In the newly revised 2024 edition of Security Yearbook: A History and Directory of the IT Security Industry, celebrated author and information security expert Richard Stiennon delivers the latest complete desk reference for the entire cybersecurity industry. In the book, you'll find a comprehensive directory of cybersecurity vendors, updated for 2024, complete with headquarters location, category, sub-category, number of employees, and growth trends. The author has also included an insightful and concise history of important and relevant sub-sectors of the cybersecurity industry, including Distributed Denial-of-Service defense, network security, endpoint detection, identity and access management, data security, and governance risk compliance. Case studies and stories of key personalities supplement the history, showcasing the stories of significant characters who had their hands in landscape-altering events in the field.
You'll also find: - Discussions of substantial IT security failures that had an impact on the industry, and on society as a whole - Major mergers and acquisitions, company failures and closures, and funding events in the cybersecurity sector - Significant developments in open-source projects with an impact on cybersecurity practitioners around the world
Perfect for security architects, CISOs, freelance cybersecurity professionals, and other technical specialists, Security Yearbook 2024 is also a must-read resource for the managers, executives, and directors responsible for guiding and leading the efforts of technology professionals.
New entrants to the field will want to read Security Yearbook 2024 cover-to-cover to understand how we got to where we are today. Students will enjoy Stiennon's breezy style as they learn everything the author has gleaned in his 29-year career.
Table of Contents
Acknowledgments xi
1 2023 in Review 1
The AI Tsunami 1
Silicon Valley Bank Failure 1
2023 Funding 2
Mergers and Acquisitions in 2023 2
Public Cybersecurity Companies 2
The New Guy 3
Updates to the Directory 3
Vendor/Product Selection 3
Investment Thesis Validation 3
Industry Analysis 3
Strategic Evaluation 3
Marketing 3
OEM Relationship Development 3
2 Introduction 5
3 Getting to Know the IT Security Industry 9
Main Categories 10
Network Security 10
Data Security 11
Identity and Access Management 11
Grc 12
Endpoint Security 12
Other Categories 12
Security Operations 12
IoT Security 12
Managed Security Service Providers 13
Application Security 13
API Security 13
Security Analytics 13
Fraud Prevention 14
Threat Intelligence 14
Types of Threat Intelligence Vendors 15
Deep and Dark Web Defined 16
XI Email Security 16
Training 16
Deception 17
Security Testing 17
Summary 18
4 A Brief History of the IT Security Industry 21
Missed Opportunity 22
Acquisition Replaces R&D in the Security Space 22
Digital Mercantilism 24
5 The History of Network Security 27
The Rise of Intrusion Prevention 28
Internet Security Systems 29
Sourcefire 29
Multifunction to UTM to Next- Gen Firewall 30
Local Internet Breakouts 31
Palo Alto Networks 31
The Other UTM Vendors 32
From Hardware Sales to Subscription Model 33
Mobile Devices Side- Step Firewall Controls 34
The Zscaler Story 34
Story: Chris Blask 36
Story: Gil Shwed 38
Story: Guy Guzner 44
NetGuard: My First Cybersecurity Startup 45
Life at Check Point 45
Browser Isolation and FireGlass 46
Acquisition by Symantec 47
Becoming Savvy 47
Conclusion 49
Story: Martin Roesch 49
Snort Catches Fire 49
Hacking a Business Model 50
Sourcefire Heats Up 51
Capping the Sourcefire Journey 52
Back to Startup Life 53
6 DDoS Defense 55
Cloud Proxies 55
Prolexic 56
7 Endpoint Protection from AV to EDR 59
Symantec 59
Network Associates 62
Trend Micro 64
Kaspersky Lab 64
Endpoint Detection and Response 65
Story: Eva Chen and Trend Micro 65
The Early Years 65
Never Stop Innovating 66
Culture Is Everything 67
Above and Beyond 67
Story: Kailash Katkar: Quick Heal: Building a Successful Global Cybersecurity Company Out of India 68
The Genesis 68
Quick Heal Was Born 70
Quick Heal, the Most Popular Antivirus in Pune, India 71
Becoming the Largest- Selling Cybersecurity Brand in India 71
Repairing Computers to Securing Computers: Cat Computer Services to Quick Heal Technologies 72
From the Leading Consumer Cybersecurity Brand to Full- Scale Enterprise Security Solutions Provider 72
Going Public 73
Coronavirus Pandemic: The World Quarantines Itself 73
Gearing Up for the Future 74
8 Identity and Access Management 75
It All Began with RACF 75
Story: Barry Schrager 76
Story: Venkat Raghavan 78
9 Data Security 81
Digital Certificates 82
Other Data Security Categories 83
Story: David Cowan 84
Story: Sandra Toms 90
Story: Deborah Taylor Moore 92
10 Governance, Risk, and Compliance 95
Risk Management 95
Frameworks 98
Other GRC Solutions 98
Story: Renaud Deraison 98
11 Managed Security Services 103
Story: Amit Yoran 104
Riptech 104
Symantec 107
Department of Homeland Security 107
NetWitness 109
Tenable 111
12 Open- Source Security 113
Snort 113
Nmap 113
Kali Linux 114
Nessus 114
Metasploit 114
Osquery 114
eBPF 115
Ruff 115
The Top 100 Open- Source Security Projects 115
13 Failures 121
2020 Failures 122
2021 Failures 122
2022 Failures 123
2023 Failures 123
14 In Memoriam 125
Zohar Zisapel 125
Kevin Mitnick 125
Vittorio Luigi Bertocci 126
Steve Katz 126
French Caldwell 127
15 2023 Mergers and Acquisitions 129
First Quarter M&A 129
Second Quarter M&A 129
Third Quarter M&A 130
Fourth Quarter M&A 130
Year Summary 130
16 2023 Funding 143
17 Significant Cyber Incidents in 2023 157
January 2023 158
February 2023 159
March 2023 160
April 2023 160
May 2023 162
June 2023 162
July 2023 163
August 2023 164
September 2023 165
October 2023 167
November 2023 167
December 2023 168
18 Research Methodology 169
What Is a Security Vendor? 169
How to Find Vendors? 169
19 Directory A-Z 173
20 Directory by Country 257
21 Directory by Category 345