Written By Patrick Kilgore And Presented By Charles Leaver Ziften CEO
A report was released called “Financiers pour billions into cyber security companies” by CEO of Cybersecurity Ventures, Steve Morgan. This is not guesswork. The previous year alone, venture backed cyber security organizations raised almost $2 billion dollars. With this increase of capital, you would be forgiven for believing that things have actually achieved their peak. However you would be incorrect …
At the midpoint of 2015, start ups in cyber security had actually already raised $1.2 billion in financing. There appears to be no end in sight when it comes to cyber security as Morgan says. Top firms like Allegis Capital have even raised funds (to the tune of $100M) to back cyber security development, exclusively.
The normal suspects are not there on the list of names. Morgan’s article specifies that the majority of the funding statements are for quick growing organizations like ours. Ziften remains in excellent company amongst innovators who are keeping pace with the demands of modern-day cyber security. While we lead the pack in constant endpoint visibility – others businesses have actually taken special approaches, such as using artificial intelligence to the battle against cyber attacks or simplifying essential lookups to bring public key encryption to the masses. They are all taking on a various pieces of the puzzle.
And it certainly is a puzzle. Because lots of solutions are extremely specialized, working together is going to be critical. The need for incorporating the different elements in the market for a sophisticated view of the issue set is clear. That’s why we developed Ziften Open Visibility ™ – to offer APIs, connectors, and alerts to integrate endpoint context and attribution data with existing financial investments.
Market Vision That Is 20/20
It may seem like market saturation to the layman however it is just the tip of the cyber security iceberg. Every day, cyber attacks become more advanced, discovering brand-new ways to devastate consumers and organizations. This list of endorsed organizations is a testament to the notion that legacy endpoint and network security is failing. The notion of prevention is a good one, however security experts now understand that a 2 pronged strategy is required that integrates detection and response.
You can have a 20/20 view of your security landscape, or you can keep your current blind spots. Which one do you think will help you to sleep during the night?