Five cybersecurity unicorns valued at $1B+ are represented in this map including: Okta, Lookout, Avast Software, Tanium, and Cylance.
As internet-connected hardware proliferates, there’s been a corresponding rise in cyber security threats, with malicious hackers using these new digital entry points to infiltrate and disrupt systems. In turn, startups focused on securing the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) are emerging as important players in the cybersecurity industry.
We used the CB Insights database to identify 78 private companies at the intersection of cybersecurity and connected hardware, which includes: critical infrastructure, mobile phones, connected devices, enterprise endpoints (defined as laptop computers, desktop computers, servers, and mobile devices connected to an enterprise-network), and connected cars. Not all of the categories in our map are mutually exclusive.
There’s been a big uptick in early-stage companies in this market in recent years. In fact, over half (56%) of the companies in our map received Seed/Angel financing in the last three years.
We define cybersecurity as tech-enabled companies that offer products and services for which the primary use case is the protection of digital and/or physical assets from unauthorized access and malicious use by cyber criminals.
Click on the image below to enlarge. This market map is not meant to be exhaustive of companies in the space.
The breakdown of categories is as follows:
Critical Infrastructure: Startups in this category include Indegy which provides real-time situational awareness, visibility, and security for industrial control systems used across critical infrastructure, including energy, water utilities, petrochemical plants, manufacturing facilities, etc. Similar companies such as CyberX can detect network anomalies by analyzing the operational behavior of industrial internet networks using Big Data and Machine Learning. The company Bastille Networks is among the more unique startups in this category, with a product that scans air space to provide visibility into RF-emitting devices. Bastille has broad implications across the connected hardware cybersecurity market.
Mobile Phones: Companies in this category include three unicorns valued at $1B+. They are: Okta which offers cloud-based identity management and mobility management services, Lookout which is a smartphone security company for the Android and iOS platforms, and Avast Software which offers security and privacy solutions also for iOS and Android.
Connected Devices: Included are companies like Mocana which secures IP addressable devices as well as the information, applications, and services that run on them. Companies in this category also include MedCrypt which offers the ability to manage all of the digital keys needed for users to securely access medical devices.
Enterprise Endpoints: Startups like the unicorn Tanium offer a systems management solution that allows enterprises to collect data and update endpoints across networks. Another unicorn in this category is Cylance, which operates in defense of enterprises’ endpoints by applying artificial intelligence algorithms to predict, identify, and stop malware and advanced threats.
Connected Cars: Argus Cyber Security enables car manufacturers to protect technologically advanced connected vehicles from malicious cyber attacks.
See the full company list below:
|CyberX||ff Venture Capital, Flint Capital, GlenRock Israel||Critical Infrastructure Security|
|SparkCognition||Alameda Ventures, CME Ventures, Verizon Ventures||Critical Infrastructure Security|
|Tempered Networks||Fluid Capital, IDG Ventures USA, Ignition Partners||Critical Infrastructure Security|
|Indegy||Aspect Ventures, Magma Venture Partners, SBI Group||Critical Infrastructure Security|
|Bayshore Networks||Trident Capital, Yokogawa Electric||Critical Infrastructure Security|
|Ionic Security||Amazon, Goldman Sachs, Google Ventures||Critical Infrastructure Security|
|EagleEye Intelligence||Florida Venture Forum, Mayport Venture Partners||Critical Infrastructure Security|
|mPrest||GE Ventures, OurCrowd||Critical Infrastructure Security|
|ThetaRay||Alibaba Group, BIRD Foundation, General Electric||Critical Infrastructure Security|
|Senrio||Talis Capital||Critical Infrastructure Security|
|Sentryo||ACE Management||Critical Infrastructure Security|
|Bastille Networks||Bessemer Venture Partners||Critical Infrastructure Security|
|Power Fingerprinting||Blu Venture Investors, CIT GAP Funds||Critical Infrastructure Security|
|PingThings||Frost Data Capital, GE Ventures||Critical Infrastructure Security|
|NexDefense||TechOperators, BIP Capital, Mosley Ventures||Critical Infrastructure Security|
|SecureRF||Emerald Technology Ventures, Foundation Capital, General Electric||Critical Infrastructure Security|
|SCADAfence||Jerusalem Venture Partners||Critical Infrastructure Security|
|Camgian Microsystems||U.S. Department of Defense||Critical Infrastructure Security|
|Nozomi Networks||GGv Capital, Lux Capital, Planven Investments||Critical Infrastructure Security|
|Okta||Altimeter Capital, Andreessen Horowitz, Khosla Ventures||Mobile Phone Security|
|wickr||Alsop-Louie Partners, Breyer Capital, CME Ventures||Mobile Phone Security|
|Lookout||Accel Partners, Andreessen Horowitz, Bezos Expeditions||Mobile Phone Security|
|Silent Circle||Santander InnoVentures, Cain Capital||Mobile Phone Security|
|AVAST Software||CVC Capital Partners, Summit Partners, Kickstarter||Mobile Phone Security|
|Zimperium||Warbug Pincus, Samsung Ventures, Sierra Ventures||Mobile Phone Security|
|Skycure||New York Life Insurance Company, Foundation Capital||Mobile Phone Security|
|Appthority||Venrock, Trident Capital, US Venture Partners||Mobile Phone Security|
|AppDome||Draper Nexus Ventures, Jerusalem Venture Partners, Menlo Ventures||Mobile Phone Security|
|Trustlook||Linear Capital Partners, Sparkland Ventures, Trustbridge Partners||Mobile Phone Security|
|OpenPeak||AT&T, Blackstone Group, RRE Ventures||Mobile Phone Security|
|Sequitur Labs||Undisclosed Investors||Mobile Phone Security|
|Auth0||Bessemer Venture Partners, Silicon Valley Bank, K9 Ventures||Connected Device Security|
|Netskope||Accel Partners, Iconiq Capital, Social Capital||Connected Device Security|
|Mojo Networks||Trident Capital, Presidio Partners, Walden International||Connected Device Security|
|Pwnie Express||.406 Ventures, Fairhaven Capital, Ascent Venture Partners||Connected Device Security|
|Device Authority (FKA Cryptosoft)||Alsop-Louie Partners||Connected Device Security|
|Security Innovation||Brook Venture Partners||Connected Device Security|
|Bat Blue Networks||Columbia Capital, Kita Capital, AITV||Connected Device Security|
|Mocana||Trident Capital, Southern Cross Venture Partners, Shasta Ventures||Connected Device Security|
|Rubicon Labs||Akamai Technologies, Pelion Venture Partners, Third Point||Connected Device Security|
|ZingBox||Undisclosed Investors||Connected Device Security|
|MedCrypt||Safeguard Scientifics||Connected Device Security|
|Bear Systems||Undisclosed Investors||Connected Device Security|
|ZitoVault||Undisclosed Investors||Connected Device Security|
|RazorSecure||Breed Reply||Connected Device Security|
|SteelMountain||MACH37||Connected Device Security|
|Ihiji||Floodgate, Capital Factory, Silverton Partners||Connected Device Security|
|Imubit||UpWest Labs||Connected Device Security|
|Securithings||Microsoft Ventures Accelerator||Connected Device Security|
|Icon Labs||Undisclosed Investors||Connected Device Security|
|Delta ID||Intel Capital||Connected Device Security|
|LogRhythm||Adams Street Partners, Delta-V Capital, EDBI||Enterprise Endpoint Security|
|Cylance||Blackstone Group, Capital One Growth Ventures, Citi Ventures, Dell Ventures, DFJ Growth Fund||Enterprise Endpoint Security|
|Crowdstrike||Accel Partners, capitalG, Warbug Pincus||Enterprise Endpoint Security|
|Duo Security||Benchmark, Google Ventures, Lead Edge Capital||Enterprise Endpoint Security|
|ForeScout Technologies||Amadeus Capital Partners, Aspect Ventures, Pitango Venture Capital||Enterprise Endpoint Security|
|Carbon Black||.406 Ventures, Kleiner Perkins Caufield & Byers, Sequoia Capital||Enterprise Endpoint Security|
|Workspot||Helion Venture Partners, Presidio Ventures, TransLink Capital||Enterprise Endpoint Security|
|Centrify||BDCA Venture, Fortinet, Samsung Ventures, NTT DoCoMo Ventures||Enterprise Endpoint Security|
|Countertack||Alcatel-Lucent Ventures, Fairhaven Capital, Goldman Sachs||Enterprise Endpoint Security|
|Tanium||Andreessen Horowitz, Institutional Venture Partners, TPG Growth||Enterprise Endpoint Security|
|SentinelOne||Data Collective, Third Point, Tiger Global Management||Enterprise Endpoint Security|
|Code42 Software||Accel Partners, New Enterprise Associates, Split Rock Partners||Enterprise Endpoint Security|
|Bromium||Andreessen Horowitz, Intel Capital, Lightspeed Venture Partners||Enterprise Endpoint Security|
|bitglass||New Enterprise Associates, Norwest Venture Partners, SingTel Innov8||Enterprise Endpoint Security|
|Interset||In-Q-Tel, Anthem Venture Partners, Toba Capital||Enterprise Endpoint Security|
|Red Canary||Access Venture Partners, Kyrus, Service Provider Capital||Enterprise Endpoint Security|
|Morphisec||Deutsche Telekom Capital Partners, GE Ventures, Jerusalem Venture Partners||Enterprise Endpoint Security|
|NEXThink||Auriga Partners, Galeo Ventures, Highland Europe||Enterprise Endpoint Security|
|Lightcyber||Access Industries, Battery Ventures, Gilot Capital Partners||Enterprise Endpoint Security|
|Digital Guardian||Brookline Venture Partners, Fairhaven Capital, GE Pension Fund||Enterprise Endpoint Security|
|Avecto||JMI Equity||Enterprise Endpoint Security|
|Trillium||Global Brain Corporation||Connected Car Security|
|Argus Cybersecurity||Startup Autobahn, Allianz Ventures, SBI Group||Connected Car Security|
|Karamba Security||Fontinalis Partners, GlenRock Israel, YL Ventures||Connected Car Security|
|CloudMade||Valeo, Intel Capital, 83North||Connected Car Security|
|Baimos Technologies||Bayern Kapital, HCS Beteiligungsgesellschaft, High-Tech Grunderfonds||Connected Car Security|
|VisualThreat||Undisclosed Investors||Connected Car Security|
Want more data on cybersecurity startups? Log in to CB Insights or sign up for free below.
This report was created with data from CB Insights’ emerging technology insights platform, which offers clarity into emerging tech and new business strategies through tools like:
- Earnings Transcripts Search Engine & Analytics to get an information edge on competitors’ and incumbents’ strategies
- Patent Analytics to see where innovation is happening next
- Company Mosaic Scores to evaluate startup health, based on our National Science Foundation-backed algorithm
- Business Relationships to quickly see a company’s competitors, partners, and more
- Market Sizing Tools to visualize market growth and spot the next big opportunity