"The history of the IT security industry is one of necessitated evolution: A new threat arises, IT responds. Driven by mobile, cloud, and remote-work megashifts, the new IT security model breaks this reactive cycle. The new IT security is adaptive, agile, cloud-based, and built on Zero Trust principles: Limit the opportunity for attack and minimize the potential for damage...because you can't steal what you can't see. Richard Stiennon has chronicled this revolution in Security Yearbook 2024. It is vital reading for enterprise IT leaders looking to establish the best-in-world IT security…mehr
"The history of the IT security industry is one of necessitated evolution: A new threat arises, IT responds. Driven by mobile, cloud, and remote-work megashifts, the new IT security model breaks this reactive cycle. The new IT security is adaptive, agile, cloud-based, and built on Zero Trust principles: Limit the opportunity for attack and minimize the potential for damage...because you can't steal what you can't see. Richard Stiennon has chronicled this revolution in Security Yearbook 2024. It is vital reading for enterprise IT leaders looking to establish the best-in-world IT security capabilities of the future." --Jay Chaudhry, CEO and founder of Zscaler "Our future depends on the strength of our cyber infrastructure. Stiennon's experience and contribution to this industry makes him the best person to tell its story and his voice is the best one to help guide us into the future." --Gil Shwed, CEO and founder of Check Point Software Cybersecurity is not just an industry, but a community of dedicated guardians of the digital world. Our common purpose and shared mission have created a vibrant culture, storied history, and boundless future, marked by noteworthy events and distinguished by remarkable individuals, fascinating companies, and captivating stories. Through his yearbook series, Richard Stiennon masterfully weaves together valuable industry research and sentimental reflection to encapsulate all that defines us, in a style that only he can deliver." --Kevin Magee, CSO of Microsoft Canada Security Yearbook 2024 is the fifth edition in an annual series. It is the story of the people, companies, and events that comprise the history of the IT security industry. In this edition you will discover the early history of Symantec, Network Associates, Borderware, Check Point Software, Netwitness, Tenable, Sourcefire, Quick Heal, Trend Micro and dozens of other companies that contributed to the growth of an industry that is comprised of 3,700+ vendors of security products. The Directory has been updated to reflect the change in headcount at each vendor during 2023.
About the Author RICHARD STIENNON played his own part in the IT security industry starting in 1995 at Netrex, one of the first MSSPs. He was a Manager of Technical Risk Services at PwC before being drafted into Gartner in 2000 to cover the network security industry. He left Gartner in 2004 to join Webroot Software as VP of Threat Research. He has also had roles as Chief Marketing Officer at Fortinet, and Chief Strategy Officer at data erasure company, Blancco Technology Group. He is an aerospace engineer (University of Michigan, 1982) turned historian (King's College, London, 2014). He is Chief Research Analyst at IT-Harvest, a data-driven analyst firm covering the entire cybersecurity industry.
Inhaltsangabe
Acknowledgments xi 1 2023 in Review 1 The AI Tsunami 1 Silicon Valley Bank Failure 1 2023 Funding 2 Mergers and Acquisitions in 2023 2 Public Cybersecurity Companies 2 The New Guy 3 Updates to the Directory 3 Vendor/Product Selection 3 Investment Thesis Validation 3 Industry Analysis 3 Strategic Evaluation 3 Marketing 3 OEM Relationship Development 3 2 Introduction 5 3 Getting to Know the IT Security Industry 9 Main Categories 10 Network Security 10 Data Security 11 Identity and Access Management 11 Grc 12 Endpoint Security 12 Other Categories 12 Security Operations 12 IoT Security 12 Managed Security Service Providers 13 Application Security 13 API Security 13 Security Analytics 13 Fraud Prevention 14 Threat Intelligence 14 Types of Threat Intelligence Vendors 15 Deep and Dark Web Defined 16 XI Email Security 16 Training 16 Deception 17 Security Testing 17 Summary 18 4 A Brief History of the IT Security Industry 21 Missed Opportunity 22 Acquisition Replaces R&D in the Security Space 22 Digital Mercantilism 24 5 The History of Network Security 27 The Rise of Intrusion Prevention 28 Internet Security Systems 29 Sourcefire 29 Multifunction to UTM to Next- Gen Firewall 30 Local Internet Breakouts 31 Palo Alto Networks 31 The Other UTM Vendors 32 From Hardware Sales to Subscription Model 33 Mobile Devices Side- Step Firewall Controls 34 The Zscaler Story 34 Story: Chris Blask 36 Story: Gil Shwed 38 Story: Guy Guzner 44 NetGuard: My First Cybersecurity Startup 45 Life at Check Point 45 Browser Isolation and FireGlass 46 Acquisition by Symantec 47 Becoming Savvy 47 Conclusion 49 Story: Martin Roesch 49 Snort Catches Fire 49 Hacking a Business Model 50 Sourcefire Heats Up 51 Capping the Sourcefire Journey 52 Back to Startup Life 53 6 DDoS Defense 55 Cloud Proxies 55 Prolexic 56 7 Endpoint Protection from AV to EDR 59 Symantec 59 Network Associates 62 Trend Micro 64 Kaspersky Lab 64 Endpoint Detection and Response 65 Story: Eva Chen and Trend Micro 65 The Early Years 65 Never Stop Innovating 66 Culture Is Everything 67 Above and Beyond 67 Story: Kailash Katkar: Quick Heal: Building a Successful Global Cybersecurity Company Out of India 68 The Genesis 68 Quick Heal Was Born 70 Quick Heal, the Most Popular Antivirus in Pune, India 71 Becoming the Largest- Selling Cybersecurity Brand in India 71 Repairing Computers to Securing Computers: Cat Computer Services to Quick Heal Technologies 72 From the Leading Consumer Cybersecurity Brand to Full- Scale Enterprise Security Solutions Provider 72 Going Public 73 Coronavirus Pandemic: The World Quarantines Itself 73 Gearing Up for the Future 74 8 Identity and Access Management 75 It All Began with RACF 75 Story: Barry Schrager 76 Story: Venkat Raghavan 78 9 Data Security 81 Digital Certificates 82 Other Data Security Categories 83 Story: David Cowan 84 Story: Sandra Toms 90 Story: Deborah Taylor Moore 92 10 Governance, Risk, and Compliance 95 Risk Management 95 Frameworks 98 Other GRC Solutions 98 Story: Renaud Deraison 98 11 Managed Security Services 103 Story: Amit Yoran 104 Riptech 104 Symantec 107 Department of Homeland Security 107 NetWitness 109 Tenable 111 12 Open- Source Security 113 Snort 113 Nmap 113 Kali Linux 114 Nessus 114 Metasploit 114 Osquery 114 eBPF 115 Ruff 115 The Top 100 Open- Source Security Projects 115 13 Failures 121 2020 Failures 122 2021 Failures 122 2022 Failures 123 2023 Failures 123 14 In Memoriam 125 Zohar Zisapel 125 Kevin Mitnick 125 Vittorio Luigi Bertocci 126 Steve Katz 126 French Caldwell 127 15 2023 Mergers and Acquisitions 129 First Quarter M&A 129 Second Quarter M&A 129 Third Quarter M&A 130 Fourth Quarter M&A 130 Year Summary 130 16 2023 Funding 143 17 Significant Cyber Incidents in 2023 157 January 2023 158 February 2023 159 March 2023 160 April 2023 160 May 2023 162 June 2023 162 July 2023 163 August 2023 164 September 2023 165 October 2023 167 November 2023 167 December 2023 168 18 Research Methodology 169 What Is a Security Vendor? 169 How to Find Vendors? 169 19 Directory A-Z 173 20 Directory by Country 257 21 Directory by Category 345
Acknowledgments xi 1 2023 in Review 1 The AI Tsunami 1 Silicon Valley Bank Failure 1 2023 Funding 2 Mergers and Acquisitions in 2023 2 Public Cybersecurity Companies 2 The New Guy 3 Updates to the Directory 3 Vendor/Product Selection 3 Investment Thesis Validation 3 Industry Analysis 3 Strategic Evaluation 3 Marketing 3 OEM Relationship Development 3 2 Introduction 5 3 Getting to Know the IT Security Industry 9 Main Categories 10 Network Security 10 Data Security 11 Identity and Access Management 11 Grc 12 Endpoint Security 12 Other Categories 12 Security Operations 12 IoT Security 12 Managed Security Service Providers 13 Application Security 13 API Security 13 Security Analytics 13 Fraud Prevention 14 Threat Intelligence 14 Types of Threat Intelligence Vendors 15 Deep and Dark Web Defined 16 XI Email Security 16 Training 16 Deception 17 Security Testing 17 Summary 18 4 A Brief History of the IT Security Industry 21 Missed Opportunity 22 Acquisition Replaces R&D in the Security Space 22 Digital Mercantilism 24 5 The History of Network Security 27 The Rise of Intrusion Prevention 28 Internet Security Systems 29 Sourcefire 29 Multifunction to UTM to Next- Gen Firewall 30 Local Internet Breakouts 31 Palo Alto Networks 31 The Other UTM Vendors 32 From Hardware Sales to Subscription Model 33 Mobile Devices Side- Step Firewall Controls 34 The Zscaler Story 34 Story: Chris Blask 36 Story: Gil Shwed 38 Story: Guy Guzner 44 NetGuard: My First Cybersecurity Startup 45 Life at Check Point 45 Browser Isolation and FireGlass 46 Acquisition by Symantec 47 Becoming Savvy 47 Conclusion 49 Story: Martin Roesch 49 Snort Catches Fire 49 Hacking a Business Model 50 Sourcefire Heats Up 51 Capping the Sourcefire Journey 52 Back to Startup Life 53 6 DDoS Defense 55 Cloud Proxies 55 Prolexic 56 7 Endpoint Protection from AV to EDR 59 Symantec 59 Network Associates 62 Trend Micro 64 Kaspersky Lab 64 Endpoint Detection and Response 65 Story: Eva Chen and Trend Micro 65 The Early Years 65 Never Stop Innovating 66 Culture Is Everything 67 Above and Beyond 67 Story: Kailash Katkar: Quick Heal: Building a Successful Global Cybersecurity Company Out of India 68 The Genesis 68 Quick Heal Was Born 70 Quick Heal, the Most Popular Antivirus in Pune, India 71 Becoming the Largest- Selling Cybersecurity Brand in India 71 Repairing Computers to Securing Computers: Cat Computer Services to Quick Heal Technologies 72 From the Leading Consumer Cybersecurity Brand to Full- Scale Enterprise Security Solutions Provider 72 Going Public 73 Coronavirus Pandemic: The World Quarantines Itself 73 Gearing Up for the Future 74 8 Identity and Access Management 75 It All Began with RACF 75 Story: Barry Schrager 76 Story: Venkat Raghavan 78 9 Data Security 81 Digital Certificates 82 Other Data Security Categories 83 Story: David Cowan 84 Story: Sandra Toms 90 Story: Deborah Taylor Moore 92 10 Governance, Risk, and Compliance 95 Risk Management 95 Frameworks 98 Other GRC Solutions 98 Story: Renaud Deraison 98 11 Managed Security Services 103 Story: Amit Yoran 104 Riptech 104 Symantec 107 Department of Homeland Security 107 NetWitness 109 Tenable 111 12 Open- Source Security 113 Snort 113 Nmap 113 Kali Linux 114 Nessus 114 Metasploit 114 Osquery 114 eBPF 115 Ruff 115 The Top 100 Open- Source Security Projects 115 13 Failures 121 2020 Failures 122 2021 Failures 122 2022 Failures 123 2023 Failures 123 14 In Memoriam 125 Zohar Zisapel 125 Kevin Mitnick 125 Vittorio Luigi Bertocci 126 Steve Katz 126 French Caldwell 127 15 2023 Mergers and Acquisitions 129 First Quarter M&A 129 Second Quarter M&A 129 Third Quarter M&A 130 Fourth Quarter M&A 130 Year Summary 130 16 2023 Funding 143 17 Significant Cyber Incidents in 2023 157 January 2023 158 February 2023 159 March 2023 160 April 2023 160 May 2023 162 June 2023 162 July 2023 163 August 2023 164 September 2023 165 October 2023 167 November 2023 167 December 2023 168 18 Research Methodology 169 What Is a Security Vendor? 169 How to Find Vendors? 169 19 Directory A-Z 173 20 Directory by Country 257 21 Directory by Category 345
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309