Cyberattacks in Healthcare have Increased by a Factor of 125% Since 2010
The digital revolution has transformed the way businesses operate across the globe. However, digitally stored information is prone to hacking and manipulation by cyber criminals. The concern is validated by the fact that more than 5.1 million records are compromised due to data breaches every day. In 2016, close to 1,800 incidents of data breaches were reported across all the industries; in total, almost 1.4 billion data records were lost or stolen. The year 2017 also witnessed several cyberattacks; notable examples include WannaCry and NotPetya ransomware attacks, Equifax data breach, MongoDB databases leak, Elasticsearch server hack, Cloudbleed security bug, Zomato hack, HBO hack / Game of Thrones leaks, Uber data breach, and Ethereum hack.
The healthcare industry has been amongst the prime targets for hackers over the last several years. The Ponemon Institute’s Fifth Annual Study reported that cyberattacks in healthcare have increased by a factor of 125% since 2010. In the first half of 2017, the healthcare industry had been compromised a number of times, having experienced a total of 228 data breaches, representing 25% of the total number of breaches worldwide. Across these instances, around 31 million records were compromised, stolen or lost, representing an increase of 423% as compared to the first six months of 2016.
In addition, according to a report published in May 2016, it is estimated that, with each electronic health record (EHR) costing around USD 355 in the black market, healthcare data breaches have resulted in losses worth USD 6.2 billion per year to the US healthcare industry. Examples of organizations that have recently been the victims of cyberattacks / security incidents include (in alphabetical order) Abbott / St. Jude Medical, Anthem BlueCross BlueShield, Bayer, Bupa Global Health Insurance, Bronx Lebanon Hospital Center, HealthNow Networks, Johnson & Johnson, Med Center Health, Merck, National Health System (NHS), Pacific Alliance Medical Center, Patient Home Monitoring, and Smiths Medical.
In order to overcome these challenges, various cybersecurity solution providers have started to specifically focus on healthcare. Along with the presence of big companies, the entry of several start-ups is driving the innovation in this domain. Contrary to the expectation, capital spending on cybersecurity in the healthcare industry is far less compared to some other industries. In addition, the scarcity of skilled cybersecurity professionals capable of catering to the complex regulatory demands in the healthcare industry is making it even more difficult for the successful implementation of cybersecurity policies across this field.
The ‘Cybersecurity in Healthcare Market, 2018-2030’ report features an extensive study of the current landscape and future outlook of the growing market of cybersecurity within the healthcare industry. The focus of this study is on the cybersecurity products / solutions and services that are currently available for protecting internet connected devices against cybercriminals, and the likely evolution of novel technologies / platforms in the mid to long term. Backed by funding from several venture capital firms and strategic investors, this evolving market has its hopes pinned on the efforts of multiple start-ups.
Amongst other elements, the report features:
- A detailed assessment of the current market landscape of cybersecurity within the healthcare domain, providing information on cybersecurity core products / solutions, threat intelligence solutions, information on different threat types, security elements and modes of deployment.
- Detailed profiles of some of the emerging players in the industry, highlighting the current focus of the companies, capital raised, and details on their specific cybersecurity products / solutions and services. The profiles also have a section on recent developments, highlighting the achievements, partnerships / collaborations, and the likely strategies that may be adopted by these players to fuel growth in the foreseen future.
- A comprehensive benchmark analysis, highlighting key focus areas of mid to large sized companies, thereby, providing a means to compare the existing capabilities within respective peer groups and help industry stakeholders identify ways to achieve a competitive edge over contemporary players. In addition, we have provided detailed profiles of some of the established players within each peer group.
- An analysis of investments made at various stages of product development; these include seed financing, venture capital financing, debt financing and grants / awards received by the companies that are focused in this area.
- An elaborate valuation analysis of companies that are involved in providing cybersecurity products / solutions / services to the healthcare industry; for the purpose of this analysis, we focused on companies that have been established over the last 5-6 years.
- An overview of how artificial intelligence (AI), machine learning and deep learning techniques can augment cybersecurity, once integrated. In addition, we have outlined a detailed assessment of the current market landscape of AI-based cybersecurity, and provided high-level insights on the market competitiveness within this domain.
- A case study on cybersecurity use cases within the healthcare industry, highlighting some of the notable healthcare data breaches and security incidents that have happened in 2017. In addition, we have briefly outlined some of the recently reported medical device hacks / security vulnerabilities that led to the recalling of these devices.
One of the key objectives of the report was to understand the primary growth drivers and estimate the future size of the market. Based on various parameters, such as number of healthcare data breaches, number of records compromised, expected pricing of the stolen medical records and spending trends on cybersecurity in the healthcare industry, we have provided an informed estimate on the likely evolution of the market in the long term, for the period 2018-2030. To account for the uncertainties associated with the number of data breaches, and to add robustness to our model, we have provided three forecast scenarios, portraying the conservative, base and optimistic tracks of the market’s evolution.
The opinions and insights presented in the report were also influenced by discussions held with senior stakeholders in the industry. These include Garrett Silver (CEO, Critical Informatics), John Gomez (CEO, Sensato), Matan Kubovsky (VP, R&D, illusive networks), Mike Kijewski (CEO, MedCrypt), Mike Meikle (CEO, secureHIM), Robert Dobson (Director, Device Authority) and Rosa Lenders (Marketing Executive, Device Authority), Rod Schultz (CPO, Rubicon Labs) and Julia Cline (Senior Director, Product and Marketing, Rubicon Labs), Saïd Kenj (Account Executive, Cyberlytic) and Rebecca Bourke (Marketing Manager, Cyberlytic), Steve Leatherman (IT Consultant, BlackRidge Technology), and Yoni Shohet (CEO, SCADAfence). All actual figures have been sourced and analyzed from publicly available information forums and primary research discussions. Financial figures mentioned in this report are in USD, unless otherwise specified.
Example Highlights
- Close to 400 stakeholders currently offer a variety of products / solutions / services to healthcare organizations. Of these, over 80% companies provide core products / solutions (such as identity access management and intrusion prevention) to enhance information security. In addition, about 56% of the companies provide threat intelligence solutions to organizations in the healthcare organizations including hospitals, pharmaceutical / biotechnology companies and medical device manufacturers.
- At present, the market is highly fragmented and is a mix of large enterprises, mid-size companies and start-ups. Majority of the large-sized companies (total 72) have three types of offerings (core products / solutions, threat intelligence solutions and services). In fact, for some of the companies in this category, cybersecurity is one of the many focus areas. Examples include (in alphabetical order, no selection criteria) AECOM, Cisco, Fortinet, IBM, Juniper Networks, Level 3, McAfee, Microsoft, NETSCOUT, Secure Works, SonicWall, Symantec and VMware.
- Similarly, there are close to 100 mid-sized companies that are providing cybersecurity solutions / services to players in the healthcare domain. Examples include (in alphabetical order, no selection criteria) Absolute Software, Arbor Networks, Auth0, BeyondTrust, Black Duck Software, CipherCloud, Cybereason, Infoblox, Malwarebytes, Netskope, ThreatMetrix, LogRhythm, SentinelOne, Skyhigh Networks and Zerto.
- In addition, several start-ups (close to 200) are offering innovative solutions / products / services. Venture capitalists have strongly supported innovation in this domain; around USD 2.5 billion has been invested in this industry since 2012 across around 180 instances of funding. Some of the companies that have raised capital multiple times since 2012 include (in alphabetical order, no selection criteria) Auth0, Cybereason, Cylance, Darktrac, Fortscale, ProtectWise, Rubicon Labs, SentinelOne, Skyhigh Networks, SnoopWall, Sqrrl and Synack.
- Our proprietary valuation analysis reveals that, of the 64 start-ups that were evaluated, 20 companies are estimated to have a valuation between USD 100 million and USD 1,000 million. Examples of such companies include (in alphabetical order, no selection criteria) Anomali, Area 1 Security, Bitglass, Exabeam, Silent Circle, Sqrrl, Synack, Tempered Networks, Threat Stack, UpGuard and ZeroFOX. Specifically, there are two companies that are estimated to have a billion-dollar valuation.
- Given the increasing number of cyberattacks in the healthcare industry, and the fact that the volume of digital data / records will steadily increase in the future, we estimate the overall cybersecurity market specific to the healthcare industry to grow at an annualized rate of about 14%. Since a significant proportion of electronic / digital data is located in the US, we believe that this region currently accounts for over 60% of the market’s share; this is followed by Europe with over 20% share. Over time, due to the adoption of digital solutions in highly populated countries, such as India and China, the market in Asia-Pacific is expected grow at a relatively higher rate.
- Intrusion (hacking / ransomware) attacks, accounting for over 50% of the market, are the primary concern in the healthcare industry. In fact, the share of these breaches is estimated to grow to about 70% by 2030.
- In terms of type of security, products / solutions for application security and network security are the most popular; these occupy about 50% of the current market. Due to the increasing prevalence of cloud based solutions, the market for cloud security is likely to register a relatively higher growth and occupy around 25% of the overall share by 2030.
Table of Contents
1. PREFACE
1.1. Scope of the Report
1.2. Research Methodology
1.3. Chapter Outlines
2. EXECUTIVE SUMMARY
3. INTRODUCTION
3.1. Digitization and Global Transformation
3.1.1. The Internet of Things (IoT)
3.1.2. Cloud Computing
3.1.3. Digitized Business Communication
3.2. Impact of Digitization on Different Industries
3.3. Current Underlying Problems of Digitization
3.4. Risks and Mitigation Strategies of Digitization
3.5. Cybersecurity
3.5.1. The Importance of Cybersecurity
3.5.2. Historical Review of Notable Attacks and Data Breaches
3.5.3. Industries Impacted by Cybersecurity Incidents
3.5.4. Security Vulnerabilities and Threat Landscape
3.5.5. Introduction to Cybersecurity Solutions
4. CYBERSECURITY IN HEALTHCARE
4.1. Chapter Overview
4.2. Digital and Connected Healthcare
4.3. Common Vulnerabilities and Cyber Risks in Healthcare
4.4. HIPAA Framework
4.5. Cybersecurity in Healthcare
4.5.1. The Importance of Cybersecurity in Healthcare
4.5.2. Notable Attacks and Data Breaches in Healthcare
4.5.2.1. Attack on Anthem: The Largest Healthcare Data Breach in History
4.5.2.2. Recent Healthcare Data Breaches
4.5.3. Ransomware: A Key Concern for Healthcare Organizations
4.5.4. Elements of Cybersecurity in Healthcare
4.5.5. Growth Drivers and Road Blocks to Cybersecurity in Healthcare
4.5.6. Best Cybersecurity Practices for Healthcare Industry
5. CURRENT MARKET LANDSCAPE
5.1. Chapter Overview
5.2. Cybersecurity in Healthcare: List of Industry Players
5.2.1. Distribution by Year of Establishment
5.2.2. Distribution by Geographical Location
5.2.3. Distribution by Company Size
5.2.4. Distribution by Type of Offering
5.2.5. Distribution by Type of Core Products/Solutions
5.2.6. Distribution by Type of Threat Intelligence Solutions
5.2.7. Distribution by Type of Services
5.2.8. Distribution by Type of Security Elements
5.2.9. Distribution by Type of Deployment Mode
5.2.10. Distribution by Type of Threats Mitigated
6. CORE CYBERSECURITY PRODUCTS/SOLUTIONS: COMPANY PROFILES
6.1. Chapter Overview
6.2. Attivo Networks
6.2.1. Company Snapshot
6.2.2. Financial Information
6.2.3. Cybersecurity Product/Service Portfolio
6.2.4. Recent Developments
6.3. CensorNet
6.3.1. Company Snapshot
6.3.2. Financial Information
6.3.3. Cybersecurity Product/Service Portfolio
6.3.4. Recent Developments
6.4. Exabeam
6.4.1. Company Snapshot
6.4.2. Financial Information
6.4.3. Cybersecurity Product/Service Portfolio
6.4.4. Recent Developments
6.5. iCyber-Security
6.5.1. Company Snapshot
6.5.2. Financial Information
6.5.3. Cybersecurity Product/Service Portfolio
6.5.4. Recent Developments
6.6. Threat Stack
6.6.1. Company Snapshot
6.6.2. Financial Information
6.6.3. Cybersecurity Product/Service Portfolio
6.6.4. Recent Developments
6.7. TraceSecurity
6.7.1. Company Snapshot
6.7.2. Financial Information
6.7.3. Cybersecurity Product/Service Portfolio
6.7.4. Recent Developments
6.8. Zenedge
6.8.1. Company Snapshot
6.8.2. Financial Information
6.8.3. Cybersecurity Product/Service Portfolio
6.8.4. Recent Developments
7. THREAT INTELLIGENCE SOLUTIONS: COMPANY PROFILES
7.1. Chapter Overview
7.2. Anomali
7.2.1. Company Snapshot
7.2.2. Financial Information
7.2.3. Cybersecurity Product/Service Portfolio
7.2.4. Recent Developments
7.3. Centripetal Networks
7.3.1. Company Snapshot
7.3.2. Financial Information
7.3.3. Cybersecurity Product/Service Portfolio
7.3.4. Recent Developments
7.4. Flashpoint
7.4.1. Company Snapshot
7.4.2. Financial Information
7.4.3. Cybersecurity Product/Service Portfolio
7.4.4. Recent Developments
7.5. ProtectWise
7.5.1. Company Snapshot
7.5.2. Financial Information
7.5.3. Cybersecurity Product/Service Portfolio
7.5.4. Recent Developments
7.6. Sqrrl
7.6.1. Company Snapshot
7.6.2. Financial Information
7.6.3. Cybersecurity Product/Service Portfolio
7.6.4. Recent Developments
7.7. Shape Security
7.7.1. Company Snapshot
7.7.2. Financial Information
7.7.3. Cybersecurity Product/Service Portfolio
7.7.4. Recent Developments
7.8. Vectra Networks
7.8.1. Company Snapshot
7.8.2. Financial Information
7.8.3. Cybersecurity Product/Service Portfolio
7.8.4. Recent Developments
8. CYBERSECURITY SERVICES: COMPANY PROFILES
8.1. Chapter Overview
8.2. Agio
8.2.1. Company Snapshot
8.2.2. Cybersecurity Service Portfolio
8.2.3. Recent Developments
8.3. CyberSurance
8.3.1. Company Snapshot
8.3.2. Cybersecurity Service Portfolio
8.3.3. Recent Developments
8.4. Delta Risk
8.4.1. Company Snapshot
8.4.2. Cybersecurity Service Portfolio
8.4.3. Recent Developments
8.5. ITEGRITI
8.5.1. Company Snapshot
8.5.2. Cybersecurity Service Portfolio
8.5.3. Recent Developments
8.6. Security Risk Advisors
8.6.1. Company Snapshot
8.6.2. Cybersecurity Service Portfolio
8.6.3. Recent Developments
8.7. Sera-Brynn
8.7.1. Company Snapshot
8.7.2. Cybersecurity Service Portfolio
8.7.3. Recent Developments
8.8. VigiTrust
8.8.1. Company Snapshot
8.8.2. Cybersecurity Service Portfolio
8.8.3. Recent Developments
9. BENCHMARK ANALYSIS
9.1. Chapter Overview
9.2. Benchmark Analysis: Methodology
9.3. Benchmark Analysis: Peer Groups
9.4. Benchmark Analysis: Medium-Sized Companies
9.4.1. Peer Group I
9.4.2. Peer Group II
9.4.3. Peer Group III
9.4.4. Key Industry Players
9.4.4.1. AlienVault
9.4.4.1.1. Company Snapshot
9.4.4.1.2. Financial Information
9.4.4.1.3. Cybersecurity Product/Service Portfolio
9.4.4.1.4. Recent Developments
9.4.4.2. Carbon Black
9.4.4.2.1. Company Snapshot
9.4.4.2.2. Financial Information
9.4.4.2.3. Cybersecurity Product/Service Portfolio
9.4.4.2.4. Recent Developments
9.4.4.3. CrowdStrike
9.4.4.3.1. Company Snapshot
9.4.4.3.2. Financial Information
9.4.4.3.3. Cybersecurity Product/Service Portfolio
9.4.4.3.4. Recent Developments
9.4.4.4. Cylance
9.4.4.4.1. Company Snapshot
9.4.4.4.2. Financial Information
9.4.4.4.3. Cybersecurity Product/Service Portfolio
9.4.4.4.4. Recent Developments
9.4.4.5. Darktrace
9.4.4.5.1. Company Snapshot
9.4.4.5.2. Financial Information
9.4.4.5.3. Cybersecurity Product/Service Portfolio
9.4.4.5.4. Recent Developments
9.4.4.6. Gigamon
9.4.4.6.1. Company Snapshot
9.4.4.6.2. Financial Information
9.4.4.6.3. Cybersecurity Product/Service Portfolio
9.4.4.6.4. Recent Developments
9.4.4.7. LogRhythm
9.4.4.7.1. Company Snapshot
9.4.4.7.2. Financial Information
9.4.4.7.3. Cybersecurity Product/Service Portfolio
9.4.4.7.4. Recent Developments
9.5. Benchmark Analysis: Large-Sized Companies
9.5.1. Peer Group IV
9.5.2. Peer Group V
9.5.3. Key Industry Players
9.5.3.1. Fortinet
9.5.3.1.1. Company Snapshot
9.5.3.1.2. Financial Information
9.5.3.1.3. Cybersecurity Product/Service Portfolio
9.5.3.1.4. Recent Developments
9.5.3.2. FireEye
9.5.3.2.1. Company Snapshot
9.5.3.2.2. Financial Information
9.5.3.2.3. Cybersecurity Product/Service Portfolio
9.5.3.2.4. Recent Developments
9.5.3.3. IBM
9.5.3.3.1. Company Snapshot
9.5.3.3.2. Financial Information
9.5.3.3.3. Cybersecurity Product/Service Portfolio
9.5.3.3.4. Recent Developments
9.5.3.4. McAfee
9.5.3.4.1. Company Snapshot
9.5.3.4.2. Financial Information
9.5.3.4.3. Cybersecurity Product/Service Portfolio
9.5.3.4.4. Recent Developments
9.5.3.5. Palo Alto Networks
9.5.3.5.1. Company Snapshot
9.5.3.5.2. Financial Information
9.5.3.5.3. Cybersecurity Product/Service Portfolio
9.5.3.5.4. Recent Developments
9.5.3.6. Sophos
9.5.3.6.1. Company Snapshot
9.5.3.6.2. Financial Information
9.5.3.6.3. Cybersecurity Product/Service Portfolio
9.5.3.6.4. Recent Developments
9.5.3.7. Trustwave
9.5.3.7.1. Company Snapshot
9.5.3.7.2. Financial Information
9.5.3.7.3. Cybersecurity Product/Service Portfolio
9.5.3.7.4. Recent Developments
10. CAPITAL INVESTMENTS AND FUNDING
10.1. Chapter Overview
10.2. Types of Funding
10.3. Cybersecurity in Healthcare: Funding Instances
10.3.1. Analysis by Year of Funding
10.3.2. Analysis by Amount Invested
10.3.3. Analysis by Type of Funding
10.3.4. Most Active Players by Number of Instances
10.3.5. Most Active Investors by Number of Instances
10.4. Concluding Remarks
11. COMPANY VALUATION ANALYSIS
11.1. Chapter Overview
11.2. Company Valuation: Methodology
11.3. Company Valuation: Categorization by Multiple Parameters
11.3.1. Categorization by Employee Size
11.3.2. Categorization by Portfolio Strength
11.3.3. Categorization by Weighted Average Score
11.4. Company Valuation: Roots Analysis Proprietary Scores
12. MARKET FORECAST
12.1. Chapter Overview
12.2. Forecast Methodology and Key Assumptions
12.3. Overall Cybersecurity Market in Healthcare, 2018-2030
12.4. Cybersecurity Market in Healthcare: Distribution by Type of Offering
12.4.1. Core Cybersecurity Products/Solutions Market, 2018-2030
12.4.2. Threat Intelligence Solutions Market, 2018-2030
12.4.3. Cybersecurity Services Market (Managed v/s Professional Services), 2018-2030
12.5. Cybersecurity Market in Healthcare: Distribution by Threat Type
12.5.1. Intrusion (Hacking/Phishing/Ransomware) Market, 2018-2030
12.5.3. Insider Theft Market, 2018-2030
12.5.3. Employee Negligence Market, 2018-2030
12.5.4. 3rd Party/Subcontractor Negligence Market, 2018-2030
12.5.5. Physical Theft Market, 2018-2030
12.5.6. Other Threat Types Market, 2018-2030
12.6. Cybersecurity Market in Healthcare: Distribution by Type of Security Elements
12.6.1. Application Security Market, 2018-2030
12.6.2. Cloud Security Market, 2018-2030
12.6.3. Network Security Market, 2018-2030
12.6.4. Endpoint Security Market, 2018-2030
12.6.5. Other Security Element Types Market, 2018-2030
12.7. Cybersecurity Market in Healthcare: Distribution by Deployment Mode
12.7.1. Cloud Deployment Market, 2018-2030
12.7.2. On-Premise Deployment Market, 2018-2030
12.8. Cybersecurity Market in Healthcare: Distribution by Geographies
12.8.1. Cybersecurity Market in Healthcare in the US, 2018-2030
12.8.2. Cybersecurity Market in Healthcare in Europe, 2018-2030
12.8.3. Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030
12.8.4. Cybersecurity Market in Healthcare in Rest of the World, 2018-2030
13. FUTURE TRENDS: ARTIFICIAL INTELLIGENCE AND CYBERSECURITY
13.1. Chapter Overview
13.2. Artificial Intelligence (AI): An Overview
13.2.1. Machine Learning: An Approach to Achieve AI
13.2.2. Deep Learning: A Technique for Implementing Machine Learning
13.3. AI in Cybersecurity
13.3.1. Potential Benefits of AI in Cybersecurity
13.4. AI-based Cybersecurity in Healthcare
13.4.1. AI-based Cybersecurity in Healthcare: List of Industry Players
13.4.1.1. Analysis by Year of Establishment
13.4.1.2. Analysis by Geographical Location
13.4.1.3. Analysis by Company Size
13.4.1.4. Top 15 Industry Players in Terms of Equity Funding
13.4.1.5. Market Competitiveness Analysis
14. CASE STUDY: CYBERSECURITY USE CASES IN HEALTHCARE
14.1. Chapter Overview
14.2. Notable Healthcare Data Breaches in 2017
14.3. The Next Major Security Concern: Medical Device Hacks
14.4. Example Strategies to Tackle Cyber Threats
14.4.1. Anthem
14.4.2. Merck
14.4.3. Aralez Pharmaceuticals
14.4.4. Atrius Health
14.4.5. Cardinal Health
14.4.6. Baptist Healthcare System
14.4.7. Sarasota Memorial Healthcare System
14.4.8. State Health and Human Services (HHS) Agency
15. EXECUTIVE INSIGHTS
15.1. Chapter Overview
15.2. BlackRidge Technology
15.2.1. Company Snapshot
15.2.2. Interview Transcript: Steve Leatherman, IT Consultant
15.3. Critical Informatics
15.3.1. Company Snapshot
15.3.2. Interview Transcript: Garrett Silver, Chief Executive Officer
15.4. Cyberlytic
15.4.1. Company Snapshot
15.4.2. Interview Transcript: Saïd Kenj, Account Executive and Rebecca Bourke, Marketing Manager
15.5. Device Authority
15.5.1. Company Snapshot
15.5.2. Interview Transcript: Robert Dobson, Director and Rosa Lenders, Marketing Executive
15.6. illusive networks
15.6.1. Company Snapshot
15.6.2. Interview Transcript: Matan Kubovsky, Vice President, R&D
15.7. MedCrypt
15.7.1. Company Snapshot
15.7.2. Interview Transcript: Mike Kijewski, Chief Executive Officer
15.8. Risk Based Security
15.8.1. Company Snapshot
15.8.2. Interview Transcript: Jake Kouns, Chief Information Security Officer
15.9. Rubicon Labs
15.9.1. Company Snapshot
15.9.2. Interview Transcript: Rod Schultz, Chief Product Officer and Julia Cline, Senior Director, Product and Marketing
15.10. SCADAfence
15.10.1. Company Snapshot
15.10.2. Interview Transcript: Yoni Shohet, Chief Executive Officer
15.11. secureHIM
15.11.1. Company Snapshot
15.11.2. Interview Transcript: Mike Meikle, Chief Executive Officer
15.12. Sensato
15.12.1. Company Snapshot
15.12.2. Interview Transcript: John Gomez, Chief Executive Officer
16. CONCLUSION
16.1. Although the Advent of Digitization has Created Several New Business Opportunities, Industries are Now More Vulnerable to Cyberattacks
16.2. Owing to Multiple Contributors, Healthcare is Amongst the Worst Hit Industries by Cyberattacks
16.3. With Growing Complexity and Frequency of Cyberattacks, a Large Number of Industry Players have Widened their Expertise to Protect Healthcare Organizations
16.4. Several Start-ups, Backed by Venture Capital Investors, are Driving Technological Innovation in the Market
16.5. Given the Financial Support and Diverse Product/Solution Portfolio, Several Recently Established Companies are Steadily Approaching Unicorn Status
16.6. Driven by the Evolving Threat Landscape and High Value of Healthcare Records, the Market is Expected to Grow Significantly in the Coming Years
16.7. As Threat Levels Increase, Artificial Intelligence (AI) Holds a Significant Potential in Next Generation Cyber Defenses
17. APPENDIX 1: TABULATED DATA
18. APPENDIX 2: LIST OF COMPANIES AND ORGANIZATIONS
LIST OF FIGURES
Figure 3.1 Internet of Things: Framework
Figure 3.2 Internet of Things: Schematic Representation
Figure 3.3 Internet of Things: Number of Connected Devices, 2015-2025 (Billion)
Figure 3.4 Cloud Computing: Development Timeline
Figure 3.5 Cloud Computing: Deployment Models
Figure 3.6 Cloud Computing: Global Spending, 2015-2020 (USD Billion)
Figure 3.7 Digitized Business Communication Channels
Figure 3.8 Digitization: Major Drawbacks
Figure 3.9 Top Security Implications of Cyberattacks, 2016
Figure 3.10 Annual Number of Data Breaches and Exposed Records in the US, 2005-2016 (Million)
Figure 3.11 Number of Data Breach Incidents in North and Central America, South America, Europe, Middle East, Africa, and Asia-Pacific, 2016 (Million)
Figure 3.12 Number of Compromised Data Records in Selected Data Breaches, 2007-H1 2017 (Million)
Figure 3.13 Average Organizational Cost to Business after a Data Breach in the US, 2006-2016 (USD Million)
Figure 3.14 Industries Hit by the Highest Number of Cyberattacks in 2014, 2015 and 2016
Figure 3.15 Number of Records Breached: Distribution by Industry, 2015
Figure 4.1 Digital Transformation in Healthcare Industry: Key Elements
Figure 4.2 Global Digital Health Market, 2015-2020 (USD Billion)
Figure 4.3 Healthcare Assets Targeted by Different Cyber Criminals
Figure 4.4 Different Healthcare Organizations Affected by Data Breaches in the US, November 2016-January 2017
Figure 4.5 Impact on Trust of Consumers on Healthcare Organizations after a Breach in the US
Figure 4.6 Annual Number of Healthcare Data Breaches and Exposed Records, 2009-2016 (Million)
Figure 4.7 Global Average Cost to a Healthcare Organization Due to a Data Breach, 2006-2016 (USD Million)
Figure 4.8 Number of Healthcare Records Breached per Month, 2016
Figure 4.9 Healthcare Data Breaches, 2016
Figure 4.10 Primary Causes of Healthcare Data Breaches, 2016
Figure 4.11 Growth Drivers and Road Blocks to Cybersecurity in Healthcare
Figure 5.1 Cybersecurity in Healthcare: Distribution of Industry Players by Year of Establishment
Figure 5.2 Cybersecurity in Healthcare: Distribution of Industry Players by Geographical Location
Figure 5.3 Cybersecurity in Healthcare: Distribution of Industry Players by Size (Number of Employees)
Figure 5.4 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Offering
Figure 5.5 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Core Products/Solutions
Figure 5.6 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Threat Intelligence Solutions
Figure 5.7 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Services
Figure 5.8 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Security Elements
Figure 5.9 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Deployment Mode
Figure 5.10 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Threats Mitigated
Figure 9.1 Benchmark Analysis: Distribution of Industry Players by Year of Establishment and Geographical Location
Figure 9.2 Benchmark Analysis: Medium-Sized Companies, Peer Group I
Figure 9.3 Benchmark Analysis: Medium-Sized Companies, Peer Group II
Figure 9.4 Benchmark Analysis: Medium-Sized Companies, Peer Group III
Figure 9.5 Gigamon: Revenues, FY 2012-Q3 FY 2017 (USD Million)
Figure 9.6 Gigamon, Revenues: Distribution by Business Segment, 2016 (USD Million)
Figure 9.7 Gigamon, Revenues: Distribution by Region, 2016 (USD Million)
Figure 9.8 Benchmark Analysis: Large-Sized Companies, Peer Group IV
Figure 9.9 Benchmark Analysis: Large-Sized Companies, Peer Group V
Figure 9.10 Fortinet: Revenues, FY 2012-Q3 FY 2017 (USD Billion)
Figure 9.11 Fortinet, Revenues: Distribution by Business Segment, 2016 (USD Billion)
Figure 9.12 Fortinet, Revenues: Distribution by Region, 2016 (USD Billion)
Figure 9.13 FireEye: Revenues, FY 2012-Q3 FY 2017 (USD Million)
Figure 9.14 FireEye, Revenues: Distribution by Business Segment, 2016 (USD Million)
Figure 9.15 FireEye, Revenues: Distribution by Region, 2016 (USD Million)
Figure 9.16 Palo Alto Networks: Revenues, FY 2013-Q1 FY 2018 (USD Billion)
Figure 9.17 Palo Alto Networks, Revenues: Distribution by Business Segment, FY 2017 (USD Billion)
Figure 9.18 Palo Alto Networks, Revenues: Distribution by Region, FY 2017 (USD Billion)
Figure 9.19 Sophos: Revenues, FY 2015-H1 FY 2018 (USD Million)
Figure 9.20 Sophos, Revenues: Distribution by Business Segment, FY 2017 (USD Million)
Figure 9.21 Sophos, Revenues: Distribution by Type of Product, FY 2017 (USD Million)
Figure 9.22 Sophos, Revenues: Distribution by Region, FY 2017 (USD Million)
Figure 10.1 Cybersecurity in Healthcare, Funding Instances: Year-wise Trend, 2012-2017
Figure 10.2 Cybersecurity in Healthcare, Funding Instances: Distribution by Amount Invested, 2012-2017 (USD Million)
Figure 10.3 Cybersecurity in Healthcare, Funding Instances: Distribution by Type of Funding, 2012-2017
Figure 10.4 Cybersecurity in Healthcare, Funding Instances: Distribution by Amount and Type of Funding, 2012-2017 (USD Million)
Figure 10.5 Cybersecurity in Healthcare, Funding Instances: Most Active Players by Number of Instances, 2012-2017
Figure 10.6 Cybersecurity in Healthcare, Funding Instances: Most Active Investors by Number of Instances, 2012-2017
Figure 10.7 Cybersecurity in Healthcare: Funding and Investment Summary
Figure 11.1 Company Valuation Analysis: A/F Ratio, Input Dataset
Figure 11.2 Company Valuation Analysis: A/Y Ratio, Input Dataset
Figure 11.3 Company Valuation Analysis: A/E Ratio, Input Dataset
Figure 11.4 Company Valuation Analysis: Categorization by Employee Base Score
Figure 11.5 Company Valuation Analysis: Categorization by Portfolio Strength
Figure 11.6 Company Valuation Analysis: Categorization by Weighted Average Score
Figure 11.7 Company Valuation Analysis: Likely Unicorns in Cybersecurity in Healthcare Industry
Figure 12.1 Country-wise Average Cost per Record, 2017 (USD)
Figure 12.2 Overall Cybersecurity Market in Healthcare (Actual v/s Untapped Opportunity), 2018 and 2030 (USD Billion)
Figure 12.3 Overall Cybersecurity Market in Healthcare, 2018-2030: Base Scenario (USD Billion)
Figure 12.4 Core Cybersecurity Products/Solutions Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.5 Threat Intelligence Solutions Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.6 Cybersecurity Services Market (Managed v/s Professional Services), 2018-2030: Base Scenario (USD Billion)
Figure 12.7 Intrusion (Hacking/Phishing/Ransomware) Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.8 Insider Theft Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.9 Employee Negligence Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.10 3rd Party/Subcontractor Negligence Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.11 Physical Theft Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.12 Other Threat Types Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.13 Application Security Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.14 Cloud Security Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.15 Network Security Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.16 Endpoint Security Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.17 Other Security Element Types Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.18 Cloud Deployment Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.19 On-Premise Deployment Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.20 Cybersecurity Market in Healthcare in the US, 2018-2030: Base Scenario (USD Billion)
Figure 12.21 Cybersecurity Market in Healthcare in Europe, 2018-2030: Base Scenario (USD Billion)
Figure 12.22 Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030: Base Scenario (USD Billion)
Figure 12.23 Cybersecurity Market in Healthcare in Rest of the World, 2018-2030: Base Scenario (USD Billion)
Figure 13.1 Machine Learning Algorithm: Workflow
Figure 13.2 Deep Learning: Image Recognition
Figure 13.3 Google Trends: Artificial Intelligence, Machine Learning and Deep Learning
Figure 13.4 Google Trends: Popular Keywords (Deep Learning)
Figure 13.5 Artificial Intelligence v/s Cybersecurity: Google Trends, 2011-2017
Figure 13.6 Artificial Intelligence v/s Cybersecurity: Geographical Distribution of Google Searches, 2011-2017
Figure 13.7 AI/Machine Learning: Shaping the Future of Cybersecurity
Figure 13.8 AI-based Cybersecurity in Healthcare: Cumulative Distribution of Industry Players by Year of Establishment
Figure 13.9 AI-based Cybersecurity in Healthcare: Distribution of Industry Players by Location of Headquarters
Figure 13.10 AI-based Cybersecurity in Healthcare: Regional Landscape of Industry Players
Figure 13.11 AI-based Cybersecurity in Healthcare: Distribution of Industry Players by Size (Number of Employees)
Figure 13.12 AI-based Cybersecurity in Healthcare: Top 15 Industry Players in Terms of Equity Funding (USD Million)
Figure 13.13 AI-based Cybersecurity in Healthcare: Market Competitiveness
Figure 14.1 Notable Healthcare Data Breaches and Security Incidents, 2017
Figure 14.2 Notable Healthcare Data Breaches and Security Incidents, 2017: Distribution by Geographical Location
Figure 14.3 Notable Healthcare Data Breaches and Security Incidents, 2017: Distribution by Cause of Breach
Figure 16.1 Overall Cybersecurity Market in Healthcare: Comparative Evolution Scenarios, 2018 and 2030 (USD Billion)
LIST OF TABLES
Table 3.1 Impact of Digitization on Different Industries
Table 3.2 Key Cyberattacks and Security Vulnerabilities
Table 3.3 Key Cybersecurity Solutions
Table 4.1 Potential Applications of IoT Across Healthcare Industry
Table 4.2 Cybersecurity Vulnerabilities in the Healthcare Industry
Table 4.3 Largest Healthcare Data Breaches, 2017
Table 4.4 Largest Healthcare Data Breaches, 2016
Table 4.5 Biggest Ransomware Attacks on Healthcare Industry, 2016
Table 4.6 Cybersecurity Elements in Healthcare
Table 4.7 Best Cybersecurity Practices in Healthcare
Table 5.1 Cybersecurity in Healthcare: List of Industry Players
Table 5.2 Cybersecurity in Healthcare, Industry Players: Information on Type of Offering
Table 5.3 Cybersecurity in Healthcare, Industry Players: Information on Type of Security Elements and Deployment Mode
Table 5.4 Cybersecurity in Healthcare, Industry Players: Information on Type of Threats Mitigated
Table 6.1 Attivo Networks: Key Highlights
Table 6.2 Attivo Networks: Funding Instances
Table 6.3 Attivo Networks: Cybersecurity Product/Service Portfolio
Table 6.4 Attivo Networks: Recent Developments
Table 6.5 CensorNet: Key Highlights
Table 6.6 CensorNet: Funding Instances
Table 6.7 CensorNet: Cybersecurity Product/Service Portfolio
Table 6.8 CensorNet: Recent Developments
Table 6.9 Exabeam: Key Highlights
Table 6.10 Exabeam: Funding Instances
Table 6.11 Exabeam: Cybersecurity Product/Service Portfolio
Table 6.12 Exabeam: Recent Developments
Table 6.13 iCyber-Security: Key Highlights
Table 6.14 iCyber-Security: Funding Instances
Table 6.15 iCyber-Security: Cybersecurity Product/Service Portfolio
Table 6.16 iCyber-Security: Recent Developments
Table 6.17 Threat Stack: Key Highlights
Table 6.18 Threat Stack: Funding Instances
Table 6.19 Threat Stack: Cybersecurity Product/Service Portfolio
Table 6.20 Threat Stack: Recent Developments
Table 6.21 TraceSecurity: Key Highlights
Table 6.22 TraceSecurity: Funding Instances
Table 6.23 TraceSecurity: Cybersecurity Product/Service Portfolio
Table 6.24 TraceSecurity: Recent Developments
Table 6.25 Zenedge: Key Highlights
Table 6.26 Zenedge: Funding Instances
Table 6.27 Zenedge: Cybersecurity Product/Service Portfolio
Table 6.28 Zenedge: Recent Developments
Table 7.1 Anomali: Key Highlights
Table 7.2 Anomali: Funding Instances
Table 7.3 Anomali: Cybersecurity Product/Service Portfolio
Table 7.4 Anomali: Recent Developments
Table 7.5 Centripetal Networks: Key Highlights
Table 7.6 Centripetal Networks: Funding Instances
Table 7.7 Centripetal Networks: Cybersecurity Product/Service Portfolio
Table 7.8 Centripetal Networks: Recent Developments
Table 7.9 Flashpoint: Key Highlights
Table 7.10 Flashpoint: Funding Instances
Table 7.11 Flashpoint: Cybersecurity Product/Service Portfolio
Table 7.12 Flashpoint: Recent Developments
Table 7.13 ProtectWise: Key Highlights
Table 7.14 ProtectWise: Funding Instances
Table 7.15 ProtectWise: Cybersecurity Product/Service Portfolio
Table 7.16 ProtectWise: Recent Developments
Table 7.17 Sqrrl: Key Highlights
Table 7.18 Sqrrl: Funding Instances
Table 7.19 Sqrrl: Cybersecurity Product/Service Portfolio
Table 7.20 Sqrrl: Recent Developments
Table 7.21 Shape Security: Key Highlights
Table 7.22 Shape Security: Funding Instances
Table 7.23 Shape Security: Cybersecurity Product/Service Portfolio
Table 7.24 Shape Security: Recent Developments
Table 7.25 Vectra Networks: Key Highlights
Table 7.26 Vectra Networks: Funding Instances
Table 7.27 Vectra Networks: Cybersecurity Product/Service Portfolio
Table 7.28 Vectra Networks: Recent Developments
Table 8.1 Agio: Key Highlights
Table 8.2 Agio: Cybersecurity Service Portfolio
Table 8.3 Agio: Recent Developments
Table 8.4 CyberSurance: Key Highlights
Table 8.5 CyberSurance: Cybersecurity Service Portfolio
Table 8.6 CyberSurance: Recent Developments
Table 8.7 Delta Risk: Key Highlights
Table 8.8 Delta Risk: Cybersecurity Service Portfolio
Table 8.9 Delta Risk: Recent Developments
Table 8.10 ITEGRITI: Key Highlights
Table 8.11 ITEGRITI: Cybersecurity Service Portfolio
Table 8.12 ITEGRITI: Recent Developments
Table 8.13 Security Risk Advisors: Key Highlights
Table 8.14 Security Risk Advisors: Cybersecurity Service Portfolio
Table 8.15 Security Risk Advisors: Recent Developments
Table 8.16 Sera-Brynn: Key Highlights
Table 8.17 Sera-Brynn: Cybersecurity Service Portfolio
Table 8.18 Sera-Brynn: Recent Developments
Table 8.19 VigiTrust: Key Highlights
Table 8.20 VigiTrust: Cybersecurity Service Portfolio
Table 8.21 VigiTrust: Recent Developments
Table 9.1 Benchmark Analysis: Peer Groups
Table 9.2 AlienVault: Key Highlights
Table 9.3 AlienVault: Funding Instances
Table 9.4 AlienVault: Cybersecurity Product/Service Portfolio
Table 9.5 AlienVault: Recent Developments
Table 9.6 Carbon Black: Key Highlights
Table 9.7 Carbon Black: Recent Acquisitions
Table 9.8 Carbon Black: Funding Instances
Table 9.9 Carbon Black: Cybersecurity Product/Service Portfolio
Table 9.10 Carbon Black: Recent Developments
Table 9.11 CrowdStrike: Key Highlights
Table 9.12 CrowdStrike: Funding Instances
Table 9.13 CrowdStrike: Cybersecurity Product/Service Portfolio
Table 9.14 CrowdStrike: Recent Developments
Table 9.15 Cylance: Key Highlights
Table 9.16 Cylance: Funding Instances
Table 9.17 Cylance: Cybersecurity Product/Service Portfolio
Table 9.18 Cylance: Recent Developments
Table 9.19 Darktrace: Key Highlights
Table 9.20 Darktrace: Funding Instances
Table 9.21 Darktrace: Cybersecurity Product/Service Portfolio
Table 9.22 Darktrace: Recent Developments
Table 9.23 Gigamon: Key Highlights
Table 9.24 Gigamon: Cybersecurity Product/Service Portfolio
Table 9.25 Gigamon: Recent Developments
Table 9.26 LogRhythm: Key Highlights
Table 9.27 LogRhythm: Funding Instances
Table 9.28 LogRhythm: Cybersecurity Product/Service Portfolio
Table 9.29 LogRhythm: Recent Developments
Table 9.30 Fortinet: Key Highlights
Table 9.31 Fortinet: Recent Acquisitions
Table 9.32 Fortinet: Cybersecurity Product/Service Portfolio
Table 9.33 Fortinet: Recent Developments
Table 9.34 FireEye: Key Highlights
Table 9.35 FireEye: Recent Acquisitions
Table 9.36 FireEye: Cybersecurity Product/Service Portfolio
Table 9.37 FireEye: Recent Developments
Table 9.38 IBM: Key Highlights
Table 9.39 IBM: Recent Acquisitions
Table 9.40 IBM: Cybersecurity Product/Service Portfolio
Table 9.41 IBM: Recent Developments
Table 9.42 McAfee: Key Highlights
Table 9.43 McAfee: Recent Acquisitions
Table 9.44 McAfee: Cybersecurity Product/Service Portfolio
Table 9.45 McAfee: Recent Developments
Table 9.46 Palo Alto Networks: Key Highlights
Table 9.47 Palo Alto Networks: Recent Acquisitions
Table 9.48 Palo Alto Networks: Cybersecurity Product/Service Portfolio
Table 9.49 Palo Alto Networks: Recent Developments
Table 9.50 Sophos: Key Highlights
Table 9.51 Sophos: Recent Acquisitions
Table 9.52 Sophos: Cybersecurity Product/Service Portfolio
Table 9.53 Sophos: Recent Developments
Table 9.54 Trustwave: Key Highlights
Table 9.55 Trustwave: Recent Acquisitions
Table 9.56 Trustwave: Funding Instances
Table 9.57 Trustwave: Cybersecurity Product/Service Portfolio
Table 9.58 Trustwave: Recent Developments
Table 10.1 Cybersecurity in Healthcare: Funding Instances
Table 10.2 Cybersecurity in Healthcare: Summary of Investments
Table 11.1 Company Valuation Analysis: Sample Dataset
Table 11.2 Company Valuation Analysis: Weighted Average Evaluation
Table 11.3 Company Valuation Analysis: Estimated Valuation
Table 13.1 Combating Cybersecurity Threats: Traditional Approach v/s AI-based Approach
Table 13.2 AI-based Cybersecurity in Healthcare: List of Industry Players
Table 14.1 Notable Healthcare Data Breaches and Security Incidents, 2017
Table 14.2 Recent Medical Device Cybersecurity Incidents
Table 15.1 BlackRidge Technology: Key Highlights
Table 15.2 Critical Informatics: Key Highlights
Table 15.3 Cyberlytic: Key Highlights
Table 15.4 Device Authority: Key Highlights
Table 15.5 illusive networks: Key Highlights
Table 15.6 MedCrypt: Key Highlights
Table 15.7 Risk Based Security: Key Highlights
Table 15.8 Rubicon Labs: Key Highlights
Table 15.9 SCADAfence: Key Highlights
Table 15.10 secureHIM: Key Highlights
Table 15.11 Sensato: Key Highlights
Table 17.1 Internet of Things: Number of Connected Devices, 2015-2025 (Billion)
Table 17.2 Cloud Computing: Global Spending, 2015-2020 (USD Billion)
Table 17.3 Top Security Implications of Cyberattacks, 2016
Table 17.4 Annual Number of Data Breaches and Exposed Records in the US, 2005-2016 (Million)
Table 17.5 Number of Data Breach Incidents in North and Central America, South America, Europe, Middle East, Africa, and Asia-Pacific, 2016 (Million)
Table 17.6 Number of Compromised Data Records in Selected Data Breaches, 2007-H1 2017 (Million)
Table 17.7 Average Organizational Cost to Business after a Data Breach in the US, 2006-2016 (USD Million)
Table 17.8 Number of Records Breached: Distribution by Industry, 2015
Table 17.9 Global Digital Health Market, 2015-2020 (USD Billion)
Table 17.10 Different Healthcare Organizations Affected by Data Breaches in the US, November 2016-January 2017
Table 17.11 Impact on Trust of Consumers on Healthcare Organizations after a Breach in the US
Table 17.12 Annual Number of Healthcare Data Breaches and Exposed Records, 2009-2016 (Million)
Table 17.13 Global Average Cost to a Healthcare Organization Due to a Data Breach, 2006-2016 (USD Million)
Table 17.14 Number of Healthcare Records Breached per Month, 2016
Table 17.15 Healthcare Data Breaches, 2016
Table 17.16 Primary Causes of Healthcare Data Breaches, 2016
Table 17.17 Cybersecurity in Healthcare: Distribution of Industry Players by Year of Establishment
Table 17.18 Cybersecurity in Healthcare: Distribution of Industry Players by Geographical Location
Table 17.19 Cybersecurity in Healthcare: Distribution of Industry Players by Size (Number of Employees)
Table 17.20 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Offering
Table 17.21 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Core Products/Solutions
Table 17.22 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Threat Intelligence Solutions
Table 17.23 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Services
Table 17.24 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Security Elements
Table 17.25 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Deployment Mode
Table 17.26 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Threats Mitigated
Table 17.27 Benchmark Analysis: Distribution of Industry Players by Year of Establishment and Geographical Location
Table 17.28 Benchmark Analysis: Medium-Sized Companies, Peer Group I
Table 17.29 Benchmark Analysis: Medium-Sized Companies, Peer Group II
Table 17.30 Benchmark Analysis: Medium-Sized Companies, Peer Group III
Table 17.31 Gigamon: Revenues, FY 2012-Q3 FY 2017 (USD Million)
Table 17.32 Gigamon, Revenues: Distribution by Business Segment, 2016 (USD Million)
Table 17.33 Gigamon, Revenues: Distribution by Region, 2016 (USD Million)
Table 17.34 Benchmark Analysis: Large-Sized Companies, Peer Group IV
Table 17.35 Benchmark Analysis: Large-Sized Companies, Peer Group V
Table 17.36 Fortinet: Revenues, FY 2012-Q3 FY 2017 (USD Billion)
Table 17.37 Fortinet, Revenues: Distribution by Business Segment, 2016 (USD Billion)
Table 17.38 Fortinet, Revenues: Distribution by Region, 2016 (USD Billion)
Table 17.39 FireEye: Revenues, FY 2012-Q3 FY 2017 (USD Million)
Table 17.40 FireEye, Revenues: Distribution by Business Segment, 2016 (USD Million)
Table 17.41 FireEye, Revenues: Distribution by Region, 2016 (USD Million)
Table 17.42 Palo Alto Networks: Revenues, FY 2013-Q1 FY 2018 (USD Billion)
Table 17.43 Palo Alto Networks, Revenues: Distribution by Business Segment, FY 2017 (USD Billion)
Table 17.44 Palo Alto Networks, Revenues: Distribution by Region, FY 2017 (USD Billion)
Table 17.45 Sophos: Revenues, FY 2015-H1 FY 2018 (USD Million)
Table 17.46 Sophos, Revenues: Distribution by Business Segment, FY 2017 (USD Million)
Table 17.47 Sophos, Revenues: Distribution by Type of Product, FY 2017 (USD Million)
Table 17.48 Sophos, Revenues: Distribution by Region, FY 2017 (USD Million)
Table 17.49 Cybersecurity in Healthcare, Funding Instances: Year-wise Trend, 2012-2017
Table 17.50 Cybersecurity in Healthcare, Funding Instances: Distribution by Amount Invested, 2012-2017 (USD Million)
Table 17.51 Cybersecurity in Healthcare, Funding Instances: Distribution by Type of Funding, 2012-2017
Table 17.52 Cybersecurity in Healthcare, Funding Instances: Distribution by Amount Invested and Type of Funding, 2012-2017 (USD Million)
Table 17.53 Cybersecurity in Healthcare, Funding Instances: Most Active Players by Number of Instances, 2012-2017
Table 17.54 Cybersecurity in Healthcare, Funding Instances: Most Active Investors by Number of Instances, 2012-2017
Table 17.55 Cybersecurity in Healthcare: Funding and Investment Summary
Table 17.56 Company Valuation Analysis: A/F Ratio, Input Dataset
Table 17.57 Company Valuation Analysis: A/Y Ratio, Input Dataset
Table 17.58 Company Valuation Analysis: A/E Ratio, Input Dataset
Table 17.59 Country-wise Average Cost per Record, 2017 (USD)
Table 17.60 Overall Cybersecurity Market in Healthcare (Actual v/s Untapped Opportunity), 2018 and 2030 (USD Billion)
Table 17.61 Overall Cybersecurity Market in Healthcare, 2018-2030: Conservative Scenario (USD Billion)
Table 17.62 Overall Cybersecurity Market in Healthcare, 2018-2030: Base Scenario (USD Billion)
Table 17.63 Overall Cybersecurity Market in Healthcare, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.64 Core Cybersecurity Products/Solutions Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.65 Core Cybersecurity Products/Solutions Market, 2018-2030: Base Scenario (USD Billion)
Table 17.66 Core Cybersecurity Products/Solutions Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.67 Threat Intelligence Solutions Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.68 Threat Intelligence Solutions Market, 2018-2030: Base Scenario (USD Billion)
Table 17.69 Threat Intelligence Solutions Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.70 Cybersecurity Services Market (Managed v/s Professional Services), 2018-2030: Base Scenario (USD Billion)
Table 17.71 Intrusion (Hacking/Phishing/Ransomware) Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.72 Intrusion (Hacking/Phishing/Ransomware) Market, 2018-2030: Base Scenario (USD Billion)
Table 17.73 Intrusion (Hacking/Phishing/Ransomware) Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.74 Insider Theft Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.75 Insider Theft Market, 2018-2030: Base Scenario (USD Billion)
Table 17.76 Insider Theft Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.77 Employee Negligence Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.78 Employee Negligence Market, 2018-2030: Base Scenario (USD Billion)
Table 17.79 Employee Negligence Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.80 3rd Party/Subcontractor Negligence Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.81 3rd Party/Subcontractor Negligence Market, 2018-2030: Base Scenario (USD Billion)
Table 17.82 3rd Party/Subcontractor Negligence Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.83 Physical Theft Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.84 Physical Theft Market, 2018-2030: Base Scenario (USD Billion)
Table 17.85 Physical Theft Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.86 Other Threat Types Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.87 Other Threat Types Market, 2018-2030: Base Scenario (USD Billion)
Table 17.88 Other Threat Types Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.89 Application Security Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.90 Application Security Market, 2018-2030: Base Scenario (USD Billion)
Table 17.91 Application Security Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.92 Cloud Security Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.93 Cloud Security Market, 2018-2030: Base Scenario (USD Billion)
Table 17.94 Cloud Security Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.95 Network Security Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.96 Network Security Market, 2018-2030: Base Scenario (USD Billion)
Table 17.97 Network Security Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.98 Endpoint Security Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.99 Endpoint Security Market, 2018-2030: Base Scenario (USD Billion)
Table 17.100 Endpoint Security Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.101 Other Security Element Types Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.102 Other Security Element Types Market, 2018-2030: Base Scenario (USD Billion)
Table 17.103 Other Security Element Types Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.104 Cloud Deployment Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.105 Cloud Deployment Market, 2018-2030: Base Scenario (USD Billion)
Table 17.106 Cloud Deployment Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.107 On-Premise Deployment Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.108 On-Premise Deployment Market, 2018-2030: Base Scenario (USD Billion)
Table 17.109 On-Premise Deployment Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.110 Cybersecurity Market in Healthcare in the US, 2018-2030: Conservative Scenario (USD Billion)
Table 17.111 Cybersecurity Market in Healthcare in the US, 2018-2030: Base Scenario (USD Billion)
Table 17.112 Cybersecurity Market in Healthcare in the US, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.113 Cybersecurity Market in Healthcare in Europe, 2018-2030: Conservative Scenario (USD Billion)
Table 17.114 Cybersecurity Market in Healthcare in Europe, 2018-2030: Base Scenario (USD Billion)
Table 17.115 Cybersecurity Market in Healthcare in Europe, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.116 Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030: Conservative Scenario (USD Billion)
Table 17.117 Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030: Base Scenario (USD Billion)
Table 17.118 Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.119 Cybersecurity Market in Healthcare in Rest of the World, 2018-2030: Conservative Scenario (USD Billion)
Table 17.120 Cybersecurity Market in Healthcare in Rest of the World, 2018-2030: Base Scenario (USD Billion)
Table 17.121 Cybersecurity Market in Healthcare in Rest of the World, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.122 AI-based Cybersecurity in Healthcare: Cumulative Distribution of Industry by Year of Establishment
Table 17.123 AI-based Cybersecurity in Healthcare: Distribution of Industry Players by Location of Headquarters
Table 17.124 AI-based Cybersecurity in Healthcare: Distribution of Industry Players by Size (Number of Employees)
Table 17.125 AI-based Cybersecurity in Healthcare: Top 15 Industry Players in Terms of Equity Funding (USD Million)
Table 17.126 Notable Healthcare Data Breaches and Security Incidents, 2017: Distribution by Geographical Location
Table 17.127 Notable Healthcare Data Breaches and Security Incidents, 2017: Distribution by Cause of Breach
Table 17.128 Overall Cybersecurity Market in Healthcare: Comparative Evolution Scenarios, 2018 and 2030 (USD Billion)
Executive Summary
Research Methodology
The data presented in this report has been gathered via secondary and primary research. For all our projects, we conduct interviews with experts in the area (academia, industry, medical practice and other associations) to solicit their opinions on emerging trends in the market. This is primarily useful for us to draw out our own opinion on how the market will evolve across different regions and technology segments. Where possible, the available data has been checked for accuracy from multiple sources of information.
The secondary sources of information include:
- Annual reports
- Investor presentations
- SEC filings
- Industry databases
- News releases from company websites
- Government policy documents
- Industry analysts’ views
While the focus has been on forecasting the market till 2030, the report also provides our independent view on various non-commercial trends emerging in the industry. This opinion is solely based on our knowledge, research and understanding of the relevant market gathered from various secondary and primary sources of information.
Chapter Outlines
- Chapter 2 is an executive summary of the insights captured in our research. The summary offers a high-level view on the likely evolution of the cybersecurity market within the healthcare industry in the long term.
- Chapter 3 is an introductory chapter that presents an overview of the digital revolution, emergence of IoT, cloud computing, and the digitization of business communication across a number of industries, with information on the associated risks and vulnerabilities. It outlines some of the prevalent cyber threats and security vulnerabilities, thereby, highlighting the importance of cybersecurity. It also provides an overview of the key cybersecurity solutions that are being used in the industry. In addition, the chapter provides information on some of the notable cyberattacks and data breaches that have taken place across different industries in the past few years.
- Chapter 4 provides information on the digitization of the healthcare industry, and outlines key reasons why organizations in this domain have been a prime target for cyber criminals in the past few years. Further, the chapter stresses on the importance of cybersecurity in the healthcare industry, giving an overview of the HIPAA framework, and highlights several security vulnerabilities that exist within the industry. It also provides details on some of the largest healthcare data breaches in history. In addition, it presents a summary of the best practices that must be considered while implementing security measures within the healthcare industry.
- Chapter 5 includes information on around 400 key stakeholders that are exploring the potential applications of their cybersecurity products/solutions and services within the healthcare industry. We have classified the database based on the type of offering, including cybersecurity core products/solutions, threat intelligence solutions and cybersecurity services. In addition, the chapter provides information on companies’ geographical location, size of employee base, type of threats that a company is capable of dealing with, type of security elements, and mode of deployment. Furthermore, we have identified various prevalent and upcoming trends in the industry that are likely to govern the future of cybersecurity within the healthcare industry.
- Chapter 6 features detailed profiles of some of the emerging stakeholders that are primarily offering cybersecurity core products/solutions for the healthcare industry. Each profile includes an overview of the company, financial information, details on their cybersecurity products/solutions, and recent developments with respect to the cybersecurity domain.
- Chapter 7 includes detailed profiles of some of the emerging stakeholders that are primarily offering threat intelligence solutions for the healthcare industry. Each profile includes an overview of the company, information on financial performance, details on their specific cybersecurity products/solutions, and recent developments with respect to the cybersecurity domain.
- Chapter 8 provides detailed profiles of some of the emerging stakeholders that are primarily offering cybersecurity services (managed/professional) for the healthcare industry. Each profile includes an overview of the company, information on financial performance, details on their specific cybersecurity products/solutions, and recent developments with respect to the cybersecurity domain.
- Chapter 9 presents a benchmark analysis, taking into consideration the established players that are engaged in this domain. It highlights the capabilities of these companies in terms of their expertise across cybersecurity products/solutions and services for the healthcare industry. The analysis allows companies to compare their existing capabilities within and beyond their peer groups, and identify opportunities to become more competitive in the industry. In addition, we have provided detailed profiles of some of the established stakeholders within different peer groups. Each of these profiles feature an overview of the company, information on financial performance, details on their specific cybersecurity products/solutions, and recent developments with respect to the cybersecurity domain.
- Chapter 10 provides information on the funding instances and investments that have been made in this industry. The chapter includes details on various investments (seed financing, venture funding, debt financing and grants) received by companies between 2012 and late 2017, highlighting the growing interest of the venture capital community and other strategic investors.
- Chapter 11 features a comprehensive valuation analysis of the companies that are offering cybersecurity products/solutions and services for the healthcare industry. The chapter provides insights based on a multi-variable dependent valuation model. The model is based on the year of establishment of the companies, employed workforce, funding received and depth of product/service portfolio.
- Chapter 12 presents a comprehensive market forecast, highlighting the future potential of the market till 2030. The forecast, which provides estimates on the market opportunity across the three major types of offering (cybersecurity core products/solutions, threat intelligence solutions and cybersecurity services), is backed by robust secondary research, as wells as inputs from senior stakeholders in the industry. The analysis also highlights the relative growth opportunity across different geographical regions (North America, Europe, Asia-Pacific and Rest of the World), type of threats (insider theft, intrusion, 3rd party/sub-contractor negligence, employee negligence, physical theft and others), type of cybersecurity services (managed and professional), type of security elements (application security, cloud security, endpoint security and network security), and mode of deployment (cloud and on-premise). To account for the uncertainties associated with the adoption of these technologies, we have provided optimistic and conservative forecast scenarios, in addition to the base forecast scenario.
- Chapter 13 presents an overview of AI, machine learning and deep learning techniques, and the likely benefits of integration of these technologies into cybersecurity tools/systems. The chapter highlights how AI/machine learning techniques can bolster cybersecurity capabilities for combating the ever-increasing threat landscape. In addition, we have outlined a detailed assessment of the current market landscape of AI-based cybersecurity, and provided high-level insights on the market competitiveness within this domain.
- Chapter 14 presents a case study on cybersecurity use cases within the healthcare industry. The chapter highlights some of the notable healthcare data breaches and security incidents that took place in 2017. In addition, we have briefly discussed some of the recently reported medical device hacks/security vulnerabilities, in order to highlight the potential damages these incidents can cause. We have also summarized some of the initiatives/measures adopted by healthcare/pharmaceutical organizations to tackle cyberattacks.
- Chapter 15 summarizes the overall report. In this chapter, we have provided a list of key takeaways from the report, and expressed our independent opinion related to the research and analysis described in the previous chapters.
- Chapter 16 is a collection of executive insights from various key stakeholders in this market. The chapter provides brief overview of the companies and interview transcripts of the discussions that were held with stakeholders associated with these companies. The chapter provides details of interviews held with Garrett Silver (CEO, Critical Informatics), John Gomez (CEO, Sensato), Matan Kubovsky (VP, R&D, illusive networks), Mike Kijewski (CEO, MedCrypt), Mike Meikle (CEO, secureHIM), Robert Dobson (Director, Device Authority) and Rosa Lenders (Marketing Executive, Device Authority), Rod Schultz (CPO, Rubicon Labs) and Julia Cline (Senior Director, Product and Marketing, Rubicon Labs), Saïd Kenj (Account Executive, Cyberlytic) and Rebecca Bourke (Marketing Manager, Cyberlytic), Steve Leatherman (IT Consultant, BlackRidge Technology), and Yoni Shohet (CEO, SCADAfence).
- Chapter 17 is an appendix, which provides tabulated data and numbers for all the figures provided in the report.
- Chapter 18 is an appendix, which provides the list of companies and organizations mentioned in the report.
Companies Mentioned (Partial List)
A selection of companies mentioned in this report includes, but is not limited to:
- 406 Ventures
- 21st Century Oncology
- 3eTI
- 3i International
- 4SEC Group
- 500 Startups
- 7Safe
- 83North (formerly Greylock IL)
- A10 Networks
- Abbott
- ABCD Pediatrics
- Absolute
- Acalvio Technologies
- Accel Partners
- Accenture
- Access Venture Partners
- Accomplice
- Accuvant
- ActiveCanopy
- ACTIVECYBER
- Adams Street Partners
- Adara Ventures
- Adobe
- ADT Cybersecurity (formerly DATASHIELD)
- AECOM
- Aesthetic Dentistry, New York, US
- Agari
- AGC Networks
- Agio
- AirWatch
- Airway Oxygen
- Akamai
- AlertEnterprise
- AlienVault
- AllClear ID
- Allegis Capital
- Alphaserve Technologies
- Alpine Security
- Alsop Louie Partners
- Alvarado Hospital Medical Center
- Amazon
- AME Cloud Ventures
- America One Technologies
- AmericaTech
- Amerigroup
- Amplify Partners
- Anomali
- Anthem
- AOL
- AppDynamics
- Appthority
- Arbor Networks
- ArcSight
- Area 1 Security
- Argus Cyber Security
- Aristos Ventures
- Arkansas Oral & Facial Surgery Center
- Armolon
- Armor
- Arrow Electronics
- Arsenal Venture Partners
- Arthur Ventures
- Aruba (a Hewlett Packard Enterprise company)
- Arxan
- Ascent Venture Partners
- Ashley Madison
- Aspect Security
- Aspect Ventures
- AT&T
- Athens Orthopedic Clinic
- Atlas Venture
- Atos
- Atredis Partners
- Attivo Networks
- August Capital
- Augusta University Medical Center
- Aurionpro
- Auth0
- Auxilio
- Avast Software
- Avata Intelligence (formerly Armorway)
- AV-Comparatives
- Avecto
- AVG
- Axiad IDS
- AXON Connected
- AxonAI (formerly AXON Ghost Sentinel)
- Axway
- BAE Systems
- Bain Capital Ventures
- Baltimore Angels
- Banner Health
- Barracuda Networks
- Barrier1 Systems
- Baseline Ventures
- Battelle
- Battery Ventures
- Bayer
- Bayshore Networks
- Beckton Dickinson
- Benhamou Global Ventures (BGV)
- Bessemer Venture Partners
- BeyondTrust
- BIO-key International
- Bitfinex
- Bitglass
- BitSight
- Black Duck Software
- Black Sheep Capital
- BlackBerry
- BlackRidge Technology
- Blackstone Tactical Opportunities Fund
- BlackstoneOne
- Bloomberg Beta
- Blu Venture Investors
- Blue Coat Systems
- BlueCat
- BlueChilli
- Blueliv
- Blumberg Capital
- BlumShapiro
- BluVector
- Bomgar
- Bon Secours Health System
- Booz Allen Hamilton
- BostInno
- Box
- Bradford Networks
- Breach Intelligence
- BRM Capital
- Broadcom
- Bromium
- Bronx-Lebanon Hospital Center
- BT Group
- Buckhead Investment Partners
- Built in LA
- Bupa Global
- ByteGrid
- CA Technologies
- Cain Capital
- California Correctional Health Care Services
- Calyptix Security
- Capital One Growth Ventures
- CapitalG (formerly Google Capital)
- Carbon Black
- CareMore
- Catbird
- Category 5 Consulting
- CDW
- CensorNet
- Center of Innovative Technology
- Central Ohio Urology Group
- Centrify
- Centripetal Networks
- CenturyLink
- Charles River Ventures
- Check Point Software Technologies
- Chertoff Group
- Chino Valley Medical Center
- Cicada Innovations
- Cimcor
- CIPHER
- CipherCloud
- CipherTrust
- Cisco
- Citi Ventures
- CITIC Telecom CPC
- Citrix
- Clear Venture Partners
- Clearwater Compliance
- Cleveland Medical Associates
- Cloud Harmonics
- Cloudera
- CloudLink
- CloudLock
- CME Ventures
- CNBC
- Coalfire
- Coaxis International
- Code Dx
- Cognosante
- Commonwealth Health Corporation
- Community Health Plan of Washington
- Community Mercy Health Partners
- Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology (MIT CSAIL)
- Conduent
- Confer Technologies
- Conjur
- ConnectWise
- Content Security
- Context Information Security
- Contextual Security
- Continental
- Core Capital Partners
- Core Security
- Corero Network Security
- CORL Technologies
- Cornell University
- Correlation Ventures
- Cowboy Ventures
- Cray
- Critical Informatics
- CRN
- Croghan Investments
- Crosscheck Networks
- Crosslink Capital
- CrowdStrike
- Crowe Horwath
- Crypta Labs
- Cryptzone
- CSC Digital Brand Services
- CSRA
- Cyber Rescue Alliance
- Cyber Toa
- CyberArk
- Cybereason
- Cyberinc
- Cyberlytic
- Cybersafe Solutions
- CyberSurance
- CyberWire
- CyberX
- Cybraics
- Cybric
- Cygilant (formerly EiQ Networks)
- Cylance
- Cylera
- CynergisTek
- Cytellix
- Cyveillance
- DAG Ventures
- Dailymotion
- Darktrace
- DataArt
- Dataguise
- DataMotion
- Datto
- DB Networks
- DearBytes
- Dell
- Deloitte
- Delta ID
- Delta Risk
- Delta-v Capital
- Demisto
- Department of Health and Human Services (HHS)
- Department of Homeland Security (DHS)
- Deutsche Telekom Capital Partners
- Device Authority
- DeviceLock
- DFJ
- DFLabs
- Diamond Institute for Infertility and Menopause
- DigiCert
- Digital Defense
- Digital Guardian
- DLT Solutions
- DMC Investments
- DomainTools
- Dragos
- Draper Nexus
- Dropbox
- Druva
- Duo Security
- DXC Technology
- East Seattle Partners
- ebay
- EDB Investments
- EdgeWave
- Edgile
- Eight Roads
- Eileses Capital
- Elliott Management
- Emerald Compliance Solutions (Emerald Cybersecurity)
- Empire Blue Cross Blue Shield
- ENCODE
- Endgame
- Engineering Capital
- enSilo
- Envision Ventures
- EPIC Ventures
- Epsilon
- eSentire
- ESET
- e-Share (formerly nCrypted Cloud)
- ESXi
- Evergreen Coast Capital
- Evolution Equity Partners
- Exabeam
- Excellus Health Plan
- Exclusive Ventures
- EXELERYS
- Exostar
- ExtraHop
- Extreme Networks
- EY
- Facebook
- Fairhaven Capital
- Family Tree Health Clinic
- Farsight Security
- Federal Bureau of Investigation (FBI)Fenwick & West
- ff Venture Capital
- Fidelis Cybersecurity
- Fine Tec
- Fingerprint Cards
- FireBlade
- FireEye
- Fireglass
- FireMon
- First Round Capital
- FishNet Security
- Fishtech Labs
- Flashpoint
- Flint Capital
- Forbes
- Forcepoint
- ForeScout
- Foresite
- ForgeRock
- Fortinet
- Fortscale
- Forum Systems
- Foundation Capital
- Founders Circle
- Foundstone
- Fox Technologies
- F-Prime Capital Partners
- FriendFinder Networks
- FSE Group
- Future Com
- Future Fund
- G20 Ventures
- Gemalto
- Genacast Ventures
- General Catalyst
- General Dynamics Information Technology
- Geodesic Capital
- GeoLang
- Georgian Partners
- GGV Capital
- Giacom
- Gigamon
- GigaTrust
- Github
- Glasswall Solutions
- GlenRock
- Glilot Capital
- Globalscape
- GlobalSign
- Goldman Sachs
- Google
- Granite Hill Capital Partners
- Great Place to Work
- GreatHorn
- Green Visor Capital
- Greenfield Capital Partners
- GreyCastle Security
- Greycroft Partners
- Greylock Partners
- Grotech Ventures
- GuardiCore
- Guidance Software
- Gurucul
- GV (formerly Google Ventures)
- HackerOne
- Harrisburg Gastroenterology
- harvest.ai
- Hasso Plattner Ventures
- HCI Group
- Health Information Trust (HITRUST) Alliance
- HealthNow Networks
- Heartland Payment Systems
- Help AG
- Heritage Valley Health System
- Herjavec Group
- Hewlett Packard Enterprise (HPE)
- Hexadite
- HID Global
- High Country Venture
- Highland Capital Partners
- Hollywood Presbyterian Medical Center
- HonorTech
- Hoxton Ventures
- HumanFirewalls
- Hypori
- IA Ventures
- IBM
- iboss
- Icon Ventures
- ICONIQ Capital
- iCyber-Security
- ID Agent
- ID Experts
- IDG Ventures
- Ignition Partners
- IID
- Illusive Networks
- ImageWare Systems
- Immersive
- Imperva
- Imprivata
- Index Ventures
- Indiana Cancer Agency
- Industrial Control System-Information Sharing and Analysis Center (ICS-ISAC)
- Infoblox
- InfoGuard
- Informatica
- Information Management Resources (IMRI)
- Information Technology Partners
- Ingram Micro
- Innovation Endeavors
- In-Q-Tel (IQT)
- Insight Venture Partners
- InstantScale Ventures
- Institutional Venture Partners (IVP)
- Insurance Australia Group (IAG)
- Integrated Technical Solutions (ITS)
- Intel
- Internet2
- Intersec Worldwide
- Interset
- intiGrow
- Intralinks
- Intrust IT
- IntSights
- Invincea
- Invoke Capital
- Invotas
- Ionic Security
- iSIGHT Partners
- i-Sprint Innovations
- iT-CUBE SYSTEMS
- ITEGRITI
- Ivanti
- iWelcome
- Ixia
- Jackson Square Ventures
- Jackson Square Ventures (formerly Sigma West)
- JMP Securities
- Johnson & Johnson
- JohnsTek
- JPMorgan Chase
- Jump Capital
- Juniper Networks
- K2 Intelligence
- K9 Ventures
- Kaiser Permanente Ventures
- Kaleida Health
- Kansas Heart Hospital
- Kaspersky Lab
- Keck Medicine of USC
- KHIPU Networks
- Khosla Ventures
- King's Daughters' Health (KDH)
- KKR
- Kleiner Perkins Caufield & Byers
- KPMG
- Kroll
- Kyrus Tech
- Lancope
- Lastline
- Left Bank Pediatric Clinic
- LEONI
- Leslie Ventures
- Level 3 Communications
- Level Nine Group
- Liaison Technologies
- Liberty Venture Partners
- Lidera Network
- Lieberman Software
- LIFARS
- LifeLock
- LightCyber
- Lightspeed Venture Partners
- LinkedIn
- Location Labs
- Lockheed Martin
- LogRhythm
- Logsign
- London Digital Security Centre
- Long River Ventures
- LookingGlass Cyber Solutions
- Lookout
- Los Angeles County Department of Mental Health Covertix
- Lukas Hospital
- Macnica Ventures
- MainNerve
- Malformity Labs
- Malwarebytes
- Mandiant
- Maple Leaf Partners
- March Capital Partners
- Marin Healthcare District
- Matrix Partners
- Maxfield Capital
- Mayfield Clinic
- McAfee
- MCO Global
- Med Center Health
- MedCrypt
- Medical Oncology Hematology Consultants
- Medicare
- Meditology Services
- MedSec
- MedStar Health
- MegaPath
- Menlo Security
- Merck
- Meritech Capital Partners
- Methodist Hospital, Kentucky, US
- Metropolitan Urology Group
- Micro Focus
- Microsoft
- Mid-Michigan Physicians Imaging Center
- Milton Security Group
- Mimecast
- Mirin Capital
- Mirox Cyber Security & Technology
- MobileIron
- Mobileye
- Molina Healthcare
- Morphick
- Mosley Ventures
- Myspace
- Nasdaq
- National Health Service (NHS) Niara
- National Health-Information Sharing and Analysis Center (NH-ISAC)
- NC4
- NCC Group
- NEC Networks & System Integration Corporation (NESIC)
- Neotec
- Nervana Systems
- Netcraft
- netForensics
- Netizen
- NETSCOUT
- Netskope
- NetWorks Group
- Netwrix
- New Enterprise Associates
- New Jersey Spine Center
- New York Life Insurance
- Newkirk Products
- NexDefense
- Nexthink
- NextView Ventures
- Nexusguard
- North Bridge Venture Partners
- Northern Light Venture Capital
- Northrop Grumman
- Norwest Venture Partners
- Novasano
- NowSecure
- NSS Labs
- NTT DOCOMO Ventures
- NTT Security
- NXTP Labs
- Objective Logistics
- ObserveIT
- OC Gasto Care
- Okta
- OMC Systems
- Omidyar Technology Ventures
- OpenSky
- OpenStack
- OPSWAT
- Optiv
- Opus Capital
- Oracle
- Orchard Holdings Group
- Osage Partners
- Osirium
- Ostendio
- Pacific Alliance Medical Center
- Paladion
- Palo Alto Networks
- PassiveTotal
- Patient Home Monitoring (PHM)
- Peachtree Neurological Clinic
- Peachtree Orthopaedic Clinic
- Pelion Venture Partners
- Pepper Hamilton
- Petrillo Capital
- Pew Research Center
- Phantom
- PhishLabs
- PhishMe
- Pilot Growth Equity
- Pitango Venture Capital
- Plastic Surgery Associates, South Dakota
- Plurilock
- Polito
- Ponemon Institute
- Portage Partners
- Portland Seed Fund
- Post-Quantum
- Praetorian
- Premera Blue Cross
- Premier Healthcare
- Prevalent Networks
- PriorityOne Group
- Professional Dermatology Care
- Proficio
- Progress Distribution
- Promenade Software
- Promisec
- Proofpoint
- ProStar Solutions
- ProtectWise
- Protegrity
- Protenus
- PwC
- Pwnie Express
- QinetiQ
- Qriocity
- Qualcomm Ventures
- Qualys
- Quarles & Brady
- Rackspace
- Radiology Regional Center, Pennsylvania
- Radware
- Rally Ventures
- Rapid7
- Raytheon
- Recorded Future
- Red Herring
- Redpoint Ventures
- RedSeal
- RedSocks Security
- Redspin
- Rein Capital
- Rembrandt Venture Partners
- Reveal Imaging Technologies
- Ridge Ventures
- Ridgewall
- Right Side Capital Management
- Risk Based Security
- RiskIQ
- RiskSense
- River City Media
- Riverwood Capital
- root9B
- RRE Ventures
- RSA
- Rsam
- Rubicon Labs
- Safeguard Scientifics
- SAINT
- Salesforce Ventures
- Samsung NEXT Ventures
- Sandvine
- SANS Institute
- Santander Bank
- SAP National Security Services
- Sapphire Ventures
- SAS
- SC Media
- SCADAfence
- Scale Venture Partners
- SDGblue
- Seagate Technology
- Seceon
- Seclore
- SecqureOne
- Secure Sense
- SecureAuth
- secureHIM
- Secureworks
- Security Innovation
- Security Iris
- Security Risk Advisors
- Securonix
- Sedara
- Senrio
- Sensato
- SentinelOne
- sep
- Sequoia Capital
- Sequretek
- Sera-Brynn
- ServiceNow
- SEWORKS
- Shape Security
- Shasta Ventures
- Siemens Venture Capital
- Siemplify
- Sierra
- Signal Networks
- Silent Circle
- Silicon Valley Bank
- Silver Lake Waterman
- SineWave Ventures
- Singtel Innov8
- Sirius Computer Solutions
- Skybox Security
- Skycure
- Skyhigh Networks
- Skyriver IT
- Slack
- Smilegate Investment
- Smiths Medical
- Snapchat
- SnoopWall
- Social Capital
- SoftBank Ventures
- Soltra
- Solutionary
- SonicWall
- Sony
- Sophos
- Sound Ventures
- Spark Capital
- SpearTip
- SPHERE Technology Solutions
- Spikes Security
- Spirion
- Splunk
- Spring Lake Equity Partners
- Sqrrl
- SquarePeg Capital
- SS&C Technologies
- St. Jude Medical
- St. Mark’s Surgery Center
- StackPath
- Starfish Ventures
- Startmate
- Stasmayer
- Stonesoft
- Strategic Cyber Ventures
- Sucuri
- Summit Partners
- Sun Mountain Capital
- Sutter Hill Ventures
- Swarth Group
- Swimlane
- Swivel Secure
- Sword & Shield
- Symantec
- Synack
- SyncDog
- Synchronoss
- Synopsys
- Systematic Group
- Systems Engineering
- T.J.Maxx
- Taia Global
- Talis Capital
- Tampa Bay Surgery Center
- Tangible Security
- Tanium
- Taobao
- TCP Venture Capital
- Team8
- TechFlow
- TechOperators
- TEDCO
- Teldat
- Telstra Ventures
- TELUS Ventures
- Tempered Networks
- Tenable
- TenEleven Ventures
- Thales e-Security
- The Cook County Department of Homeland Security and Emergency Management (DHSEM)
- The Hague Security Delta (HSD)
- The Mako Group
- The Media Trust
- The Ottawa Hospital
- The Oxman Group
- The Perkins Fund
- The University of Kansas Health System
- The Westly Group
- The Women's Healthcare Group, Kansas, US WordPress
- Third Point Ventures
- Thomvest Ventures
- Threat Stack
- ThreatConnect
- ThreatMetrix
- ThreatTrack Security
- Thycotic
- Tiger Global Management
- TitanHQ
- Titus Regional Medical Center
- Toba Capital
- TokenOne
- Tola Capital
- TomorrowVentures
- Top Tier Capital Partners
- Topsec
- TopSpin Security
- Torrance Memorial Medical Center
- Toshiba
- TPG Growth
- TraceSecurity
- TrapX Security
- Trend Micro
- Trident Capital
- Trinity Ventures
- Tripwire
- Trusona
- Trusted-HIT
- TrustPoint Solutions
- Trustwave
- TSC Advantage
- T-Systems
- Tufin
- TÜV Rheinland
- Tyfone
- UAE Banks Federation
- Ubiquiti Networks
- UC Davis Health
- Ukraine Power Grid
- UniCare
- Union Bay Partners
- University of Cambridge
- Untangle
- UpGuard
- UpWest Labs
- Urgent Care Clinic of Oxford
- Urology Austin
- USC Norris Comprehensive Cancer Center
- UST Global
- v1.vc
- Valar Frontier Solutions
- Valley Anesthesiology and Pain Consultants
- Valor Capital Group
- Vantage Cybersecurity Group
- vArmour
- Varonis
- VASCO
- Vaultive
- Vector Capital
- Vectra Networks
- Vela Trading Technologies
- Venable
- Venafi
- Venrock
- Ventures Unlimited
- Vera
- Veracode
- Verity Health System
- Verity Medical Foundation (formerly San Jose Medical Group)
- Verizon
- VictorOps
- VigiTrust
- Vintage Investment Partners
- Viola Ventures (formerly Carmel Ventures)
- Virtu
- Virtue Security Services
- VirusTotal
- VisionQuest Eyecare
- VisiTrend
- VMware
- Vorstack
- Votiro
- Wandera
- Warburg Pincus
- Washington University School of Medicine
- West Corporation
- WhiteHat Security
- Wilson Consulting Group
- Windancer Technologies
- Wing
- WinMagic
- Wipro Ventures
- Wombat Security Technologies
- WorkplaceDynamics
- World Economic Forum
- Wortham Insurance
- Yahoo
- Zayo
- Zelkova Ventures
- Zenedge
- ZeroFOX
- Zerto
- Ziften
- Zimperium
- Zix
- Zoho
- ZoneFox
- Zscaler
Methodology
LOADING...