This Is Why Cyber Security Investment Is Rising To Record Levels – Chuck Leaver

Written By Patrick Kilgore And Presented By Chuck Leaver Ziften CEO

A report was released called “Investors pour billions into cyber security companies” by CEO of Cybersecurity Ventures, Steve Morgan. This is not conjecture. The previous year alone, venture backed cyber security companies raised nearly $2 billion dollars. With this influx of capital, you would be forgiven for believing that things have actually hit their peak. However you would be incorrect …

At the midpoint of 2015, start ups in cyber security had already raised $1.2 billion in financing. There seems to be no end in sight when it comes to cyber security as Morgan says. Top firms like Allegis Capital have actually even raised funds (to the tune of $100M) to back cyber security development, solely.

The usual suspects are not there on the list of names. Morgan’s article states that the majority of the funding announcements are for fast growing organizations like ours. Ziften is in good company among innovators who are keeping up with the demands of modern cyber security. While we lead the pack in constant endpoint visibility – others companies have taken distinct approaches, like using artificial intelligence to the battle against cyber attacks or streamlining key lookups to bring public key encryption to the masses. They are all tackling a various pieces of the puzzle.

And it certainly is a puzzle. Because lots of services are extremely specialized, working together is going to be critical. The requirement for incorporating the different elements in the market for a sophisticated view of the issue set is clear. That’s why we developed Ziften Open Visibility ™ – to supply APIs, connectors, and indicators to integrate endpoint context and attribution data with existing investments.

Market Vision That Is 20/20

It may look like market saturation to the layperson however it is just the tip of the cyber security iceberg. Every day, cyber attacks end up being more advanced, finding new methods to ravage customers and organizations. This list of endorsed organizations is a testament to the idea that legacy endpoint and network security is failing. The notion of prevention is a good one, but security experts now understand that a 2 pronged strategy is needed that integrates detection and response.

You can have a 20/20 view of your security landscape, or you can keep your existing blind spots. Which one do you think will help you to sleep during the night?

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title="" rel=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>