+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Security Yearbook 2024. A History and Directory of the IT Security Industry. Edition No. 5

  • Book

  • 432 Pages
  • June 2024
  • John Wiley and Sons Ltd
  • ID: 5949337
A fascinating history of the cybersecurity industry as well as an up-to-date collection of leading cybersecurity vendors from around the globe

In the newly revised 2024 edition of Security Yearbook: A History and Directory of the IT Security Industry, celebrated author and information security expert Richard Stiennon delivers the latest complete desk reference for the entire cybersecurity industry. In the book, you'll find a comprehensive directory of cybersecurity vendors, updated for 2024, complete with headquarters location, category, sub-category, number of employees, and growth trends. The author has also included an insightful and concise history of important and relevant sub-sectors of the cybersecurity industry, including Distributed Denial-of-Service defense, network security, endpoint detection, identity and access management, data security, and governance risk compliance. Case studies and stories of key personalities supplement the history, showcasing the stories of significant characters who had their hands in landscape-altering events in the field.

You'll also find: - Discussions of substantial IT security failures that had an impact on the industry, and on society as a whole - Major mergers and acquisitions, company failures and closures, and funding events in the cybersecurity sector - Significant developments in open-source projects with an impact on cybersecurity practitioners around the world

Perfect for security architects, CISOs, freelance cybersecurity professionals, and other technical specialists, Security Yearbook 2024 is also a must-read resource for the managers, executives, and directors responsible for guiding and leading the efforts of technology professionals.

New entrants to the field will want to read Security Yearbook 2024 cover-to-cover to understand how we got to where we are today. Students will enjoy Stiennon's breezy style as they learn everything the author has gleaned in his 29-year career.

Table of Contents

Acknowledgments xi

1 2023 in Review 1

The AI Tsunami 1

Silicon Valley Bank Failure 1

2023 Funding 2

Mergers and Acquisitions in 2023 2

Public Cybersecurity Companies 2

The New Guy 3

Updates to the Directory 3

Vendor/Product Selection 3

Investment Thesis Validation 3

Industry Analysis 3

Strategic Evaluation 3

Marketing 3

OEM Relationship Development 3

2 Introduction 5

3 Getting to Know the IT Security Industry 9

Main Categories 10

Network Security 10

Data Security 11

Identity and Access Management 11

Grc 12

Endpoint Security 12

Other Categories 12

Security Operations 12

IoT Security 12

Managed Security Service Providers 13

Application Security 13

API Security 13

Security Analytics 13

Fraud Prevention 14

Threat Intelligence 14

Types of Threat Intelligence Vendors 15

Deep and Dark Web Defined 16

XI Email Security 16

Training 16

Deception 17

Security Testing 17

Summary 18

4 A Brief History of the IT Security Industry 21

Missed Opportunity 22

Acquisition Replaces R&D in the Security Space 22

Digital Mercantilism 24

5 The History of Network Security 27

The Rise of Intrusion Prevention 28

Internet Security Systems 29

Sourcefire 29

Multifunction to UTM to Next- Gen Firewall 30

Local Internet Breakouts 31

Palo Alto Networks 31

The Other UTM Vendors 32

From Hardware Sales to Subscription Model 33

Mobile Devices Side- Step Firewall Controls 34

The Zscaler Story 34

Story: Chris Blask 36

Story: Gil Shwed 38

Story: Guy Guzner 44

NetGuard: My First Cybersecurity Startup 45

Life at Check Point 45

Browser Isolation and FireGlass 46

Acquisition by Symantec 47

Becoming Savvy 47

Conclusion 49

Story: Martin Roesch 49

Snort Catches Fire 49

Hacking a Business Model 50

Sourcefire Heats Up 51

Capping the Sourcefire Journey 52

Back to Startup Life 53

6 DDoS Defense 55

Cloud Proxies 55

Prolexic 56

7 Endpoint Protection from AV to EDR 59

Symantec 59

Network Associates 62

Trend Micro 64

Kaspersky Lab 64

Endpoint Detection and Response 65

Story: Eva Chen and Trend Micro 65

The Early Years 65

Never Stop Innovating 66

Culture Is Everything 67

Above and Beyond 67

Story: Kailash Katkar: Quick Heal: Building a Successful Global Cybersecurity Company Out of India 68

The Genesis 68

Quick Heal Was Born 70

Quick Heal, the Most Popular Antivirus in Pune, India 71

Becoming the Largest- Selling Cybersecurity Brand in India 71

Repairing Computers to Securing Computers: Cat Computer Services to Quick Heal Technologies 72

From the Leading Consumer Cybersecurity Brand to Full- Scale Enterprise Security Solutions Provider 72

Going Public 73

Coronavirus Pandemic: The World Quarantines Itself 73

Gearing Up for the Future 74

8 Identity and Access Management 75

It All Began with RACF 75

Story: Barry Schrager 76

Story: Venkat Raghavan 78

9 Data Security 81

Digital Certificates 82

Other Data Security Categories 83

Story: David Cowan 84

Story: Sandra Toms 90

Story: Deborah Taylor Moore 92

10 Governance, Risk, and Compliance 95

Risk Management 95

Frameworks 98

Other GRC Solutions 98

Story: Renaud Deraison 98

11 Managed Security Services 103

Story: Amit Yoran 104

Riptech 104

Symantec 107

Department of Homeland Security 107

NetWitness 109

Tenable 111

12 Open- Source Security 113

Snort 113

Nmap 113

Kali Linux 114

Nessus 114

Metasploit 114

Osquery 114

eBPF 115

Ruff 115

The Top 100 Open- Source Security Projects 115

13 Failures 121

2020 Failures 122

2021 Failures 122

2022 Failures 123

2023 Failures 123

14 In Memoriam 125

Zohar Zisapel 125

Kevin Mitnick 125

Vittorio Luigi Bertocci 126

Steve Katz 126

French Caldwell 127

15 2023 Mergers and Acquisitions 129

First Quarter M&A 129

Second Quarter M&A 129

Third Quarter M&A 130

Fourth Quarter M&A 130

Year Summary 130

16 2023 Funding 143

17 Significant Cyber Incidents in 2023 157

January 2023 158

February 2023 159

March 2023 160

April 2023 160

May 2023 162

June 2023 162

July 2023 163

August 2023 164

September 2023 165

October 2023 167

November 2023 167

December 2023 168

18 Research Methodology 169

What Is a Security Vendor? 169

How to Find Vendors? 169

19 Directory A-Z 173

20 Directory by Country 257

21 Directory by Category 345

Authors

Richard Stiennon University of Michigan, USA; King's College, London, UK.