Cybersecurity in Healthcare, 2018-2030

  • Lowest Price Guaranteed From USD 3,499

  • Published
    January 2018

  • Pages
    547

  • View Count
    4629

Example Insights

  1. Close to 400 stakeholders currently offer a variety of products / solutions / services to healthcare organizations. Of these, over 80% companies provide core products / solutions (such as identity access management and intrusion prevention) to enhance information security. In addition, about 56% of the companies provide threat intelligence solutions to organizations in the healthcare organizations including hospitals, pharmaceutical / biotechnology companies and medical device manufacturers.
  2. At present, the market is highly fragmented and is a mix of large enterprises, mid-size companies and start-ups. Majority of the large-sized companies (total 72) have three types of offerings (core products / solutions, threat intelligence solutions and services). In fact, for some of the companies in this category, cybersecurity is one of the many focus areas. Examples include (in alphabetical order, no selection criteria) AECOM, Cisco, Fortinet, IBM, Juniper Networks, Level 3, McAfee, Microsoft, NETSCOUT, Secure Works, SonicWall, Symantec and VMware.
  3. Similarly, there are close to 100 mid-sized companies that are providing cybersecurity solutions / services to players in the healthcare domain. Examples include (in alphabetical order, no selection criteria) Absolute Software, Arbor Networks, Auth0, BeyondTrust, Black Duck Software, CipherCloud, Cybereason, Infoblox, Malwarebytes, Netskope, ThreatMetrix, LogRhythm, SentinelOne, Skyhigh Networks and Zerto.
  4. In addition, several start-ups (close to 200) are offering innovative solutions / products / services. Venture capitalists have strongly supported innovation in this domain; around USD 2.5 billion has been invested in this industry since 2012 across around 180 instances of funding. Some of the companies that have raised capital multiple times since 2012 include (in alphabetical order, no selection criteria) Auth0, Cybereason, Cylance, Darktrac, Fortscale, ProtectWise, Rubicon Labs, SentinelOne, Skyhigh Networks, SnoopWall, Sqrrl and Synack.
  5. Our proprietary valuation analysis reveals that, of the 64 start-ups that were evaluated, 20 companies are estimated to have a valuation between USD 100 million and USD 1,000 million. Examples of such companies include (in alphabetical order, no selection criteria) Anomali, Area 1 Security, Bitglass, Exabeam, Silent Circle, Sqrrl, Synack, Tempered Networks, Threat Stack, UpGuard and ZeroFOX. Specifically, there are two companies that are estimated to have a billion-dollar valuation.
  6. Given the increasing number of cyberattacks in the healthcare industry, and the fact that the volume of digital data / records will steadily increase in the future, we estimate the overall cybersecurity market specific to the healthcare industry to grow at an annualized rate of about 14%. Since a significant proportion of electronic / digital data is located in the US, we believe that this region currently accounts for over 60% of the market’s share; this is followed by Europe with over 20% share. Over time, due to the adoption of digital solutions in highly populated countries, such as India and China, the market in Asia-Pacific is expected grow at a relatively higher rate.
  7. Intrusion (hacking / ransomware) attacks, accounting for over 50% of the market, are the primary concern in the healthcare industry. In fact, the share of these breaches is estimated to grow to about 70% by 2030.
  8. In terms of type of security, products / solutions for application security and network security are the most popular; these occupy about 50% of the current market. Due to the increasing prevalence of cloud based solutions, the market for cloud security is likely to register a relatively higher growth and occupy around 25% of the overall share by 2030.

Report Description

I believe cybersecurity services are very important for healthcare organizations. No cybersecurity product / platform tells how to tackle the situation of a data breach or how to respond to cyberattacks. The cybersecurity services market is going to grow as soon as people realize that the actual threat is already out there, and they are not capable to deal with that

-Chief Executive Officer

The digital revolution has transformed the way businesses operate across the globe. However, digitally stored information is prone to hacking and manipulation by cyber criminals. The concern is validated by the fact that more than 5.1 million records are compromised due to data breaches every day. In 2016, close to 1,800 incidents of data breaches were reported across all the industries; in total, almost 1.4 billion data records were lost or stolen. The year 2017 also witnessed several cyberattacks; notable examples include WannaCry and NotPetya ransomware attacks, Equifax data breach, MongoDB databases leak, Elasticsearch server hack, Cloudbleed security bug, Zomato hack, HBO hack / Game of Thrones leaks, Uber data breach, and Ethereum hack.

The healthcare industry has been amongst the prime targets for hackers over the last several years. The Ponemon Institute’s Fifth Annual Study reported that cyberattacks in healthcare have increased by a factor of 125% since 2010. In the first half of 2017, the healthcare industry had been compromised a number of times, having experienced a total of 228 data breaches, representing 25% of the total number of breaches worldwide. Across these instances, around 31 million records were compromised, stolen or lost, representing an increase of 423% as compared to the first six months of 2016. In addition, according to a report published in May 2016, it is estimated that, with each electronic health record (EHR) costing around USD 355 in the black market, healthcare data breaches have resulted in losses worth USD 6.2 billion per year to the US healthcare industry. Examples of organizations that have recently been the victims of cyberattacks / security incidents include (in alphabetical order) Abbott / St. Jude Medical, Anthem BlueCross BlueShield, Bayer, Bupa Global Health Insurance, Bronx Lebanon Hospital Center, HealthNow Networks, Johnson & Johnson, Med Center Health, Merck, National Health System (NHS), Pacific Alliance Medical Center, Patient Home Monitoring, and Smiths Medical.

In order to overcome these challenges, various cybersecurity solution providers have started to specifically focus on healthcare. Along with the presence of big companies, the entry of several start-ups is driving the innovation in this domain. Contrary to the expectation, capital spending on cybersecurity in the healthcare industry is far less compared to some other industries. In addition, the scarcity of skilled cybersecurity professionals capable of catering to the complex regulatory demands in the healthcare industry is making it even more difficult for the successful implementation of cybersecurity policies across this field.

 

Scope of the Report

The ‘Cybersecurity in Healthcare Market, 2018-2030’ report features an extensive study of the current landscape and future outlook of the growing market of cybersecurity within the healthcare industry. The focus of this study is on the cybersecurity products / solutions and services that are currently available for protecting internet connected devices against cybercriminals, and the likely evolution of novel technologies / platforms in the mid to long term. Backed by funding from several venture capital firms and strategic investors, this evolving market has its hopes pinned on the efforts of multiple start-ups. Amongst other elements, the report features:

  • A detailed assessment of the current market landscape of cybersecurity within the healthcare domain, providing information on cybersecurity core products / solutions, threat intelligence solutions, information on different threat types, security elements and modes of deployment.
  • Detailed profiles of some of the emerging players in the industry, highlighting the current focus of the companies, capital raised, and details on their specific cybersecurity products / solutions and services. The profiles also have a section on recent developments, highlighting the achievements, partnerships / collaborations, and the likely strategies that may be adopted by these players to fuel growth in the foreseen future.
  • A comprehensive benchmark analysis, highlighting key focus areas of mid to large sized companies, thereby, providing a means to compare the existing capabilities within respective peer groups and help industry stakeholders identify ways to achieve a competitive edge over contemporary players. In addition, we have provided detailed profiles of some of the established players within each peer group.
  • An analysis of investments made at various stages of product development; these include seed financing, venture capital financing, debt financing and grants / awards received by the companies that are focused in this area.
  • An elaborate valuation analysis of companies that are involved in providing cybersecurity products / solutions / services to the healthcare industry; for the purpose of this analysis, we focused on companies that have been established over the last 5-6 years.
  • An overview of how artificial intelligence (AI), machine learning and deep learning techniques can augment cybersecurity, once integrated. In addition, we have outlined a detailed assessment of the current market landscape of AI-based cybersecurity, and provided high-level insights on the market competitiveness within this domain.
  • A case study on cybersecurity use cases within the healthcare industry, highlighting some of the notable healthcare data breaches and security incidents that have happened in 2017. In addition, we have briefly outlined some of the recently reported medical device hacks / security vulnerabilities that led to the recalling of these devices.

One of the key objectives of the report was to understand the primary growth drivers and estimate the future size of the market. Based on various parameters, such as number of healthcare data breaches, number of records compromised, expected pricing of the stolen medical records and spending trends on cybersecurity in the healthcare industry, we have provided an informed estimate on the likely evolution of the market in the long term, for the period 2018-2030. To account for the uncertainties associated with the number of data breaches, and to add robustness to our model, we have provided three forecast scenarios, portraying the conservative, base and optimistic tracks of the market’s evolution.

The opinions and insights presented in the report were also influenced by discussions held with senior stakeholders in the industry. These include Garrett Silver (CEO, Critical Informatics), John Gomez (CEO, Sensato), Matan Kubovsky (VP, R&D, illusive networks), Mike Kijewski (CEO, MedCrypt), Mike Meikle (CEO, secureHIM), Robert Dobson (Director, Device Authority) and Rosa Lenders (Marketing Executive, Device Authority), Rod Schultz (CPO, Rubicon Labs) and Julia Cline (Senior Director, Product and Marketing, Rubicon Labs), Saïd Kenj (Account Executive, Cyberlytic) and Rebecca Bourke (Marketing Manager, Cyberlytic), Steve Leatherman (IT Consultant, BlackRidge Technology), and Yoni Shohet (CEO, SCADAfence). All actual figures have been sourced and analyzed from publicly available information forums and primary research discussions. Financial figures mentioned in this report are in USD, unless otherwise specified.

Contents

Chapter 2  is an executive summary of the insights captured in our research. The summary offers a high-level view on the likely evolution of the cybersecurity market within the healthcare industry in the long term.

Chapter 3  is an introductory chapter that presents an overview of the digital revolution, emergence of IoT, cloud computing, and the digitization of business communication across a number of industries, with information on the associated risks and vulnerabilities. It outlines some of the prevalent cyber threats and security vulnerabilities, thereby, highlighting the importance of cybersecurity. It also provides an overview of the key cybersecurity solutions that are being used in the industry. In addition, the chapter provides information on some of the notable cyberattacks and data breaches that have taken place across different industries in the past few years.

Chapter 4  provides information on the digitization of the healthcare industry, and outlines key reasons why organizations in this domain have been a prime target for cyber criminals in the past few years. Further, the chapter stresses on the importance of cybersecurity in the healthcare industry, giving an overview of the HIPAA framework, and highlights several security vulnerabilities that exist within the industry. It also provides details on some of the largest healthcare data breaches in history. In addition, it presents a summary of the best practices that must be considered while implementing security measures within the healthcare industry.

Chapter 5  includes information on around 400 key stakeholders that are exploring the potential applications of their cybersecurity products / solutions and services within the healthcare industry. We have classified the database based on the type of offering, including cybersecurity core products / solutions, threat intelligence solutions and cybersecurity services. In addition, the chapter provides information on companies’ geographical location, size of employee base, type of threats that a company is capable of dealing with, type of security elements, and mode of deployment. Furthermore, we have identified various prevalent and upcoming trends in the industry that are likely to govern the future of cybersecurity within the healthcare industry.

Chapter 6  features detailed profiles of some of the emerging stakeholders that are primarily offering cybersecurity core products / solutions for the healthcare industry. Each profile includes an overview of the company, financial information, details on their cybersecurity products / solutions, and recent developments with respect to the cybersecurity domain.

Chapter 7  includes detailed profiles of some of the emerging stakeholders that are primarily offering threat intelligence solutions for the healthcare industry. Each profile includes an overview of the company, information on financial performance, details on their specific cybersecurity products / solutions, and recent developments with respect to the cybersecurity domain.

Chapter 8  provides detailed profiles of some of the emerging stakeholders that are primarily offering cybersecurity services (managed / professional) for the healthcare industry. Each profile includes an overview of the company, information on financial performance, details on their specific cybersecurity products / solutions, and recent developments with respect to the cybersecurity domain.

Chapter 9  presents a benchmark analysis, taking into consideration the established players that are engaged in this domain. It highlights the capabilities of these companies in terms of their expertise across cybersecurity products / solutions and services for the healthcare industry. The analysis allows companies to compare their existing capabilities within and beyond their peer groups, and identify opportunities to become more competitive in the industry. In addition, we have provided detailed profiles of some of the established stakeholders within different peer groups. Each of these profiles feature an overview of the company, information on financial performance, details on their specific cybersecurity products / solutions, and recent developments with respect to the cybersecurity domain.

Chapter 10  provides information on the funding instances and investments that have been made in this industry. The chapter includes details on various investments (seed financing, venture funding, debt financing and grants) received by companies between 2012 and late 2017, highlighting the growing interest of the venture capital community and other strategic investors.

Chapter 11  features a comprehensive valuation analysis of the companies that are offering cybersecurity products / solutions and services for the healthcare industry. The chapter provides insights based on a multi-variable dependent valuation model. The model is based on the year of establishment of the companies, employed workforce, funding received and depth of product / service portfolio.

Chapter 12  presents a comprehensive market forecast, highlighting the future potential of the market till 2030. The forecast, which provides estimates on the market opportunity across the three major types of offering (cybersecurity core products / solutions, threat intelligence solutions and cybersecurity services), is backed by robust secondary research, as wells as inputs from senior stakeholders in the industry. The analysis also highlights the relative growth opportunity across different geographical regions (North America, Europe, Asia-Pacific and Rest of the World), type of threats (insider theft, intrusion, 3 rd party / sub-contractor negligence, employee negligence, physical theft and others), type of cybersecurity services (managed and professional), type of security elements (application security, cloud security, endpoint security and network security), and mode of deployment (cloud and on-premise). To account for the uncertainties associated with the adoption of these technologies, we have provided optimistic and conservative forecast scenarios, in addition to the base forecast scenario.

Chapter 13  presents an overview of AI, machine learning and deep learning techniques, and the likely benefits of integration of these technologies into cybersecurity tools / systems. The chapter highlights how AI / machine learning techniques can bolster cybersecurity capabilities for combating the ever-increasing threat landscape. In addition, we have outlined a detailed assessment of the current market landscape of AI-based cybersecurity, and provided high-level insights on the market competitiveness within this domain.

Chapter 14  presents a case study on cybersecurity use cases within the healthcare industry. The chapter highlights some of the notable healthcare data breaches and security incidents that took place in 2017. In addition, we have briefly discussed some of the recently reported medical device hacks / security vulnerabilities, in order to highlight the potential damages these incidents can cause. We have also summarized some of the initiatives / measures adopted by healthcare / pharmaceutical organizations to tackle cyberattacks.

Chapter 15  summarizes the overall report. In this chapter, we have provided a list of key takeaways from the report, and expressed our independent opinion related to the research and analysis described in the previous chapters.

Chapter 16  is a collection of executive insights from various key stakeholders in this market. The chapter provides brief overview of the companies and interview transcripts of the discussions that were held with stakeholders associated with these companies. The chapter provides details of interviews held with Garrett Silver (CEO, Critical Informatics), John Gomez (CEO, Sensato), Matan Kubovsky (VP, R&D, illusive networks), Mike Kijewski (CEO, MedCrypt), Mike Meikle (CEO, secureHIM), Robert Dobson (Director, Device Authority) and Rosa Lenders (Marketing Executive, Device Authority), Rod Schultz (CPO, Rubicon Labs) and Julia Cline (Senior Director, Product and Marketing, Rubicon Labs), Saïd Kenj (Account Executive, Cyberlytic) and Rebecca Bourke (Marketing Manager, Cyberlytic), Steve Leatherman (IT Consultant, BlackRidge Technology), and Yoni Shohet (CEO, SCADAfence).

Chapter 17  is an appendix, which provides tabulated data and numbers for all the figures provided in the report.

Chapter 18  is an appendix, which provides the list of companies and organizations mentioned in the report.

Table of Contents

1. PREFACE
1.1. Scope of the Report
1.2. Research Methodology
1.3. Chapter Outlines
 
2. EXECUTIVE SUMMARY
 
3. INTRODUCTION
3.1. Digitization and Global Transformation
3.1.1. The Internet of Things (IoT)
3.1.2. Cloud Computing
3.1.3. Digitized Business Communication
3.2. Impact of Digitization on Different Industries
3.3. Current Underlying Problems of Digitization
3.4. Risks and Mitigation Strategies of Digitization
3.5. Cybersecurity
3.5.1. The Importance of Cybersecurity
3.5.2. Historical Review of Notable Attacks and Data Breaches
3.5.3. Industries Impacted by Cybersecurity Incidents
3.5.4. Security Vulnerabilities and Threat Landscape
3.5.5. Introduction to Cybersecurity Solutions
 
4. CYBERSECURITY IN HEALTHCARE
4.1. Chapter Overview
4.2. Digital and Connected Healthcare
4.3. Common Vulnerabilities and Cyber Risks in Healthcare
4.4. HIPAA Framework
4.5. Cybersecurity in Healthcare
4.5.1. The Importance of Cybersecurity in Healthcare
4.5.2. Notable Attacks and Data Breaches in Healthcare
4.5.2.1. Attack on Anthem: The Largest Healthcare Data Breach in History
4.5.2.2. Recent Healthcare Data Breaches
 
4.5.3. Ransomware: A Key Concern for Healthcare Organizations
4.5.4. Elements of Cybersecurity in Healthcare
4.5.5. Growth Drivers and Road Blocks to Cybersecurity in Healthcare
4.5.6. Best Cybersecurity Practices for Healthcare Industry
 
5. CURRENT MARKET LANDSCAPE
5.1. Chapter Overview
5.2. Cybersecurity in Healthcare: List of Industry Players
5.2.1. Distribution by Year of Establishment
5.2.2. Distribution by Geographical Location
5.2.3. Distribution by Company Size
5.2.4. Distribution by Type of Offering
5.2.5. Distribution by Type of Core Products / Solutions
5.2.6. Distribution by Type of Threat Intelligence Solutions
5.2.7. Distribution by Type of Services
5.2.8. Distribution by Type of Security Elements
5.2.9. Distribution by Type of Deployment Mode
5.2.10. Distribution by Type of Threats Mitigated
 
6. CORE CYBERSECURITY PRODUCTS / SOLUTIONS: COMPANY PROFILES
6.1. Chapter Overview
6.2. Attivo Networks
6.2.1. Company Snapshot
6.2.2. Financial Information
6.2.3. Cybersecurity Product / Service Portfolio
6.2.4. Recent Developments
 
6.3. CensorNet
6.3.1. Company Snapshot
6.3.2. Financial Information
6.3.3. Cybersecurity Product / Service Portfolio
6.3.4. Recent Developments
 
6.4. Exabeam
6.4.1. Company Snapshot
6.4.2. Financial Information
6.4.3. Cybersecurity Product / Service Portfolio
6.4.4. Recent Developments
 
6.5. iCyber-Security
6.5.1. Company Snapshot
6.5.2. Financial Information
6.5.3. Cybersecurity Product / Service Portfolio
6.5.4. Recent Developments
 
6.6. Threat Stack
6.6.1. Company Snapshot
6.6.2. Financial Information
6.6.3. Cybersecurity Product / Service Portfolio
6.6.4. Recent Developments
 
6.7. TraceSecurity
6.7.1. Company Snapshot
6.7.2. Financial Information
6.7.3. Cybersecurity Product / Service Portfolio
6.7.4. Recent Developments
 
6.8. Zenedge
6.8.1. Company Snapshot
6.8.2. Financial Information
6.8.3. Cybersecurity Product / Service Portfolio
6.8.4. Recent Developments
 
7. THREAT INTELLIGENCE SOLUTIONS: COMPANY PROFILES
7.1. Chapter Overview
7.2. Anomali
7.2.1. Company Snapshot
7.2.2. Financial Information
7.2.3. Cybersecurity Product / Service Portfolio
7.2.4. Recent Developments
 
7.3. Centripetal Networks
7.3.1. Company Snapshot
7.3.2. Financial Information
7.3.3. Cybersecurity Product / Service Portfolio
7.3.4. Recent Developments
 
7.4. Flashpoint
7.4.1. Company Snapshot
7.4.2. Financial Information
7.4.3. Cybersecurity Product / Service Portfolio
7.4.4. Recent Developments
 
7.5. ProtectWise
7.5.1. Company Snapshot
7.5.2. Financial Information
7.5.3. Cybersecurity Product / Service Portfolio
7.5.4. Recent Developments
 
7.6. Sqrrl
7.6.1. Company Snapshot
7.6.2. Financial Information
7.6.3. Cybersecurity Product / Service Portfolio
7.6.4. Recent Developments
 
7.7. Shape Security
7.7.1. Company Snapshot
7.7.2. Financial Information
7.7.3. Cybersecurity Product / Service Portfolio
7.7.4. Recent Developments
 
7.8. Vectra Networks
7.8.1. Company Snapshot
7.8.2. Financial Information
7.8.3. Cybersecurity Product / Service Portfolio
7.8.4. Recent Developments
 
8. CYBERSECURITY SERVICES: COMPANY PROFILES
8.1. Chapter Overview
8.2. Agio
8.2.1. Company Snapshot
8.2.2. Cybersecurity Service Portfolio
8.2.3. Recent Developments
 
8.3. CyberSurance
8.3.1. Company Snapshot
8.3.2. Cybersecurity Service Portfolio
8.3.3. Recent Developments
 
8.4. Delta Risk
8.4.1. Company Snapshot
8.4.2. Cybersecurity Service Portfolio
8.4.3. Recent Developments
 
8.5. ITEGRITI
8.5.1. Company Snapshot
8.5.2. Cybersecurity Service Portfolio
8.5.3. Recent Developments
 
8.6. Security Risk Advisors
8.6.1. Company Snapshot
8.6.2. Cybersecurity Service Portfolio
8.6.3. Recent Developments
 
8.7. Sera-Brynn
8.7.1. Company Snapshot
8.7.2. Cybersecurity Service Portfolio
8.7.3. Recent Developments
 
8.8. VigiTrust
8.8.1. Company Snapshot
8.8.2. Cybersecurity Service Portfolio
8.8.3. Recent Developments
 
9. BENCHMARK ANALYSIS
9.1. Chapter Overview
9.2. Benchmark Analysis: Methodology
9.3. Benchmark Analysis: Peer Groups
 
9.4. Benchmark Analysis: Medium-Sized Companies
9.4.1. Peer Group I
9.4.2. Peer Group II
9.4.3. Peer Group III
 
9.4.4. Key Industry Players
9.4.4.1. AlienVault
9.4.4.1.1. Company Snapshot
9.4.4.1.2. Financial Information
9.4.4.1.3. Cybersecurity Product / Service Portfolio
9.4.4.1.4. Recent Developments
 
9.4.4.2. Carbon Black
9.4.4.2.1. Company Snapshot
9.4.4.2.2. Financial Information
9.4.4.2.3. Cybersecurity Product / Service Portfolio
9.4.4.2.4. Recent Developments
 
9.4.4.3. CrowdStrike
9.4.4.3.1. Company Snapshot
9.4.4.3.2. Financial Information
9.4.4.3.3. Cybersecurity Product / Service Portfolio
9.4.4.3.4. Recent Developments
 
9.4.4.4. Cylance
9.4.4.4.1. Company Snapshot
9.4.4.4.2. Financial Information
9.4.4.4.3. Cybersecurity Product / Service Portfolio
9.4.4.4.4. Recent Developments
 
9.4.4.5. Darktrace
9.4.4.5.1. Company Snapshot
9.4.4.5.2. Financial Information
9.4.4.5.3. Cybersecurity Product / Service Portfolio
9.4.4.5.4. Recent Developments
 
9.4.4.6. Gigamon
9.4.4.6.1. Company Snapshot
9.4.4.6.2. Financial Information
9.4.4.6.3. Cybersecurity Product / Service Portfolio
9.4.4.6.4. Recent Developments
 
9.4.4.7. LogRhythm
9.4.4.7.1. Company Snapshot
9.4.4.7.2. Financial Information
9.4.4.7.3. Cybersecurity Product / Service Portfolio
9.4.4.7.4. Recent Developments
 
9.5. Benchmark Analysis: Large-Sized Companies
9.5.1. Peer Group IV
9.5.2. Peer Group V
 
9.5.3. Key Industry Players
9.5.3.1. Fortinet
9.5.3.1.1. Company Snapshot
9.5.3.1.2. Financial Information
9.5.3.1.3. Cybersecurity Product / Service Portfolio
9.5.3.1.4. Recent Developments
 
9.5.3.2. FireEye
9.5.3.2.1. Company Snapshot
9.5.3.2.2. Financial Information
9.5.3.2.3. Cybersecurity Product / Service Portfolio
9.5.3.2.4. Recent Developments
 
9.5.3.3. IBM
9.5.3.3.1. Company Snapshot
9.5.3.3.2. Financial Information
9.5.3.3.3. Cybersecurity Product / Service Portfolio
9.5.3.3.4. Recent Developments
 
9.5.3.4. McAfee
9.5.3.4.1. Company Snapshot
9.5.3.4.2. Financial Information
9.5.3.4.3. Cybersecurity Product / Service Portfolio
9.5.3.4.4. Recent Developments
 
9.5.3.5. Palo Alto Networks
9.5.3.5.1. Company Snapshot
9.5.3.5.2. Financial Information
9.5.3.5.3. Cybersecurity Product / Service Portfolio
9.5.3.5.4. Recent Developments
 
9.5.3.6. Sophos
9.5.3.6.1. Company Snapshot
9.5.3.6.2. Financial Information
9.5.3.6.3. Cybersecurity Product / Service Portfolio
9.5.3.6.4. Recent Developments
 
9.5.3.7. Trustwave
9.5.3.7.1. Company Snapshot
9.5.3.7.2. Financial Information
9.5.3.7.3. Cybersecurity Product / Service Portfolio
9.5.3.7.4. Recent Developments
 
10. CAPITAL INVESTMENTS AND FUNDING
10.1. Chapter Overview
10.2. Types of Funding
10.3. Cybersecurity in Healthcare: Funding Instances
10.3.1. Analysis by Year of Funding
10.3.2. Analysis by Amount Invested
10.3.3. Analysis by Type of Funding
10.3.4. Most Active Players by Number of Instances
10.3.5. Most Active Investors by Number of Instances
10.4. Concluding Remarks
 
11. COMPANY VALUATION ANALYSIS
11.1. Chapter Overview
11.2. Company Valuation: Methodology
11.3. Company Valuation: Categorization by Multiple Parameters
11.3.1. Categorization by Employee Size
11.3.2. Categorization by Portfolio Strength
11.3.3. Categorization by Weighted Average Score
11.4. Company Valuation: Roots Analysis Proprietary Scores
 
12. MARKET FORECAST
12.1. Chapter Overview
12.2. Forecast Methodology and Key Assumptions
12.3. Overall Cybersecurity Market in Healthcare, 2018-2030
12.4. Cybersecurity Market in Healthcare: Distribution by Type of Offering
12.4.1. Core Cybersecurity Products / Solutions Market, 2018-2030
12.4.2. Threat Intelligence Solutions Market, 2018-2030
12.4.3. Cybersecurity Services Market (Managed v/s Professional Services), 2018-2030
 
12.5. Cybersecurity Market in Healthcare: Distribution by Threat Type
12.5.1. Intrusion (Hacking / Phishing / Ransomware) Market, 2018-2030
12.5.3. Insider Theft Market, 2018-2030
12.5.3. Employee Negligence Market, 2018-2030
12.5.4. 3rd Party / Subcontractor Negligence Market, 2018-2030
12.5.5. Physical Theft Market, 2018-2030
12.5.6. Other Threat Types Market, 2018-2030
 
12.6. Cybersecurity Market in Healthcare: Distribution by Type of Security Elements
12.6.1. Application Security Market, 2018-2030
12.6.2. Cloud Security Market, 2018-2030
12.6.3. Network Security Market, 2018-2030
12.6.4. Endpoint Security Market, 2018-2030
12.6.5. Other Security Element Types Market, 2018-2030
 
12.7. Cybersecurity Market in Healthcare: Distribution by Deployment Mode
12.7.1. Cloud Deployment Market, 2018-2030
12.7.2. On-Premise Deployment Market, 2018-2030
 
12.8. Cybersecurity Market in Healthcare: Distribution by Geographies
12.8.1. Cybersecurity Market in Healthcare in the US, 2018-2030
12.8.2. Cybersecurity Market in Healthcare in Europe, 2018-2030
12.8.3. Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030
12.8.4. Cybersecurity Market in Healthcare in Rest of the World, 2018-2030
 
13. FUTURE TRENDS: ARTIFICIAL INTELLIGENCE AND CYBERSECURITY
13.1. Chapter Overview
13.2. Artificial Intelligence (AI): An Overview
13.2.1. Machine Learning: An Approach to Achieve AI
13.2.2. Deep Learning: A Technique for Implementing Machine Learning
13.3. AI in Cybersecurity
13.3.1. Potential Benefits of AI in Cybersecurity
13.4. AI-based Cybersecurity in Healthcare
13.4.1. AI-based Cybersecurity in Healthcare: List of Industry Players
13.4.1.1. Analysis by Year of Establishment
13.4.1.2. Analysis by Geographical Location
13.4.1.3. Analysis by Company Size
13.4.1.4. Top 15 Industry Players in Terms of Equity Funding
13.4.1.5. Market Competitiveness Analysis
 
14. CASE STUDY: CYBERSECURITY USE CASES IN HEALTHCARE
14.1. Chapter Overview
14.2. Notable Healthcare Data Breaches in 2017
14.3. The Next Major Security Concern: Medical Device Hacks
14.4. Example Strategies to Tackle Cyber Threats
14.4.1. Anthem
14.4.2. Merck
14.4.3. Aralez Pharmaceuticals
14.4.4. Atrius Health
14.4.5. Cardinal Health
14.4.6. Baptist Healthcare System
14.4.7. Sarasota Memorial Healthcare System
14.4.8. State Health and Human Services (HHS) Agency
 
15. EXECUTIVE INSIGHTS
15.1. Chapter Overview
15.2. BlackRidge Technology
15.2.1. Company Snapshot
15.2.2. Interview Transcript: Steve Leatherman, IT Consultant
 
15.3. Critical Informatics
15.3.1. Company Snapshot
15.3.2. Interview Transcript: Garrett Silver, Chief Executive Officer
 
15.4. Cyberlytic
15.4.1. Company Snapshot
15.4.2. Interview Transcript: Said Kenj, Account Executive and Rebecca Bourke, Marketing Manager
 
15.5. Device Authority
15.5.1. Company Snapshot
15.5.2. Interview Transcript: Robert Dobson, Director and Rosa Lenders, Marketing Executive
 
15.6. illusive networks
15.6.1. Company Snapshot
15.6.2. Interview Transcript: Matan Kubovsky, Vice President, R&D
 
15.7. MedCrypt
15.7.1. Company Snapshot
15.7.2. Interview Transcript: Mike Kijewski, Chief Executive Officer
 
15.8. Risk Based Security
15.8.1. Company Snapshot
15.8.2. Interview Transcript: Jake Kouns, Chief Information Security Officer
 
15.9. Rubicon Labs
15.9.1. Company Snapshot
15.9.2. Interview Transcript: Rod Schultz, Chief Product Officer and Julia Cline, Senior Director, Product and Marketing
 
15.10. SCADAfence
15.10.1. Company Snapshot
15.10.2. Interview Transcript: Yoni Shohet, Chief Executive Officer
 
15.11. secureHIM
15.11.1. Company Snapshot
15.11.2. Interview Transcript: Mike Meikle, Chief Executive Officer
 
15.12. Sensato
15.12.1. Company Snapshot
15.12.2. Interview Transcript: John Gomez, Chief Executive Officer
 
16. CONCLUSION
16.1. Although the Advent of Digitization has Created Several New Business Opportunities, Industries are Now More Vulnerable to Cyberattacks
16.2. Owing to Multiple Contributors, Healthcare is Amongst the Worst Hit Industries by Cyberattacks
16.3. With Growing Complexity and Frequency of Cyberattacks, a Large Number of Industry Players have Widened their Expertise to Protect Healthcare Organizations
16.4. Several Start-ups, Backed by Venture Capital Investors, are Driving Technological Innovation in the Market
16.5. Given the Financial Support and Diverse Product / Solution Portfolio, Several Recently Established Companies are Steadily Approaching Unicorn Status
16.6. Driven by the Evolving Threat Landscape and High Value of Healthcare Records, the Market is Expected to Grow Significantly in the Coming Years
16.7. As Threat Levels Increase, Artificial Intelligence (AI) Holds a Significant Potential in Next Generation Cyber Defenses
 
17. APPENDIX 1: TABULATED DATA
 
18. APPENDIX 2: LIST OF COMPANIES AND ORGANIZATIONS

List of Figures

Figure 3.1 Internet of Things: Framework
Figure 3.2 Internet of Things: Schematic Representation
Figure 3.3 Internet of Things: Number of Connected Devices, 2015-2025 (Billion)
Figure 3.4 Cloud Computing: Development Timeline
Figure 3.5 Cloud Computing: Deployment Models
Figure 3.6 Cloud Computing: Global Spending, 2015-2020 (USD Billion)
Figure 3.7 Digitized Business Communication Channels
Figure 3.8 Digitization: Major Drawbacks
Figure 3.9 Top Security Implications of Cyberattacks, 2016
Figure 3.10 Annual Number of Data Breaches and Exposed Records in the US, 2005-2016 (Million)
Figure 3.11 Number of Data Breach Incidents in North and Central America, South America, Europe, Middle East, Africa, and Asia-Pacific, 2016 (Million)
Figure 3.12 Number of Compromised Data Records in Selected Data Breaches, 2007-H1 2017 (Million)
Figure 3.13 Average Organizational Cost to Business after a Data Breach in the US, 2006-2016 (USD Million)
Figure 3.14 Industries Hit by the Highest Number of Cyberattacks in 2014, 2015 and 2016
Figure 3.15 Number of Records Breached: Distribution by Industry, 2015
Figure 4.1 Digital Transformation in Healthcare Industry: Key Elements
Figure 4.2 Global Digital Health Market, 2015-2020 (USD Billion)
Figure 4.3 Healthcare Assets Targeted by Different Cyber Criminals 
Figure 4.4 Different Healthcare Organizations Affected by Data Breaches in the US, November 2016-January 2017
Figure 4.5 Impact on Trust of Consumers on Healthcare Organizations after a Breach in the US
Figure 4.6 Annual Number of Healthcare Data Breaches and Exposed Records, 2009-2016 (Million)
Figure 4.7 Global Average Cost to a Healthcare Organization Due to a Data Breach, 2006-2016 (USD Million)
Figure 4.8 Number of Healthcare Records Breached per Month, 2016
Figure 4.9 Healthcare Data Breaches, 2016
Figure 4.10 Primary Causes of Healthcare Data Breaches, 2016
Figure 4.11 Growth Drivers and Road Blocks to Cybersecurity in Healthcare
Figure 5.1 Cybersecurity in Healthcare: Distribution of Industry Players by Year of Establishment
Figure 5.2 Cybersecurity in Healthcare: Distribution of Industry Players by Geographical Location
Figure 5.3 Cybersecurity in Healthcare: Distribution of Industry Players by Size (Number of Employees)
Figure 5.4 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Offering
Figure 5.5 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Core Products / Solutions
Figure 5.6 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Threat Intelligence Solutions
Figure 5.7 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Services
Figure 5.8 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Security Elements
Figure 5.9 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Deployment Mode
Figure 5.10 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Threats Mitigated
Figure 9.1 Benchmark Analysis: Distribution of Industry Players by Year of Establishment and Geographical Location
Figure 9.2 Benchmark Analysis: Medium-Sized Companies, Peer Group I
Figure 9.3 Benchmark Analysis: Medium-Sized Companies, Peer Group II
Figure 9.4 Benchmark Analysis: Medium-Sized Companies, Peer Group III
Figure 9.5 Gigamon: Revenues, FY 2012-Q3 FY 2017 (USD Million)
Figure 9.6 Gigamon, Revenues: Distribution by Business Segment, 2016 (USD Million)
Figure 9.7 Gigamon, Revenues: Distribution by Region, 2016 (USD Million)
Figure 9.8 Benchmark Analysis: Large-Sized Companies, Peer Group IV
Figure 9.9 Benchmark Analysis: Large-Sized Companies, Peer Group V
Figure 9.10 Fortinet: Revenues, FY 2012-Q3 FY 2017 (USD Billion)
Figure 9.11 Fortinet, Revenues: Distribution by Business Segment, 2016 (USD Billion)
Figure 9.12 Fortinet, Revenues: Distribution by Region, 2016 (USD Billion)
Figure 9.13 FireEye: Revenues, FY 2012-Q3 FY 2017 (USD Million)
Figure 9.14 FireEye, Revenues: Distribution by Business Segment, 2016 (USD Million)
Figure 9.15 FireEye, Revenues: Distribution by Region, 2016 (USD Million)
Figure 9.16 Palo Alto Networks: Revenues, FY 2013-Q1 FY 2018 (USD Billion)
Figure 9.17 Palo Alto Networks, Revenues: Distribution by Business Segment, FY 2017 (USD Billion)
Figure 9.18 Palo Alto Networks, Revenues: Distribution by Region, FY 2017 (USD Billion)
Figure 9.19 Sophos: Revenues, FY 2015-H1 FY 2018 (USD Million)
Figure 9.20 Sophos, Revenues: Distribution by Business Segment, FY 2017 (USD Million)
Figure 9.21 Sophos, Revenues: Distribution by Type of Product, FY 2017 (USD Million)
Figure 9.22 Sophos, Revenues: Distribution by Region, FY 2017 (USD Million)
Figure 10.1 Cybersecurity in Healthcare, Funding Instances: Year-wise Trend, 2012-2017
Figure 10.2 Cybersecurity in Healthcare, Funding Instances: Distribution by Amount Invested, 2012-2017 (USD Million)
Figure 10.3 Cybersecurity in Healthcare, Funding Instances: Distribution by Type of Funding, 2012-2017
Figure 10.4 Cybersecurity in Healthcare, Funding Instances: Distribution by Amount and Type of Funding, 2012-2017 (USD Million)
Figure 10.5 Cybersecurity in Healthcare, Funding Instances: Most Active Players by Number of Instances, 2012-2017
Figure 10.6 Cybersecurity in Healthcare, Funding Instances: Most Active Investors by Number of Instances, 2012-2017
Figure 10.7 Cybersecurity in Healthcare: Funding and Investment Summary
Figure 11.1 Company Valuation Analysis: A/F Ratio, Input Dataset
Figure 11.2 Company Valuation Analysis: A/Y Ratio, Input Dataset
Figure 11.3 Company Valuation Analysis: A/E Ratio, Input Dataset
Figure 11.4 Company Valuation Analysis: Categorization by Employee Base Score
Figure 11.5 Company Valuation Analysis: Categorization by Portfolio Strength
Figure 11.6 Company Valuation Analysis: Categorization by Weighted Average Score
Figure 11.7 Company Valuation Analysis: Likely Unicorns in Cybersecurity in Healthcare Industry
Figure 12.1 Country-wise Average Cost per Record, 2017 (USD)
Figure 12.2 Overall Cybersecurity Market in Healthcare (Actual v/s Untapped Opportunity), 2018 and 2030 (USD Billion)
Figure 12.3 Overall Cybersecurity Market in Healthcare, 2018-2030: Base Scenario (USD Billion)
Figure 12.4 Core Cybersecurity Products / Solutions Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.5 Threat Intelligence Solutions Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.6 Cybersecurity Services Market (Managed v/s Professional Services), 2018-2030: Base Scenario (USD Billion)
Figure 12.7 Intrusion (Hacking / Phishing / Ransomware) Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.8 Insider Theft Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.9 Employee Negligence Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.10 3rd Party / Subcontractor Negligence Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.11 Physical Theft Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.12 Other Threat Types Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.13 Application Security Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.14 Cloud Security Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.15 Network Security Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.16 Endpoint Security Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.17 Other Security Element Types Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.18 Cloud Deployment Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.19 On-Premise Deployment Market, 2018-2030: Base Scenario (USD Billion)
Figure 12.20 Cybersecurity Market in Healthcare in the US, 2018-2030: Base Scenario (USD Billion)
Figure 12.21 Cybersecurity Market in Healthcare in Europe, 2018-2030: Base Scenario (USD Billion)
Figure 12.22 Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030: Base Scenario (USD Billion)
Figure 12.23 Cybersecurity Market in Healthcare in Rest of the World, 2018-2030: Base Scenario (USD Billion)
Figure 13.1 Machine Learning Algorithm: Workflow
Figure 13.2 Deep Learning: Image Recognition
Figure 13.3 Google Trends: Artificial Intelligence, Machine Learning and Deep Learning
Figure 13.4 Google Trends: Popular Keywords (Deep Learning)
Figure 13.5 Artificial Intelligence v/s Cybersecurity: Google Trends, 2011-2017
Figure 13.6 Artificial Intelligence v/s Cybersecurity: Geographical Distribution of Google Searches, 2011-2017
Figure 13.7 AI / Machine Learning: Shaping the Future of Cybersecurity
Figure 13.8 AI-based Cybersecurity in Healthcare: Cumulative Distribution of Industry Players by Year of Establishment
Figure 13.9 AI-based Cybersecurity in Healthcare: Distribution of Industry Players by Location of Headquarters
Figure 13.10 AI-based Cybersecurity in Healthcare: Regional Landscape of Industry Players
Figure 13.11 AI-based Cybersecurity in Healthcare: Distribution of Industry Players by Size (Number of Employees)
Figure 13.12 AI-based Cybersecurity in Healthcare: Top 15 Industry Players in Terms of Equity Funding (USD Million)
Figure 13.13 AI-based Cybersecurity in Healthcare: Market Competitiveness
Figure 14.1 Notable Healthcare Data Breaches and Security Incidents, 2017
Figure 14.2 Notable Healthcare Data Breaches and Security Incidents, 2017: Distribution by Geographical Location
Figure 14.3 Notable Healthcare Data Breaches and Security Incidents, 2017: Distribution by Cause of Breach
Figure 16.1 Overall Cybersecurity Market in Healthcare: Comparative Evolution Scenarios, 2018 and 2030 (USD Billion)

List of Tables

Table 3.1 Impact of Digitization on Different Industries
Table 3.2 Key Cyberattacks and Security Vulnerabilities
Table 3.3 Key Cybersecurity Solutions
Table 4.1 Potential Applications of IoT Across Healthcare Industry
Table 4.2 Cybersecurity Vulnerabilities in the Healthcare Industry
Table 4.3 Largest Healthcare Data Breaches, 2017
Table 4.4 Largest Healthcare Data Breaches, 2016
Table 4.5 Biggest Ransomware Attacks on Healthcare Industry, 2016
Table 4.6 Cybersecurity Elements in Healthcare
Table 4.7 Best Cybersecurity Practices in Healthcare
Table 5.1 Cybersecurity in Healthcare: List of Industry Players 
Table 5.2 Cybersecurity in Healthcare, Industry Players: Information on Type of Offering
Table 5.3 Cybersecurity in Healthcare, Industry Players: Information on Type of Security Elements and Deployment Mode
Table 5.4 Cybersecurity in Healthcare, Industry Players: Information on Type of Threats Mitigated
Table 6.1 Attivo Networks: Key Highlights
Table 6.2 Attivo Networks: Funding Instances
Table 6.3 Attivo Networks: Cybersecurity Product / Service Portfolio
Table 6.4 Attivo Networks: Recent Developments
Table 6.5 CensorNet: Key Highlights
Table 6.6 CensorNet: Funding Instances 
Table 6.7 CensorNet: Cybersecurity Product / Service Portfolio
Table 6.8 CensorNet: Recent Developments
Table 6.9 Exabeam: Key Highlights
Table 6.10 Exabeam: Funding Instances 
Table 6.11 Exabeam: Cybersecurity Product / Service Portfolio
Table 6.12 Exabeam: Recent Developments
Table 6.13 iCyber-Security: Key Highlights
Table 6.14 iCyber-Security: Funding Instances 
Table 6.15 iCyber-Security: Cybersecurity Product / Service Portfolio
Table 6.16 iCyber-Security: Recent Developments
Table 6.17 Threat Stack: Key Highlights
Table 6.18 Threat Stack: Funding Instances 
Table 6.19 Threat Stack: Cybersecurity Product / Service Portfolio
Table 6.20 Threat Stack: Recent Developments
Table 6.21 TraceSecurity: Key Highlights
Table 6.22 TraceSecurity: Funding Instances 
Table 6.23 TraceSecurity: Cybersecurity Product / Service Portfolio
Table 6.24 TraceSecurity: Recent Developments
Table 6.25 Zenedge: Key Highlights
Table 6.26 Zenedge: Funding Instances 
Table 6.27 Zenedge: Cybersecurity Product / Service Portfolio
Table 6.28 Zenedge: Recent Developments
Table 7.1 Anomali: Key Highlights
Table 7.2 Anomali: Funding Instances 
Table 7.3 Anomali: Cybersecurity Product / Service Portfolio
Table 7.4 Anomali: Recent Developments
Table 7.5 Centripetal Networks: Key Highlights
Table 7.6 Centripetal Networks: Funding Instances 
Table 7.7 Centripetal Networks: Cybersecurity Product / Service Portfolio
Table 7.8 Centripetal Networks: Recent Developments
Table 7.9 Flashpoint: Key Highlights
Table 7.10 Flashpoint: Funding Instances
Table 7.11 Flashpoint: Cybersecurity Product / Service Portfolio
Table 7.12 Flashpoint: Recent Developments
Table 7.13 ProtectWise: Key Highlights
Table 7.14 ProtectWise: Funding Instances 
Table 7.15 ProtectWise: Cybersecurity Product / Service Portfolio
Table 7.16 ProtectWise: Recent Developments
Table 7.17 Sqrrl: Key Highlights
Table 7.18 Sqrrl: Funding Instances 
Table 7.19 Sqrrl: Cybersecurity Product / Service Portfolio
Table 7.20 Sqrrl: Recent Developments
Table 7.21 Shape Security: Key Highlights
Table 7.22 Shape Security: Funding Instances 
Table 7.23 Shape Security: Cybersecurity Product / Service Portfolio
Table 7.24 Shape Security: Recent Developments
Table 7.25 Vectra Networks: Key Highlights
Table 7.26 Vectra Networks: Funding Instances 
Table 7.27 Vectra Networks: Cybersecurity Product / Service Portfolio
Table 7.28 Vectra Networks: Recent Developments
Table 8.1 Agio: Key Highlights
Table 8.2 Agio: Cybersecurity Service Portfolio
Table 8.3 Agio: Recent Developments
Table 8.4 CyberSurance: Key Highlights
Table 8.5 CyberSurance: Cybersecurity Service Portfolio
Table 8.6 CyberSurance: Recent Developments
Table 8.7 Delta Risk: Key Highlights
Table 8.8 Delta Risk: Cybersecurity Service Portfolio
Table 8.9 Delta Risk: Recent Developments
Table 8.10 ITEGRITI: Key Highlights
Table 8.11 ITEGRITI: Cybersecurity Service Portfolio
Table 8.12 ITEGRITI: Recent Developments
Table 8.13 Security Risk Advisors: Key Highlights
Table 8.14 Security Risk Advisors: Cybersecurity Service Portfolio
Table 8.15 Security Risk Advisors: Recent Developments
Table 8.16 Sera-Brynn: Key Highlights
Table 8.17 Sera-Brynn: Cybersecurity Service Portfolio
Table 8.18 Sera-Brynn: Recent Developments
Table 8.19 VigiTrust: Key Highlights
Table 8.20 VigiTrust: Cybersecurity Service Portfolio
Table 8.21 VigiTrust: Recent Developments
Table 9.1 Benchmark Analysis: Peer Groups
Table 9.2 AlienVault: Key Highlights
Table 9.3 AlienVault: Funding Instances 
Table 9.4 AlienVault: Cybersecurity Product / Service Portfolio
Table 9.5 AlienVault: Recent Developments
Table 9.6 Carbon Black: Key Highlights
Table 9.7 Carbon Black: Recent Acquisitions
Table 9.8 Carbon Black: Funding Instances 
Table 9.9 Carbon Black: Cybersecurity Product / Service Portfolio
Table 9.10 Carbon Black: Recent Developments
Table 9.11 CrowdStrike: Key Highlights
Table 9.12 CrowdStrike: Funding Instances 
Table 9.13 CrowdStrike: Cybersecurity Product / Service Portfolio
Table 9.14 CrowdStrike: Recent Developments
Table 9.15 Cylance: Key Highlights
Table 9.16 Cylance: Funding Instances 
Table 9.17 Cylance: Cybersecurity Product / Service Portfolio
Table 9.18 Cylance: Recent Developments
Table 9.19 Darktrace: Key Highlights
Table 9.20 Darktrace: Funding Instances 
Table 9.21 Darktrace: Cybersecurity Product / Service Portfolio
Table 9.22 Darktrace: Recent Developments
Table 9.23 Gigamon: Key Highlights
Table 9.24 Gigamon: Cybersecurity Product / Service Portfolio
Table 9.25 Gigamon: Recent Developments
Table 9.26 LogRhythm: Key Highlights
Table 9.27 LogRhythm: Funding Instances  
Table 9.28 LogRhythm: Cybersecurity Product / Service Portfolio
Table 9.29 LogRhythm: Recent Developments
Table 9.30 Fortinet: Key Highlights
Table 9.31 Fortinet: Recent Acquisitions
Table 9.32 Fortinet: Cybersecurity Product / Service Portfolio
Table 9.33 Fortinet: Recent Developments
Table 9.34 FireEye: Key Highlights
Table 9.35 FireEye: Recent Acquisitions
Table 9.36 FireEye: Cybersecurity Product / Service Portfolio
Table 9.37 FireEye: Recent Developments
Table 9.38 IBM: Key Highlights
Table 9.39 IBM: Recent Acquisitions
Table 9.40 IBM: Cybersecurity Product / Service Portfolio
Table 9.41 IBM: Recent Developments
Table 9.42 McAfee: Key Highlights
Table 9.43 McAfee: Recent Acquisitions
Table 9.44 McAfee: Cybersecurity Product / Service Portfolio
Table 9.45 McAfee: Recent Developments
Table 9.46 Palo Alto Networks: Key Highlights
Table 9.47 Palo Alto Networks: Recent Acquisitions
Table 9.48 Palo Alto Networks: Cybersecurity Product / Service Portfolio
Table 9.49 Palo Alto Networks: Recent Developments
Table 9.50 Sophos: Key Highlights
Table 9.51 Sophos: Recent Acquisitions
Table 9.52 Sophos: Cybersecurity Product / Service Portfolio
Table 9.53 Sophos: Recent Developments
Table 9.54 Trustwave: Key Highlights
Table 9.55 Trustwave: Recent Acquisitions
Table 9.56 Trustwave: Funding Instances
Table 9.57 Trustwave: Cybersecurity Product / Service Portfolio
Table 9.58 Trustwave: Recent Developments
Table 10.1 Cybersecurity in Healthcare: Funding Instances
Table 10.2 Cybersecurity in Healthcare: Summary of Investments
Table 11.1 Company Valuation Analysis: Sample Dataset
Table 11.2 Company Valuation Analysis: Weighted Average Evaluation
Table 11.3 Company Valuation Analysis: Estimated Valuation
Table 13.1 Combating Cybersecurity Threats: Traditional Approach v/s AI-based Approach
Table 13.2 AI-based Cybersecurity in Healthcare: List of Industry Players
Table 14.1 Notable Healthcare Data Breaches and Security Incidents, 2017 
Table 14.2 Recent Medical Device Cybersecurity Incidents 
Table 15.1 BlackRidge Technology: Key Highlights
Table 15.2 Critical Informatics: Key Highlights
Table 15.3 Cyberlytic: Key Highlights
Table 15.4 Device Authority: Key Highlights
Table 15.5 illusive networks: Key Highlights
Table 15.6 MedCrypt: Key Highlights
Table 15.7 Risk Based Security: Key Highlights
Table 15.8 Rubicon Labs: Key Highlights
Table 15.9 SCADAfence: Key Highlights
Table 15.10 secureHIM: Key Highlights
Table 15.11 Sensato: Key Highlights
Table 17.1 Internet of Things: Number of Connected Devices, 2015-2025 (Billion)
Table 17.2 Cloud Computing: Global Spending, 2015-2020 (USD Billion)
Table 17.3 Top Security Implications of Cyberattacks, 2016
Table 17.4 Annual Number of Data Breaches and Exposed Records in the US, 2005-2016 (Million)
Table 17.5 Number of Data Breach Incidents in North and Central America, South America, Europe, Middle East, Africa, and Asia-Pacific, 2016 (Million)
Table 17.6 Number of Compromised Data Records in Selected Data Breaches, 2007-H1 2017 (Million)
Table 17.7 Average Organizational Cost to Business after a Data Breach in the US, 2006-2016 (USD Million)
Table 17.8 Number of Records Breached: Distribution by Industry, 2015
Table 17.9 Global Digital Health Market, 2015-2020 (USD Billion)
Table 17.10 Different Healthcare Organizations Affected by Data Breaches in the US, November 2016-January 2017
Table 17.11 Impact on Trust of Consumers on Healthcare Organizations after a Breach in the US
Table 17.12 Annual Number of Healthcare Data Breaches and Exposed Records, 2009-2016 (Million)
Table 17.13 Global Average Cost to a Healthcare Organization Due to a Data Breach, 2006-2016 (USD Million)
Table 17.14 Number of Healthcare Records Breached per Month, 2016
Table 17.15 Healthcare Data Breaches, 2016
Table 17.16 Primary Causes of Healthcare Data Breaches, 2016
Table 17.17 Cybersecurity in Healthcare: Distribution of Industry Players by Year of Establishment
Table 17.18 Cybersecurity in Healthcare: Distribution of Industry Players by Geographical Location
Table 17.19 Cybersecurity in Healthcare: Distribution of Industry Players by Size (Number of Employees)
Table 17.20 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Offering
Table 17.21 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Core Products / Solutions
Table 17.22 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Threat Intelligence Solutions
Table 17.23 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Services
Table 17.24 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Security Elements
Table 17.25 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Deployment Mode
Table 17.26 Cybersecurity in Healthcare: Distribution of Industry Players by Type of Threats Mitigated
Table 17.27 Benchmark Analysis: Distribution of Industry Players by Year of Establishment and Geographical Location
Table 17.28 Benchmark Analysis: Medium-Sized Companies, Peer Group I
Table 17.29 Benchmark Analysis: Medium-Sized Companies, Peer Group II
Table 17.30 Benchmark Analysis: Medium-Sized Companies, Peer Group III
Table 17.31 Gigamon: Revenues, FY 2012-Q3 FY 2017 (USD Million)
Table 17.32 Gigamon, Revenues: Distribution by Business Segment, 2016 (USD Million)
Table 17.33 Gigamon, Revenues: Distribution by Region, 2016 (USD Million)
Table 17.34 Benchmark Analysis: Large-Sized Companies, Peer Group IV
Table 17.35 Benchmark Analysis: Large-Sized Companies, Peer Group V
Table 17.36 Fortinet: Revenues, FY 2012-Q3 FY 2017 (USD Billion)
Table 17.37 Fortinet, Revenues: Distribution by Business Segment, 2016 (USD Billion)
Table 17.38 Fortinet, Revenues: Distribution by Region, 2016 (USD Billion)
Table 17.39 FireEye: Revenues, FY 2012-Q3 FY 2017 (USD Million)
Table 17.40 FireEye, Revenues: Distribution by Business Segment, 2016 (USD Million)
Table 17.41 FireEye, Revenues: Distribution by Region, 2016 (USD Million)
Table 17.42 Palo Alto Networks: Revenues, FY 2013-Q1 FY 2018 (USD Billion)
Table 17.43 Palo Alto Networks, Revenues: Distribution by Business Segment, FY 2017 (USD Billion)
Table 17.44 Palo Alto Networks, Revenues: Distribution by Region, FY 2017 (USD Billion)
Table 17.45 Sophos: Revenues, FY 2015-H1 FY 2018 (USD Million)
Table 17.46 Sophos, Revenues: Distribution by Business Segment, FY 2017 (USD Million)
Table 17.47 Sophos, Revenues: Distribution by Type of Product, FY 2017 (USD Million)
Table 17.48 Sophos, Revenues: Distribution by Region, FY 2017 (USD Million)
Table 17.49 Cybersecurity in Healthcare, Funding Instances: Year-wise Trend, 2012-2017
Table 17.50 Cybersecurity in Healthcare, Funding Instances: Distribution by Amount Invested, 2012-2017 (USD Million)
Table 17.51 Cybersecurity in Healthcare, Funding Instances: Distribution by Type of Funding, 2012-2017
Table 17.52 Cybersecurity in Healthcare, Funding Instances: Distribution by Amount Invested and Type of Funding, 2012-2017 (USD Million)
Table 17.53 Cybersecurity in Healthcare, Funding Instances: Most Active Players by Number of Instances, 2012-2017
Table 17.54 Cybersecurity in Healthcare, Funding Instances: Most Active Investors by Number of Instances, 2012-2017
Table 17.55 Cybersecurity in Healthcare: Funding and Investment Summary
Table 17.56 Company Valuation Analysis: A/F Ratio, Input Dataset
Table 17.57 Company Valuation Analysis: A/Y Ratio, Input Dataset
Table 17.58 Company Valuation Analysis: A/E Ratio, Input Dataset
Table 17.59 Country-wise Average Cost per Record, 2017 (USD)
Table 17.60 Overall Cybersecurity Market in Healthcare (Actual v/s Untapped Opportunity), 2018 and 2030 (USD Billion)
Table 17.61 Overall Cybersecurity Market in Healthcare, 2018-2030: Conservative Scenario (USD Billion)
Table 17.62 Overall Cybersecurity Market in Healthcare, 2018-2030: Base Scenario (USD Billion)
Table 17.63 Overall Cybersecurity Market in Healthcare, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.64 Core Cybersecurity Products / Solutions Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.65 Core Cybersecurity Products / Solutions Market, 2018-2030: Base Scenario (USD Billion)
Table 17.66 Core Cybersecurity Products / Solutions Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.67 Threat Intelligence Solutions Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.68 Threat Intelligence Solutions Market, 2018-2030: Base Scenario (USD Billion)
Table 17.69 Threat Intelligence Solutions Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.70 Cybersecurity Services Market (Managed v/s Professional Services), 2018-2030: Base Scenario (USD Billion)
Table 17.71 Intrusion (Hacking / Phishing / Ransomware) Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.72 Intrusion (Hacking / Phishing / Ransomware) Market, 2018-2030: Base Scenario (USD Billion)
Table 17.73 Intrusion (Hacking / Phishing / Ransomware) Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.74 Insider Theft Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.75 Insider Theft Market, 2018-2030: Base Scenario (USD Billion)
Table 17.76 Insider Theft Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.77 Employee Negligence Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.78 Employee Negligence Market, 2018-2030: Base Scenario (USD Billion)
Table 17.79 Employee Negligence Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.80 3rd Party / Subcontractor Negligence Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.81 3rd Party / Subcontractor Negligence Market, 2018-2030: Base Scenario (USD Billion)
Table 17.82 3rd Party / Subcontractor Negligence Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.83 Physical Theft Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.84 Physical Theft Market, 2018-2030: Base Scenario (USD Billion)
Table 17.85 Physical Theft Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.86 Other Threat Types Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.87 Other Threat Types Market, 2018-2030: Base Scenario (USD Billion)
Table 17.88 Other Threat Types Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.89 Application Security Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.90 Application Security Market, 2018-2030: Base Scenario (USD Billion)
Table 17.91 Application Security Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.92 Cloud Security Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.93 Cloud Security Market, 2018-2030: Base Scenario (USD Billion)
Table 17.94 Cloud Security Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.95 Network Security Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.96 Network Security Market, 2018-2030: Base Scenario (USD Billion)
Table 17.97 Network Security Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.98 Endpoint Security Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.99 Endpoint Security Market, 2018-2030: Base Scenario (USD Billion)
Table 17.100 Endpoint Security Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.101 Other Security Element Types Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.102 Other Security Element Types Market, 2018-2030: Base Scenario (USD Billion)
Table 17.103 Other Security Element Types Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.104 Cloud Deployment Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.105 Cloud Deployment Market, 2018-2030: Base Scenario (USD Billion)
Table 17.106 Cloud Deployment Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.107 On-Premise Deployment Market, 2018-2030: Conservative Scenario (USD Billion)
Table 17.108 On-Premise Deployment Market, 2018-2030: Base Scenario (USD Billion)
Table 17.109 On-Premise Deployment Market, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.110 Cybersecurity Market in Healthcare in the US, 2018-2030: Conservative Scenario (USD Billion)
Table 17.111 Cybersecurity Market in Healthcare in the US, 2018-2030: Base Scenario (USD Billion)
Table 17.112 Cybersecurity Market in Healthcare in the US, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.113 Cybersecurity Market in Healthcare in Europe, 2018-2030: Conservative Scenario (USD Billion)
Table 17.114 Cybersecurity Market in Healthcare in Europe, 2018-2030: Base Scenario (USD Billion)
Table 17.115 Cybersecurity Market in Healthcare in Europe, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.116 Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030: Conservative Scenario (USD Billion)
Table 17.117 Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030: Base Scenario (USD Billion)
Table 17.118 Cybersecurity Market in Healthcare in Asia-Pacific, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.119 Cybersecurity Market in Healthcare in Rest of the World, 2018-2030: Conservative Scenario (USD Billion)
Table 17.120 Cybersecurity Market in Healthcare in Rest of the World, 2018-2030: Base Scenario (USD Billion)
Table 17.121 Cybersecurity Market in Healthcare in Rest of the World, 2018-2030: Optimistic Scenario (USD Billion)
Table 17.122 AI-based Cybersecurity in Healthcare: Cumulative Distribution of Industry by Year of Establishment
Table 17.123 AI-based Cybersecurity in Healthcare: Distribution of Industry Players by Location of Headquarters
Table 17.124 AI-based Cybersecurity in Healthcare: Distribution of Industry Players by Size (Number of Employees)
Table 17.125 AI-based Cybersecurity in Healthcare: Top 15 Industry Players in Terms of Equity Funding (USD Million)
Table 17.126 Notable Healthcare Data Breaches and Security Incidents, 2017: Distribution by Geographical Location
Table 17.127 Notable Healthcare Data Breaches and Security Incidents, 2017: Distribution by Cause of Breach
Table 17.128 Overall Cybersecurity Market in Healthcare: Comparative Evolution Scenarios, 2018 and 2030 (USD Billion) Figure 3.1 Internet of Things: Framework

Listed Companies

The following companies / institutes / government bodies and organizations have been mentioned in this report.

  1. 406 Ventures
  2. 21st Century Oncology
  3. 3eTI
  4. 3i International
  5. 4SEC Group
  6. 500 Startups
  7. 7Safe
  8. 83North (formerly Greylock IL)
  9. A10 Networks
  10. Abbott
  11. ABCD Pediatrics
  12. Absolute
  13. Acalvio Technologies
  14. Accel Partners
  15. Accenture
  16. Access Venture Partners
  17. Accomplice
  18. Accuvant
  19. ActiveCanopy
  20. ACTIVECYBER
  21. Adams Street Partners
  22. Adara Ventures
  23. Adobe
  24. ADT Cybersecurity (formerly DATASHIELD)
  25. AECOM
  26. Aesthetic Dentistry, New York, US
  27. Agari
  28. AGC Networks
  29. Agio
  30. AirWatch
  31. Airway Oxygen
  32. Akamai
  33. AlertEnterprise
  34. AlienVault
  35. AllClear ID
  36. Allegis Capital
  37. Alphaserve Technologies
  38. Alpine Security
  39. Alsop Louie Partners
  40. Alvarado Hospital Medical Center
  41. Amazon
  42. AME Cloud Ventures
  43. America One Technologies
  44. AmericaTech
  45. Amerigroup
  46. Amplify Partners
  47. Anomali
  48. Anthem
  49. AOL
  50. AppDynamics
  51. Appthority
  52. Arbor Networks
  53. ArcSight
  54. Area 1 Security
  55. Argus Cyber Security
  56. Aristos Ventures
  57. Arkansas Oral & Facial Surgery Center
  58. Armolon
  59. Armor
  60. Arrow Electronics
  61. Arsenal Venture Partners
  62. Arthur Ventures
  63. Aruba (a Hewlett Packard Enterprise company)
  64. Arxan
  65. Ascent Venture Partners
  66. Ashley Madison
  67. Aspect Security
  68. Aspect Ventures
  69. AT&T
  70. Athens Orthopedic Clinic
  71. Atlas Venture
  72. Atos
  73. Atredis Partners
  74. Attivo Networks
  75. August Capital
  76. Augusta University Medical Center
  77. Aurionpro
  78. Auth0
  79. Auxilio
  80. Avast Software
  81. Avata Intelligence (formerly Armorway)
  82. AV-Comparatives
  83. Avecto
  84. AVG
  85. Axiad IDS
  86. AXON Connected
  87. AxonAI (formerly AXON Ghost Sentinel)
  88. Axway
  89. BAE Systems
  90. Bain Capital Ventures
  91. Baltimore Angels
  92. Banner Health
  93. Barracuda Networks
  94. Barrier1 Systems
  95. Baseline Ventures
  96. Battelle
  97. Battery Ventures
  98. Bayer
  99. Bayshore Networks
  100. Beckton Dickinson
  101. Benhamou Global Ventures (BGV)
  102. Bessemer Venture Partners
  103. BeyondTrust
  104. BIO-key International
  105. Bitfinex
  106. Bitglass
  107. BitSight
  108. Black Duck Software
  109. Black Sheep Capital
  110. BlackBerry
  111. BlackRidge Technology
  112. Blackstone Tactical Opportunities Fund
  113. BlackstoneOne
  114. Bloomberg Beta
  115. Blu Venture Investors
  116. Blue Coat Systems
  117. BlueCat
  118. BlueChilli
  119. Blueliv
  120. Blumberg Capital
  121. BlumShapiro
  122. BluVector
  123. Bomgar
  124. Bon Secours Health System
  125. Booz Allen Hamilton
  126. BostInno
  127. Box
  128. Bradford Networks
  129. Breach Intelligence
  130. BRM Capital
  131. Broadcom
  132. Bromium
  133. Bronx-Lebanon Hospital Center
  134. BT Group
  135. Buckhead Investment Partners
  136. Built in LA
  137. Bupa Global
  138. ByteGrid
  139. CA Technologies
  140. Cain Capital
  141. California Correctional Health Care Services
  142. Calyptix Security
  143. Capital One Growth Ventures
  144. CapitalG (formerly Google Capital)
  145. Carbon Black
  146. CareMore
  147. Catbird
  148. Category 5 Consulting
  149. CDW
  150. CensorNet
  151. Center of Innovative Technology
  152. Central Ohio Urology Group
  153. Centrify
  154. Centripetal Networks
  155. CenturyLink
  156. Charles River Ventures
  157. Check Point Software Technologies
  158. Chertoff Group
  159. Chino Valley Medical Center
  160. Cicada Innovations
  161. Cimcor
  162. CIPHER
  163. CipherCloud
  164. CipherTrust
  165. Cisco
  166. Citi Ventures
  167. CITIC Telecom CPC
  168. Citrix
  169. Clear Venture Partners
  170. Clearwater Compliance
  171. Cleveland Medical Associates
  172. Cloud Harmonics
  173. Cloudera
  174. CloudLink
  175. CloudLock
  176. CME Ventures
  177. CNBC
  178. Coalfire
  179. Coaxis International
  180. Code Dx
  181. Cognosante
  182. Commonwealth Health Corporation
  183. Community Health Plan of Washington
  184. Community Mercy Health Partners
  185. Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology (MIT CSAIL)
  186. Conduent
  187. Confer Technologies
  188. Conjur
  189. ConnectWise
  190. Content Security
  191. Context Information Security
  192. Contextual Security
  193. Continental
  194. Core Capital Partners
  195. Core Security
  196. Corero Network Security
  197. CORL Technologies
  198. Cornell University
  199. Correlation Ventures
  200. Cowboy Ventures
  201. Cray
  202. Critical Informatics
  203. CRN
  204. Croghan Investments
  205. Crosscheck Networks
  206. Crosslink Capital
  207. CrowdStrike
  208. Crowe Horwath
  209. Crypta Labs
  210. Cryptzone
  211. CSC Digital Brand Services
  212. CSRA
  213. Cyber Rescue Alliance
  214. Cyber Toa
  215. CyberArk
  216. Cybereason
  217. Cyberinc
  218. Cyberlytic
  219. Cybersafe Solutions
  220. CyberSurance
  221. CyberWire
  222. CyberX
  223. Cybraics
  224. Cybric
  225. Cygilant (formerly EiQ Networks)
  226. Cylance
  227. Cylera
  228. CynergisTek
  229. Cytellix
  230. Cyveillance
  231. DAG Ventures
  232. Dailymotion
  233. Darktrace
  234. DataArt
  235. Dataguise
  236. DataMotion
  237. Datto
  238. DB Networks
  239. DearBytes
  240. Dell
  241. Deloitte
  242. Delta ID
  243. Delta Risk
  244. Delta-v Capital
  245. Demisto
  246. Department of Health and Human Services (HHS)
  247. Department of Homeland Security (DHS)
  248. Deutsche Telekom Capital Partners
  249. Device Authority
  250. DeviceLock
  251. DFJ
  252. DFLabs
  253. Diamond Institute for Infertility and Menopause
  254. DigiCert
  255. Digital Defense
  256. Digital Guardian
  257. DLT Solutions
  258. DMC Investments
  259. DomainTools
  260. Dragos
  261. Draper Nexus
  262. Dropbox
  263. Druva
  264. Duo Security
  265. DXC Technology
  266. East Seattle Partners
  267. ebay
  268. EDB Investments
  269. EdgeWave
  270. Edgile
  271. Eight Roads
  272. Eileses Capital
  273. Elliott Management
  274. Emerald Compliance Solutions (Emerald Cybersecurity)
  275. Empire Blue Cross Blue Shield
  276. ENCODE
  277. Endgame
  278. Engineering Capital
  279. enSilo
  280. Envision Ventures
  281. EPIC Ventures
  282. Epsilon
  283. eSentire
  284. ESET
  285. e-Share (formerly nCrypted Cloud)
  286. ESXi
  287. Evergreen Coast Capital
  288. Evolution Equity Partners
  289. Exabeam
  290. Excellus Health Plan
  291. Exclusive Ventures
  292. EXELERYS
  293. Exostar
  294. ExtraHop
  295. Extreme Networks
  296. EY
  297. Facebook
  298. Fairhaven Capital
  299. Family Tree Health Clinic
  300. Farsight Security
  301. Federal Bureau of Investigation (FBI)Fenwick & West
  302. ff Venture Capital
  303. Fidelis Cybersecurity
  304. Fine Tec
  305. Fingerprint Cards
  306. FireBlade
  307. FireEye
  308. Fireglass
  309. FireMon
  310. First Round Capital
  311. FishNet Security
  312. Fishtech Labs
  313. Flashpoint
  314. Flint Capital
  315. Forbes
  316. Forcepoint
  317. ForeScout
  318. Foresite
  319. ForgeRock
  320. Fortinet
  321. Fortscale
  322. Forum Systems
  323. Foundation Capital
  324. Founders Circle
  325. Foundstone
  326. Fox Technologies
  327. F-Prime Capital Partners
  328. FriendFinder Networks
  329. FSE Group
  330. Future Com
  331. Future Fund
  332. G20 Ventures
  333. Gemalto
  334. Genacast Ventures
  335. General Catalyst
  336. General Dynamics Information Technology
  337. Geodesic Capital
  338. GeoLang
  339. Georgian Partners
  340. GGV Capital
  341. Giacom
  342. Gigamon
  343. GigaTrust
  344. Github
  345. Glasswall Solutions
  346. GlenRock
  347. Glilot Capital
  348. Globalscape
  349. GlobalSign
  350. Goldman Sachs
  351. Google
  352. Granite Hill Capital Partners
  353. Great Place to Work
  354. GreatHorn
  355. Green Visor Capital
  356. Greenfield Capital Partners
  357. GreyCastle Security
  358. Greycroft Partners
  359. Greylock Partners
  360. Grotech Ventures
  361. GuardiCore
  362. Guidance Software
  363. Gurucul
  364. GV (formerly Google Ventures)
  365. HackerOne
  366. Harrisburg Gastroenterology
  367. harvest.ai
  368. Hasso Plattner Ventures
  369. HCI Group
  370. Health Information Trust (HITRUST) Alliance
  371. HealthNow Networks
  372. Heartland Payment Systems
  373. Help AG
  374. Heritage Valley Health System
  375. Herjavec Group
  376. Hewlett Packard Enterprise (HPE)
  377. Hexadite
  378. HID Global
  379. High Country Venture
  380. Highland Capital Partners
  381. Hollywood Presbyterian Medical Center
  382. HonorTech
  383. Hoxton Ventures
  384. HumanFirewalls
  385. Hypori
  386. IA Ventures
  387. IBM
  388. iboss
  389. Icon Ventures
  390. ICONIQ Capital
  391. iCyber-Security
  392. ID Agent
  393. ID Experts
  394. IDG Ventures
  395. Ignition Partners
  396. IID
  397. Illusive Networks
  398. ImageWare Systems
  399. Immersive
  400. Imperva
  401. Imprivata
  402. Index Ventures
  403. Indiana Cancer Agency
  404. Industrial Control System-Information Sharing and Analysis Center (ICS-ISAC)
  405. Infoblox
  406. InfoGuard
  407. Informatica
  408. Information Management Resources (IMRI)
  409. Information Technology Partners
  410. Ingram Micro
  411. Innovation Endeavors
  412. In-Q-Tel (IQT)
  413. Insight Venture Partners
  414. InstantScale Ventures
  415. Institutional Venture Partners (IVP)
  416. Insurance Australia Group (IAG)
  417. Integrated Technical Solutions (ITS)
  418. Intel
  419. Internet2
  420. Intersec Worldwide
  421. Interset
  422. intiGrow
  423. Intralinks
  424. Intrust IT
  425. IntSights
  426. Invincea
  427. Invoke Capital
  428. Invotas
  429. Ionic Security
  430. iSIGHT Partners
  431. i-Sprint Innovations
  432. iT-CUBE SYSTEMS
  433. ITEGRITI
  434. Ivanti
  435. iWelcome
  436. Ixia
  437. Jackson Square Ventures
  438. Jackson Square Ventures (formerly Sigma West)
  439. JMP Securities
  440. Johnson & Johnson
  441. JohnsTek
  442. JPMorgan Chase
  443. Jump Capital
  444. Juniper Networks
  445. K2 Intelligence
  446. K9 Ventures
  447. Kaiser Permanente Ventures
  448. Kaleida Health
  449. Kansas Heart Hospital
  450. Kaspersky Lab
  451. Keck Medicine of USC
  452. KHIPU Networks
  453. Khosla Ventures
  454. King's Daughters' Health (KDH)
  455. KKR
  456. Kleiner Perkins Caufield & Byers
  457. KPMG
  458. Kroll
  459. Kyrus Tech
  460. Lancope
  461. Lastline
  462. Left Bank Pediatric Clinic
  463. LEONI
  464. Leslie Ventures
  465. Level 3 Communications
  466. Level Nine Group
  467. Liaison Technologies
  468. Liberty Venture Partners
  469. Lidera Network
  470. Lieberman Software
  471. LIFARS
  472. LifeLock
  473. LightCyber
  474. Lightspeed Venture Partners
  475. LinkedIn
  476. Location Labs
  477. Lockheed Martin
  478. LogRhythm
  479. Logsign
  480. London Digital Security Centre
  481. Long River Ventures
  482. LookingGlass Cyber Solutions
  483. Lookout
  484. Los Angeles County Department of Mental Health Covertix
  485. Lukas Hospital
  486. Macnica Ventures
  487. MainNerve
  488. Malformity Labs
  489. Malwarebytes
  490. Mandiant
  491. Maple Leaf Partners
  492. March Capital Partners
  493. Marin Healthcare District
  494. Matrix Partners
  495. Maxfield Capital
  496. Mayfield Clinic
  497. McAfee
  498. MCO Global
  499. Med Center Health
  500. MedCrypt
  501. Medical Oncology Hematology Consultants
  502. Medicare
  503. Meditology Services
  504. MedSec
  505. MedStar Health
  506. MegaPath
  507. Menlo Security
  508. Merck
  509. Meritech Capital Partners
  510. Methodist Hospital, Kentucky, US
  511. Metropolitan Urology Group
  512. Micro Focus
  513. Microsoft
  514. Mid-Michigan Physicians Imaging Center
  515. Milton Security Group
  516. Mimecast
  517. Mirin Capital
  518. Mirox Cyber Security & Technology
  519. MobileIron
  520. Mobileye
  521. Molina Healthcare
  522. Morphick
  523. Mosley Ventures
  524. Myspace
  525. Nasdaq
  526. National Health Service (NHS) Niara
  527. National Health-Information Sharing and Analysis Center (NH-ISAC)
  528. NC4
  529. NCC Group
  530. NEC Networks & System Integration Corporation (NESIC)
  531. Neotec
  532. Nervana Systems
  533. Netcraft
  534. netForensics
  535. Netizen
  536. NETSCOUT
  537. Netskope
  538. NetWorks Group
  539. Netwrix
  540. New Enterprise Associates
  541. New Jersey Spine Center
  542. New York Life Insurance
  543. Newkirk Products
  544. NexDefense
  545. Nexthink
  546. NextView Ventures
  547. Nexusguard
  548. North Bridge Venture Partners
  549. Northern Light Venture Capital
  550. Northrop Grumman
  551. Norwest Venture Partners
  552. Novasano
  553. NowSecure
  554. NSS Labs
  555. NTT DOCOMO Ventures
  556. NTT Security
  557. NXTP Labs
  558. Objective Logistics
  559. ObserveIT
  560. OC Gasto Care
  561. Okta
  562. OMC Systems
  563. Omidyar Technology Ventures
  564. OpenSky
  565. OpenStack
  566. OPSWAT
  567. Optiv
  568. Opus Capital
  569. Oracle
  570. Orchard Holdings Group
  571. Osage Partners
  572. Osirium
  573. Ostendio
  574. Pacific Alliance Medical Center
  575. Paladion
  576. Palo Alto Networks
  577. PassiveTotal
  578. Patient Home Monitoring (PHM)
  579. Peachtree Neurological Clinic
  580. Peachtree Orthopaedic Clinic
  581. Pelion Venture Partners
  582. Pepper Hamilton
  583. Petrillo Capital
  584. Pew Research Center
  585. Phantom
  586. PhishLabs
  587. PhishMe
  588. Pilot Growth Equity
  589. Pitango Venture Capital
  590. Plastic Surgery Associates, South Dakota
  591. Plurilock
  592. Polito
  593. Ponemon Institute
  594. Portage Partners
  595. Portland Seed Fund
  596. Post-Quantum
  597. Praetorian
  598. Premera Blue Cross
  599. Premier Healthcare
  600. Prevalent Networks
  601. PriorityOne Group
  602. Professional Dermatology Care
  603. Proficio
  604. Progress Distribution
  605. Promenade Software
  606. Promisec
  607. Proofpoint
  608. ProStar Solutions
  609. ProtectWise
  610. Protegrity
  611. Protenus
  612. PwC
  613. Pwnie Express
  614. QinetiQ
  615. Qriocity
  616. Qualcomm Ventures
  617. Qualys
  618. Quarles & Brady
  619. Rackspace
  620. Radiology Regional Center, Pennsylvania
  621. Radware
  622. Rally Ventures
  623. Rapid7
  624. Raytheon
  625. Recorded Future
  626. Red Herring
  627. Redpoint Ventures
  628. RedSeal
  629. RedSocks Security
  630. Redspin
  631. Rein Capital
  632. Rembrandt Venture Partners
  633. Reveal Imaging Technologies
  634. Ridge Ventures
  635. Ridgewall
  636. Right Side Capital Management
  637. Risk Based Security
  638. RiskIQ
  639. RiskSense
  640. River City Media
  641. Riverwood Capital
  642. root9B
  643. RRE Ventures
  644. RSA
  645. Rsam
  646. Rubicon Labs
  647. Safeguard Scientifics
  648. SAINT
  649. Salesforce Ventures
  650. Samsung NEXT Ventures
  651. Sandvine
  652. SANS Institute
  653. Santander Bank
  654. SAP National Security Services
  655. Sapphire Ventures
  656. SAS
  657. SC Media
  658. SCADAfence
  659. Scale Venture Partners
  660. SDGblue
  661. Seagate Technology
  662. Seceon
  663. Seclore
  664. SecqureOne
  665. Secure Sense
  666. SecureAuth
  667. secureHIM
  668. Secureworks
  669. Security Innovation
  670. Security Iris
  671. Security Risk Advisors
  672. Securonix
  673. Sedara
  674. Senrio
  675. Sensato
  676. SentinelOne
  677. sep
  678. Sequoia Capital
  679. Sequretek
  680. Sera-Brynn
  681. ServiceNow
  682. SEWORKS
  683. Shape Security
  684. Shasta Ventures
  685. Siemens Venture Capital
  686. Siemplify
  687. Sierra
  688. Signal Networks
  689. Silent Circle
  690. Silicon Valley Bank
  691. Silver Lake Waterman
  692. SineWave Ventures
  693. Singtel Innov8
  694. Sirius Computer Solutions
  695. Skybox Security
  696. Skycure
  697. Skyhigh Networks
  698. Skyriver IT
  699. Slack
  700. Smilegate Investment
  701. Smiths Medical
  702. Snapchat
  703. SnoopWall
  704. Social Capital
  705. SoftBank Ventures
  706. Soltra
  707. Solutionary
  708. SonicWall
  709. Sony
  710. Sophos
  711. Sound Ventures
  712. Spark Capital
  713. SpearTip
  714. SPHERE Technology Solutions
  715. Spikes Security
  716. Spirion
  717. Splunk
  718. Spring Lake Equity Partners
  719. Sqrrl
  720. SquarePeg Capital
  721. SS&C Technologies
  722. St. Jude Medical
  723. St. Mark’s Surgery Center
  724. StackPath
  725. Starfish Ventures
  726. Startmate
  727. Stasmayer
  728. Stonesoft
  729. Strategic Cyber Ventures
  730. Sucuri
  731. Summit Partners
  732. Sun Mountain Capital
  733. Sutter Hill Ventures
  734. Swarth Group
  735. Swimlane
  736. Swivel Secure
  737. Sword & Shield
  738. Symantec
  739. Synack
  740. SyncDog
  741. Synchronoss
  742. Synopsys
  743. Systematic Group
  744. Systems Engineering
  745. T.J.Maxx
  746. Taia Global
  747. Talis Capital
  748. Tampa Bay Surgery Center
  749. Tangible Security
  750. Tanium
  751. Taobao
  752. TCP Venture Capital
  753. Team8
  754. TechFlow
  755. TechOperators
  756. TEDCO
  757. Teldat
  758. Telstra Ventures
  759. TELUS Ventures
  760. Tempered Networks
  761. Tenable
  762. TenEleven Ventures
  763. Thales e-Security
  764. The Cook County Department of Homeland Security and Emergency Management (DHSEM)
  765. The Hague Security Delta (HSD)
  766. The Mako Group
  767. The Media Trust
  768. The Ottawa Hospital
  769. The Oxman Group
  770. The Perkins Fund
  771. The University of Kansas Health System
  772. The Westly Group
  773. The Women's Healthcare Group, Kansas, US WordPress
  774. Third Point Ventures
  775. Thomvest Ventures
  776. Threat Stack
  777. ThreatConnect
  778. ThreatMetrix
  779. ThreatTrack Security
  780. Thycotic
  781. Tiger Global Management
  782. TitanHQ
  783. Titus Regional Medical Center
  784. Toba Capital
  785. TokenOne
  786. Tola Capital
  787. TomorrowVentures
  788. Top Tier Capital Partners
  789. Topsec
  790. TopSpin Security
  791. Torrance Memorial Medical Center
  792. Toshiba
  793. TPG Growth
  794. TraceSecurity
  795. TrapX Security
  796. Trend Micro
  797. Trident Capital
  798. Trinity Ventures
  799. Tripwire
  800. Trusona
  801. Trusted-HIT
  802. TrustPoint Solutions
  803. Trustwave
  804. TSC Advantage
  805. T-Systems
  806. Tufin
  807. TÜV Rheinland
  808. Tyfone
  809. UAE Banks Federation
  810. Ubiquiti Networks
  811. UC Davis Health
  812. Ukraine Power Grid
  813. UniCare
  814. Union Bay Partners
  815. University of Cambridge
  816. Untangle
  817. UpGuard
  818. UpWest Labs
  819. Urgent Care Clinic of Oxford
  820. Urology Austin
  821. USC Norris Comprehensive Cancer Center
  822. UST Global
  823. v1.vc
  824. Valar Frontier Solutions
  825. Valley Anesthesiology and Pain Consultants
  826. Valor Capital Group
  827. Vantage Cybersecurity Group
  828. vArmour
  829. Varonis
  830. VASCO
  831. Vaultive
  832. Vector Capital
  833. Vectra Networks
  834. Vela Trading Technologies
  835. Venable
  836. Venafi
  837. Venrock
  838. Ventures Unlimited
  839. Vera
  840. Veracode
  841. Verity Health System
  842. Verity Medical Foundation (formerly San Jose Medical Group)
  843. Verizon
  844. VictorOps
  845. VigiTrust
  846. Vintage Investment Partners
  847. Viola Ventures (formerly Carmel Ventures)
  848. Virtu
  849. Virtue Security Services
  850. VirusTotal
  851. VisionQuest Eyecare
  852. VisiTrend
  853. VMware
  854. Vorstack
  855. Votiro
  856. Wandera
  857. Warburg Pincus
  858. Washington University School of Medicine
  859. West Corporation
  860. WhiteHat Security
  861. Wilson Consulting Group
  862. Windancer Technologies
  863. Wing
  864. WinMagic
  865. Wipro Ventures
  866. Wombat Security Technologies
  867. WorkplaceDynamics
  868. World Economic Forum
  869. Wortham Insurance
  870. Yahoo
  871. Zayo
  872. Zelkova Ventures
  873. Zenedge
  874. ZeroFOX
  875. Zerto
  876. Ziften
  877. Zimperium
  878. Zix
  879. Zoho
  880. ZoneFox
  881. Zscaler

PRICING DETAILS

USD 3,499

This license grants the right of use of the purchased report to a single recipient only (normally the person who buys the report). You may access the material on your computer, as and when required, for your own personal use. You may also print read more

This license grants the right of use of the purchased report by the employees of a business unit at a particular site/office location. The report may be accessed on the computer of any employee within the business unit. You may also print multiple read more

This license entitles the buyer of the report to share, distribute the report (either full or in part) with other employees of the same firm/enterprise. The report may be accessed by any employee of the enterprise and there is no limit on the read more

Discounts available for multiple report purchases
sales@rootsanalysis.com