The 121 companies, VCs, corporate investors, and acquirers defining the cybersecurity industry.

Cybersecurity startups have seen an investment slowdown through the first half of this year. However, five out of the nine private company unicorns in cybersecurity reached their $1B+ valuations last year, and corporations and their corporate venture arms, including Intel Capital, are increasingly investing in the space. Of the most active investors in cybersecurity, Andreessen Horowitz has backed the most unicorns since 2012, with four.

Despite the slowdown, cybersecurity is still seeing some mega-rounds of funding. Cylance, an artificial intelligence and machine learning cybersecurity company, secured a $100M series D investment in June, and became the only new cybersecurity unicorn to emerge so far in 2016.

We put together a periodic table of cybersecurity to spotlight the top startups, industry categories, investors, and exits.

The table is meant to serve as a guide to navigate the key players in the space. The companies and investors in the table were chosen using CB Insights data and analytics around momentum, financial health, and investor quality. The categories in our table are not all mutually exclusive. Below is the full periodic table of cybersecurity.

Research Briefing: Cybersecurity Trends
With cyberattacks happening almost every day, startups in cybersecurity are more in demand than ever. Join us for a live webinar to cover investment trends, exits, and startups to watch.

Note: click on the image below to enlarge. This periodic table is not meant to be exhaustive of companies in this space. 

updated table 9 29 16

Navigating the Periodic Table of Cybersecurity

The table’s top section lists notable cybersecurity startups, while the bottom two rows shows top investors in cybersecurity and notable exits. We broke down our list of cybersecurity startups into 11 segments:

Network & Endpoint Security: This is the largest category in our market map and includes startups like Red Canary which specializes in protecting an enterprise’s computer networks from vulnerabilities that arise as a result of remotely connecting users’ laptops, tablets, and other electronic devices. Other companies, like Cylance, apply artificial intelligence algorithms to predictively identify and stop malware and advanced threats in defense of endpoints.

IoT/IIoT Security: Startups in this category include Argus Cyber Security, which is an automotive cybersecurity company enabling car manufacturers to protect connected vehicles. Also, Indegy, which provides security for Industrial Control Systems (ICS) used across critical infrastructures, e.g., energy, water utilities, petrochemical plants, manufacturing facilities, etc.

Threat Intelligence: Companies include Flashpoint, which illuminates targeted malicious activities on the deep web and dark web to uncover potential threats and thwart attacks.

Mobile Security: Companies in this category include Zimperium, which delivers enterprise mobile threat protection for Android and iOS devices.

Behavioral Detection: Included are companies like Darktrace, which detects abnormal behavior in organizations in order to identify threats and manage risks from cyberattacks.

Cloud Security: Startups like Tigera offer solutions for enterprises looking for secure application and workload delivery across private, public, and hybrid clouds.

Deception Security: Companies like illusive networks can identify and proactively deceive and disrupt attackers before they can cause harm.

Continuous Network Visibility: Protectwise and others offer solutions for visualizing network activity and responding to cyberattacks in real time.

Risk Remediation: Companies, including AttackIQ, offer solutions for pinpointing vulnerabilities in technologies, people, and processes, with recommendations on how to effectively fill security gaps.

Website Security: Distil Networks and Shape Security offer website developers the ability to identify and police malicious website traffic, including malicious bots and more.

Quantum Encryption: Startups like Post-Quantum offer encrypted wireless and data communications technology that relies on the science underlying quantum mechanics.

If you think an investor or company should be added, please leave a comment below, with your rational.

Want more data on high-momentum startups? Login to CB Insights or sign up for free below.

  • Susan Kling Finston

    Simply brilliant.