Data Breaches Boost Funding for Cybersecurity Startups

BT-AD101_CYBERV_16U_20150715182705.jpg

In the 2015 first half, venture firms invested $1.2 billion in cybersecurity startups
 
Before Max Krohn, the OkCupid co-founder, played online matchmaker, he had a far-less-romantic interest in cryptography. But he couldn’t see a way to make a living at it.
“Security startups never really did so well,” says Mr. Krohn, who studied computer science at Harvard University and the Massachusetts Institute of Technology. “There was not an example of a runaway success.”
That is changing, following major data breaches, as corporate customers and venture capitalists show increased interest in cybersecurity. Mr. Krohn and another OkCupid co-founder have a new startup, Keybase, which aims to make encryption easier to use. Wednesday drew its first outside investment, a $10.8 million round led by venture-capital firm Andreessen Horowitz.
On Monday, Google Capital, the search giant’s growth-equity fund, made its first cybersecurity investment, leading a $100 million round in Crowdstrike, known for outing Chinese and Russian hackers. Allegis Capital this month said it closed on $100 million toward a fund focused on cybersecurity. Three years ago, private-equity fund Blackstone Group had no cybersecurity investments; now it has seven.
“It’s almost like, ‘Who hasn’t been hacked?’ ” said Venky Ganesan, a managing director at Menlo Ventures who led the firm’s investment in BitSight Technologies, which gives companies a credit-score-like rating for computer defenses. In 2011, Menlo directed about 5% of a $400 million fund toward security startups, Mr. Ganesan said, and its current fund has dedicated about 20% to the field.

In the 2015 first half, venture firms invested $1.2 billion in cybersecurity startups, according to researcher CB Insights. That is down slightly from $1.4 billion a year earlier but up sharply from $771 million in 2013’s first half.
The shift is particularly notable at Andreessen Horowitz, which used to view security companies as necessary for Internet safety but less lucrative than other technology niches.
One reason is that cybersecurity startups were often acquired prior to an initial public offering, says Scott Weiss, an Andreessen Horowitz partner. Mr. Weiss sold his own security startup, IronPort Systems Inc., to Cisco Systems Inc. for $830 million in 2007.
Well-received offerings from companies including Palo Alto Networks Inc. in 2012 and FireEye Inc. in 2013 have altered that view. Partners at Andreessen Horowitz say they likely wouldn't have invested in a company like Keybase even two years ago. Over the past 13 months, the firm also made an unusually large $142 million bet on Tanium Inc., which tries to make it easier for companies to find vulnerable and infected machines on their networks.
Ted Schlein, a partner at Kleiner Perkins Caufield & Byers who has invested in security startups for two decades, says he has noticed more investors jumping into cybersecurity.
That is a risk for investors in cybersecurity companies, as is the rush of entrepreneurs suddenly flooding the space. Bob Ackerman, a managing director of Allegis Capital and another longtime investor in cybersecurity, says he sees a lot of me-too companies led by founders without experience in the field.
“This isn’t sharing-economy stuff,” says Mr. Ackerman, referring to companies like Uber Technologies Inc. and Airbnb Inc. that connect individuals looking for rides or rooms. “This is nerdy stuff.”
Another risk, Mr. Ackerman notes, is that every new piece of security technology is one data breach away from being obsolete.
Core to Keybase’s pitch is making it easier for users to trade public encryption keys, a crucial step in using PGP, the encryption protocol formally called Pretty Good Privacy. PGP is considered secure, but it’s clunky and nowhere near as simple as Facebook or Google.
Chris Dixon, the Andreessen Horowitz partner who led the investment, said he expects Keybase to let individuals use the service for free but charge enterprises for extra features. Krohn, the cofounder, said he wants to offer users an encrypted file-sharing tool and encrypted chat applications.
As a Harvard student in the late 1990s, Mr. Krohn worked on websites during the first tech boom alongside programmers with a hacking background. The interest rubbed off, he said.
After graduating in 1999, however, he and his friends were more interested solving more immediate problems, like dating. Hence OkCupid.
Mr. Krohn left the dating site in 2012 and pondered his next move with cofounder Chris Coyne. They became intrigued with simplifying encryption, and launched Keybase last year.
They initially didn’t see much commercial future in the startup, and spurned investment offers from venture capitalists, Messrs. Krohn and Dixon said.
A few breaches later, they too began to see it as a business.
“Five years ago, it would have been a very hard sell,” Mr. Krohn said. “Probably, it would have been, ’Sorry, no one cares about security, therefore this product doesn’t have much of a hope.’ ”
WSJ: http://on.wsj.com/1HweA7Z

« SurfWatch Labs Rolls Out Dark Web Intelligence Service
How Analytics Will Influence Connected Cars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Information Security Research Group - University of South Wales

Information Security Research Group - University of South Wales

The Information Security Research Group has an international reputation in the areas of network security, computer forensics and threat analysis.

ID Agent

ID Agent

ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions.

Malomatia

Malomatia

Malomatia is a leading provider of technology services and solutions in Qatar including information security.

Level39 (L39)

Level39 (L39)

Level39 is the world's most connected tech community, with over 200 tech startups and scaleups based onsite.

astarios

astarios

astarios provide near-shore software development services including secure software development (DevSecOps), quality assurance and testing.

Injazat

Injazat

Injazat Data Systems is an industry recognized market leader in the Gulf region for Information Technology, Data Center and Managed Services.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

Bright Security

Bright Security

Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively.

Slamm Technologies

Slamm Technologies

Slamm Technologies is a trusted IT firm that offers Cyber Security Support, Corporate IT Solutions and Professional IT Training courses with international certification.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

Btech

Btech

Btech is the market leader in providing affordable managed IT security services for credit unions.

Vana Solutions

Vana Solutions

Vana Solutions is an Information Technology Services company. We help commercial & federal organizations select, adapt, and integrate the right technology solution so you can move faster.