Written By Patrick Kilgore And Presented By Chuck Leaver Ziften CEO
A report was published called “Financiers pour billions into cyber security firms” by CEO of Cybersecurity Ventures, Steve Morgan. This is not guesswork. The previous year alone, venture backed cyber security companies raised practically $2 billion dollars. With this increase of capital, you would be forgiven for believing that things have achieved their peak. However you would be incorrect …
At the midpoint of 2015, start ups in cyber security had already raised $1.2 billion in funding. There appears to be no end in sight when it comes to cyber security as Morgan indicates. Top companies like Allegis Capital have actually even raised funds (to the tune of $100M) to back cyber security innovation, exclusively.
The typical suspects are not there on the list of names. Morgan’s post mentions that most of the financing statements are for fast growing companies like ours. Ziften remains in excellent company among innovators who are keeping up with the demands of modern-day cyber security. While we lead the pack in constant endpoint visibility – others companies have actually taken special approaches, such as applying artificial intelligence to the fight against cyber attacks or streamlining key lookups to bring public key encryption to the masses. They are all dealing with a different piece of the puzzle.
And it definitely is a puzzle. Since lots of solutions are extremely specialized, working together is going to be very important. The requirement for integrating the different components in the market for a sophisticated view of the issue set is clear. That’s why we developed Ziften Open Visibility ™ – to provide APIs, connectors, and indicators to integrate endpoint context and attribution data with existing investments.
Market Vision That Is 20/20
It might look like market saturation to the layperson however it is simply the tip of the cyber security iceberg. Every day, cyber attacks end up being more sophisticated, discovering new ways to devastate consumers and companies. This list of backed organizations is a testament to the concept that legacy endpoint and network security is failing. The notion of avoidance is a good one, but security specialists now understand that a 2 pronged strategy is needed that includes detection and response.
You can have a 20/20 view of your security landscape, or you can keep your current blind spots. Which one do you think will help you to sleep during the night?