Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Security Yearbook 2024
A History and Directory of the It Security Industry
Buch von Richard Stiennon
Sprache: Englisch

62,40 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 1-2 Wochen

Kategorien:
Beschreibung

"The history of the IT security industry is one of necessitated evolution: A new threat arises, IT responds. Driven by mobile, cloud, and remote-work megashifts, the new IT security model breaks this reactive cycle. The new IT security is adaptive, agile, cloud-based, and built on Zero Trust principles: Limit the opportunity for attack and minimize the potential for damage...because you can't steal what you can't see. Richard Stiennon has chronicled this revolution in Security Yearbook 2024. It is vital reading for enterprise IT leaders looking to establish the best-in-world IT security capabilities of the future."
--Jay Chaudhry, CEO and founder of Zscaler

"Our future depends on the strength of our cyber infrastructure. Stiennon's experience and contribution to this industry makes him the best person to tell its story and his voice is the best one to help guide us into the future."
--Gil Shwed, CEO and founder of Check Point Software

Cybersecurity is not just an industry, but a community of dedicated guardians of the digital world. Our common purpose and shared mission have created a vibrant culture, storied history, and boundless future, marked by noteworthy events and distinguished by remarkable individuals, fascinating companies, and captivating stories. Through his yearbook series, Richard Stiennon masterfully weaves together valuable industry research and sentimental reflection to encapsulate all that defines us, in a style that only he can deliver."
--Kevin Magee, CSO of Microsoft Canada

Security Yearbook 2024 is the fifth edition in an annual series. It is the story of the people, companies, and events that comprise the history of the IT security industry. In this edition you will discover the early history of Symantec, Network Associates, Borderware, Check Point Software, Netwitness, Tenable, Sourcefire, Quick Heal, Trend Micro and dozens of other companies that contributed to the growth of an industry that is comprised of 3,700+ vendors of security products. The Directory has been updated to reflect the change in headcount at each vendor during 2023.

"The history of the IT security industry is one of necessitated evolution: A new threat arises, IT responds. Driven by mobile, cloud, and remote-work megashifts, the new IT security model breaks this reactive cycle. The new IT security is adaptive, agile, cloud-based, and built on Zero Trust principles: Limit the opportunity for attack and minimize the potential for damage...because you can't steal what you can't see. Richard Stiennon has chronicled this revolution in Security Yearbook 2024. It is vital reading for enterprise IT leaders looking to establish the best-in-world IT security capabilities of the future."
--Jay Chaudhry, CEO and founder of Zscaler

"Our future depends on the strength of our cyber infrastructure. Stiennon's experience and contribution to this industry makes him the best person to tell its story and his voice is the best one to help guide us into the future."
--Gil Shwed, CEO and founder of Check Point Software

Cybersecurity is not just an industry, but a community of dedicated guardians of the digital world. Our common purpose and shared mission have created a vibrant culture, storied history, and boundless future, marked by noteworthy events and distinguished by remarkable individuals, fascinating companies, and captivating stories. Through his yearbook series, Richard Stiennon masterfully weaves together valuable industry research and sentimental reflection to encapsulate all that defines us, in a style that only he can deliver."
--Kevin Magee, CSO of Microsoft Canada

Security Yearbook 2024 is the fifth edition in an annual series. It is the story of the people, companies, and events that comprise the history of the IT security industry. In this edition you will discover the early history of Symantec, Network Associates, Borderware, Check Point Software, Netwitness, Tenable, Sourcefire, Quick Heal, Trend Micro and dozens of other companies that contributed to the growth of an industry that is comprised of 3,700+ vendors of security products. The Directory has been updated to reflect the change in headcount at each vendor during 2023.

Über den Autor

About the Author

RICHARD STIENNON played his own part in the IT security industry starting in 1995 at Netrex, one of the first MSSPs. He was a Manager of Technical Risk Services at PwC before being drafted into Gartner in 2000 to cover the network security industry. He left Gartner in 2004 to join Webroot Software as VP of Threat Research. He has also had roles as Chief Marketing Officer at Fortinet, and Chief Strategy Officer at data erasure company, Blancco Technology Group. He is an aerospace engineer (University of Michigan, 1982) turned historian (King's College, London, 2014). He is Chief Research Analyst at IT-Harvest, a data-driven analyst firm covering the entire cybersecurity industry.

Inhaltsverzeichnis

Acknowledgments xi

1 2023 in Review 1

The AI Tsunami 1

Silicon Valley Bank Failure 1

2023 Funding 2

Mergers and Acquisitions in 2023 2

Public Cybersecurity Companies 2

The New Guy 3

Updates to the Directory 3

Vendor/Product Selection 3

Investment Thesis Validation 3

Industry Analysis 3

Strategic Evaluation 3

Marketing 3

OEM Relationship Development 3

2 Introduction 5

3 Getting to Know the IT Security Industry 9

Main Categories 10

Network Security 10

Data Security 11

Identity and Access Management 11

Grc 12

Endpoint Security 12

Other Categories 12

Security Operations 12

IoT Security 12

Managed Security Service Providers 13

Application Security 13

API Security 13

Security Analytics 13

Fraud Prevention 14

Threat Intelligence 14

Types of Threat Intelligence Vendors 15

Deep and Dark Web Defined 16

XI Email Security 16

Training 16

Deception 17

Security Testing 17

Summary 18

4 A Brief History of the IT Security Industry 21

Missed Opportunity 22

Acquisition Replaces R&D in the Security Space 22

Digital Mercantilism 24

5 The History of Network Security 27

The Rise of Intrusion Prevention 28

Internet Security Systems 29

Sourcefire 29

Multifunction to UTM to Next- Gen Firewall 30

Local Internet Breakouts 31

Palo Alto Networks 31

The Other UTM Vendors 32

From Hardware Sales to Subscription Model 33

Mobile Devices Side- Step Firewall Controls 34

The Zscaler Story 34

Story: Chris Blask 36

Story: Gil Shwed 38

Story: Guy Guzner 44

NetGuard: My First Cybersecurity Startup 45

Life at Check Point 45

Browser Isolation and FireGlass 46

Acquisition by Symantec 47

Becoming Savvy 47

Conclusion 49

Story: Martin Roesch 49

Snort Catches Fire 49

Hacking a Business Model 50

Sourcefire Heats Up 51

Capping the Sourcefire Journey 52

Back to Startup Life 53

6 DDoS Defense 55

Cloud Proxies 55

Prolexic 56

7 Endpoint Protection from AV to EDR 59

Symantec 59

Network Associates 62

Trend Micro 64

Kaspersky Lab 64

Endpoint Detection and Response 65

Story: Eva Chen and Trend Micro 65

The Early Years 65

Never Stop Innovating 66

Culture Is Everything 67

Above and Beyond 67

Story: Kailash Katkar: Quick Heal: Building a Successful Global Cybersecurity Company Out of India 68

The Genesis 68

Quick Heal Was Born 70

Quick Heal, the Most Popular Antivirus in Pune, India 71

Becoming the Largest- Selling Cybersecurity Brand in India 71

Repairing Computers to Securing Computers: Cat Computer Services to Quick Heal Technologies 72

From the Leading Consumer Cybersecurity Brand to Full- Scale Enterprise Security Solutions Provider 72

Going Public 73

Coronavirus Pandemic: The World Quarantines Itself 73

Gearing Up for the Future 74

8 Identity and Access Management 75

It All Began with RACF 75

Story: Barry Schrager 76

Story: Venkat Raghavan 78

9 Data Security 81

Digital Certificates 82

Other Data Security Categories 83

Story: David Cowan 84

Story: Sandra Toms 90

Story: Deborah Taylor Moore 92

10 Governance, Risk, and Compliance 95

Risk Management 95

Frameworks 98

Other GRC Solutions 98

Story: Renaud Deraison 98

11 Managed Security Services 103

Story: Amit Yoran 104

Riptech 104

Symantec 107

Department of Homeland Security 107

NetWitness 109

Tenable 111

12 Open- Source Security 113

Snort 113

Nmap 113

Kali Linux 114

Nessus 114

Metasploit 114

Osquery 114

eBPF 115

Ruff 115

The Top 100 Open- Source Security Projects 115

13 Failures 121

2020 Failures 122

2021 Failures 122

2022 Failures 123

2023 Failures 123

14 In Memoriam 125

Zohar Zisapel 125

Kevin Mitnick 125

Vittorio Luigi Bertocci 126

Steve Katz 126

French Caldwell 127

15 2023 Mergers and Acquisitions 129

First Quarter M&A 129

Second Quarter M&A 129

Third Quarter M&A 130

Fourth Quarter M&A 130

Year Summary 130

16 2023 Funding 143

17 Significant Cyber Incidents in 2023 157

January 2023 158

February 2023 159

March 2023 160

April 2023 160

May 2023 162

June 2023 162

July 2023 163

August 2023 164

September 2023 165

October 2023 167

November 2023 167

December 2023 168

18 Research Methodology 169

What Is a Security Vendor? 169

How to Find Vendors? 169

19 Directory A-Z 173

20 Directory by Country 257

21 Directory by Category 345

Details
Erscheinungsjahr: 2024
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Buch
Inhalt: Acknowledgments xi1 2023 in Review 1The AI Tsunami 1Silicon Valley Bank Failure 12023 Funding 2Mergers and Acquisitions in 2023 2Public Cybersecurity Companies 2The New Guy 3Updates to the Directory 3Vendor/Product Selection 3Investment Thesis Validation
ISBN-13: 9781394220809
ISBN-10: 1394220804
Sprache: Englisch
Einband: Gebunden
Autor: Stiennon, Richard
Auflage: 5th edition
Hersteller: Wiley
Verantwortliche Person für die EU: Produktsicherheitsverantwortliche/r, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de
Maße: 242 x 197 x 30 mm
Von/Mit: Richard Stiennon
Erscheinungsdatum: 05.06.2024
Gewicht: 0,74 kg
Artikel-ID: 127871606
Über den Autor

About the Author

RICHARD STIENNON played his own part in the IT security industry starting in 1995 at Netrex, one of the first MSSPs. He was a Manager of Technical Risk Services at PwC before being drafted into Gartner in 2000 to cover the network security industry. He left Gartner in 2004 to join Webroot Software as VP of Threat Research. He has also had roles as Chief Marketing Officer at Fortinet, and Chief Strategy Officer at data erasure company, Blancco Technology Group. He is an aerospace engineer (University of Michigan, 1982) turned historian (King's College, London, 2014). He is Chief Research Analyst at IT-Harvest, a data-driven analyst firm covering the entire cybersecurity industry.

Inhaltsverzeichnis

Acknowledgments xi

1 2023 in Review 1

The AI Tsunami 1

Silicon Valley Bank Failure 1

2023 Funding 2

Mergers and Acquisitions in 2023 2

Public Cybersecurity Companies 2

The New Guy 3

Updates to the Directory 3

Vendor/Product Selection 3

Investment Thesis Validation 3

Industry Analysis 3

Strategic Evaluation 3

Marketing 3

OEM Relationship Development 3

2 Introduction 5

3 Getting to Know the IT Security Industry 9

Main Categories 10

Network Security 10

Data Security 11

Identity and Access Management 11

Grc 12

Endpoint Security 12

Other Categories 12

Security Operations 12

IoT Security 12

Managed Security Service Providers 13

Application Security 13

API Security 13

Security Analytics 13

Fraud Prevention 14

Threat Intelligence 14

Types of Threat Intelligence Vendors 15

Deep and Dark Web Defined 16

XI Email Security 16

Training 16

Deception 17

Security Testing 17

Summary 18

4 A Brief History of the IT Security Industry 21

Missed Opportunity 22

Acquisition Replaces R&D in the Security Space 22

Digital Mercantilism 24

5 The History of Network Security 27

The Rise of Intrusion Prevention 28

Internet Security Systems 29

Sourcefire 29

Multifunction to UTM to Next- Gen Firewall 30

Local Internet Breakouts 31

Palo Alto Networks 31

The Other UTM Vendors 32

From Hardware Sales to Subscription Model 33

Mobile Devices Side- Step Firewall Controls 34

The Zscaler Story 34

Story: Chris Blask 36

Story: Gil Shwed 38

Story: Guy Guzner 44

NetGuard: My First Cybersecurity Startup 45

Life at Check Point 45

Browser Isolation and FireGlass 46

Acquisition by Symantec 47

Becoming Savvy 47

Conclusion 49

Story: Martin Roesch 49

Snort Catches Fire 49

Hacking a Business Model 50

Sourcefire Heats Up 51

Capping the Sourcefire Journey 52

Back to Startup Life 53

6 DDoS Defense 55

Cloud Proxies 55

Prolexic 56

7 Endpoint Protection from AV to EDR 59

Symantec 59

Network Associates 62

Trend Micro 64

Kaspersky Lab 64

Endpoint Detection and Response 65

Story: Eva Chen and Trend Micro 65

The Early Years 65

Never Stop Innovating 66

Culture Is Everything 67

Above and Beyond 67

Story: Kailash Katkar: Quick Heal: Building a Successful Global Cybersecurity Company Out of India 68

The Genesis 68

Quick Heal Was Born 70

Quick Heal, the Most Popular Antivirus in Pune, India 71

Becoming the Largest- Selling Cybersecurity Brand in India 71

Repairing Computers to Securing Computers: Cat Computer Services to Quick Heal Technologies 72

From the Leading Consumer Cybersecurity Brand to Full- Scale Enterprise Security Solutions Provider 72

Going Public 73

Coronavirus Pandemic: The World Quarantines Itself 73

Gearing Up for the Future 74

8 Identity and Access Management 75

It All Began with RACF 75

Story: Barry Schrager 76

Story: Venkat Raghavan 78

9 Data Security 81

Digital Certificates 82

Other Data Security Categories 83

Story: David Cowan 84

Story: Sandra Toms 90

Story: Deborah Taylor Moore 92

10 Governance, Risk, and Compliance 95

Risk Management 95

Frameworks 98

Other GRC Solutions 98

Story: Renaud Deraison 98

11 Managed Security Services 103

Story: Amit Yoran 104

Riptech 104

Symantec 107

Department of Homeland Security 107

NetWitness 109

Tenable 111

12 Open- Source Security 113

Snort 113

Nmap 113

Kali Linux 114

Nessus 114

Metasploit 114

Osquery 114

eBPF 115

Ruff 115

The Top 100 Open- Source Security Projects 115

13 Failures 121

2020 Failures 122

2021 Failures 122

2022 Failures 123

2023 Failures 123

14 In Memoriam 125

Zohar Zisapel 125

Kevin Mitnick 125

Vittorio Luigi Bertocci 126

Steve Katz 126

French Caldwell 127

15 2023 Mergers and Acquisitions 129

First Quarter M&A 129

Second Quarter M&A 129

Third Quarter M&A 130

Fourth Quarter M&A 130

Year Summary 130

16 2023 Funding 143

17 Significant Cyber Incidents in 2023 157

January 2023 158

February 2023 159

March 2023 160

April 2023 160

May 2023 162

June 2023 162

July 2023 163

August 2023 164

September 2023 165

October 2023 167

November 2023 167

December 2023 168

18 Research Methodology 169

What Is a Security Vendor? 169

How to Find Vendors? 169

19 Directory A-Z 173

20 Directory by Country 257

21 Directory by Category 345

Details
Erscheinungsjahr: 2024
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Buch
Inhalt: Acknowledgments xi1 2023 in Review 1The AI Tsunami 1Silicon Valley Bank Failure 12023 Funding 2Mergers and Acquisitions in 2023 2Public Cybersecurity Companies 2The New Guy 3Updates to the Directory 3Vendor/Product Selection 3Investment Thesis Validation
ISBN-13: 9781394220809
ISBN-10: 1394220804
Sprache: Englisch
Einband: Gebunden
Autor: Stiennon, Richard
Auflage: 5th edition
Hersteller: Wiley
Verantwortliche Person für die EU: Produktsicherheitsverantwortliche/r, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de
Maße: 242 x 197 x 30 mm
Von/Mit: Richard Stiennon
Erscheinungsdatum: 05.06.2024
Gewicht: 0,74 kg
Artikel-ID: 127871606
Sicherheitshinweis