x Intrusion detection & prevention & anti-malware Announced Date: July, 2013 Deal Value: $2.7B EV/S Multiple: 10.7x Acquired by Acquired by Acquired by
  • 21. High Valuations Israeli DAF security software Announced Date: November, 2014 Deal Value: $198.71M EV/S Multiple: 500x Security behavioral analytics software Announced Date: July, 2015 Deal Value: $190M EV/S Multiple: 95x Acquired by Acquired by
  • 22. Board of Advisors David Levine Senior Vice President, Corum Group Ltd. Dave joined Corum in 2015 and has a diverse background in technology and life sciences. As an executive and entrepreneur, Dave has been operating and investing in companies sitting at the convergence of commerce and eCommerce as well as innovative life science businesses for over 25 years. Recently, Dave was CEO North America for Gaxsys, an eCommerce and logistics company that is a leader in last mile logistics and fulfillment for eCommerce marketplaces. Dave has been on both sides of the mergers and acquisitions table, having sold a life science technology company, facilitated sell side and buy side technology transactions and has also scaled multiple technology companies globally in the counter-intelligence, eCommerce, life sciences and innovation intelligence markets. Dave sits on boards of numerous public and private companies, including one that recently filed for an IPO. Email: DavidL@corumgroup.com Steve Jones Senior Vice President, Corum Group Ltd. Steve joined Corum after 25 years of executive experience in various high-tech industries with both public and private venture-backed startups. He has extensive global experience, opening international markets and growing sales from zero to tens of million in revenue. He has been on the forefront of selling several companies and spinning off software divisions, highlighted by the sale of GetFon to Alestra (AT&T Mexico). He is fluent in Spanish. Steve was the founding CEO of Solera Networks, a real-time intrusion detection security company. He also co-founded Auction Trust Network, an eCommerce company for online exchanges which he sold to MediaForge (Rakuten Marketing). Email: SteveJ@corumgroup.com