You are on page 1of 71

CYBER DEFENDERS

2017 cybersecurity trends to watch and high-momentum startups


with the potential to shape the future of digital resilience.
The technology market
intelligence platform.
CB Insights software lets you predict, discuss, and
communicate emerging technology trends using data
in ways that are beyond human cognition.

www.cbinsights.com 2
A FEW OF OUR HAPPY CUSTOMERS
The most publicly reference-able customers of anyone in the industry

Think of the fundamental value chain of venture


capital If we play the clock forward, the finding
and assessing of investments will be almost entirely
done by technology, not human beings. And the
company that is today positioned to be the market
leader in that evolution is CB Insights."
Pat Grady
Sequoia Capital, Partner

See what other customers have to say at http://www.cbinsights.com/customer-love www.cbinsights.com 3


ACCORDING TO CB INSIGHTS
From the NY Times to Bloomberg, CB Insights data is used by hundreds of
leading media outlets every week

CB INSIGHTS NEWS MENTIONS PER YEAR


1600

1200

490

211
62 16
9

2010 2011 2012 2013 2014 2015 2016(YTD)

www.cbinsights.com 4
ABOUT THE ANALYST
William Altman
Tech Industry Analyst, CB Insights
Focuses on cybersecurity and macro venture capital trends
Published research and data analysis has been featured in The New
York Times, CNN, Bloomberg, Financial Times, and The Wall Street
Journal
@AltmanW
Previously worked as an Associate in the Wamda Research Lab in
Amman, Jordan and Beirut, Lebanon
Graduate of Denison University 12 (B.S.), and MIIS 14 (M.A.)
waltman@cbinsights.com

www.cbinsights.com 5
TABLE OF CONTENTS
7 Cybersecurity funding trends 40 IoT Security
15 Cyber Defender categories 46 Mobile Security
16 2017 Cyber Defenders 50 Automobile Security
19 Quantum Encryption 55 Critical Infrastructure Security
23 Predictive Intelligence 60 Cyber Insurance
29 Deception Security 64 Appendix
33 Autonomous Systems 68 Methodology

www.cbinsights.com 6
The global cyber threat landscape is
large, complex, and varied
VCs are seizing the opportunity to fund the next
generation of cybersecurity startups

www.cbinsights.com 7
Cybersecurity is a phenomenal investment
area because companies need to fight back
against hackers that are already inside the
perimeter. Moreover, unlike most enterprise
software, continually enhanced solutions are
required because aggressors are always
changing their tactics.

Donald R. Dixon
Co-founder & Managing Director, Trident Capital Cybersecurity

www.cbinsights.com 8
Cybersecurity funding with VC participation:

$12.5 BILLION
across

1,222 DEALS
2012 - 2016

www.cbinsights.com 9
CYBERSECURITY ANNUAL VC FINANCING HISTORY
2012 - 2016 CONSISTENT ACTIVITY
279 278 IN CYBERSECURITY
273

Investors participated in
216
over 270 deals to VC-
backed cybersecurity
176
companies the last three
years running.

Funding dropped in 2016,


when the broader
venture capital industry
slowed down in terms of
$196
deals and dollars
(Full-Year Projection) deployed.
$1,316 $1,749 $2,647 $3,668 $3,074

2012 2013 2014 2015 2016


Disclosed Funding ($M) Deals

www.cbinsights.com 10
CYBERSECURITY VC INVESTMENT ACTIVITY BY STAGE
2012 - 2016 NEW SOLUTIONS ARE
STILL ON THE HORIZON
7% 9% 6% 8%
11%
9%
6% 8%
8% 5% The largest share of
3% 5%
6% 6%
1%
8%
deals to companies with
8% 9%
10%
4% VC backing in
17%
14% 16% 17% cybersecurity still goes to
11%
startups at the early
stages (Seed / Series A).
22% 29% 25%
26%
30%
Series A deals took a
larger share of the total
over the time period.
31% 34% 32% 33%
26%

2012 2013 2014 2015 2016

Seed / Angel Series A Series B Series C Series D Series E+ Other

www.cbinsights.com 11
PRIVATE LEADERS: CYBERSECURITY COMPANIES VALUED AT $1B+ EIGHT UNICORNS IN
2012 2017 YTD (3/27/2017) CYBERSECURITY
Tanium (USA) Select Investors: Executive Press, Nor-Cal Invest, Institutional Venture Partners, Andreessen Horowitz
Date reached $1B+ valuation: 3/31/2015
$3.5B
Okta (USA) Select Investors: Sequoia Capital, Khosla Ventures, Greylock Partners, Andreessen Horowitz Tanium, valued at $3.5B,
Date reached $1B+ valuation: 9/8/2015
$1.11B is the most valuable
CloudFlare (USA) Select Investors: Venrock, Union Square Ventures, Pelion Venture Partners, New Enterprise Associates
Date reached $1B+ valuation: 12/1/2012
private cybersecurity
$1B
company in the world.
Illumio (USA) Select Investors: Data Collective, General Catalyst Partners, Andreessen Horowitz, Accel Partners
Date reached $1B+ valuation: 4/14/2014
$1B
Okta filed for IPO on
AVAST Software (CZ) Select Investors: Summit Partners (Growth Equity), CVC Capital Partners (Private Equity)
Date reached $1B+ valuation: 2/5/2014
3/13/2017.
$1B
Lookout (USA) Select Investors: Lowercase Capital, Greylock Partners, Khosla Ventures, Andreessen Horowitz, Accel Partners
Date reached $1B+ valuation: 8/13/2014
AVAST, located in the
$1B
Czech Republic, is the
Cylance (USA)
$1B
Select Investors: Ten Eleven Ventures, Khosla Ventures, Fairhaven Capital, DFJ Growth Fund
Date reached $1B+ valuation: 6/8/2016 only non-US unicorn.
Zscaler (USA)
$1B
Select Investors: capitalG, EMC Ventures, Lightspeed Venture Partners
Date reached $1B+ valuation: 8/3/2015 Cylance is the only new
cybersecurity unicorn to
emerge in 2016.

www.cbinsights.com 12
CYBERSECURITY + AI / ML ON THE RISE AI + CYBERSECURITY
UP AND TO THE RIGHT

With applications across


cybersecurity and the
potential to help address
industry-wide challenges;
AI is currently enjoying a
wave of attention as a
paradigm shift in
cybersecurity.

CB Insights Trends mines a massive


corpus of media articles to enable a
data-driven, real-time method to
discover, predict, and plot the arc of
rising expectations and excitement.

CB Insights Trends www.cbinsights.com 13


What makes
a Cyber Defender?
sabr dfndr

Our selected startups are early- to mid-stage high-


momentum companies pioneering technology with the
potential to transform cybersecurity.

Unicorns valued at $1B+, companies that have raised


funding past the Series C stage, and companies that
have not raised funding since 2016 were excluded.

www.cbinsights.com 14
THIS YEARS CYBER DEFENDER CATEGORIES
Quantum Encryption Predictive Intelligence Deception Security
the future of secure digital tools to identify threats early startups turning the tables
communications and help prevent attacks by deceiving attackers

Autonomous Systems IoT Security Mobile Security


software that automatically startups securing internet securing smartphones and the
executes security protocols connected devices mobile-workforce

Automobile Security Critical Infrastructure Security Cyber Insurance


startups developing cybersecurity for industrial tools for quantifying cyber-
security for connected cars control systems risk and sizing premiums

www.cbinsights.com 15
2017 CYBER DEFENDERS
Quantum Encryption Predictive Intelligence Deception Security

Autonomous Systems IoT Security Mobile Security

Automobile Security Critical Infrastructure Security Cyber Insurance

www.cbinsights.com 16
THE US HAS THE MOST
CYBER DEFENDERS

70% of the Cyber


Defenders are located in
the US, mostly in
California and
Massachusetts.

The next highest


concentration of Cyber
Defenders are in Israel,
followed by Switzerland,
the UK, Australia, and
Japan.

www.cbinsights.com 17
www.cbinsights.com 18
Quantum Encryption
The science of exploiting quantum mechanics for
cryptography. The best known type of quantum
encryption is quantum key distribution (QKD). QKD
uses quantum mechanics to secure communications
by enabling two parties to produce a shared random
secret key known only to them, which can then be
used to encrypt and decrypt messages.

Experts claim quantum cryptography is more secure


than any encryption technique used today, and will be
important when computers become more powerful.

www.cbinsights.com 19
QUINTESSENTIAL SECRECY

Description: QuintessenceLabs is developing a


commercially available quantum key distribution (QKD)
product. qOptica, the companys second generation QKD
uses quantum physics to provide a secure key exchange for
encrypting digital communications.
Total Funding: $1.1M
Select Investors: Westpac Group, Department of
Defense Australia

Image: QuintessenceLabs www.cbinsights.com 20


QUANTUM SAFE CRYPTO

Description: ID Quantique (IDQ) provides multi-protocol


network encryption solutions based on conventional and
quantum technologies. The companys Cerberis QKD server
enables a key exchange that in theory can thwart attacks
from quantum computers that could render non-quantum
forms of encryption obsolete.
Total Funding: $9.6M
Select Investors: SK Telecom, Qwave

Image: QuintessenceLabs www.cbinsights.com 21


FUTURE PROOF

Description: Post-Quantum offers quorum technology,


biometric authentication, and algorithmically encrypted
messaging to protect enterprises' data and communications
systems from advanced forms of codebreaking by both
quantum and supercomputers.
Total Funding: $10.4M
Select Investors: AM Partners, VMS Investment Group,
Barclays Accelerator

Image: Post-Quantum www.cbinsights.com 22


Predictive Intelligence
These startups offer products that are capable of
parsing various data feeds about cyber activity in-the-
wild as well as behavioral data inside an organizations
network and come up with actionable information to
help analysts thwart impending attacks.

www.cbinsights.com 23
Are we going to be able to
predict every attack? No. Are
we going to be better about
predicting trends and threats
so that were ahead of the
game? Yes.
Terry Halvorsen
Chief Information Officer, U.S. Department of Defense

Quote: MeriTalk www.cbinsights.com 24


DEEP DARK INTEL

Description: 4iQ integrates internal and external


intelligence sources like the visible web, social media,
and Deep and Dark web intelligence to help
organizations anticipate cyber-threats.

Total Funding: $14M


Select Investors: Trident Capital Cybersecurity,
Telefonica Ventures, Benhamou Global Ventures,
Adara Venture Partners

Image: 4iQ www.cbinsights.com 25


HOLDN DOWN THE FORT

Description: Fortscale Security provides organizations


with a platform combining predictive, big data
analytics and machine learning to give real-time
visibility into the actions of users and entities across
systems and networks and uncovers insider threats
by identifying unusual behaviors that pose a risk.
Total Funding: $23M
Select Investors: Intel Capital, UST Global, CME
Ventures, Swarth Group, Blumberg Capital

Image: Fortscale Security www.cbinsights.com 26


EARLIER DETECTION

Description: Anomali correlates threat indicators, real time


network activity logs, and forensic log data to detect and
identify attackers in an organization's network.
Total Funding: $56M

Select Investors: Google Ventures,


General Catalyst Partners, In-Q-Tel

Image: Anomali www.cbinsights.com 27


BEYOND PREVENTION

Description: SentinelOne offers a predictive execution


inspection engine that combines attack pattern and
malware technique modeling with crowd-sourced
security intelligence. The company uses predictive
execution modeling to detect and protect devices
against targeted, zero day threats in real time.
Total Funding: $109.5M
Select Investors: Data Collective, Redpoint Ventures,
Westly Group, ITOCHU Technology Ventures, Sound
Ventures

Image: SentinelOne www.cbinsights.com 28


Deception Security
Startups offering cybersecurity systems that deploy
decoy-assets in a network as bait for attackers, to
identify, track, and disrupt security threats such as
advanced automated malware attacks before they do
damage.

.
www.cbinsights.com 29
DECEPTIVE STRATEGY

Description: Acalvio Technologies provides advanced


threat defense solutions to detect, engage, and
respond to malicious activity inside the security
perimeter. The solutions are anchored on patented
innovations in deception security and data science.
Total Funding: Undisclosed
Select Investors: Google Ventures, Splunk, Accel
Partners, Ignition Partners, Eileses Capital
N/N/A
N/A
A

Image: Acalvio Technologies www.cbinsights.com 30


ITS A TRAP!

Description: The TrapX 360 platform captures


malware in its virtualized sensor network of
honeypots and traps, before the malware can
inflict damage.
Total Funding: $19M
Select Investors: Opus Capital, Intel Capital,
BRM Group, Liberty Media Corporation,
Strategic Cyber Ventures

Image: TrapX www.cbinsights.com 31


THE ART OF DECEPTION

Description: illusive networks provides solutions that


combat Advanced Persistent Threats (APT) by
exploiting the weakest link of any cyber attack: the
human team behind it. The company offers a platform
that deceives attackers by planting false information
about a network's resources to flag and stop threats.
Total Funding: $30M

Select Investors: New Enterprise Associates, Bessemer


Venture Partners, Microsoft Ventures

Image source: illusive networks www.cbinsights.com 32


Autonomous Systems
Software that utilizes advanced algorithms to
efficiently and instantaneously respond to security
threats, either free-of or in-tandem with human
analysts.

www.cbinsights.com 33
"You can't say that you are
going to replace your analysts.
What ends up happening is that
you put your analysts to better
use. It saves you from getting
additional people.
Golan Ben-Oni
CIO at IDT Corporation

Quote: TechTarget www.cbinsights.com 34


SIFT THE SIGNALS

Description: Sift Science offers machine learning


software that automatically learns the signals of a
threat and detects fraudulent behavioral patterns,
alerting businesses before they or their customers are
defrauded.
Total Funding: $53.5M
Select Investors: First Round Capital, Union Square
Ventures, Spark Capital

Image: Sift Science www.cbinsights.com 35


SOMETHINGS PHISHY
Description: PhishMe is a provider of threat
management for organizations concerned about
spear phishing, malware, and drive-by threats.
PhishMe Triage is a phishing-specific incident
response platform that allows analysts to automate
the prioritization, analysis, and response to phishing
threats.

Total Funding: $58M


Select Investors: Bessemer Venture Partners, Paladin
Capital Group, Aldrich Capital Partners

Image: PhishMe www.cbinsights.com 36


SEE EVERYTHING

Description: ProtectWise provides network security


with its Cloud Network DVR, a virtual camera in the
cloud that records everything on the network. The
companys cloud based software can detect threats in
real time and automatically replay stored data to
discover previously unknown threats.
Total Funding: $62.1M
Select Investors: Trinity Ventures, Crosslink Capital,
Arsenal Venture Partners

Image: Protectwise www.cbinsights.com 37


BEAMING DATA
Description: Exabeam's user behavior analytics
solution leverages existing log data to quickly detect
advanced attacks, prioritize incidents, and guide
effective responses.
Total Funding: $65M
Select Investors: Norwest Venture Partners, Icon
Ventures, Aspect Ventures

Image: Exabeam www.cbinsights.com 38


ENTERPRISE IMMUNITY
Description: Darktrace is a provider in intelligence-led
Behavioral Cyber Defense that uses advanced
mathematics to automatically detect abnormal
behavior in organizations in order to manage risks
from cyber-attacks across all network types, from
physical, virtualized, and cloud, through to IoT and
industrial control systems.

Total Funding: $107.3M


Select Investors: Invoke Capital, Talis Capital, Summit
Partners, SoftBank Group, Samsung Ventures

Image(s): EC Wise & Darktrace www.cbinsights.com 39


IoT Security
Startups that offer products and services to
authenticate IoT devices and encrypt data transmitted
throughout IoT systems and industrial internet
networks.

www.cbinsights.com 40
We are in a massive paradigm shift from
an IT perspective, we are connecting our
physical lives and our bodies to digital
tools, and it changes the way we have to
think about managing security. As we
bring more devices online, we are seeing
the number of attacks on these devices
go up proportionally.

Chris Young
General Manager of the Intel Security Group

Quote: CBR www.cbinsights.com 41


WATCH IT
Description: BIOWATCH offers a wearable biometric
recognition system for secure authentication, mobile
payment protection, and smart device interaction. It
uses the unique pattern of the user's wrist-veins to
provide a secure bio-authenticator for unlocking a
device or machine, accessing a secure internet
gateway, and more.
Total Funding: $2.13M
Select Investors: MassChallenge, SICPA, AGIRE,
Foundation for Technological Innovation

Image: BIOWATCH www.cbinsights.com 42


IDENTIFY YOURSELF
Description: Rubicon Labs develops symmetric
cryptography, digital fingerprints, and a cloud based
identity service for securing the IoT, and more.
Total Funding: $18.4M

Select Investors: Pelion Venture Partners, Akamai


Technologies, Third Point

Image: Rubicon www.cbinsights.com 43


AUTHENTICATE ACCORDINGLY
Description: Auth0 offers a platform for authentication and
authorization to implement identity solutions for IoT devices,
and more.
Total Funding: $24.2M
Select Investors: Bessemer Venture Partners, K9 Ventures,
Portland Seed Fund, Silicon Valley Bank, Trinity Ventures

Image: Auth0 www.cbinsights.com 44


IOT + CYBERSECURITY RISING IN THE PRESS IOT + CYBERSECURITY
TICKING UP AND TO
THE RIGHT

With applications in a
wide array of industries,
as well as a series of
high-profile attacks,
securing the IoT is
currently enjoying a wave
of attention.

CB Insights Trends mines a massive


corpus of media articles to enable a
data-driven, real-time method to
discover, predict, and plot the arc of
rising expectations and excitement.

CB Insights Trends www.cbinsights.com 45


Mobile Security
These startups help ensure the privacy, reliability, and
accessibility of the information that a mobile device
accesses, stores, and processes.

www.cbinsights.com 46
RESPECT MY AUTHORITY
Description: Appthority provides a cloud-based
platform that identifies and grades risky behavior in
mobile apps including known and unknown malware,
corporate data exfiltration, and intellectual property
exposure. The companys mobile security solutions
are built for the needs of enterprise security and
mobility teams.
Total Funding: $23.3M
Select Investors: Venrock, US Venture Partners, Trident
Capital Cybersecurity, Blue Coat Systems

Image: Appthority www.cbinsights.com 47


CONTINUOUSLY (MIS)BEHAVING
Description: Zimperium uses behavior-based analytics
that continuously protect mobile devices against Wi-Fi,
cellular, and host-based threats. Much like a doctor
can diagnose an illness by analyzing the symptoms
your body is exhibiting, zIPS can detect both known
and unknown threats by analyzing the behavior of your
mobile device.
Total Funding: $60.3M
Select Investors: Telstra Ventures, Sierra Ventures,
Samsung Ventures, SoftBank Group, TOYO

Image: Zimperium www.cbinsights.com 48


IS THIS A SECURE LINE?

Description: Skycures risk-based mobile security


approach is designed from the ground up to defend
against all threats that put business data at risk of
exposure, theft, and manipulation. Skycure's
technology leverages massive crowd knowledge to
proactively identify threats and secure mobile devices.
Total Funding: $27.5M
Select Investors: Pitango Venture Capital, New York
Life Insurance Company, Shasta Ventures, Foundation
Capital

Image: Skycure www.cbinsights.com 49


Automotive Security
These startups aim to protect autonomous and
connected vehicles from malicious cyber attacks.

www.cbinsights.com 50
We are obviously securing our
ecosystemand securing is a relative
word as theres no absolute security
and employing layers of defensive
measures in our vehicles and
services. Its a defensive posture and
the ability to not only detect and
monitor but to respond.
Jeff Massimilla
Chief Product Cybersecurity Officer at General Motors

Quote: Fast Company www.cbinsights.com 51


PROTECT MY RIDE
Description: Trillium protects mission critical
automotive and IoT networks from malicious cyber
attack including intrusive manipulation and passive
monitoring or eavesdropping.
Total Funding: Undisclosed
Select Investors: Global Brain Corporation, DBJ Capital,
Mizuho Capital

Undisclosed

Image: Trillium www.cbinsights.com 52


ENTRY DENIED

Description: Karamba Security protects a car's


externally connected components, identifying attack
attempts and blocking exploits from infiltrating the
car's network.

Total Funding: $5M


Select Investors: YL Ventures, GlenRock Israel,
Fontinalis Partners

Image: Karamba Security www.cbinsights.com 53


PROTECTED, CONNECTED
Description: Argus Cyber Security protects private and
commercial vehicles, fleets, connectivity platforms
and dealerships from cyber attacks.
Total Funding: $30M

Select Investors: Vertex Venture Capital, Magma


Venture Partners, Allianz Ventures, SBI Group, Startup
Autobahn

Image: Argus Cyber Security www.cbinsights.com 54


Critical Infrastructure Security
Startups offering cybersecurity for critical
infrastructure networks, especially industrial control
systems (ICS) for which disruption could cause a
debilitating impact on economic security, public health,
or safety.

www.cbinsights.com 55
One attack on a single point of failure
could lead to the disruption or destruction
of multiple vital systems in the country
directly affected, and a ripple effect
worldwide. This creates an appealing
target to those intending to harm us. And
as our cities and infrastructure evolve, so
do their weapons.

Jrgen Stock
Secretary-General of the International Criminal Police
Organization (ICPO-INTERPOL)

Quote: UN News Centre www.cbinsights.com 56


NETWORK MODELED
Description: Nozomi Networks builds models of
industrial networks and uses behavioral analytics and
continuous monitoring to detect changes to baseline
states. The result is real-time insight into ICS
networks, devices and process status, and the ability
to rapidly identify and remediate cyberattacks and
process anomalies.
Total Funding: $7.5M
Select Investors: Planven Investments, Lux Capital,
GGV Capital

Image: Nozomi Networks www.cbinsights.com 57


SYSTEM UNDERSTOOD
Description: CyberX can detect abnormal behavior on
an industrial internet network by analyzing the
operational behavior of the network using machine
learning technology, and combine that network
understanding with proprietary ICS threat intelligence
to detect and mitigate risks from cyber attacks.
Total Funding: $11M

Select Investors: UpWest Labs, Swarth Group, Glilot


Capital Partners, GlenRock Israel, Flint Capital, ff
Venture Capital

Image: CyberX www.cbinsights.com 58


CRITICAL AWARENESS
Description: Indegy provides real-time situational
awareness, visibility and security for ICS used across
critical infrastructure.
Total Funding: $18M
Select Investors: Aspect Ventures, Magma Venture
Partners, SBI Group, Vertex Ventures

Image: Indegy www.cbinsights.com 59


Cyber Insurance
Startups offering products and services for insurance
companies to better quantify cyber risk and negotiate
premiums.

www.cbinsights.com 60
CYBER INSURANCE IN THE MEDIA IN 2017:
PUBLIC SECTOR BANKS RUSH TO GET CYBER
INSURANCE POLICIES

3/13/2017

UK TERRORISM REINSURANCE FUND HOPES


TO INCLUDE CYBER - CEO
3/10/2017

www.cbinsights.com 61
EN GARDE!
Description: UpGuard offers CSTAR, a cybersecurity
preparedness score for enterprises. The score allows
businesses to understand the risk of breaches and
unplanned outages. It also offers insurance carriers a
new standard by which to effectively assess client risk
and compliance profiles.
Total Funding: $27.4M
Select Investors: Valar Ventures, Square Peg Capital,
Insurance Australia Group, 500 Startups

Image: UpGuard www.cbinsights.com 62


RISKY SCIENCE
Description: Cyence empowers the insurance industry
to understand the impact of cyber risk in the context
of dollars and probabilities.
Total Funding: $40M

Select Investors: Institutional Venture Partners, New


Enterprise Associates

Image: Cyence www.cbinsights.com 63


BIT BY BIT
Description: BitSight Technologies offers cyber
security ratings to help organizations manage third
party risk, benchmark performance, and negotiate
cyber insurance premiums.
Total Funding: $87M
Select Investors: Comcast Ventures, Flybridge Capital
Partners, GGV Capital, Globespan Capital Partners,
Liberty Global Ventures, SingTel Innov8

Image: BitSight Technologies www.cbinsights.com 64


Cyber Defenders Appendix
Additional data on the selected companies.

www.cbinsights.com 65
CYBER DEFENDERS MOST WELL-FUNDED COMPANIES SILENT CIRCLE ON TOP
2012 2017 YTD (3/20/2017)
Rank Company Disclosed Cyber Defender Category
Funding
($M)
SentinelOne and
1 SentinelOne $109.5 Predictive Intelligence Darktrace are the only
2 Darktrace $107.3 Autonomous Systems Cyber Defenders to raise
over $100M.
3 BitSight Technologies $87 Cyber Insurance

4 Exabeam $65 Autonomous Systems Of the 10 most-well


5 ProtectWise $62.11 Autonomous Systems
funded Cyber Defenders,
half are in Autonomous
6 Zimperium $60.25 Mobile Security
Systems.
7 PhishMe $58 Autonomous Systems

8 Anomali $56 Predictive Intelligence

9 Sift Science $53.5 Autonomous Systems

10 Cyence $40 Cyber Insurance

www.cbinsights.com 66
CYBER DEFENDERS MOST ACTIVE VC INVESTORS BESSEMER VENTURE
Measured by number of deals 2012 2017 YTD (3/27/2017) PARTNERS ON TOP
Rank Investor Investments In Cyber Defenders
1 Bessemer Venture
Bessemer Venture Partners Auth0 (Seed, A, B), illusive networks (B, B-II), PhishMe (C)
Partners is the only VC to
2 participate in more than
Google Ventures Anomali (A,B,C), Acalvio Technologies (B)
five deals to Cyber
2 Accel Partners SentinelOne (seed, A), Acalvio Technologies (A, B)
Defenders since 2012.

2 No VCs outside of the


Aspect Ventures Exabeam (A, B, C), Indegy (A)
seven listed participated
2 in more than four deals
Data Collective SentinelOne (seed, A, B, C)
to Cyber Defenders since
2 Magma Venture Partners Argus Cyber Security (A, B), Indegy (seed, A)
2012.

2 Trinity Ventures ProtectWise (seed, A, B), Auth0 (B)

www.cbinsights.com 67
MOSAIC MONEY SCORE COMPARISON CYBER DEFENDERS ARE
Cyber Defenders vs. All Cybersecurity Companies HIGH-MOSAIC
COMPANIES

CB Insights data-driven
Mosaic Money metric
assesses financial
signals including recency
of funding and total
raised, etc. And scores
901 companies on a scale of
0-1000.
566

Cyber Defenders Average All Cybersecurity Average

CB Insights Mosaic www.cbinsights.com 68


Methodology

How the 9 categories were selected: To identify our categories, we used CB Insights Trends
tool, which mines and organizes million of media articles to quantify media attention to tech
trends.

How the 30 companies were selected: We used CB Insights Company Mosaic, which uses
data to track private company health, using signals including recency of financing, total raised,
and investor quality. Weve gathered this data via our machine learning technology (dubbed
The Cruncher) as well as via several thousand direct submissions from firms and individual
professionals using The Editor.

The CB Insights Mosaic page walks through the factors considered in the algorithm in some
detail.

CB Insights Mosaic www.cbinsights.com 69


Where is all this data from?
The CB Insights platform has the details on all the
companies, investors, and deals included in this report.

CLICK HERE TO SIGN UP FOR FREE

www.cbinsights.com 70
CBINSIGHTS.COM
@ cbinsights

+1(212)292-3148

You might also like