Analytics

11/7/2018
09:00 AM
Jai Vijayan
Jai Vijayan
Slideshows
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

20 Cybersecurity Firms to Watch

A look at some of the more interesting investments, acquisitions, and strategic moves in the security sector over the past year.
Previous
1 of 21
Next

Image Source: Pixabay

Image Source: Pixabay

It's been another busy year in the cybersecurity business.

During the course of 2018, many established and new players in the security industry made strategic moves that revealed as much about their plans as it did about where the industry is heading.

The following is a list of organizations, arranged in alphabetical order, that garnered attention in the industry due to investments they made, companies they acquired, funding they attracted, or strategic directions they took.

Their moves paint a picture of an industry in transition. Small pure-play security vendors are quickly growing up and spreading out from their traditional niches. Big technology vendors – particularly those selling cloud services — have increasingly begun acquiring capabilities for securing customer workloads and applications on their software-, Internet- and platform-as-a-service environments. And investors seeking a slice of the still-lucrative cybersecurity pie — global market revenues are expected to top $124 billion in 2019, according to Gartner — continued to pour money into the industry.

Many firms featured on this list are relatively young but are not officially startups anymore; others are established players in the security sector with thousands of customers, hundreds of millions in revenues, and market valuations in the billions. There's also a handful of players that aren't traditional security vendors but made the cut because of the impact they are having on the industry. 

Here is our list of 20 security vendors to watch.

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Previous
1 of 21
Next
Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11515
PUBLISHED: 2019-04-25
core/classes/db_backup.php in Gila CMS 1.10.1 allows admin/db_backup?download= absolute path traversal to read arbitrary files.
CVE-2019-11511
PUBLISHED: 2019-04-25
Zoho ManageEngine ADSelfService Plus before build 5708 has XSS via the mobile app API.
CVE-2019-11513
PUBLISHED: 2019-04-25
The File Manager in CMS Made Simple through 2.2.10 has Reflected XSS via the "New name" field in a Rename action.
CVE-2019-11514
PUBLISHED: 2019-04-25
User/Command/ConfirmEmailHandler.php in Flarum before 0.1.0-beta.8 mishandles invalidation of user email tokens.
CVE-2019-11506
PUBLISHED: 2019-04-24
In GraphicsMagick from version 1.3.30 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WriteMATLABImage of coders/mat.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to Expo...