Cybersecurity Ventures recently announced its Q3 2016 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year. According to Steve Morgan, founder and CEO of Cybersecurity Ventures, thousands of potential companies were considered by soliciting feedback from CISOs and end-user security practitioners and researching hundreds of security events and news sources.
After numerous high-profile breaches both in the public and private sectors, cybersecurity has become a never-ending, mission-critical topic that all organizations must contend with. According to Cybersecurity Ventures’ "Cybersecurity Market Report," worldwide spending on cybersecurity-related products and services is expected to top $1 trillion for the 2017 to 2021 timeframe. Given the continually evolving nature of cyber attacks, it's imperative that organizations remain up to date on the latest security capabilities and offerings.
The companies on this list were evaluated on their security market category, problems solved, customer base, feedback, VC funding, company growth, published reviews, among other factors. The Cybersecurity 500 does not rank companies by revenues, employees, or annual growth. "We didn't think a list of the largest cybersecurity companies would be very useful to our target audience of cyber and IT security decision makers, evaluators, and recommenders," said Morgan. "They already know who the biggest vendors are."
In the slideshow, we've highlighted the top 25 companies from the Cybersecurity 500 for the third quarter of 2016.
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>
Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ... More >>
IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ... More >>