Palo Alto Networks is a cybersecurity company that offers an integrated enterprise security platform at a reasonable price compared to competitors like Symantec that offer multiple point products. Palo Alto has disrupted the industry with its application-based firewalls and new Traps technology that identifies cybercriminal toolkits instead of malware signatures. The company has experienced rapid growth, taking market share from Cisco, Checkpoint, and others. With continued innovation and competitive pricing, Palo Alto Networks is well positioned in the growing cybersecurity industry.
Web security is a moving target and enterprises need timely information about the latest attack trends, how they can best defend their websites, and visibility into their vulnerability lifecycle. Through its Software-as-a-Service (SaaS) offering, WhiteHat Sentinel, WhiteHat Security is uniquely positioned to deliver the knowledge and solutions that organizations need to protect their brands, attain PCI compliance and avert costly breaches.
The WhiteHat Website Security Statistics Report provides a one-of-a-kind perspective on the state of website security and the issues that organizations must address to safely conduct business online. WhiteHat has been publishing the report, which highlights the top ten vulnerabilities, tracks vertical market trends and identifies new attack techniques, since 2006.
The WhiteHat Security report presents a statistical picture of current website vulnerabilities, accompanied by WhiteHat expert analysis and recommendations. WhiteHat’s report is the only one in the industry to focus solely on unknown vulnerabilities in custom Web applications, code unique to an organization,
This year WhiteHat SecurityTM celebrates its fteenth anniversary, and the eleventh year that we have produced the Web Applications Security Statistics Report. The stats shared in this report are based on the aggregation of all the scanning and remediation data obtained from applications that used the WhiteHat SentinelTM service for application security testing in 2015. As an early pioneer in the Application Security Market, WhiteHat has a large and unique collection of data to work with.
White Paper from DVV Solutions and Prevalent Inc. studying the issues regarding third party IT supplier risk and the solutions to effective and efficient Third Party Risk Management for legal firms and suppliers.
The GFI LanGuard SDK enables software developers and OEMs to quickly and easily integrate patch management, vulnerability assessment, asset tracking, network and software auditing and more into new or existing products.
PolySwarm is developing a decentralized marketplace for cybersecurity services where security experts build competing anti-malware engines. It aims to address the problem of undetected threats by offering additional services beyond major antivirus providers. The $8.7B endpoint security market is the target, and the project has professionals from DHS, DARPA and Fortune 100 on its team. Success depends on attracting enough experts to the platform. The Nectar token will be used to pay fees on the platform and the project raised $26M in its ICO.
WhiteHat Security’s Website Security Statistics Report provides a one-of-a-kind perspective on the state of website security and the issues that organizations must address in order to conduct business online safely.
Website security is an ever-moving target. New website launches are common, new code is released constantly, new Web technologies are created and adopted every day; as a result, new attack techniques are frequently disclosed that can put every online business at risk. In order to stay protected, enterprises must receive timely information about how they can most efficiently defend their websites, gain visibility into the performance of their security programs, and learn how they compare with their industry peers. Obtaining these insights is crucial in order to stay ahead and truly improve enterprise website security.
To help, WhiteHat Security has been publishing its Website Security Statistics Report since 2006. This report is the only one that focuses exclusively on unknown vulnerabilities in custom Web applications, code that is unique to an organization, and found in real-world websites. The underlying data is hundreds of terabytes in size, comprises vulnerability assessment results from tens of thousands of websites across hundreds of the most well-known organizations, and collectively represents the largest and most accurate picture of website security available. Inside this report is information about the most prevalent vulnerabilities, how many get fixed, how long the fixes can take on average, and how every application security program may measurably improve. The report is organized by industry, and is accompanied by WhiteHat Security’s expert analysis and recommendations.
Through its Software-as-a-Service (SaaS) offering, WhiteHat Sentinel, WhiteHat Security is uniquely positioned to deliver the depth of knowledge that organizations require to protect their brands, attain compliance, and avert costly breaches.
This document summarizes the key findings from the WhiteHat Security Website Security Statistics Report from June 2012. The report analyzed vulnerabilities across 7,000 websites from hundreds of organizations. Some of the main findings include:
- The average number of serious vulnerabilities per website dropped significantly from 230 in 2010 to 79 in 2011.
- Cross-site scripting remained the most prevalent vulnerability, found in 55% of websites.
- Web application firewalls could have mitigated 71% of custom application vulnerabilities.
- Banking websites had the fewest vulnerabilities on average with 17 per site.
- Overall, organizations fixed 63% of serious vulnerabilities, up from 53% the prior year.
Web security is a moving target and enterprises need timely information about the latest attack trends, how they can best defend their websites, and visibility into their vulnerability lifecycle. Through its Software-as-a-Service (SaaS) offering, WhiteHat Sentinel, WhiteHat Security is uniquely positioned to deliver the knowledge and solutions that organizations need to protect their brands, attain PCI compliance and avert costly breaches.
The WhiteHat Website Security Statistics Report provides a one-of-a-kind perspective on the state of website security and the issues that organizations must address to safely conduct business online. WhiteHat has been publishing the report, which highlights the top ten vulnerabilities, tracks vertical market trends and identifies new attack techniques, since 2006.
The WhiteHat Security report presents a statistical picture of current website vulnerabilities, accompanied by WhiteHat expert analysis and recommendations. WhiteHat’s report is the only one in the industry to focus solely on unknown vulnerabilities in custom Web applications, code unique to an organization,
This year WhiteHat SecurityTM celebrates its fteenth anniversary, and the eleventh year that we have produced the Web Applications Security Statistics Report. The stats shared in this report are based on the aggregation of all the scanning and remediation data obtained from applications that used the WhiteHat SentinelTM service for application security testing in 2015. As an early pioneer in the Application Security Market, WhiteHat has a large and unique collection of data to work with.
White Paper from DVV Solutions and Prevalent Inc. studying the issues regarding third party IT supplier risk and the solutions to effective and efficient Third Party Risk Management for legal firms and suppliers.
The GFI LanGuard SDK enables software developers and OEMs to quickly and easily integrate patch management, vulnerability assessment, asset tracking, network and software auditing and more into new or existing products.
PolySwarm is developing a decentralized marketplace for cybersecurity services where security experts build competing anti-malware engines. It aims to address the problem of undetected threats by offering additional services beyond major antivirus providers. The $8.7B endpoint security market is the target, and the project has professionals from DHS, DARPA and Fortune 100 on its team. Success depends on attracting enough experts to the platform. The Nectar token will be used to pay fees on the platform and the project raised $26M in its ICO.
WhiteHat Security’s Website Security Statistics Report provides a one-of-a-kind perspective on the state of website security and the issues that organizations must address in order to conduct business online safely.
Website security is an ever-moving target. New website launches are common, new code is released constantly, new Web technologies are created and adopted every day; as a result, new attack techniques are frequently disclosed that can put every online business at risk. In order to stay protected, enterprises must receive timely information about how they can most efficiently defend their websites, gain visibility into the performance of their security programs, and learn how they compare with their industry peers. Obtaining these insights is crucial in order to stay ahead and truly improve enterprise website security.
To help, WhiteHat Security has been publishing its Website Security Statistics Report since 2006. This report is the only one that focuses exclusively on unknown vulnerabilities in custom Web applications, code that is unique to an organization, and found in real-world websites. The underlying data is hundreds of terabytes in size, comprises vulnerability assessment results from tens of thousands of websites across hundreds of the most well-known organizations, and collectively represents the largest and most accurate picture of website security available. Inside this report is information about the most prevalent vulnerabilities, how many get fixed, how long the fixes can take on average, and how every application security program may measurably improve. The report is organized by industry, and is accompanied by WhiteHat Security’s expert analysis and recommendations.
Through its Software-as-a-Service (SaaS) offering, WhiteHat Sentinel, WhiteHat Security is uniquely positioned to deliver the depth of knowledge that organizations require to protect their brands, attain compliance, and avert costly breaches.
This document summarizes the key findings from the WhiteHat Security Website Security Statistics Report from June 2012. The report analyzed vulnerabilities across 7,000 websites from hundreds of organizations. Some of the main findings include:
- The average number of serious vulnerabilities per website dropped significantly from 230 in 2010 to 79 in 2011.
- Cross-site scripting remained the most prevalent vulnerability, found in 55% of websites.
- Web application firewalls could have mitigated 71% of custom application vulnerabilities.
- Banking websites had the fewest vulnerabilities on average with 17 per site.
- Overall, organizations fixed 63% of serious vulnerabilities, up from 53% the prior year.
Social Media And Investor Relations - April 8, 2010Darrell Heaps
This is a deck I presented at the CIRI QC event "IR with Leading Edge Technology - Social Media Luncheon Workshop" if you're interested in more examples check out http://www.q4blog.com or contact me.
BitSight provides security ratings that quantify cyber risk based on analyzing data from over 120 sources. The ratings range from 250 to 900 and take into account risk factors such as compromised systems, user behavior, and diligence information. BitSight uses this data-driven approach to provide continuous monitoring of security performance across organizations and their vast networks of third-party vendors. The ratings enable prioritization of risk management efforts and help organizations improve their overall security posture over time.
In this report we share our insight on the recruitment of cyber security professionals including information regarding the key drivers in the cyber security market, permanent and contract recruitment trends, transferable skills, the top job titles, salaries and qualifications analysis, a heat map of skills demands/talent pools across the UK, concluding with recommendations on attracting and retaining cyber security talent.
An Overview and Competitive Analysis of the One-Time Password (OTP) MarketEMC
This Frost & Sullivan report examines the proliferation of identity theft and data breaches caused by single-factor authentication or weak passwords, and describes how, to decrease the impact of threats, companies are integrating mobile OTP, OTP tokens, and USB tokens to protect network access and end users.
Cloud security is moderately growing in emerging markets of APAC while higher growth numbers are projected for the North American market. Middle-East and Africa still remain premature due to lack of customer awareness and inconsistent network infrastructure. However, with no surprise, Israel houses few of the major cloud security companies and been a power-house for research and development. Enterprise level customers look to put cloud security services on high priority due to the sensitivity of the data they deal within cloud. In a nutshell, with the growing attacks on cloud-based services and incidents of data breaches, cloud security has started to get importance and this trend is expected to go high in the years to come. The report titled "Global Cloud Security Market" showcases an in-depth analysis of the overall cloud security market in terms of market size, segmentation for security service providers, end-users, geographies, security services, cloud environment, competition, market metrics and service provider analysis. This report also forecasts the growth numbers till 2018 (on a YoY basis) and hence suggests the Compound Annual Growth Rate for the estimated period. The report brings about a detailed description of the developed and emerging markets globally, service providers analysis bracketed as Enterprise/Small and Medium Businesses along with market across each service segment of cloud security (cloud IAM, SIEM, Email Security, Web Security, etc.) and cloud environment (public/private).
Websense was awarded the 2009 Global Content Filtering Products Market Leadership Award by Frost & Sullivan for capturing over 26% of the global $2.7 billion content filtering market in 2008. Through acquisitions and product development, Websense has strengthened its portfolio of web, email, and data security solutions. Websense's ThreatSeeker Network uses over 50 million data collection points to continuously monitor internet content and provide organizations with up-to-date protection. Frost & Sullivan recognizes Websense's continued innovation and leadership in the content filtering market.
Cloud security is moderately growing in emerging markets of APAC while higher growth numbers are projected for the North American market. Middle-East and Africa still remain premature due to lack of customer awareness and inconsistent network infrastructure. However, with no surprise, Israel houses few of the major cloud security companies and been a power-house for research and development. Enterprise level customers look to put cloud security services on high priority due to the sensitivity of the data they deal within cloud. In a nutshell, with the growing attacks on cloud-based services and incidents of data breaches, cloud security has started to get importance and this trend is expected to go high in the years to come. The report titled "Global Cloud Security Market" showcases an in-depth analysis of the overall cloud security market in terms of market size, segmentation for security service providers, end-users, geographies, security services, cloud environment, competition, market metrics and service provider analysis. This report also forecasts the growth numbers till 2018 (on a YoY basis) and hence suggests the Compound Annual Growth Rate for the estimated period. The report brings about a detailed description of the developed and emerging markets globally, service providers analysis bracketed as Enterprise/Small and Medium Businesses along with market across each service segment of cloud security (cloud IAM, SIEM, Email Security, Web Security, etc.) and cloud environment (public/private).
Cloud security is moderately growing in emerging markets of APAC while higher growth numbers are projected for the North American market. Middle-East and Africa still remain premature due to lack of customer awareness and inconsistent network infrastructure. However, with no surprise, Israel houses few of the major cloud security companies and been a power-house for research and development. Enterprise level customers look to put cloud security services on high priority due to the sensitivity of the data they deal within cloud. In a nutshell, with the growing attacks on cloud-based services and incidents of data breaches, cloud security has started to get importance and this trend is expected to go high in the years to come. The report titled "Global Cloud Security Market" showcases an in-depth analysis of the overall cloud security market in terms of market size, segmentation for security service providers, end-users, geographies, security services, cloud environment, competition, market metrics and service provider analysis. This report also forecasts the growth numbers till 2018 (on a YoY basis) and hence suggests the Compound Annual Growth Rate for the estimated period. The report brings about a detailed description of the developed and emerging markets globally, service providers analysis bracketed as Enterprise/Small and Medium Businesses along with market across each service segment of cloud security (cloud IAM, SIEM, Email Security, Web Security, etc.) and cloud environment (public/private).
The document summarizes ResearchFox Consulting's report on the cloud security market outlook for the Asia Pacific region from 2014 to 2018. It provides an overview of the research methodology, scope, and key findings of the report, which analyzes the cloud security industry landscape, market segmentation, competitive analysis, and forecasts growth in the APAC region.
RocketCyber Top 10 Security Startups - 2019RocketCyber
RocketCyber provides a cybersecurity platform and managed security services that allow Managed Service Providers (MSPs) to deliver security services to small and medium-sized businesses. The platform includes 12 applications called RocketApps that provide threat detection, network monitoring, breach detection, and other security functions. This allows MSPs to improve their security offerings to SMBs in an affordable and easy to use manner. RocketCyber was founded by cybersecurity expert Carl Banzhof to develop proactive security solutions for SMBs that typically cannot afford complex enterprise security systems.
Cloud security is moderately growing in emerging markets of APAC while higher growth numbers are projected for the North American market. Middle-East and Africa still remain premature due to lack of customer awareness and inconsistent network infrastructure. However, with no surprise, Israel houses few of the major cloud security companies and been a power-house for research and development. Enterprise level customers look to put cloud security services on high priority due to the sensitivity of the data they deal within cloud. In a nutshell, with the growing attacks on cloud-based services and incidents of data breaches, cloud security has started to get importance and this trend is expected to go high in the years to come. The report titled "Global Cloud Security Market" showcases an in-depth analysis of the overall cloud security market in terms of market size, segmentation for security service providers, end-users, geographies, security services, cloud environment, competition, market metrics and service provider analysis. This report also forecasts the growth numbers till 2018 (on a YoY basis) and hence suggests the Compound Annual Growth Rate for the estimated period. The report brings about a detailed description of the developed and emerging markets globally, service providers analysis bracketed as Enterprise/Small and Medium Businesses along with market across each service segment of cloud security (cloud IAM, SIEM, Email Security, Web Security, etc.) and cloud environment (public/private).
Cloud security is moderately growing in emerging markets of APAC while higher growth numbers are projected for the North American market. Middle-East and Africa still remain premature due to lack of customer awareness and inconsistent network infrastructure. However, with no surprise, Israel houses few of the major cloud security companies and been a power-house for research and development. Enterprise level customers look to put cloud security services on high priority due to the sensitivity of the data they deal within cloud. In a nutshell, with the growing attacks on cloud-based services and incidents of data breaches, cloud security has started to get importance and this trend is expected to go high in the years to come. The report titled "Global Cloud Security Market" showcases an in-depth analysis of the overall cloud security market in terms of market size, segmentation for security service providers, end-users, geographies, security services, cloud environment, competition, market metrics and service provider analysis. This report also forecasts the growth numbers till 2018 (on a YoY basis) and hence suggests the Compound Annual Growth Rate for the estimated period. The report brings about a detailed description of the developed and emerging markets globally, service providers analysis bracketed as Enterprise/Small and Medium Businesses along with market across each service segment of cloud security (cloud IAM, SIEM, Email Security, Web Security, etc.) and cloud environment (public/private).
Cyber risks are increasing for companies as operations become more reliant on technology. Cyber attacks threaten businesses through damage to operations, data breaches, and loss of reputation. To manage cyber risk, company boards must make it a top priority and actively seek out vulnerabilities before crises occur. Boards should identify their most critical assets, assess cyber risks, and implement protections like training, software, and monitoring to develop cyber resilience for current and future threats. Embracing cyber resilience can help companies minimize damage from security breaches while taking advantage of technology.
Risk & compliance magazine compressed Mirror Review
Recent cyber security meltdowns in some of the leading sectors of the world have led to a higher demand for security requirements. It has become more expensive and resource intensive to protect financial assets like payment card data and personal health information. This scenario has therefore developed an innate need for a higher level of risk management.
Enterprise Firewall Market - Outlook (2017-21) for EuropeResearchFox
Growing influence of Internet on business operations where employees are bound to use mobile and other wireless communication techniques to reach out to its customers is having an impact on the network infrastructure of companies. While many of the companies are benefitted from the use of Internet for business, it is also becoming a cause of concern as most of the businesses are being exposed to network related security threats. Network infrastructure become the primary and easy target to the intruder to access a company's digital assets. Hackers easily gain access to corporate networks and utilize company's classified data or information to their benefits. The past incidents related to Sony Pictures attacks, Target Corporation attacks point to the fact that any business or company is susceptible to attacks. Presence of proper preventive security measures like firewall and antivirus would help these companies to combat these attacks. Businesses today, irrespective of their size are growing cautious and more serious about the data related threats or attacks. This has prompted them to implement firewall solutions that can negate any kind of network related attacks. Hence, the market for enterprise firewall solutions is expected to surge forward in the coming years.
Cloud security is moderately growing in emerging markets of APAC while higher growth numbers are projected for the North American market. Middle-East and Africa still remain premature due to lack of customer awareness and inconsistent network infrastructure. However, with no surprise, Israel houses few of the major cloud security companies and been a power-house for research and development. Enterprise level customers look to put cloud security services on high priority due to the sensitivity of the data they deal within cloud. In a nutshell, with the growing attacks on cloud-based services and incidents of data breaches, cloud security has started to get importance and this trend is expected to go high in the years to come. The report titled "Global Cloud Security Market" showcases an in-depth analysis of the overall cloud security market in terms of market size, segmentation for security service providers, end-users, geographies, security services, cloud environment, competition, market metrics and service provider analysis. This report also forecasts the growth numbers till 2018 (on a YoY basis) and hence suggests the Compound Annual Growth Rate for the estimated period. The report brings about a detailed description of the developed and emerging markets globally, service providers analysis bracketed as Enterprise/Small and Medium Businesses along with market across each service segment of cloud security (cloud IAM, SIEM, Email Security, Web Security, etc.) and cloud environment (public/private).
This document discusses developing contingency plans to avoid supply chain disruptions from security breaches. It identifies typical supply chain risks such as natural disasters, cyber attacks, cargo theft, and geopolitical instability. The document examines causes of past disruptions and outlines strategies to mitigate risks like conducting threat assessments, identifying core business functions, analyzing impacts, and implementing prevention measures. Developing contingency plans can help companies effectively protect their supply chains and realize benefits like decreased losses, improved continuity, and competitive advantages over rivals.
Enterprise Firewall Market - Outlook (2017-21) for APACResearchFox
The document provides an overview of ResearchFox Consulting, an Indian market research firm. It discusses their services, which include data collection, analysis, and reports on various industries. The document also includes a disclaimer and copyright.
Cloud security is moderately growing in emerging markets of APAC while higher growth numbers are projected for the North American market. Middle-East and Africa still remain premature due to lack of customer awareness and inconsistent network infrastructure. However, with no surprise, Israel houses few of the major cloud security companies and been a power-house for research and development. Enterprise level customers look to put cloud security services on high priority due to the sensitivity of the data they deal within cloud. In a nutshell, with the growing attacks on cloud-based services and incidents of data breaches, cloud security has started to get importance and this trend is expected to go high in the years to come. The report titled "Global Cloud Security Market" showcases an in-depth analysis of the overall cloud security market in terms of market size, segmentation for security service providers, end-users, geographies, security services, cloud environment, competition, market metrics and service provider analysis. This report also forecasts the growth numbers till 2018 (on a YoY basis) and hence suggests the Compound Annual Growth Rate for the estimated period. The report brings about a detailed description of the developed and emerging markets globally, service providers analysis bracketed as Enterprise/Small and Medium Businesses along with market across each service segment of cloud security (cloud IAM, SIEM, Email Security, Web Security, etc.) and cloud environment (public/private).
Data handling and its security has always been a cause of concern for enterprises considering proper optimization of storage facilities. Magnetic tape storage, invented during 1920s, was the first means of data storage in organizations. As the storage systems evolved magnetic drums, DRAM cells, floppy disks, CD ROMs, flash drives were user for data storage during the time period of 1930s to 1990s. The new millennium saw the disruption in the storage market with launch of SD cards, flash storage systems, holographic memory etc. With the advent of Cloud Computing, cloud storage gained traction and cloud backup solutions became the part of disaster recovery strategy in enterprises.The demand for storage has been increasing in organizations with the accumulation and digitization of data and the inability of traditional storage systems to meet the storage demands. Enterprises demand a scalable storage solution with low investments and least maintenance. Digital data has become complicated with digitization in every field. The drawback of traditional storage solutions are that it is not compatible with today's need and incur more cost in terms of storage solution. It would also require an organization to revamp the storage strategy as well as invest in technical personnel to implement and maintain the storage systems. Cloud storage gives easy access to enterprise data at reduced costs with a service model that manages the backup data remotely and makes it available to the user over a network.
UpClose Productions London is holding a new opera competition. Applicants should submit this application form with the name of their opera, composer, and librettist, along with their contact details. Applicants should not include their names on any other materials besides this form in order to preserve anonymity, and should only label additional materials with the opera's name. Receipt of applications will be acknowledged by email.
Social Media And Investor Relations - April 8, 2010Darrell Heaps
This is a deck I presented at the CIRI QC event "IR with Leading Edge Technology - Social Media Luncheon Workshop" if you're interested in more examples check out http://www.q4blog.com or contact me.
BitSight provides security ratings that quantify cyber risk based on analyzing data from over 120 sources. The ratings range from 250 to 900 and take into account risk factors such as compromised systems, user behavior, and diligence information. BitSight uses this data-driven approach to provide continuous monitoring of security performance across organizations and their vast networks of third-party vendors. The ratings enable prioritization of risk management efforts and help organizations improve their overall security posture over time.
In this report we share our insight on the recruitment of cyber security professionals including information regarding the key drivers in the cyber security market, permanent and contract recruitment trends, transferable skills, the top job titles, salaries and qualifications analysis, a heat map of skills demands/talent pools across the UK, concluding with recommendations on attracting and retaining cyber security talent.
An Overview and Competitive Analysis of the One-Time Password (OTP) MarketEMC
This Frost & Sullivan report examines the proliferation of identity theft and data breaches caused by single-factor authentication or weak passwords, and describes how, to decrease the impact of threats, companies are integrating mobile OTP, OTP tokens, and USB tokens to protect network access and end users.
Cloud security is moderately growing in emerging markets of APAC while higher growth numbers are projected for the North American market. Middle-East and Africa still remain premature due to lack of customer awareness and inconsistent network infrastructure. However, with no surprise, Israel houses few of the major cloud security companies and been a power-house for research and development. Enterprise level customers look to put cloud security services on high priority due to the sensitivity of the data they deal within cloud. In a nutshell, with the growing attacks on cloud-based services and incidents of data breaches, cloud security has started to get importance and this trend is expected to go high in the years to come. The report titled "Global Cloud Security Market" showcases an in-depth analysis of the overall cloud security market in terms of market size, segmentation for security service providers, end-users, geographies, security services, cloud environment, competition, market metrics and service provider analysis. This report also forecasts the growth numbers till 2018 (on a YoY basis) and hence suggests the Compound Annual Growth Rate for the estimated period. The report brings about a detailed description of the developed and emerging markets globally, service providers analysis bracketed as Enterprise/Small and Medium Businesses along with market across each service segment of cloud security (cloud IAM, SIEM, Email Security, Web Security, etc.) and cloud environment (public/private).
Websense was awarded the 2009 Global Content Filtering Products Market Leadership Award by Frost & Sullivan for capturing over 26% of the global $2.7 billion content filtering market in 2008. Through acquisitions and product development, Websense has strengthened its portfolio of web, email, and data security solutions. Websense's ThreatSeeker Network uses over 50 million data collection points to continuously monitor internet content and provide organizations with up-to-date protection. Frost & Sullivan recognizes Websense's continued innovation and leadership in the content filtering market.
Cloud security is moderately growing in emerging markets of APAC while higher growth numbers are projected for the North American market. Middle-East and Africa still remain premature due to lack of customer awareness and inconsistent network infrastructure. However, with no surprise, Israel houses few of the major cloud security companies and been a power-house for research and development. Enterprise level customers look to put cloud security services on high priority due to the sensitivity of the data they deal within cloud. In a nutshell, with the growing attacks on cloud-based services and incidents of data breaches, cloud security has started to get importance and this trend is expected to go high in the years to come. The report titled "Global Cloud Security Market" showcases an in-depth analysis of the overall cloud security market in terms of market size, segmentation for security service providers, end-users, geographies, security services, cloud environment, competition, market metrics and service provider analysis. This report also forecasts the growth numbers till 2018 (on a YoY basis) and hence suggests the Compound Annual Growth Rate for the estimated period. The report brings about a detailed description of the developed and emerging markets globally, service providers analysis bracketed as Enterprise/Small and Medium Businesses along with market across each service segment of cloud security (cloud IAM, SIEM, Email Security, Web Security, etc.) and cloud environment (public/private).
Cloud security is moderately growing in emerging markets of APAC while higher growth numbers are projected for the North American market. Middle-East and Africa still remain premature due to lack of customer awareness and inconsistent network infrastructure. However, with no surprise, Israel houses few of the major cloud security companies and been a power-house for research and development. Enterprise level customers look to put cloud security services on high priority due to the sensitivity of the data they deal within cloud. In a nutshell, with the growing attacks on cloud-based services and incidents of data breaches, cloud security has started to get importance and this trend is expected to go high in the years to come. The report titled "Global Cloud Security Market" showcases an in-depth analysis of the overall cloud security market in terms of market size, segmentation for security service providers, end-users, geographies, security services, cloud environment, competition, market metrics and service provider analysis. This report also forecasts the growth numbers till 2018 (on a YoY basis) and hence suggests the Compound Annual Growth Rate for the estimated period. The report brings about a detailed description of the developed and emerging markets globally, service providers analysis bracketed as Enterprise/Small and Medium Businesses along with market across each service segment of cloud security (cloud IAM, SIEM, Email Security, Web Security, etc.) and cloud environment (public/private).
The document summarizes ResearchFox Consulting's report on the cloud security market outlook for the Asia Pacific region from 2014 to 2018. It provides an overview of the research methodology, scope, and key findings of the report, which analyzes the cloud security industry landscape, market segmentation, competitive analysis, and forecasts growth in the APAC region.
RocketCyber Top 10 Security Startups - 2019RocketCyber
RocketCyber provides a cybersecurity platform and managed security services that allow Managed Service Providers (MSPs) to deliver security services to small and medium-sized businesses. The platform includes 12 applications called RocketApps that provide threat detection, network monitoring, breach detection, and other security functions. This allows MSPs to improve their security offerings to SMBs in an affordable and easy to use manner. RocketCyber was founded by cybersecurity expert Carl Banzhof to develop proactive security solutions for SMBs that typically cannot afford complex enterprise security systems.
Cloud security is moderately growing in emerging markets of APAC while higher growth numbers are projected for the North American market. Middle-East and Africa still remain premature due to lack of customer awareness and inconsistent network infrastructure. However, with no surprise, Israel houses few of the major cloud security companies and been a power-house for research and development. Enterprise level customers look to put cloud security services on high priority due to the sensitivity of the data they deal within cloud. In a nutshell, with the growing attacks on cloud-based services and incidents of data breaches, cloud security has started to get importance and this trend is expected to go high in the years to come. The report titled "Global Cloud Security Market" showcases an in-depth analysis of the overall cloud security market in terms of market size, segmentation for security service providers, end-users, geographies, security services, cloud environment, competition, market metrics and service provider analysis. This report also forecasts the growth numbers till 2018 (on a YoY basis) and hence suggests the Compound Annual Growth Rate for the estimated period. The report brings about a detailed description of the developed and emerging markets globally, service providers analysis bracketed as Enterprise/Small and Medium Businesses along with market across each service segment of cloud security (cloud IAM, SIEM, Email Security, Web Security, etc.) and cloud environment (public/private).
Cloud security is moderately growing in emerging markets of APAC while higher growth numbers are projected for the North American market. Middle-East and Africa still remain premature due to lack of customer awareness and inconsistent network infrastructure. However, with no surprise, Israel houses few of the major cloud security companies and been a power-house for research and development. Enterprise level customers look to put cloud security services on high priority due to the sensitivity of the data they deal within cloud. In a nutshell, with the growing attacks on cloud-based services and incidents of data breaches, cloud security has started to get importance and this trend is expected to go high in the years to come. The report titled "Global Cloud Security Market" showcases an in-depth analysis of the overall cloud security market in terms of market size, segmentation for security service providers, end-users, geographies, security services, cloud environment, competition, market metrics and service provider analysis. This report also forecasts the growth numbers till 2018 (on a YoY basis) and hence suggests the Compound Annual Growth Rate for the estimated period. The report brings about a detailed description of the developed and emerging markets globally, service providers analysis bracketed as Enterprise/Small and Medium Businesses along with market across each service segment of cloud security (cloud IAM, SIEM, Email Security, Web Security, etc.) and cloud environment (public/private).
Cyber risks are increasing for companies as operations become more reliant on technology. Cyber attacks threaten businesses through damage to operations, data breaches, and loss of reputation. To manage cyber risk, company boards must make it a top priority and actively seek out vulnerabilities before crises occur. Boards should identify their most critical assets, assess cyber risks, and implement protections like training, software, and monitoring to develop cyber resilience for current and future threats. Embracing cyber resilience can help companies minimize damage from security breaches while taking advantage of technology.
Risk & compliance magazine compressed Mirror Review
Recent cyber security meltdowns in some of the leading sectors of the world have led to a higher demand for security requirements. It has become more expensive and resource intensive to protect financial assets like payment card data and personal health information. This scenario has therefore developed an innate need for a higher level of risk management.
Enterprise Firewall Market - Outlook (2017-21) for EuropeResearchFox
Growing influence of Internet on business operations where employees are bound to use mobile and other wireless communication techniques to reach out to its customers is having an impact on the network infrastructure of companies. While many of the companies are benefitted from the use of Internet for business, it is also becoming a cause of concern as most of the businesses are being exposed to network related security threats. Network infrastructure become the primary and easy target to the intruder to access a company's digital assets. Hackers easily gain access to corporate networks and utilize company's classified data or information to their benefits. The past incidents related to Sony Pictures attacks, Target Corporation attacks point to the fact that any business or company is susceptible to attacks. Presence of proper preventive security measures like firewall and antivirus would help these companies to combat these attacks. Businesses today, irrespective of their size are growing cautious and more serious about the data related threats or attacks. This has prompted them to implement firewall solutions that can negate any kind of network related attacks. Hence, the market for enterprise firewall solutions is expected to surge forward in the coming years.
Cloud security is moderately growing in emerging markets of APAC while higher growth numbers are projected for the North American market. Middle-East and Africa still remain premature due to lack of customer awareness and inconsistent network infrastructure. However, with no surprise, Israel houses few of the major cloud security companies and been a power-house for research and development. Enterprise level customers look to put cloud security services on high priority due to the sensitivity of the data they deal within cloud. In a nutshell, with the growing attacks on cloud-based services and incidents of data breaches, cloud security has started to get importance and this trend is expected to go high in the years to come. The report titled "Global Cloud Security Market" showcases an in-depth analysis of the overall cloud security market in terms of market size, segmentation for security service providers, end-users, geographies, security services, cloud environment, competition, market metrics and service provider analysis. This report also forecasts the growth numbers till 2018 (on a YoY basis) and hence suggests the Compound Annual Growth Rate for the estimated period. The report brings about a detailed description of the developed and emerging markets globally, service providers analysis bracketed as Enterprise/Small and Medium Businesses along with market across each service segment of cloud security (cloud IAM, SIEM, Email Security, Web Security, etc.) and cloud environment (public/private).
This document discusses developing contingency plans to avoid supply chain disruptions from security breaches. It identifies typical supply chain risks such as natural disasters, cyber attacks, cargo theft, and geopolitical instability. The document examines causes of past disruptions and outlines strategies to mitigate risks like conducting threat assessments, identifying core business functions, analyzing impacts, and implementing prevention measures. Developing contingency plans can help companies effectively protect their supply chains and realize benefits like decreased losses, improved continuity, and competitive advantages over rivals.
Enterprise Firewall Market - Outlook (2017-21) for APACResearchFox
The document provides an overview of ResearchFox Consulting, an Indian market research firm. It discusses their services, which include data collection, analysis, and reports on various industries. The document also includes a disclaimer and copyright.
Cloud security is moderately growing in emerging markets of APAC while higher growth numbers are projected for the North American market. Middle-East and Africa still remain premature due to lack of customer awareness and inconsistent network infrastructure. However, with no surprise, Israel houses few of the major cloud security companies and been a power-house for research and development. Enterprise level customers look to put cloud security services on high priority due to the sensitivity of the data they deal within cloud. In a nutshell, with the growing attacks on cloud-based services and incidents of data breaches, cloud security has started to get importance and this trend is expected to go high in the years to come. The report titled "Global Cloud Security Market" showcases an in-depth analysis of the overall cloud security market in terms of market size, segmentation for security service providers, end-users, geographies, security services, cloud environment, competition, market metrics and service provider analysis. This report also forecasts the growth numbers till 2018 (on a YoY basis) and hence suggests the Compound Annual Growth Rate for the estimated period. The report brings about a detailed description of the developed and emerging markets globally, service providers analysis bracketed as Enterprise/Small and Medium Businesses along with market across each service segment of cloud security (cloud IAM, SIEM, Email Security, Web Security, etc.) and cloud environment (public/private).
Data handling and its security has always been a cause of concern for enterprises considering proper optimization of storage facilities. Magnetic tape storage, invented during 1920s, was the first means of data storage in organizations. As the storage systems evolved magnetic drums, DRAM cells, floppy disks, CD ROMs, flash drives were user for data storage during the time period of 1930s to 1990s. The new millennium saw the disruption in the storage market with launch of SD cards, flash storage systems, holographic memory etc. With the advent of Cloud Computing, cloud storage gained traction and cloud backup solutions became the part of disaster recovery strategy in enterprises.The demand for storage has been increasing in organizations with the accumulation and digitization of data and the inability of traditional storage systems to meet the storage demands. Enterprises demand a scalable storage solution with low investments and least maintenance. Digital data has become complicated with digitization in every field. The drawback of traditional storage solutions are that it is not compatible with today's need and incur more cost in terms of storage solution. It would also require an organization to revamp the storage strategy as well as invest in technical personnel to implement and maintain the storage systems. Cloud storage gives easy access to enterprise data at reduced costs with a service model that manages the backup data remotely and makes it available to the user over a network.
UpClose Productions London is holding a new opera competition. Applicants should submit this application form with the name of their opera, composer, and librettist, along with their contact details. Applicants should not include their names on any other materials besides this form in order to preserve anonymity, and should only label additional materials with the opera's name. Receipt of applications will be acknowledged by email.
Ian Krause is seeking employment as an English professor and has years of experience in a variety of fields. He has a TESOL certification from Western Washington University and has taught English classes in Spain and volunteered in English programs in the US. His experience includes one-on-one tutoring, designing lesson plans, and teaching youth summer camps and soccer. He has strong communication skills and is passionate about helping others learn English.
Este documento presenta varios proyectos de desarrollo de productos realizados por Anthoni F. Espinosa. Incluye el desarrollo de líneas de utensilios de cocina, proyectos para renovar líneas de acero vitrificado y aluminio, y el diseño de accesorios con la identidad de marca. También describe proyectos como el diseño de concepto de laboratorios para la UNAM y un botanero inspirado en las formas de un textil. La mayoría de los proyectos se encuentran en etapa de com
Este documento describe los componentes clave de una política farmacéutica nacional efectiva. Explica que una política farmacéutica nacional debe promover el acceso equitativo a medicamentos esenciales de calidad y promover su uso racional. Los componentes fundamentales incluyen la selección de medicamentos esenciales, precios asequibles, financiamiento sostenible y sistemas de salud y suministro confiables. El documento enfatiza la importancia de un proceso participativo que involucre a todas las partes interesadas para el desarrol
Yoldi Taliding is a 167 cm tall, 63 kg Indonesian man born on June 26, 1990 in Pongsamelung. He has been married and lives in Jakarta. He holds a Seaman Book and Passport along with several certificates of competency and proficiency related to his work as a mariner, including for ANT-D, ANT-V, basic safety training, survival craft handling, tanker familiarization, medical first aid, advanced firefighting, GMDSS radio operation, security duties and basic rigging. His sea service record details his experience working on various cargo ships, tankers, container ships, tug boats and crew boats in ranks from AB to Nakhoda (
Este documento presenta información sobre un curso para docentes sobre el uso racional de medicamentos. Brinda contexto sobre el sistema de salud argentino y la situación actual del uso y consumo de medicamentos a nivel mundial y en Argentina. Explica conceptos como medicamentos esenciales, formularios terapéuticos y la importancia de promover el uso racional de medicamentos.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
An advanced portfolio of leading infrastructure solutions for IT and OT networks. Our solutions include protection for wired and wireless networks and aid in the construct of highly secure indoor, campus, and outdoor networks.
The document proposes an enterprise social software solution hosted in the cloud and built on Microsoft's products. It projects $15 billion in first year sales from 100 million licenses sold at $150 each. The solution aims to enhance collaboration and optimize communication securely across organizations. Risks include security breaches and an unfavorable reaction to its proprietary nature, but these are assessed as medium to low risk with mitigation strategies. The marketing strategy leverages Microsoft's brand and distribution channels while emphasizing benefits like cost savings, mobility, and environmental friendliness.
Trustwave investigated hundreds of data compromise incidents across 17 countries in 2015. Some key findings:
- 45% of incidents were in North America, while 27% were in the Asia-Pacific region and 15% in Europe, Middle East, and Africa.
- The retail industry accounted for 23% of incidents, while hospitality was 14% and food/beverage was 10%.
- 40% of investigations involved corporate/internal network breaches and 38% involved e-commerce breaches.
- 60% of breaches targeted payment card data, with 31% involving card track (magnetic stripe) data from POS terminals.
The report provides insights into trends in compromised industries and regions, attack methods
Five principles for improving your cyber securityWGroup
The document discusses cyber security risks for businesses and provides five principles for improving cyber security. It notes that as corporate assets have increasingly become virtual, cyber security risks have also increased. The five principles are: 1) Identifying security risks and determining how to address them, 2) Managing risks through resource allocation and transferring risks, 3) Understanding legal implications of breaches, 4) Obtaining technical expertise on security issues, and 5) Having expectations and oversight of the cyber security program.
Cyber-criminals are assaulting every part of the enterprise. But not all cyber-attacks are created equal. In the minds of senior executives, the greatest danger of cyber-attacks is damage to the reputation of the firm with its customers.
The presentation describes how F-Secure has transformed its business model to Security as a Service (SaaS) in telecommunication market. Security as a Service uses cloud platforms to offer security services.
This document discusses the failure of current endpoint protection platforms and the opportunity for a new "default deny" approach using lightweight container technology. It summarizes research from Gartner identifying emerging techniques like application control, malware sandboxing, and software attestation that could enable a default deny paradigm. Comodo's new Advanced Endpoint Protection solution is presented as an example of next-generation protection that implements these techniques using containment to combine application control, sandboxing, and attestation. It aims to block even unknown threats by considering anything unknown as untrusted and contained until assessment.
The document discusses cybersecurity trends in South Africa. Some key points:
1. South Africa has a growing cybersecurity market due to increasing digital transformation and cyber attacks targeting sectors like financial services and healthcare.
2. The cybersecurity market in South Africa is expected to grow from $667 million in 2017 to over $1 billion by 2022, as enterprises allocate more of their IT budgets to security.
3. Common causes of data breaches in South Africa include malicious attacks and human errors, with the financial cost estimated to be around $200 million per year.
- Artificial intelligence/machine learning, GDPR compliance, and DevSecOps were ranked as the top three security trends for 2019 by survey respondents.
- Adoption of AI tools focused on security analytics, incident management, and endpoint protection, but proper integration and skills are needed to fully leverage AI.
- Implementing GDPR requirements such as data subject rights and third party contracts posed the greatest challenges for organizations impacted by the regulation.
- While DevSecOps aims to embed security in the development process, adoption of practices like automated responses and configuration controls remains limited, showing security is not fully integrated.
What kept your CISO up last night? What market forces and threats are most impactful to your peers? How will these shape the future of enterprise security? Bill Burns, Informatica CISO and former Scale Venture Partners Executive-in-Residence, formed an InfoSec investment thesis by combining his 20+ years of domain expertise with over 100 CISO peer interviews and online survey responses. In this session Bill will share his results and perspectives on what's ahead for practical enterprise security.
Cyber- attacks are increasing massively and there is an imminent need to embrace #security #testing to overcome these security threats and vulnerabilities.
Read these #cyber security testing trends #2020.
G04.2014 magic quadrant for enterprise networkSatya Harish
This document provides an overview and analysis of the enterprise network firewall market. It finds that next generation firewall capabilities have been achieved by leading products, widening the gap between them and competitors. It also notes that while firewalls and intrusion prevention systems are converging, other security products remain separate. The document evaluates major vendors in this market and identifies leaders, challengers, and niche players based on their ability to execute and completeness of vision. It provides strategic planning assumptions about trends in virtualization, vendor selection, and deployment of next generation firewalls.
This document provides a summary of findings from Hewlett Packard Enterprise's (HPE) annual assessment of the capabilities and maturity of cyber defense organizations. Some key findings include that only 15% of assessed organizations have achieved recommended maturity levels, the median maturity level remains below optimal, and adoption of hybrid infrastructure, staffing models, and automation has increased due to skills shortages and the need to monitor complex IT environments. HPE believes that most organizations should target a maturity level of 3, defined processes, but that truly innovative security operations are moving towards threat hunting, data analytics, and intelligence sharing.
State of Security Operations 2016 report of capabilities and maturity of cybe...at MicroFocus Italy ❖✔
As businesses continue to adopt new cloud and mobile functionality rapidly, we find the
edges of the network even more blurred, and our definitions of data ownership and breach
responsibility continue to evolve. Staffing and training continue to be the foremost challenge
of the modern SOC. This is paving the way to hybrid staffing models and hybrid infrastructures
that require less in-house expertise. As a result, highly skilled security team members can then
be utilized for a more specialized hunt and analytics-focused work.
There is no question this year has been both an exciting and challenging time to be in the field
of cyber security. On one hand, it is disheartening to see the continued decline in the maturity
and effectiveness of security operations, while, on the other, I know that we are in the middle
of an exciting and transformative change in our field. You can feel it. We must go where the
data leads us, and we believe that is to widen our definition of security operations to leverage
analytics, data science, Big Data, and shared intelligence to become more effective in protecting
today’s digital enterprise.
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
The document summarizes the findings of a survey of over 700 C-suite executives from 29 countries and 18 industries regarding their perspectives on cybersecurity. Some key findings include: 75% of CxOs believe a comprehensive cybersecurity program is important; however, over half may be overstating the likelihood of a significant cybersecurity incident. Additionally, while CxOs acknowledge some risks, they understate risks from insiders and overstate risks from external threats. The C-suites were clustered into three groups based on their cybersecurity effectiveness: not prepared, progressing, and cybersecure. The cybersecure C-suites were more likely to have robust cybersecurity governance and collaboration.
Similar to Buy Recommendation for Palo Alto Networks (20)
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Buy Recommendation for Palo Alto Networks
1. Stetson University
Student Research
This report is published for educational purposes
only by Zsofia Szurovszki Industry: Cyber Security
Roland George Investment Program
Stetson University
ZsofiaSzurovszki
2. StetsonUniversity Student Research
1
Ticker: PANW (NYSE) Recommendation: Buy
Price: $185(as of 11/29/2015) Price Target: $210
Earnings/Share Oct. Jan. Apr. Jul. Year
2013 $(0.05) $(0.41) $(0.10) $(0.22) $(0.83)
2014 (0.11) (0.55) (1.86) (0.84) (3.36)
2015 (0.38) (0.53) (0.56) (0.55) (2.02)
2016E* (0.39) (0.36) (0.28) (0.13) (1.16)
2017E (0.07) (0.06) 0.14 0.24 (0.25)
*Bolded/italicized figures are team estimates
Highlights
Pent Up Demand: News about cyberespionage and cyberattacks are appearing more frequently on
national and global news than ever. With the digitalization of personal and business activities,
opportunities for cybercriminals to steal personal information and penetrate internal business networks
increased. Individuals, businesses, as well as government agencies are becoming more aware of the
severity of the cyber threats. Since globalization helped cybercriminals to come up with more
sophisticated attacks, an extensive security platform that can successfully prevent breaches and attacks
has higher demand than ever. Palo Alto positioned its product mix to capitalize on this demand.
Disruptive Technology:Palo Alto was the first company to recognize the fundamental shortcomings of
port-based firewalls.The company disrupted the network security market by introducing their
application-based firewall technology which made them the leader in the next-generation firewall
segment. Palo Alto recently disrupted the endpoint security market with the introduction of Traps. Traps
revolutionizes the traditional malware protection techniques. Instead of detecting and collecting the
signatures of malware and predicting vulnerabilities, Traps identifies the toolkits cybercriminals use and
prevents them from performing an attack by detecting the toolkit. This new method, is faster and more
efficient than any other technologies.
Quick Market Share Gains: Since 2012, the company’s initial public offering, their market share grew
from 3.8 million to 15.6 million, posting a 145 % growth in 2015, year-over-year. The recent explosive
growth was the result of Palo Alto’s competitive pricing and new endpoint technology. Palo Alto
managed to steal customers from its main competitors, Cisco and Checkpoint with a 90 % customer
retention rate.
Stock Valuation: Due to their pent up demand, disruptive technology, and quick market
penetration,I estimated that Palo Alto is undervalued by 14% with a fair value of $ 210.
Source: Thompson Baseline
Date: 11/29/2015
Source: Yahoo! Finance
3. StetsonUniversity Student Research
2
Source: Company 10-K
Exhibit 1: The Company
Exhibit 2: Product Segments
BusinessDescription
Company:Palo Alto Networks (NYSE: PANW)is the only company, in the cyber security industry, that
offersan integrated enterprise platform at a reasonable price.Different from the typical multiple-point
products that companies like Symantec offers, Palo Alto’s enterprise platform provides greater visibility,
control, andprotection against known and unknown threats at a fraction of the time and cost. Since 2012, the
company’s initial public offering, Palo Alto has been rapidly gaining market share by replacing their
competitors worldwide. Currently, Palo Alto is the third largest in the enterprise security market with a 12
% market share, 1 % behind Checkpoints, and 13 % lagging behind the market leader, Cisco.
Products:Primarily through its channel partners and as well as through direct sales, the company offers the
following products (% of all revenue):
Products (53.1 %):
o Firewall Appliances (50 %)core of the enterprise platform that detects and prevents known and
unknown cyber threats with the help of subscription services such as Wildfire and Traps.
o Panorama (3.1 %): centralized security management solution that allows the detection of all
firewall traffic, push global policies, and generate traffic patterns all from a single console.
Services (46.9 %):
o Subscription(22.9%): part of the enterprise platform with the purpose of supporting the firewall
appliances and providing increased control and visibility.
o Support and Maintenance (24.0 %): offered for end-customers and channel partners typically
purchased as two-year contracts.
Investment Rationale
RGIP needs presence in Cyber Security:As our world continues to become more interconnected and
dependent on technology, the threat of hackers and security breaches has become part of daily life.
Consequently, the demand for cyber security has been increasing and expected to increase in the future.
Recently, the inefficiency of security systems surfaced after major cyber security breaches on
companies, such as Target, and EBay, and Yahoo. In 2014, the estimated net loss due to cybercrime in
the United States wasestimated to be $ 400 billion1
.Palo Alto’s fundamentally different technology
attempts to capitalize on the inefficiency of outdated firewall systems.
Disruptive Technology: Palo Alto was the first company to recognize the fundamental shortcomings
of port-based firewalls.The company disrupted the network security market by introducing their
application-based firewall technology which made them the leader in the next-generation firewall
segment. Palo Alto recently disrupted the endpoint security market by the introduction of Traps. Traps
revolutionizes the traditional malware protection techniques. Instead of detecting and collecting the
signatures of malware and predict vulnerabilities, Traps identifies the toolkits cybercriminals use and
prevents them from performing an attack by detecting the toolkit. With this new technology, Palo Alto
is in a great position to become the leader of the endpoint security segment because no other companies
have anything remotely similar.
Proven Strong recurring business model:Since 2012, the company’s initial public offering, their
market share grew from 3.8 million to 15.6 million, posting a 145 % growth in 2015, year-over-year.
The recent explosive growth was the result of Palo Alto’s go-to-market strategy and the adaptation of
SaaS hybrid business model. Palo Alto managed to steal customers from its main competitors such as
Cisco, Fortinet, and Checkpoint with a 90 % customer retention rate.
11
Mcafee: Estimating the Net Global Loss due to Cybercrime
Headquarters Santa Clara,CA
Founded in 2005
No. of employees 2637
Year of IPO 2012
Source: Company’s 10k
4. StetsonUniversity Student Research
3
Growth Strategies: Palo Alto has 3 main strategies.
Disruptive Technology:Palo Alto is the pioneer in the next-generation firewall segment with its
application-based security approach. In the early 2000s, firewalls only had to contend two applications,
web-browsing and e-mail. Today cloud and SaaS-based applications, increased use of mobiles in
business, and more sophisticated cyber-attacks demand a new approach to cyber security.Palo Alto
found a way to successfully adopt to the new security environment. Through their enterprise platform,
Palo Alto empowers enterprises, service providers, and government entities to secure their organization
by safely enabling their applications and by preventing breaches from targeted cyber-attacks.
Consequently, the security platform provides visibility into all traffic and all application, at the user
level, at all times, and at the full speed of the network in order to better control usage, risks, and cyber
threats. As a result, corporations can have an interdependent, correlated security infrastructure that will
simplify IT security and reduce security costs.
Competitive Pricing: Palo Alto’s target customers include medium size enterprises, service providers,
and governmental agencies for whom price could be a deciding factor. For this reason Palo Alto
positioned its whole enterprise platform to compete with the price of a firewall. Additionally, the
innovative subscription services they provide can also be used with other company’s firewall
infrastructure. Their subscription services are usually licensed to their customers on a yearly based
contract. Since the company went public, its customer base expanded from 7,000 to 26,000, with an
average of 60 % growth year-over-year. In 2015, the retention rate was 90 %.
Strategic Global Positioning: Palo Alto’s sales strategy takes a global approach to reach potential
customers in developed and emerging countries. Currently, 64% of the total revenues come from the
United States; however, the company has been expanding in the Asian-Pacific (APAC) as well as in
Europe, in the Middle East, and in Africa (EMEA). The United States is the biggest market in terms of
cyber security spending; therefore gaining market share is the most challenging for a fairly new
company, due to the domination of the well-established, large security vendors. Despite the challenging
market environment, Palo Alto Networks has been able to gain market share quickly in the United
States as well as in other market regions. The presence in the APAC and EMEA markets will help
ensure the long-term growth of market share because these regions have the greatest growth potential
due their quickly emerging economies.
Industry
Pent Up Demand for Effective Security Solutions
Cyber-attacks in 2014 have claimed many high profile victims.The full extent of the damage they suffered
may not be known for many years to come. Some victims this year included: Target, JP Morgan, Home
Depot, the White House, Neiman Marcus, Yahoo, AT&T, EBay, Apple, UPS, Google, and Dairy Queen.
The threats of a cyber-attacks are real and the consequences can be catastrophic. National defenses could be
breached, weapon defense systems could be commandeered, corporate trade secrets could be stolen and
replicated, financial institutions could be hacked and potentially cause chaos in financial markets.The
number and complexity of cyberattacks have been rapidly increasing due to the globalization and
digitalization on a personal and business level. The spread of mobile and web usage as well as social media
is creating additional platforms to cybercriminals to attack. Businesses are also becoming more exposed to
cyber threats as they move increasing number of their business functions online and as more companies
around the world connect with their customers through the Internet. Consequently, every sector needs
effective cyber security infrastructure to protect their information. Due to the increasing security need of
nations, aerospace, and defense needs the most advanced security solutions. Due to all these recent attacks
and as a result, businesses realizing the importance of having an appropriate IT protection lead the cyber
security industry to become the hottest and fastest growing sector in the tech sector. The industry has been
experiencing a constant growth of 11% on average which number is expected to increase in the future for
the reasons mentioned above.
Market Outlook
Exhibit 5: Cyber Security Industry
Growth ($ billions)
Source: AlixPartners
Source: Company’s website
Exhibit 3: Global Market Capitalization
Exhibit 4: Detected Cyber-attacks (in
millions)
Source: Mcafee Report
5. StetsonUniversity Student Research
4
Source: Mcafee Report
In the Enterprise Security, companies offer network, end-point, and threat intelligence security solutions.
Most of the vendors specialize in one or two of these segments, or only have a small segment of their
revenue coming from enterprise security, except Palo Alto. Palo Alto is the only pure-play company in the
industry that solely focuses on providing the most effective security platform that includes network, end-
point, and threat intelligence solutions. Other vendors in the market are either large legacy vendors, like
Cisco, Intel, and Symantec are specializing in one segment of cyber security, or small start-up companies,
such as Barracuda, that can only compete with some of the features of Palo Alto’s product mix.
The Enterprise Security market’s revenue has been growing steadily, with an average year-over-year growth
rate of 7 %. In the future the constant growth is expected to accelerate and reach a 9.8 % growth by 2020.
The increase in Enterprise security revenue is due to the fact that cyberattacks are becoming more
sophisticated and with the recent cyber breaches, businesses as well as government agencies are becoming
aware of the seriousness and the possible damage of a successful cyberattack. Currently, the United States is
the largest market for cybersecurity on the basis of spending and adoption of cyber security solutions and
services.U.S. is expected to keep its positions as the highest revenue generator for the cyber security market
for the next five years. However, the most revenue growth is expected to come from the developing
countries since their demand for cyber security is expected to rise at a rapid rate. Palo Alto has a global
position with a U.S. focus to take advantage of both markets.
Competitors Analysis
Insert: Cisco vs PANW
Since Palo Alto is the only pure-play company in the enterprise security market, thereforedo not have a
direct competitor. In terms of technology Cisco, and Checkpoint are the closest competitors to Palo Alto.
Cisco is currently dominates the market with a 25% market share. However, their security segment only
accounts for 8% of their total revenues. Although Cisco has a bigger market share, and more established
brand name and financial. Palo Alto has been able to steal customers from the security vendor giant.
Checkpoints is the second biggest vendor in the enterprise security market, with a market share of 13 %. In
terms of size, Checkpoint is the closest competitor. Due to the lack of innovation, Checkpoint has been
stagnating in terms of revenue growth. (Exhibit 9). The reason behind Palo Alto’s success is their sole focus
on constant innovation, competitive pricing, and expertise in selling an enterprise platform.In terms of
revenue growth, Palo Alto posted a 53 % year-over-year growth, as opposed to Cisco’s security segment
with an 8% growth and Checkpoint with a 7% growth in 2014.
Cybercrime is a growth industry
Cybercrime is a growth industry with low risks and high returns for cybercriminals. In 2014, the estimated
annual cost of cybercrime exceeded 400 billion dollars in the United States. However, the real loss of
cybercrime is more complex than just the monetary damage. In 2014, more than 40 million people were
affected by cybercrime, mainly their personal information have been stolen. Cybercrime damages business
performance due to theft of intellectual property which slows down innovation. Therefore, not only
individual businesses but also national economies performances are being harmed by damages in trade,
competitiveness, innovation and the overall economic growth. Cybercriminals’ primary targets are countries
with the strongest economy. After Germany, the United States suffered the most losses in term of net loss as
a percentage of GDP, 0.64 % (Exhibit 5)2
.
Cyber Threat Alliance
Palo Alto Networks is one of the co-founders of the Cyber Security Alliance along with Symantec, Fortinet,
and Intel Security. CTA is a group of cyber security companies that chose to work together to share threat
information for the purpose of improving defenses against advanced cyber adversaries. The other objective
of the organization is to raise awareness of the severity of cybercrime in order to improve the protection of
their organizations and their customers. CTA recently managed to crack the code on crypto wallcrime ware,
which is associated causing $ 325 million loss. This first-of-its kind collaborative effort shows the power of
sharing threat intelligence information to make the Internet safer. Palo Alto’s active involvement in this
organization shows the company’s commitment to provide the efficient and up-to-date protection to its
customers.
2
Mcafee: Estimating the Net Global Loss due to Cybercrime
Brazil 0.32 %
China 0.63%
Germany 1.60%
India 0.21%
Japan 0.02%
United States 0.64%
Exhibit 6: Net Loss in terms of GDP
6. StetsonUniversity Student Research
5
Source: Company’s 10Q-s
Competitive Positioning
Competitive Differentiation
Disruptive network and endpoint technology:Palo Alto was the first company to recognize the
fundamental shortcomings of port-based firewalls.Palo Alto´s application-based firewalls made them the
leader in the next-generation firewall segment. Through their enterprise platform, Palo Alto empowers
enterprises, service providers, and government entities to secure their organization by safely enabling their
applications and by preventing breaches from targeted cyber-attacks. In the early 2000s, firewalls only had
to contend two applications, web-browsing and e-mail. Today cloud and SaaS-based applications, increased
use of mobiles in business, and more sophisticated cyber-attacks demand a new approach to cybersecurity.
Thanks to their total focus enterprise security, they are constantly innovating their products to ensure.
The disruptive approach of Palo Alto’s subscription services take endpoint protection to another level by
identifying the toolkit that cybercriminals use rather than trying to detect hundreds of thousands of malware
and create a signature and send it to endpoint protection to block the threats. Since there is only 20
something toolkit that hackers use, and discovering a new one takes times, this technology is more effective
and faster than any other security solutions. Additionally, this solution is able to prevent threats from
unknown malware which is huge, because 60 % of the cyber-attacks come from unknown mal ware. Thanks
to the next-generation threat cloud solution, Palo Alto is able to detect those toolkit and send that
information to the firewalls real-time. Both of these subscription services are compatible with other
firewalls.
Prevention from unknown attacks: Over 60 % of the cyber-attacks comes from unknown malware. Palo
Alto develop a software that has the ability to detects a new malware, than puts it into a sandbox, identifies
its signature and then prevents it from attacking. This way all the new attacks’ signatures are being
transferred into their global database of malware. Unlike Cisco, Palo Alto is capable of analyzing the data of
traffic real-time.
Disruptive Business Model:Palo Alto’s revenue hybrid SaaS model consists of products, subscriptions, and
support and maintenance.The rapid switch to this model contributed to the revenue growth of the company
because they benefit from recurring revenues as well as revenues from new customers. As the result of the
hybrid SaaS model, the customer retention rate grew significantly. Additionally, the company´s free cash
flowshave been increasing exponentially. From 62.6 million of free cash flow, in 2015 Palo Alto reported
316.5 million which is a 149 % increase year-over-year (Exhibit 8).
Go-to-Market Strategy: Go-to-Market strategy is one of the key components how Palo Alto has been able
to gain market share. Since in the enterprise security space, most of the companies already have security
vendors, signing up new customers is the most challenging market issue. Go-to-market strategy means that
Palo Alto is signing up new customers primarily for firewall appliances. Once the customers get into the
account the company is selling them more appliances and more subscription services. Since the company
primarily targets mid-and large size enterprises, their demand for firewall products will constantly increase
once they decide to purchase the entire security platform of Palo Alto.
Industry Leading Top-line Growth
Palo Alto Network has been outperforming the revenue growth of all its competitors, since the company’s
initial public offering in July, 2012. The company closed the fiscal year of 2015 with a 53 % revenue
growth year-over-year. The second best performer in the industry was lagging behind Fortinet with a 25 %
year-over-year growth. The largest vendor in the security market Cisco only posted an 8 % year-over-year
growth. The only way to gain market share in the enterprise security sector is to replace existing vendors,
these growth rate differences shows that customers are switching to Palo Alto’s platform from its
competitors’ products.
Customer Traction: As of July 31, 2015, Palo Alto had 26, 000 end-customers which is a 37 % growth
from 2014 year-over-year. Palo Alto has a diversified customer base from industries including Aerospace&
Year Free Cash Flow
2012 62.8
2013 92.1
2014 127.3
2015 316.5
Exhibit 9: Competitors Revenue Growth
Comparison
Source: Company’s website
Exhibit 8: Free Cash Flow Growth
(in millions)
Exhibit 7: PANW vs. Enterprise
Security Market Growth Comparison
Source: Company’s website
Exhibit 10: Customer Count
(in thousands)
7. StetsonUniversity Student Research
6
Defense, Media & Entertainment, Government, and Financial Services etc. Their high customer traction and
retention are due to their competitive price, integrated platform and innovative subscription services
The company’s customer base is coming from several industries, including Aerospace& Defense, Media &
Entertainment, Government, and Financial Services etc. First, they sell their firewall security appliances to
new customers and once they established an account and satisfied with the product, they can extend their
platform by buying additional subscription services to increase visibility and control. Their initial pricing is
extremely appealing because buying the firewall and subscription services’ price compete with Cisco’s
firewall price quotes.
Increasing trend of BYOD: With the consumerization of information technology, bring-your-own-device
in the office trend (BYOD) is getting more and more popular. As the result of BYOD, applications like
Dropbox and other cloud-based SaaS solutions are used more frequently in professional business settings.
The BYOD trend forces corporations to increase step up their enterprise security systems if they want to
stay competitive. The use of these online applications to increase the productivity of the employees. A
company that offers a security platform that has the ability to enable applications like Dropbox safely has a
competitive advantage.BYOD is beneficial for Palo Alto, since their security solutions are application-
based, so they can serve customers who wish to work from outside the office.
Rapid Market Share Gains:In the cyber security industry, Palo Alto is the only company offering
application-based firewalls and subscriptions with the ability to identify unknown malwares in their
integrated enterprise security platform. Compared to Cisco, whose security segment only takes up 8 % of
their total revenue, Palo Alto solely focuses on enterprise security. Checkpoint security, like Palo Alto,
focuses enterprise security, but they have not been focusing innovation, hence the 8% revenue growth.
As a result of Palo Alto’s unique differentiation, the company has been gaining market share rapidly from
its competitors the every region they operate with a 90 % customer retention rate. As a result, Palo Alto
increased its market share from 2 % to 12 % in 4 years.
Constant Innovation:Palo Alto’s competitive advantage is their disruptive approach to firewall protection
and focus on relentless innovation. Legacy vendors recognized that their technology is outdated compared
to Palo Alto. They try to keep up with Palo Alto by acquiring cutting edge technology companies but as a
result they will always be behind Palo Alto. As part of their relentless effort to innovate, they recently
introduced two subscription services that have unique features.
Geographical Growth:Since cyber security is required in all industries and countries, there is a strong
demand for Palo Alto’s products worldwide. TheUnited States is the most stable and biggest cyber security
market, 64 % of the revenue came from the United States. However, the biggest growth potential is in the
developing countries where digitalization is constantly increasing the Internet and cellphone users.
Consequently, the second biggest region of the company’s revenue comes from the EMEA region (Europe,
Middle East, and Africa). Due to the recent political unrest and economic slowdown in the region, the
demand for cyber security decreased in these region but expected to rebound in the near as Europe is
predicted to enter into the recovery stage. The third region is the APAC (Asia-Pacific). The revenue from
Expansion through Economic Recovery:As the U.S. government is loosening up its sequestration policy,
which means that the federal spendings allocated to cyber security are expected to increase. In 2016, the
federal government allocated $14 billion for cyber security spendings. As the economy recovers, businesses
will also have more money to spend on assuring that their enterprise is protected.
Financial Analysis
Revenue Breakdown: Historically, Palo Alto Network’s product revenue has been the main driver of
revenue growth. Their revenue breakdown by product reflects the recently adopted hybrid SaaS business
model consisting products, revenues, and subscription and maintenance. Products, more specifically their
firewall appliances are the core components of the security enterprise platform. However, there is a growth
in the subscription segment with the introduction of Traps and Wildfire. Since their introduction, both of the
subscriptions experienced an explosive demand.
The Value of Disruptive Technology
Exhibit 13: Revenue Breakdown
Source: Company’s 10K-s
Exhibit 11: Geographic Segments
Source: Company’s 10Ks
Exhibit 12: Government Spendings on
Cyber Security (in billions)
Source: The Office of Management and Budget
Source: Company’s 10K-s
8. StetsonUniversity Student Research
7
Application-based Firewall Solutions Contributing to Topline Growth:The core component of the
enterprise security platform is the application-based firewall products. Product revenue is the main driver of
revenue sales growth. One way to see the value of the new firewall protection technology is to compare the
topline growth of Palo Alto to its competitors (Exhibit 12). In 2015, Palo Alto’s topline growth rate was
significantly higher, with 53 % year-over-year, beating all of its competitors.
Next-Generation Endpoint Solutions Contributing to Margins Expansion: As the result of the constant
growth in the sales of firewall appliances, the company’s gross profit margin fluctuated between 71 % and
74 % and has been slowly increasing since Q1 2015. The growth in sales has been the result of the
fundamentally new application-basedtechnology that disrupted the firewall segment of the cyber security
market. As the sales continue to growth the cost of sales is expected to decrease which will result in an
additional increase in the overall gross profit margin.
Next-Generation Threat Intelligence Solutions Contribution to Margin Expansions: The disruptive
approach of Palo Alto’s subscription services take endpoint protection to another level by identifying the
toolkit that cybercriminals use rather than trying to detect hundreds of thousands of mal ware and create a
signature and send it to endpoint protection to block the threats. Since there is only 20 something toolkit that
hackers use, and discovering a new one takes times, this technology is more effective and faster than any
other security solutions.
.
Economic/Industry Effects:According to our projection, the GDP is expected to grow by 3 % in the
next 18 months; this means that governments, businesses as well as individuals will have more
resources that could be allocated to cyber security. Consequently, the industry revenue is expected to
grow by 11 % in 2016. Industry growth is also expected as a result of BYOD, and increasingly
sophisticated cyberattacks. The increasing and more complex cyberattacks benefit the competitive
positioning of Palo Alto’s products and services.
Idiosyncratic Pent Up Demand:In this section, I estimate the portions of revenue growth derived
from the releases of industry pent up demand and company-specific pent up demand. The demand for
cyber security has been changing differently among the various types of customers. As the result of
the 2008-2009 financial crisis, governments around the world cut costs in the attempt to decrease their
deficits. Cuts in government spending mean that less financial resources were being allocated to cyber
security. Businesses took the same measures as the result of the economic slowdown. However, the
increasing cyberattacks and the increasing amount of information online, the demand for better cyber
security solutions has been increasing. Apart from the innovative technological features of firewalls,
increasing demand for cyber security solutions has been another factor driving revenue growth.
Pro Forma:For my pro forma analysis of Palo Alto, I concluded that they are expected to see an increase
their revenues in 2016 and 2017 from growing net sales. I broke down their revenues based on their product
segments. I identified the following products; products, subscriptions, and support and maintenance. Since
Palo Alto is selling an entire enterprise security platform, the revenues of each product segment fluctuate
together. However, the product segment is the main driver of revenue. Based on these factors, I expect the
total revenue for Q2 2016 to be $ 310,000, a 44% increase from Q22015. Another component that will
contribute to the increase of future sales is the expected pent up demand for cyber security solutions that are
effective. With the introduction of new subscription services I expect the service revenue to increase by
51% year-over-year, while the product revenue is expected to increase by 43%.
Exhibit 15: Growth Comparison by
Product Segment
Source: Company’s 10K -s
Exhibit 17: PANW vs. CSCO
Product Revenue Growth
Exhibit 14: Product Revenue Growth
Source: Company’s 10K-s
9. StetsonUniversity Student Research
8
MarginExpansions
Application-based Firewall Solutions Contributing to Margins Expansion: As the result of the constant
growth in the sales of firewall appliances, the company’s gross profit margin fluctuated between 71 % and
74 % and has been slowly increasing since Q1 2015. The growth in sales has been the result of the
fundamentally new application-based technology that disrupted the firewall segment of the cyber security
market. As the sales continue to growth the cost of sales is expected to decrease which will result in an
additional increase in the overall gross profit margin which is expected to be 75% and 76% in 2017.
(Appendix 1)
Earnings
Since Palo Alto is a young company that operates in the technology sector, their current net loss is not
unusual. Although their revenue has been increasing with on average on a 45 % year-over-year, they closed
the majority of their quarters with a net loss, since their product mix was still in the initial phase of
establishing themselves in the market and litigation charges. Since they managed to establish their product
in the market and pay off all litigation charges on 2013 and 2014, we saw an 88% increase in earnings per.
In comparison to Checkpoints, who posted a 35% earnings per share growth in 2015 which was a significant
decline from the previous year’s growth.
Operating Expenses
Palo Alto is required to constantly upgrade their existing products, and come up with new innovations to
facilitate the efficiency of their enterprise security platform. Research & Development has been constantly
increasing from 15 to 21 % of the total quarterly revenue as the result of the company’s objective to gain
market share. Apart from Research & Development, Sales & Marketing is another, major contributor to high
operating expenses. Due to the company’s global sales coverage model, the Sales & Marketing expenses
have been significant. In Q2 2013, they started setting up their international corporate structure, and ERP
throughout the organization which resulted in a fluctuation between 47 to 60 %. For FY’16 and Q1and
Exhibit 16: Bottom-line growth
Source:Bloomberg
10. StetsonUniversity Student Research
9
Q2’17 I estimated that the R&D and the Sales and Marketing expenses will decrease due to their shifted
focus to existing customers.
Litigation Charges
Patent and other intellectual property disputes are common in the technology industry. Palo Alto incurred
unusual costs that skewed their bottom-line and overshadow their healthy sales numbers since FY’14. One
of the costs that they incurred was expenses for legal services and settlements. Fortinet filed a lawsuit
against Palo Alto and had to pay a settlement of $ 20 million in Q4 2014. Juniper Networks also sued Palo
Alto which resulted in a settlement expense of $ 121.2 million in Q3 2014. As part of the settlement charges
for Juniper, as part of the agreement mark-to-market warrants of $ 5.9 million were issued in Q4 2014.
Additionally as part of the settlement, Palo Alto entered into the amortization and intellectual property
licenses of $ 2 million in Q4 2014. Each quarter after Q4 2014, Palo Alto is required to enter the same
licenses for the cost of $ 3.1 million.
Cash Flow
A more prominent way to measure the company’s cash flow is their free cash flow. This is how much
operating cash flow remains after capital expenditures. For this reason, Palo Alto moved to the hybrid SaaS
business model to increase their free cash flows. Their cash flows provided by operating activities are
mainly driven by the sales of their products and from up-front payments for both subscriptions and support
and maintenance services. As of July 31, 2015 their cash from operating income was $ 350.3 million, 12.9
% year-over-year increase from 2014. As the result of their rapidly growing sales, the company’s free cash
flows increased by $ 316.15, a 34.10 % year-over-year growth from 2014 (Exhibit 8). The significant
increase in their free cash flows further demonstrates that after subtracting the purchases of properties,
equipment, and other assets that the company’s liquidity measures are increasing. Due to the increased cash
generated by the business, Palo Alto can use their access cash for investing in additional research,
strengthening their balance sheet, and making strategic acquisitions.
Efficiency
Sales per SG&A:Palo Alto’s revenue growth is outpacing its sales and marketing expenses, as
demonstrated by the rising sales per advertising dollar. As of Q4 2015, Palo Alto generated $ 1.79 of
revenue for every $ 1 spent on marketing and sales. By Q2 2017, the ratio is expected to surpass $ 2.05
since the expected revenue growth for sales is projected to increase. After the company’s initial public
offering, the sales per marketing and sales ratio decreased due to the company’s implementation of
international corporate structure and global ERP systems. Additionally, another factor that lead to higher
sales and marketing expenses was the result of the company’s aggressive go-to market strategy to gain
market share.
Assets per Equity
Assets/Equity: Palo Alto’s assets have been increasingly outpacing its equities as the result of the increase
in revenue growth. As of Q4 2015, Palo Alto’s Asset/Equity ratio was 2.3 as of Q4 2015, representing a 4 %
year-over year growth. The Enterprise Security Industry’s average was 1.75 in 2015.Palo Alto’s exponential
Asset per Equity growth was resulted from the rapid increase of sales since Q3 2014.
Debt
Debt to Equity: Currently, Palo Alto has a $ 1.47 million total debt outstanding, from which $ 1.03 million
short-term liabilities and $ 450,000 long-term debt. The short-term liabilities are customer advances
resulting from service-contracts with their customers. The contract durations for subscriptions were 1.9
years as of Q4 2015. Palo Alto’s debt-to equity ratio was one in 1.06 in Q4 2015,which is significantly
lower than the industry average of 1.2. Cisco’s debt to equity ratio was 0.41 as of Q4 2015 due to its much
larger total equity.
Exhibit 17: Asset/EquityComparison
Source: Thompson Reuters
11. StetsonUniversity Student Research
10
Valuations
In this section, I estimate the fair values of Palo Alto Networks’ stock. It should be noted that all input data
were derived from historical company data and pro forma estimates.
Sales FranchiseValue Model:The Sales Franchise valuation is often used when dealing with multinational
corporations. The key component of this model is the profit margin. The model distinguishes between a
company’s current and future profit margin. Companies those are able to produce significant franchise
value, i.e. Repeating its business model at a higher profit margin. The underlying assumption for Palo Alto
is that it will be able to improve its profit margin by lowering its operating costs through increasing its
revenues from global sales. Using its current profit margin of 74 % and our expected future profit margin of
75%(Appendix 1), I determined the median fair value for Palo Alto to be $ 197, undervalued by 7%
(Appendix 6).
Free Cash Flow Model: The underlying assumption for Palo Alto is that it will be able to increase its free
cash flows by the expected increase of global sales. Using the current trading price at $185 and the 12.9 %
current free cash flow, I determined a fair value of $ 224, meaning it is undervalued by 21 %.
Average Fair Value: Palo Alto Networks is currently trading at $185 and based on the valuations the
average fair value price of the stock is $ 210, meaning it is undervalued by 14%.
Investment Risk
Patents Fights
In the Enterprise Security Market legal disputes about patents and other intellectual properties are frequent
due to the competitive nature of the market and the need for constant technological innovation. One
technical advancement can translate into significant revenue increase. Consequently, companies in this
market are often involved in offensive or defensive lawsuits. Due to Palo Alto’s size, a lawsuit would affect
the company’s bottom-line more than the bottom-line of Cisco for instance.
Managing Future Growth
Operating results will be adversely affected if the company is not able to manage their business operations
effectively. Palo Alto’s business and operations experienced a fast growth in the recent periods. As a result
of the business and operation expansion, the number of employees grew from 1,722 to 2637 from 2014 to
2015. The growth technology and financial infrastructure is expected and expansion of their products places
a constraint on the financial, operational resources. Also, with future growth in business improvements in
information
Intense Competition
The market for enterprise security products is competitive and expected to increase in the future from
established competitors as well as new market entrants. Many of Palo Alto’s competitors have competitive
advantages such as longer operating histories, greater name recognition, larger sales and marketing budgets
and financial and technical resources, lower labor costs, more extensive intellectual property portfolio.
Additionally some of the larger market players have a better name-recognition, broader product line, and
less dependency on how the market is doing.
Merger and Acquisition Trends of Larger Vendors
Large vendors in the market have the financial resources to acquire companies with a more competitive
product or new innovation. As the result of acquisitions, Palo Alto’s competitors might be able to adapt
more quickly to new technologies and end-customer needs. These factors make new customer gains for Palo
Alto more difficult, because customers are more likely to add security solutions from their more-established
vendors rather than switching to use our products. These pressures from the other market players may result
in fewer demand and decrease in revenue and gross margins and loss of market share. Failure to address
these factors will hurt the operating results of the business.
12. StetsonUniversity Student Research
11
Cyclicality
Palo Alto’s revenue is linked to indirectly to economic performance. The better businesses and national
economies do, the more resources they can allocate to cyber security. In 2013, the U.S. government
exercised budget sequestration in the effort to decrease the nation’s deficit. As the result of this budget cut,
the government’s spending on cyber security decrease which negatively affected Palo Alto’s rate of revenue
growth. However, according to our estimations, GDP is expected to increase by 3 % in 2016, which is
projected to lead to increased allocated financial resources for cyber security.
Acquisition Equals Additional Leverage
In the attempt to keep up with the merger and acquisition trends of large vendors, Palo Alto acquired two
small start-up technological companies to increase their competitiveness. Acquisitions mean additional costs
and operating leverage due to the risk that the acquired company will not do as well as expected. However,
due the acquisition of Mortada and Cyrrocure a slight additional revenue growth was seen.
13. StetsonUniversity Student Research
12
Table of Contents
Appendix1:Income Statement and Pro Forma 12
Appendix 2: Balance Sheet 13
Appendix3:Income Statement 14
Appendix 4: Cash Flow Statement 15
Appendix 5: Free Cash Flow Model 16
Appendix 6: Sales Franchise Model 17
18. StetsonUniversity Student Research
17
Appendix 4: Free Cash Flow Model
Source:Own Estimates
Free Cash Flow Model
Required Rate of Return 15%
Growth from FCFE 12.9 %
Current Free Cash Flow 350,300,000
Current Total Equity 487,899,000
Number of Shares 83,968,000
FCFE 4.1
Fair Price $ 197
Fair Value = 197
Undervaluation = 7%
19. StetsonUniversity Student Research
18
Appendix5: Sales FranchiseValuationModel
Source:Bloomberg,InternalStudentEstimates
Sales Franchise Model
Sales per Share 3.15
Current Profit Margin 74 %
New Profit Margin 75%
Required Rate of Return 15%
Sales per Invested Capital 283,837
Fair Value of the Stock 224
Fair Value = 224
Undervaluation = 21 %
20. StetsonUniversity Student Research
19
Appendix 6: Sources and Disclosures
Source:Bloomberg,InternalStudentEstimates
Sources:
Baseline
Bloomberg
Reuters
Yahoo Finance
Palo Alto Networks 10Q-s
Palo Alto Networks 10Ks
Palo Alto Networks Announcements
Palo Alto Networks Transcripts
Palo Alto Networks Conference Calls
Disclosures:
Ownershipand materialconflictsof interest:
Theauthor(s),or amember of theirhousehold,of thisreportdoes notholdafinancial interestin thesecurities ofthis company.
Theauthor(s),or amember of theirhousehold,of thisreportdoes notknowof theexistence of anyconflictsof interestthatmight
biasthecontentor publicationofthis report.
Receipt of compensation:
Compensationof theauthor(s) of thisreport isnotbased oninvestmentbanking revenue.
Positionasaofficerordirector:
Theauthor(s),or amember of theirhousehold,does notserveas anofficer,director or advisoryboardmember of thesubjectcompany.
Marketmaking:
Theauthor(s) does notactas amarketmaker in thesubjectcompany’s securities.
Disclaimer:
Theinformationset forthhereinhasbeenobtained or derivedfrom sourcesgenerallyavailableto the publicandbelievedbytheauthor(s) to be
reliable,but theauthor(s) does notmakeanyrepresentation or warranty,express or implied,as toits accuracyor
completeness.Theinformationisnotintended tobeusedas the basisof anyinvestmentdecisionsbyanypersonor entity.This informationdoes
notconstitute investmentadvice, norisitan offer or a solicitationof anoffer to buyor sellanysecurity.