62,40 €*
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
"The history of the IT security industry is one of necessitated evolution: A new threat arises, IT responds. Driven by mobile, cloud, and remote-work megashifts, the new IT security model breaks this reactive cycle. The new IT security is adaptive, agile, cloud-based, and built on Zero Trust principles: Limit the opportunity for attack and minimize the potential for damage...because you can't steal what you can't see. Richard Stiennon has chronicled this revolution in Security Yearbook 2024. It is vital reading for enterprise IT leaders looking to establish the best-in-world IT security capabilities of the future."
--Jay Chaudhry, CEO and founder of Zscaler
"Our future depends on the strength of our cyber infrastructure. Stiennon's experience and contribution to this industry makes him the best person to tell its story and his voice is the best one to help guide us into the future."
--Gil Shwed, CEO and founder of Check Point Software
Cybersecurity is not just an industry, but a community of dedicated guardians of the digital world. Our common purpose and shared mission have created a vibrant culture, storied history, and boundless future, marked by noteworthy events and distinguished by remarkable individuals, fascinating companies, and captivating stories. Through his yearbook series, Richard Stiennon masterfully weaves together valuable industry research and sentimental reflection to encapsulate all that defines us, in a style that only he can deliver."
--Kevin Magee, CSO of Microsoft Canada
Security Yearbook 2024 is the fifth edition in an annual series. It is the story of the people, companies, and events that comprise the history of the IT security industry. In this edition you will discover the early history of Symantec, Network Associates, Borderware, Check Point Software, Netwitness, Tenable, Sourcefire, Quick Heal, Trend Micro and dozens of other companies that contributed to the growth of an industry that is comprised of 3,700+ vendors of security products. The Directory has been updated to reflect the change in headcount at each vendor during 2023.
"The history of the IT security industry is one of necessitated evolution: A new threat arises, IT responds. Driven by mobile, cloud, and remote-work megashifts, the new IT security model breaks this reactive cycle. The new IT security is adaptive, agile, cloud-based, and built on Zero Trust principles: Limit the opportunity for attack and minimize the potential for damage...because you can't steal what you can't see. Richard Stiennon has chronicled this revolution in Security Yearbook 2024. It is vital reading for enterprise IT leaders looking to establish the best-in-world IT security capabilities of the future."
--Jay Chaudhry, CEO and founder of Zscaler
"Our future depends on the strength of our cyber infrastructure. Stiennon's experience and contribution to this industry makes him the best person to tell its story and his voice is the best one to help guide us into the future."
--Gil Shwed, CEO and founder of Check Point Software
Cybersecurity is not just an industry, but a community of dedicated guardians of the digital world. Our common purpose and shared mission have created a vibrant culture, storied history, and boundless future, marked by noteworthy events and distinguished by remarkable individuals, fascinating companies, and captivating stories. Through his yearbook series, Richard Stiennon masterfully weaves together valuable industry research and sentimental reflection to encapsulate all that defines us, in a style that only he can deliver."
--Kevin Magee, CSO of Microsoft Canada
Security Yearbook 2024 is the fifth edition in an annual series. It is the story of the people, companies, and events that comprise the history of the IT security industry. In this edition you will discover the early history of Symantec, Network Associates, Borderware, Check Point Software, Netwitness, Tenable, Sourcefire, Quick Heal, Trend Micro and dozens of other companies that contributed to the growth of an industry that is comprised of 3,700+ vendors of security products. The Directory has been updated to reflect the change in headcount at each vendor during 2023.
About the Author
RICHARD STIENNON played his own part in the IT security industry starting in 1995 at Netrex, one of the first MSSPs. He was a Manager of Technical Risk Services at PwC before being drafted into Gartner in 2000 to cover the network security industry. He left Gartner in 2004 to join Webroot Software as VP of Threat Research. He has also had roles as Chief Marketing Officer at Fortinet, and Chief Strategy Officer at data erasure company, Blancco Technology Group. He is an aerospace engineer (University of Michigan, 1982) turned historian (King's College, London, 2014). He is Chief Research Analyst at IT-Harvest, a data-driven analyst firm covering the entire cybersecurity industry.
Acknowledgments xi
1 2023 in Review 1
The AI Tsunami 1
Silicon Valley Bank Failure 1
2023 Funding 2
Mergers and Acquisitions in 2023 2
Public Cybersecurity Companies 2
The New Guy 3
Updates to the Directory 3
Vendor/Product Selection 3
Investment Thesis Validation 3
Industry Analysis 3
Strategic Evaluation 3
Marketing 3
OEM Relationship Development 3
2 Introduction 5
3 Getting to Know the IT Security Industry 9
Main Categories 10
Network Security 10
Data Security 11
Identity and Access Management 11
Grc 12
Endpoint Security 12
Other Categories 12
Security Operations 12
IoT Security 12
Managed Security Service Providers 13
Application Security 13
API Security 13
Security Analytics 13
Fraud Prevention 14
Threat Intelligence 14
Types of Threat Intelligence Vendors 15
Deep and Dark Web Defined 16
XI Email Security 16
Training 16
Deception 17
Security Testing 17
Summary 18
4 A Brief History of the IT Security Industry 21
Missed Opportunity 22
Acquisition Replaces R&D in the Security Space 22
Digital Mercantilism 24
5 The History of Network Security 27
The Rise of Intrusion Prevention 28
Internet Security Systems 29
Sourcefire 29
Multifunction to UTM to Next- Gen Firewall 30
Local Internet Breakouts 31
Palo Alto Networks 31
The Other UTM Vendors 32
From Hardware Sales to Subscription Model 33
Mobile Devices Side- Step Firewall Controls 34
The Zscaler Story 34
Story: Chris Blask 36
Story: Gil Shwed 38
Story: Guy Guzner 44
NetGuard: My First Cybersecurity Startup 45
Life at Check Point 45
Browser Isolation and FireGlass 46
Acquisition by Symantec 47
Becoming Savvy 47
Conclusion 49
Story: Martin Roesch 49
Snort Catches Fire 49
Hacking a Business Model 50
Sourcefire Heats Up 51
Capping the Sourcefire Journey 52
Back to Startup Life 53
6 DDoS Defense 55
Cloud Proxies 55
Prolexic 56
7 Endpoint Protection from AV to EDR 59
Symantec 59
Network Associates 62
Trend Micro 64
Kaspersky Lab 64
Endpoint Detection and Response 65
Story: Eva Chen and Trend Micro 65
The Early Years 65
Never Stop Innovating 66
Culture Is Everything 67
Above and Beyond 67
Story: Kailash Katkar: Quick Heal: Building a Successful Global Cybersecurity Company Out of India 68
The Genesis 68
Quick Heal Was Born 70
Quick Heal, the Most Popular Antivirus in Pune, India 71
Becoming the Largest- Selling Cybersecurity Brand in India 71
Repairing Computers to Securing Computers: Cat Computer Services to Quick Heal Technologies 72
From the Leading Consumer Cybersecurity Brand to Full- Scale Enterprise Security Solutions Provider 72
Going Public 73
Coronavirus Pandemic: The World Quarantines Itself 73
Gearing Up for the Future 74
8 Identity and Access Management 75
It All Began with RACF 75
Story: Barry Schrager 76
Story: Venkat Raghavan 78
9 Data Security 81
Digital Certificates 82
Other Data Security Categories 83
Story: David Cowan 84
Story: Sandra Toms 90
Story: Deborah Taylor Moore 92
10 Governance, Risk, and Compliance 95
Risk Management 95
Frameworks 98
Other GRC Solutions 98
Story: Renaud Deraison 98
11 Managed Security Services 103
Story: Amit Yoran 104
Riptech 104
Symantec 107
Department of Homeland Security 107
NetWitness 109
Tenable 111
12 Open- Source Security 113
Snort 113
Nmap 113
Kali Linux 114
Nessus 114
Metasploit 114
Osquery 114
eBPF 115
Ruff 115
The Top 100 Open- Source Security Projects 115
13 Failures 121
2020 Failures 122
2021 Failures 122
2022 Failures 123
2023 Failures 123
14 In Memoriam 125
Zohar Zisapel 125
Kevin Mitnick 125
Vittorio Luigi Bertocci 126
Steve Katz 126
French Caldwell 127
15 2023 Mergers and Acquisitions 129
First Quarter M&A 129
Second Quarter M&A 129
Third Quarter M&A 130
Fourth Quarter M&A 130
Year Summary 130
16 2023 Funding 143
17 Significant Cyber Incidents in 2023 157
January 2023 158
February 2023 159
March 2023 160
April 2023 160
May 2023 162
June 2023 162
July 2023 163
August 2023 164
September 2023 165
October 2023 167
November 2023 167
December 2023 168
18 Research Methodology 169
What Is a Security Vendor? 169
How to Find Vendors? 169
19 Directory A-Z 173
20 Directory by Country 257
21 Directory by Category 345
Erscheinungsjahr: | 2024 |
---|---|
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Buch |
Inhalt: | Acknowledgments xi1 2023 in Review 1The AI Tsunami 1Silicon Valley Bank Failure 12023 Funding 2Mergers and Acquisitions in 2023 2Public Cybersecurity Companies 2The New Guy 3Updates to the Directory 3Vendor/Product Selection 3Investment Thesis Validation |
ISBN-13: | 9781394220809 |
ISBN-10: | 1394220804 |
Sprache: | Englisch |
Einband: | Gebunden |
Autor: | Stiennon, Richard |
Auflage: | 5th edition |
Hersteller: | Wiley |
Verantwortliche Person für die EU: | Produktsicherheitsverantwortliche/r, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de |
Maße: | 242 x 197 x 30 mm |
Von/Mit: | Richard Stiennon |
Erscheinungsdatum: | 05.06.2024 |
Gewicht: | 0,74 kg |
About the Author
RICHARD STIENNON played his own part in the IT security industry starting in 1995 at Netrex, one of the first MSSPs. He was a Manager of Technical Risk Services at PwC before being drafted into Gartner in 2000 to cover the network security industry. He left Gartner in 2004 to join Webroot Software as VP of Threat Research. He has also had roles as Chief Marketing Officer at Fortinet, and Chief Strategy Officer at data erasure company, Blancco Technology Group. He is an aerospace engineer (University of Michigan, 1982) turned historian (King's College, London, 2014). He is Chief Research Analyst at IT-Harvest, a data-driven analyst firm covering the entire cybersecurity industry.
Acknowledgments xi
1 2023 in Review 1
The AI Tsunami 1
Silicon Valley Bank Failure 1
2023 Funding 2
Mergers and Acquisitions in 2023 2
Public Cybersecurity Companies 2
The New Guy 3
Updates to the Directory 3
Vendor/Product Selection 3
Investment Thesis Validation 3
Industry Analysis 3
Strategic Evaluation 3
Marketing 3
OEM Relationship Development 3
2 Introduction 5
3 Getting to Know the IT Security Industry 9
Main Categories 10
Network Security 10
Data Security 11
Identity and Access Management 11
Grc 12
Endpoint Security 12
Other Categories 12
Security Operations 12
IoT Security 12
Managed Security Service Providers 13
Application Security 13
API Security 13
Security Analytics 13
Fraud Prevention 14
Threat Intelligence 14
Types of Threat Intelligence Vendors 15
Deep and Dark Web Defined 16
XI Email Security 16
Training 16
Deception 17
Security Testing 17
Summary 18
4 A Brief History of the IT Security Industry 21
Missed Opportunity 22
Acquisition Replaces R&D in the Security Space 22
Digital Mercantilism 24
5 The History of Network Security 27
The Rise of Intrusion Prevention 28
Internet Security Systems 29
Sourcefire 29
Multifunction to UTM to Next- Gen Firewall 30
Local Internet Breakouts 31
Palo Alto Networks 31
The Other UTM Vendors 32
From Hardware Sales to Subscription Model 33
Mobile Devices Side- Step Firewall Controls 34
The Zscaler Story 34
Story: Chris Blask 36
Story: Gil Shwed 38
Story: Guy Guzner 44
NetGuard: My First Cybersecurity Startup 45
Life at Check Point 45
Browser Isolation and FireGlass 46
Acquisition by Symantec 47
Becoming Savvy 47
Conclusion 49
Story: Martin Roesch 49
Snort Catches Fire 49
Hacking a Business Model 50
Sourcefire Heats Up 51
Capping the Sourcefire Journey 52
Back to Startup Life 53
6 DDoS Defense 55
Cloud Proxies 55
Prolexic 56
7 Endpoint Protection from AV to EDR 59
Symantec 59
Network Associates 62
Trend Micro 64
Kaspersky Lab 64
Endpoint Detection and Response 65
Story: Eva Chen and Trend Micro 65
The Early Years 65
Never Stop Innovating 66
Culture Is Everything 67
Above and Beyond 67
Story: Kailash Katkar: Quick Heal: Building a Successful Global Cybersecurity Company Out of India 68
The Genesis 68
Quick Heal Was Born 70
Quick Heal, the Most Popular Antivirus in Pune, India 71
Becoming the Largest- Selling Cybersecurity Brand in India 71
Repairing Computers to Securing Computers: Cat Computer Services to Quick Heal Technologies 72
From the Leading Consumer Cybersecurity Brand to Full- Scale Enterprise Security Solutions Provider 72
Going Public 73
Coronavirus Pandemic: The World Quarantines Itself 73
Gearing Up for the Future 74
8 Identity and Access Management 75
It All Began with RACF 75
Story: Barry Schrager 76
Story: Venkat Raghavan 78
9 Data Security 81
Digital Certificates 82
Other Data Security Categories 83
Story: David Cowan 84
Story: Sandra Toms 90
Story: Deborah Taylor Moore 92
10 Governance, Risk, and Compliance 95
Risk Management 95
Frameworks 98
Other GRC Solutions 98
Story: Renaud Deraison 98
11 Managed Security Services 103
Story: Amit Yoran 104
Riptech 104
Symantec 107
Department of Homeland Security 107
NetWitness 109
Tenable 111
12 Open- Source Security 113
Snort 113
Nmap 113
Kali Linux 114
Nessus 114
Metasploit 114
Osquery 114
eBPF 115
Ruff 115
The Top 100 Open- Source Security Projects 115
13 Failures 121
2020 Failures 122
2021 Failures 122
2022 Failures 123
2023 Failures 123
14 In Memoriam 125
Zohar Zisapel 125
Kevin Mitnick 125
Vittorio Luigi Bertocci 126
Steve Katz 126
French Caldwell 127
15 2023 Mergers and Acquisitions 129
First Quarter M&A 129
Second Quarter M&A 129
Third Quarter M&A 130
Fourth Quarter M&A 130
Year Summary 130
16 2023 Funding 143
17 Significant Cyber Incidents in 2023 157
January 2023 158
February 2023 159
March 2023 160
April 2023 160
May 2023 162
June 2023 162
July 2023 163
August 2023 164
September 2023 165
October 2023 167
November 2023 167
December 2023 168
18 Research Methodology 169
What Is a Security Vendor? 169
How to Find Vendors? 169
19 Directory A-Z 173
20 Directory by Country 257
21 Directory by Category 345
Erscheinungsjahr: | 2024 |
---|---|
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Buch |
Inhalt: | Acknowledgments xi1 2023 in Review 1The AI Tsunami 1Silicon Valley Bank Failure 12023 Funding 2Mergers and Acquisitions in 2023 2Public Cybersecurity Companies 2The New Guy 3Updates to the Directory 3Vendor/Product Selection 3Investment Thesis Validation |
ISBN-13: | 9781394220809 |
ISBN-10: | 1394220804 |
Sprache: | Englisch |
Einband: | Gebunden |
Autor: | Stiennon, Richard |
Auflage: | 5th edition |
Hersteller: | Wiley |
Verantwortliche Person für die EU: | Produktsicherheitsverantwortliche/r, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de |
Maße: | 242 x 197 x 30 mm |
Von/Mit: | Richard Stiennon |
Erscheinungsdatum: | 05.06.2024 |
Gewicht: | 0,74 kg |