Security Technology Q2 Update in 15 Visuals

Venture Scanner

We at Venture Scanner are tracking 520 Security Technology companies across 14 categories, with a combined funding amount of $6 Billion. The 15 visuals below summarize the current state of Security Technology.

1. Security Technology Market Overview

We organize Security Technology into the 14 categories listed below:

Cloud and Hosting Server Security: Companies that provide security solutions that protect hosting servers from being attacked. Examples include security solutions for cloud applications, third-party cloud services, and cloud data files.

Identity and Fraud Security: Companies that authenticate identities, approve access within a system, and monitor activities to prevent fraud. Examples include password management, security tokens, and digital identity management.

Data and Information Security: Companies that help protect electronic data from unauthorized external access or threats. Examples include data leakage prevention, file-based security, and enterprise data encryption.

Mobile Security: Companies that protect smartphones and tablets from threats associated with mobile computing. Examples include proactive mobile protection, lost device management, and mobile application security.

Endpoint Security and Firewall: Companies that provide security solutions to protect devices connected to networks. Examples include anti-virus programs, firewalls, and system utility tools.

Risk Assessment and Compliance: Companies that assess the security level of enterprise networks and ensure that they comply with governmental and industrial standards. Examples include companies that conduct penetration tests, ethical hacking, and compliance management.

Security Intelligence and Analytics: Companies that collect data and provide actionable analytics on network security and potential threats. Examples include threat intelligence networks, attack data collection, and security predictive analytics.

Threat Detection and Mitigation: Companies that actively monitor the network to detect attacks and help mitigate them by responding in real-time. Examples include threat monitoring, vulnerability scans, and network hardening.

Infrastructure and Industrial Security: Companies that protect industrial infrastructures and governmental operations from security threats. Examples include companies that defend against attacks on supervisory control and data acquisition (SCADA), attacks on Homeland Security, and attacks on manufacturing supply chains.

Application and Source Code Security: Companies that scan application and program source codes for potential loopholes. Examples include runtime application security, application performance management, and application assessment.

Email Security: Companies that focus on providing security solutions for email platforms. Examples include anti-spam solutions, anti-phishing solutions, and attachment scanning.

Computer Forensics: Companies that monitor and investigate computer usage for criminal investigations or evidence acquisition. Examples include internet usage monitoring, employee behavior monitoring, and online parental control.

Security Hardware: Companies that produce hardware components for digital security purposes. Examples include cloud key USBs, VPN routers, and controller access points.

Brand Protection: Companies that protect the public image of brands on the Internet. Examples include reputation management, domain name monitoring, and social media attack mitigation.

2. Company Count by Security Technology Category

 

The above graph summarizes the number of companies in each Security Technology category. The Data Security category is leading the way with 131 companies, followed by the Threat Mitigation category with 129 companies.

3. Funding by Security Technology Category

 

The above graph summarizes the total amount of funding in each Security Technology category. The Threat Mitigation category is leading the market with over $3.3B in total funding, followed by the Endpoint Security category with $2.1B in total funding.

4. Venture Investing In Security Technology

 

The above graph compares the total venture funding in each Security Technology category to the number of companies in the category. The Threat Mitigation category is leading in the Total Funding stat with over $3.3B, whereas the Data Security category is leading in the Company Count stat with 131 companies.

5. Security Technology Total Funding by Year

 

The above graph summarizes the total funding raised by Security Technology companies each year. 2015 was the best year in Security Technology funding thus far with over $1.5B raised, followed by 2014 at a close second with over $1.4B raised.

6. Average Funding by Security Technology Category

 

The above graph summarizes the average company funding in each Security Technology category. The Email Security category leads the market with over $130M in funding per company, followed by the Computer Forensics category with over $118M in funding per company.

7. Average Age by Security Technology Category

 

The above graph summarizes the average age of companies in each Security Technology category. Email Security ranks as the most mature Security Technology category with an average age of 13 years per company, followed by the Brand Protection category at a close second with an average age of 12 years per company. We included a few established companies that are innovating in these categories, which explains their relative maturity.

8. Median Age by Security Technology Category

 

The above graph summarizes the median age of companies in each Security Technology category. Email Security ranks as the most mature Security Technology category with a median age of 13 years per company, followed by the Risk Assessment category with a median age of 10 years per company. We included a few established companies that are innovating in these categories, which explains their relative maturity.

9. Security Technology Company Count by Country

 

The above map shows the number of Security Technology companies located in different countries. The United States ranks as the top country with 221 Security Technology companies.

10. Security Technology VC Funding by Country

 

The above map shows the amount of Security Technology venture capital funding in different countries. The United States leads with $5.5B funding in Security Technology companies.

11. Security Technology Companies Founded by Year

 

The above graph summarizes the number of Security Technology companies founded in a certain year. 2014 ranks as the top year with 57 Security Technology companies founded, with 2013 in second place with 52 Security Technology companies founded.

12. Security Technology Funding by Vintage Year

 

The above graph summarizes the total amount of funding raised by the Security Technology companies founded in a certain year. Security Technology companies founded in 2004 have raised the most funding at $876M, followed by those founded in 2002 which have raised $608M.

13. Security Technology Company Headcount Distribution

 

The above graph summarizes the percentage of Security Technology companies with a certain employee headcount range. Companies with 1–50 employees make up about 70% of the market.

14. Number of Security Technology Investments by Selected Investors

 

The above graph summarizes the total number of investment rounds Security Technology investors participated in. Accel outperformed all of its peers, having made 26 investments into Security Technology companies. Sequoia Capital is the runner-up with 24 investments.

15. Number of Security Technology Companies Backed by Selected Investors

 

The above graph summarizes the number of unique Security Technology companies funded by selected investors. Accel takes the top spot by having invested in a total of 20 unique Security Technology companies, followed by Sequoia Capital which has invested in 10 unique Security Technology companies.

Venture Scanner is your analyst and technology powered startup research firm. If you would like access to the full Security Technology landscape report and data, visit https://www.venturescanner.com/security-technology or reach out to [email protected].

Share This Post: