The following two graphs summarize the types of funding going into the Security Technology space. Please note these graphics are made using 2016 data through October.
The graph above shows the total amount of VC funding broken out by type. In recent years, we’ve seen a general increase in the amount of funding across the board, with growth in the amount of practically all funding stages.
The graph above shows the total count of funding events broken out by type. Similar to the earlier graph, we’ve seen a general upward trend over these past few years. Earlier stage deals (Seed, Series A, Series B) make up a larger share of the total count.
We are currently tracking 767 Security Technology companies in 14 categories across 40 countries, with a total of $12.9 Billion in funding. Click here to learn more about the full Security Technology landscape report and database.
The above graph compares the total venture funding in each Security Technology category to the number of companies in the category. The Thread Detection/Mitigation category leads the sector in both the Total Funding stat ($6B in funding) and the Company Count stat (over 200 startups).
We are currently tracking 764 Security Technology companies in 14 categories across 40 countries, with a total of $12.8B in funding. Click here to learn more about the full Security Technology landscape report and database.
The above analysis summarizes the average company funding in each Security Technology category. The Email Security category leads the sector with around $100M in average funding per company, followed by the Endpoint/Firewall category with just over $90M in average funding per company.
We are currently tracking 749 Security Technology companies in 14 categories across 39 countries, with a total of $12.3 Billion in funding. Click here to learn more about the full Retail Technology landscape report and database.
The above sector map organizes the Security Technology sector into 14 categories and shows a sampling of companies in each category.
Cloud and Hosting Server Security: Companies that provide security solutions that protect hosting servers from being attacked. Examples include security solutions for cloud applications, third-party cloud services, and cloud data files.
Identity and Fraud Security: Companies that authenticate identities, approve access within a system, and monitor activities to prevent fraud. Examples include password management, security tokens, and digital identity management.
Data and Information Security: Companies that help protect electronic data from unauthorized external access or threats. Examples include data leakage prevention, file-based security, and enterprise data encryption.
Mobile Security: Companies that protect smartphones and tablets from threats associated with mobile computing. Examples include proactive mobile protection, lost device management, and mobile application security.
Endpoint Security and Firewall: Companies that provide security solutions to protect devices connected to networks. Examples include anti-virus programs, firewalls, and system utility tools.
Risk Assessment and Compliance: Companies that assess the security level of enterprise networks and ensure that they comply with governmental and industrial standards. Examples include companies that conduct penetration tests, ethical hacking, and compliance management.
Security Intelligence and Analytics: Companies that collect data and provide actionable analytics on network security and potential threats. Examples include threat intelligence networks, attack data collection, and security predictive analytics.
Threat Detection and Mitigation: Companies that actively monitor the network to detect attacks and help mitigate them by responding in real-time. Examples include threat monitoring, vulnerability scans, and network hardening.
Infrastructure and Industrial Security: Companies that protect industrial infrastructures and governmental operations from security threats. Examples include companies that defend against attacks on supervisory control and data acquisition (SCADA), attacks on Homeland Security, and attacks on manufacturing supply chains.
Application and Source Code Security: Companies that scan application and program source codes for potential loopholes. Examples include runtime application security, application performance management, and application assessment.
Email Security: Companies that focus on providing security solutions for email platforms. Examples include anti-spam solutions, anti-phishing solutions, and attachment scanning.
Computer Forensics: Companies that monitor and investigate computer usage for criminal investigations or evidence acquisition. Examples include internet usage monitoring, employee behavior monitoring, and online parental control.
Security Hardware: Companies that produce hardware components for digital security purposes. Examples include cloud key USBs, VPN routers, and controller access points.
Brand Protection: Companies that protect the public image of brands on the Internet. Examples include reputation management, domain name monitoring, and social media attack mitigation.
We are currently tracking 737 Security Technology companies in 14 categories across 39 countries, with a total of $12.1 Billion in funding. Click here to learn more about the full Security Technology landscape report and database.