SlideShare a Scribd company logo
1 of 36
Jon Scott
SeniorVice President
Jon joined Corum in 2010 out of their Seattle headquarters. He has close to 30 years experience serving high technology companies
with the last 20 mainly in chief operating and chief executive roles. During this time Jon has become known for his ability to successfully
integrate strategies and tactics into well executed operating plans, building strong teams and achieving excellent results.
Jon has served as President and CEO of The PowerTech Group, a security and compliance software company sold to Help/Systems in
2008, and Microserv Technology Services, a nationwide tech services company which was acquired by Halifax Corporation in 2003.
Earlier he served as President and COO of Traveling Software, a leading developer of communications software in Seattle. Prior to his
operating roles Jon held vice president roles in sales, marketing and business development for technology companies.
Jon has taught in the software product management program at the University of Washington and holds a business administration
degree from San Francisco State University.
Agenda
• Welcome
• Jon Scott, SeniorVP – Corum Group
• M&A in Security Sector
• Aaron King,Analyst – Corum Group
• MarketTrends
• Jon Scott
• Seller Discussion
• Anirban Banerjee, Founder
StopTheHacker (acquired by CloudFlare)
• Q&A
Jon Scott
SeniorVice President
Jon joined Corum in 2010 out of their Seattle headquarters. He has close to 30 years experience serving high technology companies
with the last 20 mainly in chief operating and chief executive roles. During this time Jon has become known for his ability to successfully
integrate strategies and tactics into well executed operating plans, building strong teams and achieving excellent results.
Jon has served as President and CEO of The PowerTech Group, a security and compliance software company sold to Help/Systems in
2008, and Microserv Technology Services, a nationwide tech services company which was acquired by Halifax Corporation in 2003.
Earlier he served as President and COO of Traveling Software, a leading developer of communications software in Seattle. Prior to his
operating roles Jon held vice president roles in sales, marketing and business development for technology companies.
Jon has taught in the software product management program at the University of Washington and holds a business administration
degree from San Francisco State University.
Aaron King
Analyst
Aaron joined Corum Group in 2015 as a research analyst. Previously he worked as a
writer, editor, and consultant at a software startup. Aaron graduated from Reed College
with a degree in Economics, specializing in Game Theory.
2.00 x
2.50 x
3.00 x
3.50 x
4.00 x
4.50 x
5.00 x
6.00 x
8.00 x
10.00 x
12.00 x
14.00 x
16.00 x
18.00 x
EV/SEV/EBITDA
May-
14
Jun-
14
Jul-
14
Aug-
14
Sep-
14
Oct-
14
Nov-
14
Dec-
14
Jan-
15
Feb-
15
Mar-
15
Apr-
15
May-
15
EV/EBITDA 14.20 14.61 15.50 16.48 16.10 16.22 16.96 17.03 15.71 15.84 16.08 16.16 14.63
EV/S 3.41 3.89 4.07 4.27 4.37 4.73 4.34 4.16 4.12 4.03 4.23 3.88 4.05
Infrastructure Market Valuations
IT Services Management
Network Management
Storage & Hosting
Endpoint
Security
Other Infrastructure
Segments
2.00
3.00
4.00
5.00
6.00
7.00
8.00
6.00
8.00
10.00
12.00
14.00
16.00
18.00
EV/SEV/EBITDA
May-14 Jun-14 Jul-14 Aug-14 Sep-14 Oct-14 Nov-14 Dec-14 Jan-15 Feb-15 Mar-15 Apr-15 May-15
EV/EBITDA 14.24 14.73 14.90 16.02 15.32 16.22 16.96 17.26 16.51 15.86 15.15 16.23 15.89
EV/S 5.64 6.01 5.30 5.36 5.83 6.55 6.82 6.28 6.16 6.58 6.85 6.95 7.03
Security Public Peer Valuations
0
5
10
15
20
25
30
35
$0
$1,000
$2,000
$3,000
$4,000
$5,000
Q1
2012
Q2
2012
Q3
2012
Q4
2012
Q1
2013
Q2
2013
Q3
2013
Q4
2013
Q1
2014
Q2
2014
Q3
2014
Q4
2014
Q1
2015
Q2
2015
YTD
Security Technology M&A Activity 2012-2015
Total Disclosed Deal Value Total Deal Count
Millions
Sold to
Target: BeeWare
Acquirer: DenyAll
Date Announced: May 2014
Transaction Value: Undisclosed
—Web application security, payments,
and payment card data for business
$0
$500
$1,000
$1,500
$2,000
$2,500
$3,000
Top Total Security Spenders 2012-Present
Millions
Sold to
Target: Sourcefire
Acquirer: Cisco
Date Announced: July 2013
Transaction Value: $2.7B
—Intrusion detection / prevention SaaS,
anti-malware software
Sold to
Target: Websense
Acquirer: Raytheon
Date Announced: Feb 2015
Transaction Value: $1.3B
—Defense, aerospace, missile and
intelligence systems for defense and
government
4
5
3
Top Buyers by Deal Count (2012 – Present)
Target: Blue Coat
Acquirer: Bain Capital
Date Announced: March 2015
Transaction Value: $2.4B
—Enterprise cybersecurity, web traffic
management, mobile security, and SaaS.
Previously owned by Thoma Bravo.
Sold to
Encryption
Growth in Exits by Segment (2013-2014)
Penetration Testing Security Management
Mobile Security
Identity & Access
Management
Storage Security
Anti-Malware
Premises Network
Security
Transaction Security
Sold to
Target: Codenomicon
Acquirer: Synopsys
Date Announced: April 2015
Transaction Value: Undisclosed
—Security and vulnerability testing
software and SaaS, performance
management.
Sold to
Target: Quotium
Acquirer: Synopsys
Date Announced: May 2015
Transaction Value: Undisclosed
—Interactive application security testing
(IAST)
Encryption
Growth in Exits by Segment (2013-2014)
Penetration Testing Security Management
Mobile Security
Identity & Access
Management
Storage Security
Anti-Malware
Premises Network
Security
Transaction Security
Sold to
Target: Metafor Software
Acquirer: Splunk Inc.
Date Announced: June 2015
Transaction Value: Undisclosed
—Cybersecurity anomaly detection and
predictive analytics.
Sold to
Target: nsense
Acquirer: F-Secure
Date Announced: June 2015
Transaction Value: $16,481,000
—Cyber protection and vulnerability
assessment for large institutions
Geographic Breakdown
Europe Asia / Pacific
Africa and
Middle East
Latin America
and Caribbean
US and
Canada
2013 2014 2015 YTD
Sold to
Target: IdMLogic
Acquirer: CA Technologies
Date Announced: June 2015
Transaction Value: $25M
—Identity and Access Management
(IAM) for businesses, and BYOD/mobile
IAM solutions.
Sold to
Target: CyActive
Acquirer: Paypal Inc. [eBay]
Date Announced: March 2015
Transaction Value: $60M
—Predictive malware detection and
prevention cybersecurity for business
Geographic Breakdown
Europe Asia / Pacific
Africa and
Middle East
Latin America
and Caribbean
US and
Canada
2013 2014 2015 YTD
Sold to
Target: Vulnr
Acquirer: ZeroFOX
Date Announced: January 2015
Transaction Value: Undisclosed
—Stealth-mode mobile vulnerability
detection software
Sold to
Target: NumberCop
Acquirer: WhitePages, Inc.
Date Announced: June 2015
Transaction Value: Undisclosed
—Anti-spam caller ID mobile app to
identify and block spam, phishing, and
other high-risk calls and text messages
Jon Scott
SeniorVice President
Jon joined Corum in 2010 out of their Seattle headquarters. He has close to 30 years experience serving high technology companies
with the last 20 mainly in chief operating and chief executive roles. During this time Jon has become known for his ability to
successfully integrate strategies and tactics into well executed operating plans, building strong teams and achieving excellent results.
Jon has served as President and CEO of The PowerTech Group, a security and compliance software company sold to Help/Systems in
2008, and Microserv Technology Services, a nationwide tech services company which was acquired by Halifax Corporation in 2003.
Earlier he served as President and COO of Traveling Software, a leading developer of communications software in Seattle. Prior to his
operating roles Jon held vice president roles in sales, marketing and business development for technology companies.
Jon has taught in the software product management program at the University of Washington and holds a business administration
degree from San Francisco State University.
Cloud Security
Automated Incident Response
Advanced PersistentThreats
Security Provider Consortiums
More Small andVery Focused
Start-Ups
Jon Scott
SeniorVice President
Jon joined Corum in 2010 out of their Seattle headquarters. He has close to 30 years experience serving high technology companies
with the last 20 mainly in chief operating and chief executive roles. During this time Jon has become known for his ability to successfully
integrate strategies and tactics into well executed operating plans, building strong teams and achieving excellent results.
Jon has served as President and CEO of The PowerTech Group, a security and compliance software company sold to Help/Systems in
2008, and Microserv Technology Services, a nationwide tech services company which was acquired by Halifax Corporation in 2003.
Earlier he served as President and COO of Traveling Software, a leading developer of communications software in Seattle. Prior to his
operating roles Jon held vice president roles in sales, marketing and business development for technology companies.
Jon has taught in the software product management program at the University of Washington and holds a business administration
degree from San Francisco State University.
Anirban Banerjee
Dr. Anirban Banerjee is the lead Primary Investigator, the VP of Research and Development, and co-founder of StopTheHacker
Inc. He graduated with his Ph.D. in Computer Science, from the University of California at Riverside in 2008. Dr. Banerjee’s
thesis research includes well over twenty published papers in the areas of internet security, measurements and web
technology.
Over the last few years, he has garnered great visibility and respect among the web security community, rapidly advancing as a
recognized authority in the fight against underground cyber crime. Dr. Banerjee’s profound expertise in Artificial Intelligence
and web security along with his exuberant passion for innovative product development, propel StopTheHacker into the much
coveted position as one of the tech industry’s hottest new startups.
Co-Founder, StopTheHacker
Traits of a Successful Security Acquisition
1. Chasing a RealVulnerability
2. Developed an ExpandableArchitecture
3. Deep Subject Matter Expertise and Passion
4. Customer References
5. Began with an End in Mind
Q&A
We welcome your questions!
• Use Q&A window on right side
• Submit to queue at any time
• Ask “all panelists” – see “ask” option above text-entry
box
Contact Us
For further information or copies of today’s
presentation:
Visit www.wfs.com
-or-
Email jons@corumgroup.com
36

More Related Content

What's hot

Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Creus Moreira Carlos
 
2015 candidate whitepaper
2015 candidate whitepaper2015 candidate whitepaper
2015 candidate whitepaperRandstad USA
 
GWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox BlueGWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox BlueGWAVA
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
INSECURE Magazine - 42
INSECURE Magazine - 42INSECURE Magazine - 42
INSECURE Magazine - 42Felipe Prado
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck BrooksChuck Brooks
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaEMC
 
Top 30 software development companies to watch out for in 2018
Top 30 software development companies to watch out for in 2018Top 30 software development companies to watch out for in 2018
Top 30 software development companies to watch out for in 2018I-Verve Inc
 
You Are the Target
You Are the TargetYou Are the Target
You Are the TargetEMC
 
Building your-dream-cyber-team
Building your-dream-cyber-teamBuilding your-dream-cyber-team
Building your-dream-cyber-teamKleomenis Symeon
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligenceseadeloitte
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?EMC
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportDivya Kothari
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 

What's hot (19)

Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
 
2015 candidate whitepaper
2015 candidate whitepaper2015 candidate whitepaper
2015 candidate whitepaper
 
The Future of Cybersecurity
The Future of CybersecurityThe Future of Cybersecurity
The Future of Cybersecurity
 
GWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox BlueGWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
In the news
In the newsIn the news
In the news
 
INSECURE Magazine - 42
INSECURE Magazine - 42INSECURE Magazine - 42
INSECURE Magazine - 42
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
 
July 2010 Cover Story
July 2010 Cover StoryJuly 2010 Cover Story
July 2010 Cover Story
 
Top 30 software development companies to watch out for in 2018
Top 30 software development companies to watch out for in 2018Top 30 software development companies to watch out for in 2018
Top 30 software development companies to watch out for in 2018
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
Building your-dream-cyber-team
Building your-dream-cyber-teamBuilding your-dream-cyber-team
Building your-dream-cyber-team
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment Report
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 

Viewers also liked

Lessons learnt from the 2012 cyber security audit of Western Australian State...
Lessons learnt from the 2012 cyber security audit of Western Australian State...Lessons learnt from the 2012 cyber security audit of Western Australian State...
Lessons learnt from the 2012 cyber security audit of Western Australian State...Edith Cowan University
 
Spring Security Briefing: Lessons Learned from Recent Data Breach
Spring Security Briefing: Lessons Learned from Recent Data BreachSpring Security Briefing: Lessons Learned from Recent Data Breach
Spring Security Briefing: Lessons Learned from Recent Data BreachKathy Pelletier
 
PwC - Los inversionistas en exploración minera aún ven atractivo al Perú
PwC - Los inversionistas en exploración minera aún ven atractivo al PerúPwC - Los inversionistas en exploración minera aún ven atractivo al Perú
PwC - Los inversionistas en exploración minera aún ven atractivo al PerúPwC Perú
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?Brian K. Dickard
 
Cyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckCyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckJarno Limnéll
 
Symbiotic Consulting Group LLC - PCI Compliance Overview
Symbiotic Consulting Group LLC - PCI Compliance OverviewSymbiotic Consulting Group LLC - PCI Compliance Overview
Symbiotic Consulting Group LLC - PCI Compliance OverviewRosy Kaur
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercisesisc2-hellenic
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...Plus Consulting
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...Nicolas Beyer
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Preventionfmi_igf
 
Cybersecurity It Audit Services Gt April2012
Cybersecurity It Audit Services Gt April2012Cybersecurity It Audit Services Gt April2012
Cybersecurity It Audit Services Gt April2012Danny Miller
 
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared CarstensenCyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensenjaredcarst
 
Broadcom Customer Presentation
Broadcom Customer PresentationBroadcom Customer Presentation
Broadcom Customer PresentationSplunk
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attackisc2-hellenic
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Bloxx
 

Viewers also liked (19)

Lessons learnt from the 2012 cyber security audit of Western Australian State...
Lessons learnt from the 2012 cyber security audit of Western Australian State...Lessons learnt from the 2012 cyber security audit of Western Australian State...
Lessons learnt from the 2012 cyber security audit of Western Australian State...
 
Spring Security Briefing: Lessons Learned from Recent Data Breach
Spring Security Briefing: Lessons Learned from Recent Data BreachSpring Security Briefing: Lessons Learned from Recent Data Breach
Spring Security Briefing: Lessons Learned from Recent Data Breach
 
PwC - Los inversionistas en exploración minera aún ven atractivo al Perú
PwC - Los inversionistas en exploración minera aún ven atractivo al PerúPwC - Los inversionistas en exploración minera aún ven atractivo al Perú
PwC - Los inversionistas en exploración minera aún ven atractivo al Perú
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
 
Cyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckCyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality Check
 
Symbiotic Consulting Group LLC - PCI Compliance Overview
Symbiotic Consulting Group LLC - PCI Compliance OverviewSymbiotic Consulting Group LLC - PCI Compliance Overview
Symbiotic Consulting Group LLC - PCI Compliance Overview
 
Quotes about cyber security
Quotes about cyber securityQuotes about cyber security
Quotes about cyber security
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
Cybersecurity It Audit Services Gt April2012
Cybersecurity It Audit Services Gt April2012Cybersecurity It Audit Services Gt April2012
Cybersecurity It Audit Services Gt April2012
 
Security Essentials
Security EssentialsSecurity Essentials
Security Essentials
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared CarstensenCyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
 
Broadcom Customer Presentation
Broadcom Customer PresentationBroadcom Customer Presentation
Broadcom Customer Presentation
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges
 

Similar to Market Spotlight: Cyber Security

Tech M&A Monthly: Private Equity Panel - Feb. 2013
Tech M&A Monthly: Private Equity Panel - Feb. 2013Tech M&A Monthly: Private Equity Panel - Feb. 2013
Tech M&A Monthly: Private Equity Panel - Feb. 2013Corum Group
 
Global Tech M&A Annual Report - January 2013
Global Tech M&A Annual Report - January 2013 Global Tech M&A Annual Report - January 2013
Global Tech M&A Annual Report - January 2013 Corum Group
 
Corum Tech M&A Midyear Report
Corum Tech M&A Midyear ReportCorum Tech M&A Midyear Report
Corum Tech M&A Midyear ReportCorum Group
 
Digital-Enabled Wealth Management
Digital-Enabled Wealth ManagementDigital-Enabled Wealth Management
Digital-Enabled Wealth ManagementCIO Talk Network
 
2014 Tech M&A Monthly - Deals Closing Globally
2014 Tech M&A Monthly - Deals Closing Globally2014 Tech M&A Monthly - Deals Closing Globally
2014 Tech M&A Monthly - Deals Closing GloballyCorum Group
 
Tech M&A Monthly: Ten Steps to Successfully Sell Now - May 2013
Tech M&A Monthly: Ten Steps to Successfully Sell Now - May 2013Tech M&A Monthly: Ten Steps to Successfully Sell Now - May 2013
Tech M&A Monthly: Ten Steps to Successfully Sell Now - May 2013Corum Group
 
Tech M&A Monthly: Megadebt and Hypervaluations - June 2013
Tech M&A Monthly: Megadebt and Hypervaluations - June 2013Tech M&A Monthly: Megadebt and Hypervaluations - June 2013
Tech M&A Monthly: Megadebt and Hypervaluations - June 2013Corum Group
 
Jyotin gambhir
Jyotin gambhirJyotin gambhir
Jyotin gambhirjanetlouis
 
2014 Tech M&A Monthly - 10 Ways to Increase the Value of Your Company
2014 Tech M&A Monthly - 10 Ways to Increase the Value of Your Company2014 Tech M&A Monthly - 10 Ways to Increase the Value of Your Company
2014 Tech M&A Monthly - 10 Ways to Increase the Value of Your CompanyCorum Group
 
BOLD Business Security
BOLD Business SecurityBOLD Business Security
BOLD Business SecurityBOLD Business
 
Hack fund pitch deck
Hack fund pitch deckHack fund pitch deck
Hack fund pitch deckRenata George
 
Growth Acceleration Partners Overview Blk
Growth Acceleration Partners Overview BlkGrowth Acceleration Partners Overview Blk
Growth Acceleration Partners Overview Blkguest41c1eb
 
Tech M&A Monthly: Single biggest business mistake
Tech M&A Monthly: Single biggest business mistakeTech M&A Monthly: Single biggest business mistake
Tech M&A Monthly: Single biggest business mistakeCorum Group
 
Mitigating Cyber Issues in M&A
Mitigating Cyber Issues in M&AMitigating Cyber Issues in M&A
Mitigating Cyber Issues in M&AExpert Webcast
 
2014 Tech M&A Monthly - Quarterly Report
2014 Tech M&A Monthly - Quarterly Report2014 Tech M&A Monthly - Quarterly Report
2014 Tech M&A Monthly - Quarterly ReportCorum Group
 
Dauntless Traceability Products
Dauntless Traceability ProductsDauntless Traceability Products
Dauntless Traceability ProductsClark Musser
 

Similar to Market Spotlight: Cyber Security (20)

Tech M&A Monthly: Private Equity Panel - Feb. 2013
Tech M&A Monthly: Private Equity Panel - Feb. 2013Tech M&A Monthly: Private Equity Panel - Feb. 2013
Tech M&A Monthly: Private Equity Panel - Feb. 2013
 
Global Tech M&A Annual Report - January 2013
Global Tech M&A Annual Report - January 2013 Global Tech M&A Annual Report - January 2013
Global Tech M&A Annual Report - January 2013
 
Corum Tech M&A Midyear Report
Corum Tech M&A Midyear ReportCorum Tech M&A Midyear Report
Corum Tech M&A Midyear Report
 
Digital-Enabled Wealth Management
Digital-Enabled Wealth ManagementDigital-Enabled Wealth Management
Digital-Enabled Wealth Management
 
2014 Tech M&A Monthly - Deals Closing Globally
2014 Tech M&A Monthly - Deals Closing Globally2014 Tech M&A Monthly - Deals Closing Globally
2014 Tech M&A Monthly - Deals Closing Globally
 
B. Lee Jones - Resume 2021
B. Lee Jones - Resume 2021B. Lee Jones - Resume 2021
B. Lee Jones - Resume 2021
 
Tech M&A Monthly: Ten Steps to Successfully Sell Now - May 2013
Tech M&A Monthly: Ten Steps to Successfully Sell Now - May 2013Tech M&A Monthly: Ten Steps to Successfully Sell Now - May 2013
Tech M&A Monthly: Ten Steps to Successfully Sell Now - May 2013
 
Tech M&A Monthly: Megadebt and Hypervaluations - June 2013
Tech M&A Monthly: Megadebt and Hypervaluations - June 2013Tech M&A Monthly: Megadebt and Hypervaluations - June 2013
Tech M&A Monthly: Megadebt and Hypervaluations - June 2013
 
derrick summary
derrick summaryderrick summary
derrick summary
 
Jyotin gambhir
Jyotin gambhirJyotin gambhir
Jyotin gambhir
 
2014 Tech M&A Monthly - 10 Ways to Increase the Value of Your Company
2014 Tech M&A Monthly - 10 Ways to Increase the Value of Your Company2014 Tech M&A Monthly - 10 Ways to Increase the Value of Your Company
2014 Tech M&A Monthly - 10 Ways to Increase the Value of Your Company
 
BOLD Business Security
BOLD Business SecurityBOLD Business Security
BOLD Business Security
 
Hack fund pitch deck
Hack fund pitch deckHack fund pitch deck
Hack fund pitch deck
 
Growth Acceleration Partners Overview Blk
Growth Acceleration Partners Overview BlkGrowth Acceleration Partners Overview Blk
Growth Acceleration Partners Overview Blk
 
Tech M&A Monthly: Single biggest business mistake
Tech M&A Monthly: Single biggest business mistakeTech M&A Monthly: Single biggest business mistake
Tech M&A Monthly: Single biggest business mistake
 
Mitigating Cyber Issues in M&A
Mitigating Cyber Issues in M&AMitigating Cyber Issues in M&A
Mitigating Cyber Issues in M&A
 
2014 Tech M&A Monthly - Quarterly Report
2014 Tech M&A Monthly - Quarterly Report2014 Tech M&A Monthly - Quarterly Report
2014 Tech M&A Monthly - Quarterly Report
 
5.5.15
5.5.155.5.15
5.5.15
 
Aumento ventures
Aumento venturesAumento ventures
Aumento ventures
 
Dauntless Traceability Products
Dauntless Traceability ProductsDauntless Traceability Products
Dauntless Traceability Products
 

More from World Financial Symposiums

More from World Financial Symposiums (12)

Offshore to Onshore: The role of software technology in the US Manufacturing ...
Offshore to Onshore: The role of software technology in the US Manufacturing ...Offshore to Onshore: The role of software technology in the US Manufacturing ...
Offshore to Onshore: The role of software technology in the US Manufacturing ...
 
Mobile Messaging M&A: Consolidation in Mobile Messaging Space
Mobile Messaging M&A: Consolidation in Mobile Messaging SpaceMobile Messaging M&A: Consolidation in Mobile Messaging Space
Mobile Messaging M&A: Consolidation in Mobile Messaging Space
 
Connected Cars: Automotive Technology M&A
Connected Cars: Automotive Technology M&AConnected Cars: Automotive Technology M&A
Connected Cars: Automotive Technology M&A
 
IP Spotlight: Tech Patent Law and Your Exit Strategy
IP Spotlight: Tech Patent Law and Your Exit StrategyIP Spotlight: Tech Patent Law and Your Exit Strategy
IP Spotlight: Tech Patent Law and Your Exit Strategy
 
Market Spotlight: Games M&A
Market Spotlight: Games M&AMarket Spotlight: Games M&A
Market Spotlight: Games M&A
 
SCM & Logistics Technology M&A
SCM & Logistics Technology M&ASCM & Logistics Technology M&A
SCM & Logistics Technology M&A
 
Market Spotlight: Internet of Things (IoT)
Market Spotlight: Internet of Things (IoT)Market Spotlight: Internet of Things (IoT)
Market Spotlight: Internet of Things (IoT)
 
Market Spotlight: Ad Tech
Market Spotlight: Ad TechMarket Spotlight: Ad Tech
Market Spotlight: Ad Tech
 
Health Tech Market Spotlight
Health Tech Market SpotlightHealth Tech Market Spotlight
Health Tech Market Spotlight
 
Smart Cities: M&A Opportunities
Smart Cities: M&A OpportunitiesSmart Cities: M&A Opportunities
Smart Cities: M&A Opportunities
 
IP Spotlight: Patents, Technology and M&A
IP Spotlight: Patents, Technology and M&AIP Spotlight: Patents, Technology and M&A
IP Spotlight: Patents, Technology and M&A
 
Market Spotlight: IT Services Webinar
Market Spotlight: IT Services WebinarMarket Spotlight: IT Services Webinar
Market Spotlight: IT Services Webinar
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Market Spotlight: Cyber Security

  • 1.
  • 2. Jon Scott SeniorVice President Jon joined Corum in 2010 out of their Seattle headquarters. He has close to 30 years experience serving high technology companies with the last 20 mainly in chief operating and chief executive roles. During this time Jon has become known for his ability to successfully integrate strategies and tactics into well executed operating plans, building strong teams and achieving excellent results. Jon has served as President and CEO of The PowerTech Group, a security and compliance software company sold to Help/Systems in 2008, and Microserv Technology Services, a nationwide tech services company which was acquired by Halifax Corporation in 2003. Earlier he served as President and COO of Traveling Software, a leading developer of communications software in Seattle. Prior to his operating roles Jon held vice president roles in sales, marketing and business development for technology companies. Jon has taught in the software product management program at the University of Washington and holds a business administration degree from San Francisco State University.
  • 3. Agenda • Welcome • Jon Scott, SeniorVP – Corum Group • M&A in Security Sector • Aaron King,Analyst – Corum Group • MarketTrends • Jon Scott • Seller Discussion • Anirban Banerjee, Founder StopTheHacker (acquired by CloudFlare) • Q&A
  • 4. Jon Scott SeniorVice President Jon joined Corum in 2010 out of their Seattle headquarters. He has close to 30 years experience serving high technology companies with the last 20 mainly in chief operating and chief executive roles. During this time Jon has become known for his ability to successfully integrate strategies and tactics into well executed operating plans, building strong teams and achieving excellent results. Jon has served as President and CEO of The PowerTech Group, a security and compliance software company sold to Help/Systems in 2008, and Microserv Technology Services, a nationwide tech services company which was acquired by Halifax Corporation in 2003. Earlier he served as President and COO of Traveling Software, a leading developer of communications software in Seattle. Prior to his operating roles Jon held vice president roles in sales, marketing and business development for technology companies. Jon has taught in the software product management program at the University of Washington and holds a business administration degree from San Francisco State University.
  • 5. Aaron King Analyst Aaron joined Corum Group in 2015 as a research analyst. Previously he worked as a writer, editor, and consultant at a software startup. Aaron graduated from Reed College with a degree in Economics, specializing in Game Theory.
  • 6. 2.00 x 2.50 x 3.00 x 3.50 x 4.00 x 4.50 x 5.00 x 6.00 x 8.00 x 10.00 x 12.00 x 14.00 x 16.00 x 18.00 x EV/SEV/EBITDA May- 14 Jun- 14 Jul- 14 Aug- 14 Sep- 14 Oct- 14 Nov- 14 Dec- 14 Jan- 15 Feb- 15 Mar- 15 Apr- 15 May- 15 EV/EBITDA 14.20 14.61 15.50 16.48 16.10 16.22 16.96 17.03 15.71 15.84 16.08 16.16 14.63 EV/S 3.41 3.89 4.07 4.27 4.37 4.73 4.34 4.16 4.12 4.03 4.23 3.88 4.05 Infrastructure Market Valuations IT Services Management Network Management Storage & Hosting Endpoint Security Other Infrastructure Segments
  • 7. 2.00 3.00 4.00 5.00 6.00 7.00 8.00 6.00 8.00 10.00 12.00 14.00 16.00 18.00 EV/SEV/EBITDA May-14 Jun-14 Jul-14 Aug-14 Sep-14 Oct-14 Nov-14 Dec-14 Jan-15 Feb-15 Mar-15 Apr-15 May-15 EV/EBITDA 14.24 14.73 14.90 16.02 15.32 16.22 16.96 17.26 16.51 15.86 15.15 16.23 15.89 EV/S 5.64 6.01 5.30 5.36 5.83 6.55 6.82 6.28 6.16 6.58 6.85 6.95 7.03 Security Public Peer Valuations
  • 9. Sold to Target: BeeWare Acquirer: DenyAll Date Announced: May 2014 Transaction Value: Undisclosed —Web application security, payments, and payment card data for business
  • 11. Sold to Target: Sourcefire Acquirer: Cisco Date Announced: July 2013 Transaction Value: $2.7B —Intrusion detection / prevention SaaS, anti-malware software
  • 12. Sold to Target: Websense Acquirer: Raytheon Date Announced: Feb 2015 Transaction Value: $1.3B —Defense, aerospace, missile and intelligence systems for defense and government
  • 13. 4 5 3 Top Buyers by Deal Count (2012 – Present)
  • 14. Target: Blue Coat Acquirer: Bain Capital Date Announced: March 2015 Transaction Value: $2.4B —Enterprise cybersecurity, web traffic management, mobile security, and SaaS. Previously owned by Thoma Bravo. Sold to
  • 15. Encryption Growth in Exits by Segment (2013-2014) Penetration Testing Security Management Mobile Security Identity & Access Management Storage Security Anti-Malware Premises Network Security Transaction Security
  • 16. Sold to Target: Codenomicon Acquirer: Synopsys Date Announced: April 2015 Transaction Value: Undisclosed —Security and vulnerability testing software and SaaS, performance management. Sold to Target: Quotium Acquirer: Synopsys Date Announced: May 2015 Transaction Value: Undisclosed —Interactive application security testing (IAST)
  • 17. Encryption Growth in Exits by Segment (2013-2014) Penetration Testing Security Management Mobile Security Identity & Access Management Storage Security Anti-Malware Premises Network Security Transaction Security
  • 18. Sold to Target: Metafor Software Acquirer: Splunk Inc. Date Announced: June 2015 Transaction Value: Undisclosed —Cybersecurity anomaly detection and predictive analytics.
  • 19. Sold to Target: nsense Acquirer: F-Secure Date Announced: June 2015 Transaction Value: $16,481,000 —Cyber protection and vulnerability assessment for large institutions
  • 20. Geographic Breakdown Europe Asia / Pacific Africa and Middle East Latin America and Caribbean US and Canada 2013 2014 2015 YTD
  • 21. Sold to Target: IdMLogic Acquirer: CA Technologies Date Announced: June 2015 Transaction Value: $25M —Identity and Access Management (IAM) for businesses, and BYOD/mobile IAM solutions.
  • 22. Sold to Target: CyActive Acquirer: Paypal Inc. [eBay] Date Announced: March 2015 Transaction Value: $60M —Predictive malware detection and prevention cybersecurity for business
  • 23. Geographic Breakdown Europe Asia / Pacific Africa and Middle East Latin America and Caribbean US and Canada 2013 2014 2015 YTD
  • 24. Sold to Target: Vulnr Acquirer: ZeroFOX Date Announced: January 2015 Transaction Value: Undisclosed —Stealth-mode mobile vulnerability detection software
  • 25. Sold to Target: NumberCop Acquirer: WhitePages, Inc. Date Announced: June 2015 Transaction Value: Undisclosed —Anti-spam caller ID mobile app to identify and block spam, phishing, and other high-risk calls and text messages
  • 26. Jon Scott SeniorVice President Jon joined Corum in 2010 out of their Seattle headquarters. He has close to 30 years experience serving high technology companies with the last 20 mainly in chief operating and chief executive roles. During this time Jon has become known for his ability to successfully integrate strategies and tactics into well executed operating plans, building strong teams and achieving excellent results. Jon has served as President and CEO of The PowerTech Group, a security and compliance software company sold to Help/Systems in 2008, and Microserv Technology Services, a nationwide tech services company which was acquired by Halifax Corporation in 2003. Earlier he served as President and COO of Traveling Software, a leading developer of communications software in Seattle. Prior to his operating roles Jon held vice president roles in sales, marketing and business development for technology companies. Jon has taught in the software product management program at the University of Washington and holds a business administration degree from San Francisco State University.
  • 31. More Small andVery Focused Start-Ups
  • 32. Jon Scott SeniorVice President Jon joined Corum in 2010 out of their Seattle headquarters. He has close to 30 years experience serving high technology companies with the last 20 mainly in chief operating and chief executive roles. During this time Jon has become known for his ability to successfully integrate strategies and tactics into well executed operating plans, building strong teams and achieving excellent results. Jon has served as President and CEO of The PowerTech Group, a security and compliance software company sold to Help/Systems in 2008, and Microserv Technology Services, a nationwide tech services company which was acquired by Halifax Corporation in 2003. Earlier he served as President and COO of Traveling Software, a leading developer of communications software in Seattle. Prior to his operating roles Jon held vice president roles in sales, marketing and business development for technology companies. Jon has taught in the software product management program at the University of Washington and holds a business administration degree from San Francisco State University.
  • 33. Anirban Banerjee Dr. Anirban Banerjee is the lead Primary Investigator, the VP of Research and Development, and co-founder of StopTheHacker Inc. He graduated with his Ph.D. in Computer Science, from the University of California at Riverside in 2008. Dr. Banerjee’s thesis research includes well over twenty published papers in the areas of internet security, measurements and web technology. Over the last few years, he has garnered great visibility and respect among the web security community, rapidly advancing as a recognized authority in the fight against underground cyber crime. Dr. Banerjee’s profound expertise in Artificial Intelligence and web security along with his exuberant passion for innovative product development, propel StopTheHacker into the much coveted position as one of the tech industry’s hottest new startups. Co-Founder, StopTheHacker
  • 34. Traits of a Successful Security Acquisition 1. Chasing a RealVulnerability 2. Developed an ExpandableArchitecture 3. Deep Subject Matter Expertise and Passion 4. Customer References 5. Began with an End in Mind
  • 35. Q&A We welcome your questions! • Use Q&A window on right side • Submit to queue at any time • Ask “all panelists” – see “ask” option above text-entry box
  • 36. Contact Us For further information or copies of today’s presentation: Visit www.wfs.com -or- Email jons@corumgroup.com 36

Editor's Notes

  1. Valuations in the overall infrastructure market have dipped a little bit since late last year, but EBITDA multiples remain steady near 14 times overall with this May doing slightly better than last. Sales valuations are up from 3.5 to 4 times – not quite up to last year’s high of 4.7, but showing a definite increasing trend.
  2. Here in the security market, EBITDA multiples have increased from 14 times to an average of about 16 times over the past year, while sales multiples have slowly climbed from 5.5 to 7 times. Notice that the slowing of the overall infrastructure market has had relatively little effect on the Security market, which continues to show valuations well above average for the sector.
  3. After a heavy dip in early 2013, both deal count and disclosed deal values are once again on the rise; the low deal count and disclosed value at the end of 2014 reflects the peak in valuations at the time. Deal count this high indicates a lot of small-to-medium purchases…
  4. …good news for companies like Corum Client BeeWare, which was sold to French application security provider DenyAll in mid 2014.
  5. Turning now to top total spenders in the Security sector, we have four billion-plus spenders in the past three years. Cisco leads the pack with four acquisitions totaling just under 3 billion dollars…
  6. …including their 2.7 billion-dollar acquisition of intrusion detection SaaS company Sourcefire, strengthening their own network security and leveraging their existing market penetration to give Sourcefire a wider footprint.
  7. In the market’s most recent megadeal, Raytheon spends 1.3 billion to form a joint venture with Vista Equity Partners’ portfolio company Websense. The new company will combine Websense’s integrated security platform with Raytheon’s software products to protect commercial and government entities globally.
  8. Our top contributor to total deal count is Proofpoint, a security-as-a-service threat protection suite, snagging five anti-malware companies since 2012 for a total of about $100 million. Plenty of other acquirers hovered in the 3 to 4 range. Enterprise cybersecurity provider Blue Coat is of particular interest, acquiring three companies in a short time…
  9. …before being snapped up itself by Bain Capital for 2.4 billion in the fourth-largest deal the industry has ever seen. Bain is considering returning Blue Coat to the public markets now that it has had time to grow.
  10. Here we have relative growth in security deals, separated out by segment. Deal count is up significantly all across the sectors, with new technology in Penetration Testing beginning to take off in earnest – deal numbers increased 400% between 2013 and 2014.
  11. Synopsys has been particularly active in this field, enhancing its Coverity platform with two penetration testing adds in the past quarter alone – first Codenomicon in April, and then assets from Quotium in May.
  12. Growth is up significantly in other sectors overall, and even Premises Network Security, which had drop in deals during 2014, is bouncing back with more deals already this year than it had last year in total…
  13. …including Splunk, who acquired anomaly detection cybersecurity provider Metafor just a few days ago in the hopes of further evolving their M2M system…
  14. …and F-Secure, who shelled out 16 million plus earnout for Danish vulnerability assessment provider nSense to expand their incident response and forensic expertise.
  15. Geographical market shares have remained fairly consistent over the last few years, with Africa and the Middle East gaining a notable slice of the pie recently – particularly in Israel, which has seen a surge of activity…
  16. …most recently with CA Technologies’ acquisition of IdMlogic just this month. The 25-million-dollar buy is a clear strengthening of CA’s Identity and Access Management offerings.
  17. Also recently in Israel, eBay spent 60 million for predictive anti-malware developer CyActive through their subsidiary PayPal, hoping to head off in advance any threats to Paypal’s existing security platform.
  18. Note also that Latin America has slowly begun to emerge into the security market…
  19. …with ZeroFOX acquiring Chile’s stealth-mode security company Vulnr early this year. ZeroFOX will be incorporating Vulnr’s technologies and practices moving forward, hoping to strengthen its position as “the social risk management company”.
  20. Meanwhile, back here in Seattle, WhitePages just picked up anti-phishing mobile app NumberCop to enhance its Caller ID services.