News By Tag * Cybersecurity * Information Security * Infosecurity * Cybersecurity Startups * Cybersecurity Companies * More Tags... Industry News News By Place Country(s) Industry News
| Announcing the Cybersecurity 500 List for Q2 2015FireEye Tops List of the World’s Hottest and Most Innovative Cybersecurity Companies for Second Consecutive Quarter
The Cybersecurity 500 is online at: http://cybersecurityventures.com/ The Cybersecurity industry is growing from $71 Billion in 2014 to $155+ Billion in 2019, according to consolidated estimates by IT research firms and analysts cited in the Cybersecurity Market Report, published quarterly by Cybersecurity Ventures. There are many new entrants as well as M&A, investment and IPO activity, that is constantly changing the vendor and service provider landscape. The Cybersecurity 500 creates awareness and recognition for the most innovative cybersecurity companies – ranging from the largest and most recognizable brands, to VC backed start-ups and emerging players, to small firms with potentially game-changing technologies, to solution providers poised for growth around productized or vertically focused services. Editor’s Choice For #1 Goes to FireEye Coming in at number one on the list is Cybersecurity Ventures Editors’ Choice, FireEye, Inc. , the highflying Milpitas CA based cybersecurity and malware protection company. “FireEye is continuing to grow its global customer base and employee headcount, while getting kudos for their technology platform and product lineup, alliance partner integration, channel program, service, and support, from the entire cybersecurity community.” says Steve Morgan, founder and CEO at Cybersecurity Ventures, and Editor-In-Chief of the Cybersecurity 500. “FireEye is a leader in IT and cloud security, and they’ve added to that by becoming a top brand in the burgeoning mobile security sector” adds Morgan. “Cyber defense has never been more critical than it is today, and the Cybersecurity 500 recognizes the “companies to watch” on the front lines of this battle” says Dave DeWalt, CEO and Chairman of the Board at FireEye. “FireEye is committed to changing the way the world combats today’s advanced cyber attacks, and the Cybersecurity 500 spotlights the evolution taking place by raising awareness of the most innovative companies in the security industry” adds DeWalt. #6 AVG Tops Growing List of International Companies AVG Technologies N.V. , with global headquarters in Amsterdam, The Netherlands, is the top listed international company and number six overall, who recently announced they have surpassed two-hundred million active users of their software. “The cybersecurity landscape is constantly changing and AVG recognizes the importance of being represented in an authoritative and credible resource like the Cybersecurity 500″ says Stephanie Kane, Senior PR Director at AVG. “Half of AVG’s active customers are using their software on mobile devices” says Cybersecurity Ventures’ Morgan. “That’s 100 million mobile users, which makes AVG a top competitor in an exploding market for iOS and Android security” adds Morgan. “At AVG, we believe that everyone in the world has the inalienable right to security and privacy online” says Gary Kovacs, CEO at AVG. “We are committed to enabling the next three billion people coming on line to explore the Internet with peace of mind and security.” 22% of the Cybersecurity 500 listed companies (110 companies) had international (non-U.S.) headquarters, a substantial increase over the Q1 2015 list. Countries outside the U.S. with companies listed are: United Kingdom (20 companies); Israel (16); Canada (13); Germany (12); France (5); Ireland, The Netherlands, Denmark (4 each); Finland, China, Australia, Brazil (3 each); Italy, Greece, Spain, Switzerland, Sweden, Romania, South Korea; Argentina (2 each); and Russia, Slovakia, Japan, Hong Kong, India, South Africa, Czech Republic, Singapore, Portugal (1 each). IBM’s Security Business Moves Up to #8 Technology giant IBM Corp. ascended to number eight on the list, after integrating a number of acquisitions in to their now called IBM Security business, and a clarified message to the market. “IBM’s security business is really big, and really hot” says Morgan. “What IBM has done is very impressive and unique. They are the only super big corporation we can point to who has methodically built a cybersecurity business through a combination of organic growth and numerous substantial acquisitions over the past decade – and combined all of it in to a cohesive business the market can understand.” Selection Criteria For The Cybersecurity 500 “We continuously look at thousands of companies for inclusion in the Cybersecurity 500, by soliciting feedback from CISOs, IT security practitioners and service providers, and researching hundreds of cybersecurity events and news sources that we follow” says Steve Morgan, founder and CEO at Cybersecurity Ventures, and Editor-In-Chief of the Cybersecurity 500. The selection criteria for the Cybersecurity 500 is subjective and includes some or all of the following when evaluating each company: Cybersecurity Sector (market category) Problem(s) Solved Customer Base Feedback from CISOs and Decision Makers Feedback from IT Security Evaluators & Recommenders Feedback from VARs, SIs and Consultants VC Funding Company Growth Published Product Reviews Demos and Presentations at Conferences Corporate Marketing and Branding Media Coverage Notable Implementations Founder and Management Pedigree Interviews with Senior Management The Cybersecurity 500 does not rank companies by revenues, employees, or annual growth. “We do not think a list of the largest cybersecurity companies is useful to our target audience of cyber and IT security decision makers, evaluators, and recommenders” Searchable Directory The Cybersecurity 500 is both a list and a keyword-searchable directory. Users can type in a cybersecurity term or acronym i.e. ‘malware’, ‘incident response’, ‘threat management’, ‘encryption’ “The driving force behind the Cybersecurity 500 was providing something useful to the CISOs and security decision makers, evaluators, and recommenders” End
|
|