Cybersecurity technology acquisitions continue to grow

The cybersecurity technology sector continues to experience a wave of acquisitions. Leading technology vendors and security service providers continue to strengthen their portfolios by acquiring technology and capabilities to address opportunities in cloud security, threat detection, orchestration and automation.
Over the last 2-3 years, the cybersecurity sector has experienced significant acquisition activity. Within the last year GlobalData has counted a minimum of five acquisitions per leading vendor for 2019. If we equate this in monetary terms external sources report that quarter one in 2019 on its own generated more than US$7Bn in deals. Investment in startups also continues to gain momentum with global investments totaling more than US$6Bn. All this indicates a real demand for cybersecurity to address the threats placed on IT systems globally across consumer, business and government entities.
Drivers of M&A activity
From a technology perspective, there are a number of factors that are driving Mergers and Acquisition (M&A) activity. In cybersecurity. Two key end user enterprise business drivers stand out. Firstly, the advancement of enterprise IT in leveraging cloud delivery, and secondly the emergence of Internet of Things (IoT). Applications are transforming traditional connectivity and application delivery models to create flexibility and agility in networks at lower price points.
Addressing cloud security
Although public cloud providers include security to fortify their cloud infrastructure, the end user enterprise is ultimately responsible to ensure that their data and applications on the public cloud are secure. In reality, a large proportion of organizations do not have adequate security measures in place. A number of these companies have experienced some form of cloud security incidents. These include unauthorized cloud access, misconfiguration of cloud platforms, account hacking, and insecure interfaces. In addition, a large number of end user enterprises are struggling with operational and compliance risk issues with respect to their cloud infrastructure. All of this is creating more uncertainty for businesses.
Security market offers business opportunities
Taking into consideration these types of enterprise challenges, the cybersecurity market continues to create significant opportunity for technology vendors and service providers to develop robust solutions to address cloud security. However, the cybersecurity market is still in catch up mode in terms of maturity and in having defined portfolios that address emerging areas.
In addition, many leading global vendors are placing more emphasis and investment in developing their portfolio roadmaps. These are next generation solutions addressing cloud delivery. Because of this, traditional service providers that are jumping on the cybersecurity bandwagon by looking to acquire cloud security technologies to extend their managed IT service portfolio solution offerings.
Key cybersecurity acquisitions
Some of the companies that have been highly active in acquisitions include Palo Alto Networks, a company that made a number of acquisitions in 2019. These include acquiring Twistlock and PureSec, to extend its Prisma™ cloud security strategy, and the acquisition of Demisto, a leading cybersecurity company specializing in security orchestration, automation, and response.
Other examples include Check Point Software acquiring Cymplify to build its IoT security offering. Lastly, Accenture acquired Symantec’s cybersecurity services business from Broadcom, to build out its managed security threat intelligence services business by combining its expertise in advanced analytics, automation and machine learning.
Skills are in high demand
A key observation from all of these acquisitions is that many of these buyers are leading global companies with deep pockets. In a market where skill sets are in demand and product development life cycles are long, it makes business sense to bring in these capabilities. It is achieved through acquiring niche, but highly credible technology-savvy vendors that are focusing on specific areas within the cybersecurity value chain. Many of these target acquisitions have also gone through a series of investment funding and are now investment-ready as part of their exit strategy. These investment trends in cybersecurity are somewhat different when compared to general IT, where leading vendors aim to consolidate the market and take out smaller competitors.
More acquisitions on the way
As acquisitions move forward in 2020 and beyond we see investments happening. Within cloud security, in the next two years GlobalData expects acquisition opportunities in Artificial Intelligence (AI) Base Detection, Internet of Things (IoT) Threat Detection, Workload Protection Platforms, Cloud Access Security Brokers (CASBs), and Cloud Security Posture Management. Additionally, we see vendors with credible solutions in Threat Management, Identity Access Management, and improvements to platforms that improve translation of security data for multi-cloud delivery, multi-cloud, zero-trust application and security platform, gaining traction in the market. This will make them interesting targets for investors.
Integration is the challenge
So, acquisitions in the cybersecurity sector at this moment in time will continue to gain momentum as we move forward 2020 and beyond. For leading vendors with aggressive acquisition strategies the challenge is always going to be how successfully they can integrate the different technologies as they move forward with their portfolio roadmaps. On the other hand, competitors that do not see M&A initiatives to be strategic to their corporate strategy surely must consider how they will capitalize on cloud cybersecurity opportunities.
Evaluation is needed
These trends create even more complexity for end user enterprises that are attempting to reduce and consolidate different security solution vendors across their network and move to become more self-sufficient in managing the security layer for the cloud environment. Therefore, as part of an enterprise’s sourcing strategy, companies must evaluate and measure the mid-long term benefits that its selected cybersecurity vendor has to the needs of the business, and carry out a full risk contingency assessment on newly launched cloud cybersecurity portfolio suites that have been developed through acquisitions.
source verdict
Industry: Cyber Security

Latest Jobs
-
- CIAM Architect Azure B2C
- N/A
- N/A
-
We are seeking a highly skilled and experienced Azure B2C CIAM Architect for a contract starting on Jan 2024. As an Azure B2C CIAM Architect, you will be responsible for designing, implementing, and deploying an new Azure B2C Solution . Responsibilities: Design and implement an Azure B2C-based CIAM solution that meets the needs of our clients organization. Maintain and support the Azure B2C-based CIAM solution. Provide training and support to our employees on the use of the CIAM solution. Background designing, implementing, and maintaining CIAM solutions. Experience with cloud-based identity and access management (IAM) solutions. Experience with OAuth, OpenID Connect,and SAML. Excellent written and verbal communication skills
-
- Senior IAM Consultant
- Germany
- Upto €110,000 depending on level of position
-
Senior IAM Consultant is needed to help lead and deploy IAM Projects for this expand IAM Consultancy The ideal candidate will have a deep understanding of IAM concepts and technologies, as well as experience in deploying and managing complex IAM solutions. Responsibilities Lead the deployment of IAM solutions for our clients Work with clients to understand their IAM requirements and design solutions that meet their needs Configure and implement IAM solutions using best practices Integrate IAM solutions with other enterprise systems Provide training and support to clients on the use of IAM solutions Stay up-to-date on the latest IAM technologies and trends We are looking for an experieneced IAM Consutlatn with: Strong understanding of IAM concepts and technologies,including identity lifecycle management,access control,and authentication Experience in deploying and managing complex IAM solutions Experience with IAM products and solutions,such as SailPoint,One Identity Manager,and Azure Active Directory Excellent communication and interpersonal skills Ability to work independently and as part of a team Fluent in German Candidates witll need to live and have the right to work within Germany to be considered.
-
- Security Architect - SOC Design - Outside IR35 London. SC / DV cleared
- London
- Outside IR35
-
Security Architect - With in-depth SOC Design experience needed for Outside IR35 London. SC / DV cleared. 6 month rolling Immediate Experience delivering technical Security Architecture design / assurance of security design with mobile network experience. HLD / LLD Current SC Clearance a must. Willingness to undertake DV. London 3 days a week Immediately interviewing.
-
- Cyber Security Risk Consultant. UK. Hybrid. Home | Work balance
- United Kingdom
- N/A
-
Cyber Security Consultancy - done the right way. Seeking a passionate Cyber Security Risk Consultant who enjoys helping clients make a different to their business. Warning- if you want a large, slow moving, high politics, high travel security consultancy that demands their a pound of flesh this is NOT for you. A successful individual will have experience working with clients to identify business cyber security risk. This is a remote first opportunity which means you will spend the majority of your time working remotely. You will however spend some time meeting clients as well as meeting up with the team on a monthly basis.. Some of the nice to have certifications. CRISC, ISO27001 Lead implementer, CISA, CISM, CISSP Along with dedicated training budgets, unlimited holiday and a structured career path, this opportunity will give a much needed work life balance. Unable to offer Visa sponsorship now or in the future. Apply and book a call in my diary with the below