Four of the market segments in our cybersecurity map showcase at least one unicorn valued at $1B+. Mobile Security has three: Okta, Lookout, and Avast Software.
Cybersecurity funding activity has seen dramatic growth over the last four and a half years, peaking in 2015 before leveling off slightly in the first half of this year, amid investor worries that the space is over-funded.
We used CB Insights data to identify 106 private companies in cybersecurity and mapped them according to the 11 main categories where they’re operating. The startups included are mainly addressing Network and Endpoint Security, along with other niche market segments such as Deception Security, and more.
Not all of the categories in our map are mutually exclusive.
Many of our categories are domain-focused — including IoT/IIoT Security, Network & Endpoint Security, Mobile Security, Cloud Security, and Website Security — and will include companies focused on various kinds of security tech.
The remaining categories have less overlap as they are more focused on a company’s product or process that are representative of an emerging cybersecurity market trend.
For example, companies like Darktrace, which utilize machine learning to detect abnormal behaviors on networks and devices, could also be included in the category Network & Endpoint Security. However, we categorized Darktrace as a company focused on Behavioral Detection to highlight an increasingly valuable market segment arising from the ability to detect “zero day” network intrusions by observing deviations from normal or expected behaviors in users or over entire systems.
We define cybersecurity as tech-enabled companies that offer products and services for which the primary use case is the protection of digital assets from unauthorized access and malicious use by cyber criminals. Companies in online payment fraud detection are excluded from this mapping.
Click on the image below to enlarge.
The breakdown is as follows:
Network & Endpoint Security: This is the largest category in our market map and includes startups like Red Canary, which specializes in protecting enterprise computer networks from vulnerabilities that arise as a result of remotely bridging users’ laptops, tablets, and other electronic devices (aka “endpoints”). Other companies like Cylance apply artificial intelligence algorithms to predict, identify, and stop malware and advanced threats in defense of endpoints. Unicorns in this category include the companies: Tanium ($3.5B), Cylance ($1B), and CloudFlare($1B).
IoT/IIoT Security: Startups in this category include Argus Cyber Security which is an automotive cybersecurity company enabling car manufacturers to protect connected vehicles. Also, Indegy which provides security for industrial control systems used across critical infrastructures, including energy, water utilities, petrochemical plants, manufacturing facilities, etc. Unicorns include: ForeScout Technologies ($1B) and Zscaler ($1B).
Threat Intelligence: Companies include Flashpoint, which illuminates targeted malicious activities on the deep Web to uncover potential threats and thwart attacks.
Mobile Security: Companies in this category include Zimperium, which delivers enterprise mobile threat protection for Android and iOS devices. Unicorns include: Lookout ($1B), Okta ($1.2B), and Avast Software ($1B).
Behavioral Detection: Included are companies like Darktrace, which detects abnormal behavior in organizations in order to identify threats and manage risks from cyber-attacks.
Deception Security: Companies like illusive networks can identify and proactively deceive and disrupt attackers before they can cause harm.
Continuous Network Visibility: Protectwise and others offer solutions for visualizing network activity and responding to cyber attacks in real time.
Risk Remediation: Companies like AttackIQ offer solutions for pinpointing vulnerabilities in technologies, people, and processes with recommendations on how to effectively fill security gaps.
Quantum Encryption: Startups like Post-Quantum offer encrypted wireless and data communications technology that relies on the science underlying quantum mechanics.
See the full company list, below:
|Tanium||Andreessen Horowitz, Institutional Venture Partners, TPG Growth||Network & Endpoint Security|
|Bit9 + Carbon Black||Highland Capital Partners, Kleiner Perkins Caufield & Byers, Sequoia Capital||Network & Endpoint Security|
|CloudFlare||Baidu, Fidelity Investments, Google Capital||Network & Endpoint Security|
|CrowdStrike||Accel Partners, Google Capital, Rackspace||Network & Endpoint Security|
|NEXthink||Auriga Partners, Galeo Ventures, Highland Europe||Network & Endpoint Security|
|Barkly||New Enterprise Associates, Sigma Prime Ventures||Network & Endpoint Security|
|Ionic Security||Amazon, Goldman Sachs, Google ventures||Network & Endpoint Security|
|Bromium||Andreessen Horowitz, Highland Capital Partners, Ignition Partners||Network & Endpoint Security|
|Digital Guardian||Brookline Venture Partners, Fairhaven Capital, GE Pension Fund||Network & Endpoint Security|
|vArmour Network||Redline Capital Management, Telstra Ventures, Citi Ventures||Network & Endpoint Security|
|CounterTack||Fairhaven Capital, Ten Eleven Ventures||Network & Endpoint Security|
|Mojo Networks||Granite Ventures, Trident Capital||Network & Endpoint Security|
|Duo Security||Michigan Strategic Fund, Benchmark, Google Ventures||Network & Endpoint Security|
|enSilo||Carmel Ventures, Lightspeed Venture Partners||Network & Endpoint Security|
|Fireglass||Deutsche Telekom Capital Partners, Lightspeed Venture Partners||Network & Endpoint Security|
|Twistlock||Rally Ventures, Ten Eleven Ventures, YL Ventures||Network & Endpoint Security|
|Red Canary||Access Venture Partners||Network & Endpoint Security|
|Code42 Software||Accel Partners, New Enterprise Associates||Network & Endpoint Security|
|Veracode||Founders Circle Capital, .406 Ventures, In-Q-Tel||Network & Endpoint Security|
|ThinAir Labs||Workday Ventures, Y Combinator||Network & Endpoint Security|
|SentinelOne||SineWave Ventures, Third Point, Tiger Global Management||Network & Endpoint Security|
|Centrify||Jackson Square Ventures, NTT DoComo Ventures, Samsung Ventures||Network & Endpoint Security|
|Cylance||Blackstone Group, Capital One Growth Ventures, Citi Ventures||Network & Endpoint Security|
|PhishMe||Bessemer Venture Partners||Network & Endpoint Security|
|Mocana||AITV, Shasta Ventures, Trident Capital||IoT/ IIoT Security|
|Bastille Networks||Bessemer Venture Partners||IoT/ IIoT Security|
|Bayshore Networks||Trident Capital||IoT/ IIoT Security|
|Argus Cyber Security||Startup Autobahn, Magma Venture Partners||IoT/ IIoT Security|
|Indegy||Aspect Ventures, Magma Venture Partners, SBI Group||IoT/ IIoT Security|
|Pwnie Express||.406 Ventures, Ascent Venture Partners, Fairhaven Capital||IoT/ IIoT Security|
|ThetaRay||Alibaba Group, BIRD Foundation, General Electric||IoT/ IIoT Security|
|Rubicon Labs||Akamai Technologies, Pelion Venture Partners, Third Point||IoT/ IIoT Security|
|NexDefense||TechOperators, BIP Capital, Mosley Ventures||IoT/ IIoT Security|
|SecureRF||Emerald Technology Ventures, Foundation Capital, General Electric||IoT/ IIoT Security|
|ForeScout Technologies||Amadeus Capital Partners, Aspect Ventures||IoT/ IIoT Security|
|Zscaler||Google Capital, EMC Ventures, Lightspeed Venture Partners||IoT/ IIoT Security|
|Venafi||Foundation Capital, Intel Capital, Pelion Venture Partners||IoT/ IIoT Security|
|CyberX||ff Venture Capital, Flint Capital, GlenRock Israel||IoT/ IIoT Security|
|Trillium||Global Brain Corporation||IoT/ IIoT Security|
|Skybox Security||Providence Equity Partners, Benchmark, Carmel Ventures||Threat Intelligence|
|Flashpoint||Bloomberg Beta, Cisco Investments, Greycroft Partners||Threat Intelligence|
|ThreatQuotient||Blu Venture Investors, CIT GAP Funds, New Enterprise Associates||Threat Intelligence|
|Lookingglass Cyber Solutions||Alsop-Louie Partners, Neuberger Berman, New Spring Capital||Threat Intelligence|
|4iQ||Adara Venture Partners, Benhamou Global Ventures, Trident Capital||Threat Intelligence|
|ZeroFOX||Highland Capital Partners, New Enterprise Associates, Comcast Ventures||Threat Intelligence|
|Anomali||In-Q-Tel, General Catalyst Partners, Google Ventures||Threat Intelligence|
|Synack||GGV Capital, Icon Ventures, Allegis Capital||Threat Intelligence|
|SecurityScorecard||Google Ventures, Sequoia Capital, Two Sigma Ventures||Threat Intelligence|
|Digital Shadows||Passion Capital, Storm Ventures, Ten Eleven Ventures||Threat Intelligence|
|ThreatConnect||Grotech Ventures, SAP||Threat Intelligence|
|PatternEx||Khosla Ventures||Threat Intelligence|
|AlienVault||Kleiner Perkins Caufield & Byers, Trident Capital, Intel Capital||Threat Intelligence|
|EclecticIQ||NATO Cybersecurity Incubator||Threat Intelligence|
|LogRhythm||Access Venture Partners, Adams Street Partners, Piper Jaffray||Threat Intelligence|
|NSS Labs||Delta-V Capital, LiveOak Venture Partners, Chevron Technology Ventures||Threat Intelligence|
|Lookout||Accel Partners, Andreessen Horowitz, Bezos Expeditions||Mobile Security|
|OpenPeak||AT&T, Blackstone Group, CMG Capital Partners||Mobile Security|
|Okta||Andreessen Horowitz, Greylock Partners, Khosla Ventures||Mobile Security|
|Workspot||Helion Venture Partners, TransLink Capital, Qualcomm Ventures||Mobile Security|
|AppDome||Draper Nexus Ventures, Menlo Ventures||Mobile Security|
|Bitglass||New Enterprise Associates, Norwest Venture Partners||Mobile Security|
|Silent Circle||Santander InnoVentures, Ross Perot Jr.||Mobile Security|
|Avast Software||CVC Capital Partners, Summit Partners||Mobile Security|
|Zimperium||Telstra Ventures, Warbug Pincus, Samsung Ventures||Mobile Security|
|Trustlook||Trustbridge Partners, Danhua Capital, ZhenFund||Mobile Security|
|Wickr||Alsop-Louie Partners, Breyer Capital, CME Ventures||Mobile Security|
|Skycure||Foundation Capital, Lane Bess, Michael Weider||Mobile Security|
|Appthority||Trident Capital, US Venture Partners, Venrock||Mobile Security|
|Exabeam||Aspect Ventures, Icon Ventures, Norwest Venture Partners||Behaviorial Detection|
|Darktrace||Kohlberg Kravis Roberts & Co, Samsung Ventures, SoftBank Group||Behaviorial Detection|
|eSentire||Cisco Investments, Edison Partners, Georgian Partners||Behaviorial Detection|
|LightCyber||Access Industries, Amplify Partners, Battery Ventures||Behaviorial Detection|
|PerimeterX||Undisclosed Investors||Behaviorial Detection|
|Illumio||Accel Partners, Andreessen Horowitz, Black Rock||Cloud Security|
|AVANAN||Magma Venture Partners, StageOne Ventures, NYU Future Labs||Cloud Security|
|Netskope||Accel Partners, Lightspeed Venture Partners, Social Capital||Cloud Security|
|Threat Stack||Ascent Venture Partners, Scale Venture Partners, Techstars||Cloud Security|
|HyTrust||City National Bank, Cisco Investments||Cloud Security|
|CipherCloud||Andreessen Horowitz, Delta Partners Capital||Cloud Security|
|Skyhigh Networks||Greylock Partners, Salesforce Ventures, Sequoia Capital||Cloud Security|
|Evident.io||Venrock, Bain Capital Ventures, True Ventures||Cloud Security|
|Palerra||August Capital, Norwest Venture Partners, Wing Venture Capital||Cloud Security|
|Tigera||New Enterprise Associates, Wing Venture Capital||Cloud Security|
|Dome9 Security||JAL Ventures, Lazarus Israel Opportunities Fund, Opus Capital||Cloud Security|
|illusive networks||Bessemer Venture Partners, Cisco Investments, Citi Ventures||Deception Security|
|Area 1 Security||Icon Ventures, Kleiner Perkins Caufield & Byers, Allegis Capital||Deception Security|
|Cymmetria||Felicis Ventures, Sherpa Capital, Idrive Ventures||Deception Security|
|Endgame||Bessemer Venture Partners, Columbia Capital, Paladin Capital Group||Deception Security|
|TrapX||Strategic Cyber Ventures, BRM Group, Intel Capital||Deception Security|
|Cybereason||SoftBank Group, Spark Capital, Lockheed Martin||Continuous Network Visibility|
|PacketSled||Blu Venture Investors, JHS Ventures, Keshif Ventures||Continuous Network Visibility|
|Verodin||Blackstone Group, Cisco Investments, Crosslink Capital||Continuous Network Visibility|
|Centripetal Networks||Alsop-Louie Partners||Continuous Network Visibility|
|Tenable Network Security||Accel Partners, Insight Venture Partners||Continuous Network Visibility|
|ProtectWise||Arsenal Venture Partners, Crosslink Capital, Paladin Capital Group||Continuous Network Visibility|
|Vectra Networks||Wipro Ventures, Accel Partners, AME Cloud Ventures||Continuous Network Visibility|
|RedSeal Networks||DRW Trading Group, Icon Ventures, Leapfrog Ventures||Risk Remediation|
|SafeBreach||Deutsche Telekom Capital Partners, Hewlett-Packard Ventures, Maverick Ventures||Risk Remediation|
|AttackIQ||Index Ventures, evoNexus||Risk Remediation|
|UpGuard||500 Startups, Insurance Australia Group||Risk Remediation|
|Distil Networks||Bessemer Venture Partners, Foundry Group, Silicon Valley Bank||Website Security|
|Shape Security||Kleiner Perkins Caufield & Byers, Baseline Ventures, Google Ventures||Website Security|
|Post-Quantum||AM Partners, VMS Investment Group, Barclays Accelerator||Quantum Encryption|
|ID Quantique||Qwave||Quantum Encryption|
|QuintessenceLabs||Westpac Group, Dept. of Defense – Australia||Quantum Encryption|
|Nano-Meta Technologies||Qwave, Runa Capital||Quantum Encryption|
Want more data on cybersecurity startups? Login to CB Insights or sign up for free below.
This report was created with data from CB Insights’ emerging technology insights platform, which offers clarity into emerging tech and new business strategies through tools like:
- Earnings Transcripts Search Engine & Analytics to get an information edge on competitors’ and incumbents’ strategies
- Patent Analytics to see where innovation is happening next
- Company Mosaic Scores to evaluate startup health, based on our National Science Foundation-backed algorithm
- Business Relationships to quickly see a company’s competitors, partners, and more
- Market Sizing Tools to visualize market growth and spot the next big opportunity