Next-gen Cybersecurity

AI-based solutions for evolving digital threats

Overview

Emerging threats require proactive tools that take a holistic view of corporate networks

Corporate cybersecurity today is tasked with protecting connected hardware and cloud-based software from a myriad of threats, with present day threat actors leveraging AI and advanced techniques to gain access to corporate networks, interrupt business operations, and steal proprietary or sensitive data. The next generation of cybersecurity tools leverage AI and ML to combat these evolving threats across cloud networks, applications, endpoints, and operational technology.

The traditional enterprise network perimeter is fading, and enterprise workflows are increasingly reliant on the internet and cloud applications. Businesses often rely on multiple cloud platforms from different providers, distributing their workloads, data, and applications across not only private networks but also public cloud infrastructure, leaving many potential entry points for malicious actors. Operational technology, such as manufacturing equipment, critical infrastructure, and healthcare devices, are also growing increasingly connected across all industries, providing cybercriminals yet another expanding target. This evolving threat landscape requires a holistic approach to cybersecurity that considers an organization's entire network landscape.

Industry Updates

View all updatesicon
Market Sizing

The US Next-gen Cybersecurity market could reach USD 18.7 billion—27.8 billion by 2027

Conservative case

USD 0.0 Bn

Base case

USD 0.0 Bn

Expansion case

USD 0.0 Bn

Use cases


The growing demand for proactive cybersecurity solutions in response to evolving threats has resulted in the adoption of different types of security products across a wide range of sectors including financial services, information technology, healthcare, industrials, and utilities.

Cybersecurity solutions serve multiple purposes, including improving visibility into cloud networks and connected IoT devices, managing access to corporate networks, and enhancing threat detection and response workflows. Numerous organizations have observed measurable advantages, such as cost savings, quicker turnaround times, and reduced manual efforts as they deploy these solutions in their workflows.

We have identified key next-gen cybersecurity use cases below:

Market Mapping


Large incumbents maintain a strong presence in this industry as they expand traditional cybersecurity portfolios with complementary products focused on cloud services produced through a mix of internal development and acquisitions. Some larger disruptors also follow an acquisition strategy, acquiring smaller startups to expand their portfolios. These acquisitive incumbents and larger disruptors are therefore listed across multiple segments of the market map.

The endpoint security space, in particular, has a significant incumbent presence, as traditional antivirus software vendors are adding behavior analytics and artificial intelligence to their products. Symantec (now owned by Accenture) and Trend Micro are some of the largest endpoint protection providers globally, each claiming more than 18% of the segment’s overall market share.

While the market map features more endpoint security companies than any other segment, companies offering cloud security products have attracted the most private funding—more than USD 7.1 billion for the cloud network and cloud-native application security segments as of August 2021. Further, nine out of ten startups in this hub were established over the last decade and have collectively raised over USD 12 billion as of the same date.

Incumbents
Expansion
Go-to-Market
Minimum Viable Product
Ideation
?
Cloud network security
?
Cloud-native application security
?
Endpoint security
?
Industrial IoT/Operational technology security
?
Detection and response tools
?
Managed detection and response (MDR)
?
API and web application security
?
SecurityScorecard
SecurityScorecard
SecurityScorecard
SecurityScorecard
SecurityScorecard
SecurityScorecard
SecurityScorecard

The Disruptors


A majority of these disruptors offer tools for threat detection and response either as standalone products or along with cloud security and endpoint security offerings. As of August 2021, the highest amount of funding has gone towards companies in the detection and response segment.

Several next-generation cybersecurity companies have already reached valuations of at least USD 1 billion. Cloud-network security startup Netskope has garnered the highest amount of funding (USD 1 billion) as of August 2021. SentinelOne went public in June 2021 which valued the company at USD 8.9 billion, implying a 187% growth from the valuation during its last fundraise in November 2020 (USD 3.1 billion). SentinelOne also leads the endpoint security, industrial IoT/operational technology security, and managed detection and response (MDR) segments in terms of funding, with Arctic Wolf being the highest funded pureplay MDR provider in this space.

More than 90% of these disruptors were established in the last decade and most are in either the go-to-market or expansion stage. Many also have a footprint across multiple market segments in part by acquiring smaller startups to accelerate product launches and absorb expertise amid a shortage of cybersecurity professionals.

Funding History

Competitive Analysis


Filter by a segment or companies of your choice
expand
 
Loading...
Loading...
Loading...
Loading...
Product Overview
-
Loading...
Loading...
Loading...
Loading...
-
Loading...
Loading...
Loading...
Loading...
-
Loading...
Loading...
Loading...
Loading...
-
Loading...
Loading...
Loading...
Loading...
-
Loading...
Loading...
Loading...
Loading...
Product Metrics
-
Loading...
Loading...
Loading...
Loading...
-
Loading...
Loading...
Loading...
Loading...
-
Loading...
Loading...
Loading...
Loading...
-
Loading...
Loading...
Loading...
Loading...
-
Loading...
Loading...
Loading...
Loading...
Company profile
-
Loading...
Loading...
Loading...
Loading...
-
Loading...
Loading...
Loading...
Loading...
-
Loading...
Loading...
Loading...
Loading...
-
Loading...
Loading...
Loading...
Loading...
-
Loading...
Loading...
Loading...
Loading...

Incumbents


Incumbents buy the future with acquisitions of next-generation cybersecurity startups

The cloud service providers, pureplay cybersecurity companies, and endpoint security software providers in this section have either acquired stakes in next-gen startups, or pivoted their business model to offer products and services across multiple segments.

Major cloud providers like Microsoft and Fastly generally bundle security products along with their primary offerings. Pureplay cybersecurity incumbents, such as Palo Alto Networks, have been gradually building their product portfolio to keep up with industry trends, using acquisitions to bridge gaps and speed up go-to-market activities.

Incumbents in the endpoint security segment have historically offered traditional antivirus software to retail and enterprise customers. These companies have improved their offering to feature AI and behavior analytics to detect known and unknown threats. These companies have also started building endpoint detection and response (EDR) tools to leverage automation and machine learning.

In House Development
M&A
Partnership
Investment
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Notable Investors


?
Funding data are powered by Crunchbase
arrow
menuarrow
close

Contact us

Gain access to all industry hubs, market maps, research tools, and more
Get a demo

Overview

The traditional enterprise network perimeter is fading, and enterprise workflows are increasingly reliant on the internet and cloud applications. Businesses often rely on multiple cloud platforms from different providers, distributing their workloads, data, and applications across not only private networks but also public cloud infrastructure, leaving many potential entry points for malicious actors. Operational technology, such as manufacturing equipment, critical infrastructure, and healthcare devices, are also growing increasingly connected across all industries, providing cybercriminals yet another expanding target. This evolving threat landscape requires a holistic approach to cybersecurity that considers an organization's entire network landscape.
Advances in AI help companies bridge this gap by detecting threats using behavioral analysis. Companies can now use behavior-based methods to identify threats proactively, even unknown ones which would have otherwise gone undetected by traditional applications such as antivirus programs. AI also allows for efficient monitoring, investigation, and automation of common remediation tasks that would have been traditionally carried out manually—a time-consuming process prone to error.

The application of AI across different stages of a cybersecurity program

AI, combined with machine learning (ML) and deep learning algorithms, has significantly bolstered the capabilities of cybersecurity platforms and improved the detection and responding capabilities of organizations. The use of analytics and big data makes it possible for algorithms to self-learn the workings of an organization's information systems by analyzing datasets and identifying trends. This also enables companies to proactively identify threats, devise response strategies, and keep pace with malicious actors who may also use AI to coordinate attacks and avoid detection. Indeed, corporations are using AI for threat detection at a much higher rate than for prediction and response functions.
The application of AI across different stages of a cybersecurity program
Source: Compiled by Edge based on surveys by Capgemini and other sources
Large language models (LLMs) and other forms of generative AI are also rapidly becoming popular in the cybersecurity space. These AIs analyze threat data to assess and quantify risk, generate remediation advice and response code, produce threat and security insights, and even function as knowledge sources to alleviate the growing cybersecurity skills gap.
Click here to learn more
Get a demo

By using this site, you agree to allow SPEEDA Edge and our partners to use cookies for analytics and personalization. Visit our privacy policy for more information about our data collection practices.