2020 Cybersecurity Investment and Financing Report: Perspective on Investment Hotspots and Trends


There is no doubt that the epidemic is one of the biggest keywords in 2020. Affected by the epidemic, the global economic situation is not optimistic, and the network security industry has also been affected to a certain extent, and the growth rate has slowed down. Gartner data shows that the global network security industry market size in 2019 reached 124.401 billion US dollars, a year-on-year increase of 9.11%, and the market size in 2020 is expected to be around 127.827 billion US dollars, the growth rate is much smaller than that in 2019, almost the same.

Against such a background, the capital operation activities of the cybersecurity industry have not been affected too much. The emergence of new scenarios such as telecommuting, data compliance, privacy protection, and the Internet of Everything has brought freshness to cybersecurity entrepreneurship and the capital market. vitality. Judging from the performance of the investment and financing market, many investment institutions, including Insight Partners, Sequoia Capital, Accel, Bessemer Venture Partners, Sequoia, Bain Capital, and domestic Qi’an Venture Capital, all have large-scale capital operations.

In the secondary market, according to public statistics, as of December 31, 2019, the total market value of 106 listed companies (hereinafter referred to as “overall market value”) reached 3,875.587 billion yuan, a year-on-year increase of 29.12%. As of December 31, 2020, the overall market value reached 4,710.161 billion yuan, a year-on-year increase of 21.53%.

  2020 Cybersecurity Investment and Financing Report: Perspective on Investment Hotspots and Trends

Figure 1 Changes in the market value of listed cybersecurity companies

01 The overall situation of investment and financing in the global network security field in 2020

In fact, since 2016, there have been more than 15 investment institutions that have invested in more than 10 cybersecurity companies globally. In 2020 alone, there have been at least 232 incidents with relatively large amounts of financing and M&A in the cybersecurity investment and financing market (there are unavoidable omissions in the process of this article, please forgive me), including 77 domestic cases, accounting for 33%, and 153 foreign cases, accounting for 33% of the total. than 67%.

In terms of capital scale, the total amount of investment, financing and mergers and acquisitions in the global cybersecurity industry is about 24.4861 billion US dollars (some financing and mergers and acquisitions do not disclose financial details, so only the public financial information is counted, the same below), of which the domestic amount is about 2.2912 billion US dollars, and about 22.1949 billion US dollars abroad (1 US dollar ≈ 6.5 yuan at the exchange rate of USD and RMB), accounting for 9% and 91% respectively. The proportional distribution diagram is as follows:


Figure 2 Distribution of the number of domestic and foreign investment and financing events, collation of public information

Figure 3 Distribution of domestic and foreign investment and financing quotas, collation of public information

At the same time, according to the type of investment and financing, the events included in this article are divided, there are 3 listing events, 31 M&A events, and 208 financing events (as shown in the figure below). Among them, it is worth noting that “the first brother of cybersecurity” Qi Anxin will land on China’s Shanghai Stock Exchange Science and Technology Innovation Board in 2020, and its market value once exceeded the 90 billion yuan mark; and the internationally renowned anti-virus manufacturer McAfee is also listed in the United States. The stock exchange listed again, raising $750 million; Veeam, a data storage and disaster recovery company, was acquired by equity and private equity firm Insight Partners for $5 billion, setting the highest amount of acquisitions in the cybersecurity field in 2020.

Figure 4 Distribution of investment and financing types, collation of public information

Further from the perspective of subdivisions, the more popular ones mainly include cloud security, application security, identity security, detection and response, data security, security services, industrial security and business security, etc. The number and quota distribution of events are shown in the following figure:

Figure 5 Distribution of investment and financing events in sub-sectors, collation of public information

Figure 6 Distribution of investment and financing quotas in sub-sectors, collation of public information

  02 The overall characteristics of investment and financing in the global cybersecurity field in 2020

First, the new scenarios spawned by the epidemic have led to a new wave of cybersecurity venture capital investment. The surge in demand for telecommuting is one of the biggest changes brought by the epidemic to enterprises. Therefore, security protection companies targeting normal telecommuting or remote access scenarios have attracted the attention of the capital circle.

As we all know, telecommuting will inevitably involve a large number of self-owned devices. How to confirm whether the devices, people and corresponding operations connected to the enterprise network are safe has become the most concerned topic. This is mainly reflected in the field of identity management and access control. According to the number of financing events in the field of identity security included in this article, 2020 has increased by nearly 100% compared to the previous year. Among the enterprises that have obtained financing, the enterprises that do identity authentication and management occupy the vast majority. Among them, multi-factor authentication and identity authentication based on user entity behavior analysis have become mainstream.

It is worth noting that the “zero trust” architecture system has penetrated into all aspects of network security management, and has begun to enter the stage of standardized and implemented development. Following the introduction of the “Zero Trust Architecture” standard by NIST, the national zero trust standard led by Qi Anxin was officially launched, and relatively subdivided and implementable solutions have appeared in 2020. This is a big improvement compared to 2019.

Second, the pace of mergers and acquisitions of leading IT giants has gradually slowed down. Looking back on the past two years, IT giants have been very active in their capital activities, especially in the two fields of cloud security and terminal security. Microsoft, VMware, Broadcom, and domestic Alibaba and other companies have all launched large-scale mergers and acquisitions, and PaloAlto, Fortinet and other established security vendors are not far behind, and Symantec’s enterprise security business has sold for a sky-high price of 10.7 billion US dollars.

However, in 2020, the industry giants seem to have become a lot “quieter”, perhaps due to the impact of the economic downturn, they have to clench their fists and focus more on their main business. So, what is going on with the multi-billion-dollar M&A events in the world in 2020? In fact, this is basically from the handwriting of equity and private equity companies, and does not involve too many products or business integration.

Looking at China, Alibaba, Tencent and other leading Internet companies have not done much. However, 360 has made quite a few capital moves, including the wholly-owned acquisition of Hansi, the increase in holdings of Hillstone Networks, etc. In the dilemma of the shrinking 2C business, 360 tried to penetrate deeper into the customer site through mergers and acquisitions and integrate its core security. Brain ability and safe operation are connected.

Third, security compliance makes data security and personal privacy protection a favorite. This stems from the fact that the epidemic has also raised public concerns about the protection of personal privacy. On the one hand, during the epidemic, there were cybercriminal gangs who wanted to “fish in troubled waters” to make illegal profits; on the other hand, new technologies were used to fight the epidemic, and a large amount of personal information was collected and used, resulting in a sudden increase in personal privacy risks, and personal privacy leaks continued. The incident was exposed.

At the same time, with the official implementation of the CCPA and the introduction of domestic draft regulations such as the Data Security Law and the Personal Information Protection Law, security compliance will greatly increase the needs of government and enterprise organizations for data security and personal privacy protection. Private equity firm Insight Partners spent $5 billion to acquire Veeam, a data storage and backup company. Obviously, this field has attracted great attention from major capitals.

Fourth, the upsurge in the field of detection and response will continue. Whether it is 2019 or 2020, it can be seen from the number of capital transaction incidents that detection and response are regarded as the key strategies of enterprises. This is mainly due to the frequent occurrence of security incidents in the past few years, and the management of investment institutions, enterprises and various organizations. All layers recognize that security has no silver bullet thinking. They want to look for some endpoint-based, network-based or user-based approach to continuous advanced threat detection, investigation and rapid response capabilities. From this point of view, for some time to come, detection and response will still be a hot spot for investment institutions.

Fifth, Chinese cybersecurity companies may enter the era of 100 billion market value. In 2020, another major event occurred in the network security industry. Qi Anxin officially landed on the Science and Technology Innovation Board. In the past, the market value of leading cybersecurity companies was around 20 to 30 billion yuan. Although Sangfor’s market value exceeded 100 billion yuan, its cybersecurity revenue only accounted for about 60% of its total revenue. On the second trading day after Qi Anxin was listed on the Science and Technology Innovation Board, the market value once exceeded 90 billion yuan, and recently broke the 90 billion mark again. It is easy to foresee that with the rapid increase in the size of the network security market and the capital market’s optimism about the industry situation, it is a high probability event that Qi Anxin’s market value exceeds 100 billion yuan.

 03 Interpretation of global cybersecurity investment and financing segments in 2020

Cloud security: Cloud native sparks a boom in native security investment

Let’s look at a set of data first. In 2020, this article includes a total of 20 investment and financing events in the cloud security field, including 18 foreign and 2 domestic events. The financing amount was US$1,053.45 million. The details are shown in the following table:

Table 1: Some financing and M&A companies in the cloud security field

The above data actually shows that after a long period of development, the security market on the cloud has become quite “crowded”. On the one hand, in the past ten years, a large number of cloud security startups have been emerging. On the other hand, traditional security companies are also transforming in the direction of the cloud. Alibaba Cloud and Tencent Cloud are also relying on the advantages of cloud infrastructure to expand their own The map in the field of cloud security. From this perspective, it is very difficult for start-up security companies to take root in the field of cloud security and gain recognition from the capital market, especially in terms of infrastructure security protection on the relatively mature cloud.

But in 2020, cloud-native applications are completely on fire, which gives enterprises engaged in cloud computing a lot of opportunities. Correspondingly, the security protection on the cloud also shifts towards cloud-native applications. From a technical point of view, enterprises that implement cloud virtual hosts, container hosts and other related workloads and cloud native application security protection with technologies such as visualization, micro-isolation, and CWPP have won the favor of more capital, which is also in line with cloud computing. , The development trend of cloud security technology. my country’s host security star company Qingteng Cloud Security also said after completing the financing that it will fully support the research and development of container security and other related fields.

At the same time, with the rise of cloud-native applications, government and enterprise organizations have significantly increased the demand for cloud-native flexibility, high elasticity and high scalability, which makes security vendors must be able to provide a cross-application, platform, multi-cloud, hybrid cloud safety management capabilities. JupiterOne, for example, claims to centralize security controls by integrating with dozens of services and tools, including Amazon Web Services, Cloudflare, and GitLab.

Endpoint Security: The Market Is Stabilizing

In 2020, there were 9 investment and financing incidents in the terminal security field, including 1 domestic incident and 8 foreign incidents, with a total financing amount of 1.81 billion US dollars.

Table 2: Financing and M&A in the field of terminal security

Looking back at the concept hype and the crazy blessing of capital in the past few years, endpoint security has gone through a pretty crazy period, and endpoint-based detection technology (EDR) has shined brightly, giving birth to several such as CrowdStrike, Carbon Black (later acquired by VMware), etc. The star terminal security enterprise has formed three technical modules of terminal management and control (including patch distribution, terminal access, asset verification, etc.), anti-virus and EDR.

Unlike previous years, there will be no multi-billion dollar acquisitions or financing events in 2020. What attracts attention is only the secondary listing of the old antivirus software company McAfee on Nasdaq. On the one hand, mainly due to several years of mergers and acquisitions, the layout of major industry giants in the field of terminal security has been basically formed; on the other hand, the technological development of terminal security (concept speculation) has entered a “bottleneck period”. It can only detect terminal behavior, and cannot restore the entire attack, and has a certain false positive rate.

Therefore, through technological innovation, and at the same time linking NDR and threat intelligence capabilities to reduce false positives in EDR, it can still attract the attention of capital. For example, Deep Instinct and Dtex, two companies will improve detection capabilities and reduce false positives as their own. core competitiveness.

It is worth noting that SentinelOn, which has received financing twice a year, with a financing amount of more than 400 million US dollars, and Tanium, which has received financing of 150 million US dollars, have quite strong unified terminal security management and control capabilities, which can be used in a load IT environment. , including physical terminals (including IoT devices) and cloud workloads (virtual hosts, container hosts) into the unified protection category. This shows that the unified management and control of terminals still has obvious market space.

Detection and response: Deep integration of detection and response, further security operations

In the field of detection and response, this paper includes a total of 35 investment and financing events, 10 domestic and 25 foreign, with a financing and M&A amount of US$1.2055 billion.

Table 3: Financing mergers and acquisitions in the field of cybersecurity detection and response

From 2015 to the present, detection and response has been one of the most active segments in cybersecurity, favored by the capital market, and the market continues to expand. According to the survey data of the third-party consulting agency Sushi Consulting, the domestic threat detection and response (TDR) scale in 2019 is about 1.9 billion yuan, and it is expected to reach about 2.6 billion yuan in 2020, and it is expected to grow to 3.9 billion yuan in 2021. about.

With the continuous evolution of attack technology, the corresponding detection and response technology will also keep pace with the times. It is foreseeable that in the next few years, this subdivision will still be the main battlefield of technological innovation. Several characteristics can be seen from the companies that received financing in 2020.

One is that there is no breakthrough innovation in detection technology itself, but the expansion of collected data sources makes the product more grounded. For example, the domestic start-up company Fule Technology has realized the detection and analysis of all traffic; the foreign company Abnormal uniquely analyzes various data sets about people, interpersonal relationships and business environment through the API interface to block social engineering attacks .

The second is that cloud-based detection models are becoming mainstream. The huge computing power advantage brought by cloud computing provides more space for massive data analysis, which is why more and more manufacturers choose to provide customers with products in the SaaS model. This is particularly evident in the SIEM product. Manufacturers such as Devo and Panther Labs can provide customers with cloud-based SIEM products for processing massive logs and security events.

The third is the deep integration of detection and response technologies. Detection and response should be integrated, but in recent years, people have attached great importance to detection technology, and the development of response is relatively slow. However, a good phenomenon has emerged in 2020. Detection and response technologies are being deeply integrated, which will drive security operations to a new level. The main manifestation is that the threat intelligence providers represented by Weibu Online are integrating their superior capabilities and moving towards a comprehensive detection and response service provider; SOAR technology is highly valued by capital, and it can be linked with SOC and TDR equipment to promote Incident response is developing from manual transmission to automatic transmission; third, some manufacturers are integrating threat detection teams with security service teams, such as FireEye’s acquisition of XDR provider Respond, deep integration with its incident response team Mandiant, and domestic security services. The company Qi Anxin has also integrated its own threat detection team Tianyan and Anfu team.

Identity Security: The demand for telecommuting is soaring, and identity security is more contextualized

In the field of identity security, this article includes a total of 38 investment and financing events, including 12 domestic and 26 foreign, with a financing amount of US$1.6955 billion.

Table 4: Financing and M&A in the field of identity security

In 2020, zero trust is no longer a new word, but people’s attention to it has not declined, but has continued to rise due to the surge in the demand for remote work. It is worth noting that there have been many VPN-based supply chain APT attacks in China, which has increased people’s voice for zero-trust networks. Gartner believes that by 2023, 60% of VPNs will be replaced by zero trust. Because of this, a large number of startups that implement identity authentication and access control with zero trust ideas have emerged this year, and have received early investment from venture capital institutions (mainly in the B round and before).

From a technical point of view, companies that harvest financing pay more attention to the problem-solving capabilities of their products and solutions, and are therefore more contextualized. For example, Edgewise pays more attention to the identity security of software and API, while Preempt mainly conducts repeated analysis and verification of traffic.

At the same time, the integration of zero-trust thinking and Secure Access Service Edge (SASE) devices has also attracted great attention from investment institutions. For example, Perimeter 81, a SASE provider whose user-centric secure network-as-a-service enables enterprises to use cloud services to protect on-premises network resources simplifies cybersecurity for remote and mobile workers; Palo Alto’s $420 million acquisition of CloudGenix, Used to enhance capabilities in SD-WAN. This is in line with Gartner’s view that security and risk management leaders should pilot Zero Trust programs as part of a SASE strategy, or rapidly expand remote access.

In addition to startups, some leading security companies have also launched zero-trust solutions that can be implemented on the ground. For example, Qi Anxin has launched a zero-trust remote access solution. It is believed that with the implementation of the foreign NIST “Zero Trust Architecture” standard and the “Information Security Technology Zero Trust Reference Architecture” led by domestic Qi Anxin, the development of zero trust will enter a new situation.

Data security: Privacy compliance ushered in a big explosion

In the field of data security, this article includes a total of 35 investment and financing events, including 15 domestic and 20 foreign, with a total financing amount of 6.9685 billion US dollars.

Table 5: Financing mergers and acquisitions in the field of data security

In 2019, technological breakthroughs are no longer the main theme of data security protection, replaced by risk compliance. The influence of GDPR, CCPA and other laws continues to expand, and the compliance drive has ushered in a big explosion in 2020. Almost all companies that have received financing are claiming that they can help organizations meet the requirements of various regulations. In China, the excessive collection of personal privacy by apps has also become a prominent problem. The Ministry of Industry and Information Technology has also removed a large number of apps and ordered rectification during the Internet clean-up campaign over the years. However, in the field of app privacy compliance, there are no star start-ups in China, mainly leading security companies relying on advantageous resources to provide app privacy testing services for government and enterprise organizations, such as the app privacy compliance testing launched by Qi Anxin during the epidemic Serve.

One thing to note is that some data compliance solution providers targeting vertical industries have begun to emerge in 2020. For example, the VGS invested by Visa focuses on the compliance of financial data, while the domestic Yifangjianshu is more focused on the compliance of medical data. These all indicate that the data security and compliance market is maturing, because the industry attributes of sensitive data are very distinct, and companies that are more vertical and better understand business are needed to do more professional things.

There is another area worthy of attention-disaster recovery backup. In this segment, the largest single acquisition in 2020 was also born: the $5 billion acquisition of Veeam by equity and private equity firm Insight Partners. The importance of disaster recovery backup to ensure business continuity is self-evident. It can help enterprises prevent two types of risks: the first is internal malicious deletion of data events, such as service downtime caused by the deletion of the Weimob database; the second is external Attacks result in data loss or encryption, mainly ransomware attacks. Ransomware has been active for many years, and everyone hates it. According to data, starting in the second quarter of 2019, the number of ransomware attacks targeting businesses exceeded that of consumers for the first time. Obviously, the black production group is targeting enterprise-level terminals and servers with more attack value.

Therefore, in order to deal with rampant ransomware attacks, government and enterprise institutions must, in addition to deploying corresponding intrusion detection and anti-virus means, must also provide strict disaster recovery and backup services (such as three centers in two places), so as to ensure that in the event of an attack Maintain business and data continuity while avoiding extortion. For professional disaster recovery companies, if they want to gain recognition from customers and the capital market, and compete with leading technology giants such as Alibaba Cloud, Tencent Cloud and Huawei, they must have obvious advantages in disaster recovery and recovery technology.

Security services: Start-up companies are blooming, and the domestic market is poised to take off

In the field of security services, this article includes a total of 27 investment and financing events, including 10 domestic and 17 foreign, with a financing and M&A amount of US$1.787 billion.

Table 6: Financing and M&A in the Security Services Field

Affected by the epidemic, a large number of security service engineers cannot be on-site to provide support for customers, so the global security service market is not booming. Especially in China, IDC data shows that in the first half of 2020, the overall revenue of China’s IT security service market vendors was about US$572 million (about 4.023 billion yuan), and the revenue of vendors decreased by 27.7% compared with the same period in 2019.

In fact, due to the lack of capital budget and sufficient network security professional support, most customers hope that network security vendors can provide solutions to all security problems for themselves without too much intervention by themselves. Perhaps it is because of the impact of the epidemic that the market is more aware of the importance of security services, and the capital market has also noticed this. Therefore, the investment and financing enthusiasm in the field of security services has not declined because of this, but has shown a trend of blooming flowers. The companies that have obtained financing cover various fields such as penetration testing, vulnerability management, MDR, consulting, education and training, and insurance. Among them, cloud-based full-lifecycle managed detection and response has attracted more attention because it gets rid of the dependence on on-site security engineers.

Unlike the global market, the domestic network security market is still dominated by the sales of software and hardware. IDC data shows that the domestic security service market accounts for only 20.5%. But what can be seen is that domestic start-up companies are also eager to try. Douxiang Technology, which takes vulnerability public testing as its core business, has received financing for two consecutive years, and Yuanbao Technology, which provides security testing services for the insurance industry, has completed two rounds of financing within one year. .

There are two other businesses worthy of attention. One is the cybersecurity range. Due to the great promotion of actual offensive and defensive exercises for the construction of network security in recent years, the network shooting range has attracted more and more attention from government and enterprise customers. The domestic start-up companies Yongxin Zhicheng and Saining Network Security have made great achievements in this field, enabling the network to Safety competitions and offensive and defensive exercises are developing towards normalization. In addition, the use of shooting ranges for safety awareness and skills education and training has also been recognized by the capital and the market.

Another is the security consulting planning business. Although there are already very mature network security consulting service providers abroad, such as Deloitte, KPMG, etc., the domestic market is still slightly immature. However, it can be seen that in the actual offensive and defensive exercises over the years, due to the lack of systematic network security construction, the defenders are often “riddled with holes”, which further reflects the importance of consulting planning. Therefore, Northern Labs, a provider of complete network security consulting services for enterprises, has been recognized by the capital market.

It is worth noting that, according to reports, based on the concept of endogenous security, Qi Anxin officially launched the endogenous security framework in 2020. The framework starts from a top-level perspective and uses the methodology of systems engineering to deconstruct the “Ten Major Projects and Five Tasks” for network security planning in the digital age, which can guide different industries to output network security architectures that meet their characteristics and build a dynamic and comprehensive network security defense system.

Industrial Safety: Capital Markets Need New Vitality

In the field of industrial security, this article includes a total of 9 investment and financing events, including 7 domestic and 2 foreign, with a total amount of financing and mergers and acquisitions of 214 million US dollars.

Table 7: Financing mergers and acquisitions in the field of industrial security

In 2020, affected by the acceleration of new infrastructure, the Industrial Internet will undoubtedly be one of the hottest topics. Industrial enterprises are all making layouts and equipping the development of industry and manufacturing with new engines to create “new industries”. However, because the industrial network has been in a closed state for a long time and lacks the ability to resist virus intrusion and corresponding security products, industrial security problems have become more prominent in recent years.

In the face of huge risks, industrial safety is naturally the focus of capital. However, subject to the complexity of industrial security itself, it is difficult for startups to break out into the world. Judging from the companies that received financing in 2020, it is still the companies that received financing in 2019. (either in quantity or amount)

From the product level, our products are not very differentiated at present, mainly focusing on industrial-grade firewalls, gatekeepers, anti-virus and other gateway products. Only a few leading companies such as Qi Anxin and Venus have industrial advanced network monitoring and situational awareness products. At present, industrial safety is still at a fairly early stage. If you want to gain access to a large amount of capital, you must be able to tell a good “story” and inject new vitality into the capital market.

Business security: Risk control and anti-fraud are always on the way, and business security is heading for deep water

In the field of business security, this article includes a total of 9 investment and financing incidents, including 5 domestic and 4 foreign. The amount of financing mergers and acquisitions was US$372.3 million.

Table 8: Financing mergers and acquisitions in the field of business security

With the vigorous development of the mobile Internet and e-commerce, online consumption, transactions, and value-added services have gradually become popular, and online frauds such as cheating, account counterfeiting, billing, and malicious crawling have also emerged wildly. Fraud gangs exploit platform or business loopholes and cause different losses to platforms and users. Data shows that more than $50 billion is lost globally to online fraud every year. Moreover, this situation is more common in the country.

From the perspective of financing companies, most companies claim to use artificial intelligence and machine learning methods to establish risk control and anti-fraud models, identify user identities, and reduce business security risks. Interestingly, in 2020, some companies have begun to focus on vertical industries to provide risk control solutions. For example, Zhanlue Data focuses on the field of health insurance, and Forter focuses on payment card fraud detection.

If only in terms of financing, the pace of domestic anti-fraud companies is slightly ahead of the world. This is mainly due to the rapid development of Internet and mobile Internet services such as Internet finance, e-commerce, and short video in China. Risk control and anti-fraud have become the rigid needs of a large number of online companies. And with the popularity of 5G in China, it is believed that more and newer online services will be born quickly, and risk control and anti-fraud will always be on the way.

Application Security: Cloud Native Drives DevSecOps to Absolute Mainstream

In the field of application security, this article includes 19 investment and financing events, including 2 domestic and 17 foreign. The amount of financing mergers and acquisitions was US$2.3672 billion.

Table 9: Financing mergers and acquisitions in the field of application security

Affected by the popularity of cloud native, a large number of cloud native applications have been continuously developed. At the same time, native security is similar in essence to the endogenous security concept proposed by Qi Anxin, which requires the integration of network security and informatization, and focuses on security design from the development stage. DevSecOps is in line with such a concept. It emphasizes that when the DevOps plan is just launched, it is necessary to invite the security team to ensure the security of information, and develop an automatic security protection plan to achieve continuous IT protection, so it has been warmly welcomed by investment institutions.

From the perspective of technological development, whether it is for binary code vulnerability detection for developers, or for API and application security protection in operation and maintenance, the application of automation, artificial intelligence and other technologies will undoubtedly bring more value to customers. For example, Signal Sciences provides a platform that allows customers to automate testing of dynamic application security protections; DeepCode uses AI to provide customers with automated binary vulnerability detection and remediation capabilities.

IoT security: The commercialization of 5G promotes the accelerated implementation of IoT security

In the field of application security, this article includes 13 investment and financing events, including 6 domestic and 7 foreign. The amount of financing mergers and acquisitions was US$2.7413 billion.

Table 10: Financing and mergers and acquisitions in the field of IoT security

Compared with 2019, the investment and financing events in the Internet of Things field in 2020 included in this article have increased significantly in both the total amount and the total number of financing. It should be noted that with the popularization of 5G and IPv6, IoT devices will grow exponentially. At the same time, whether it is an attack on the IoT device itself or a DDoS attack using a botnet composed of IoT devices, it will cause immeasurable losses to production and life.

Obviously, IoT security has broad market prospects, which is one of the most important reasons for investment institutions to be optimistic about this segment. From a technical point of view, most enterprises position their core capabilities in the management and control of IoT devices, including comprehensive management of vulnerabilities, status, and configuration.

For example, Sepio provides a service to detect and mitigate any malicious device that has been connected to an enterprise infrastructure; Armis is able to monitor millions of devices around the world, providing visibility into enterprise devices, identifying risks and threats.


Compared with the above popular tracks, mobile security, Electronic forensics and other sub-sectors are relatively cold to avoid risks, and most of them are early-stage financing of start-ups, and giants’ “checking and filling vacancies”.

In addition, there is another type of enterprise that does not belong to a single subdivision. Their product lines are relatively comprehensive, so they are classified as comprehensive security in this article. Among them, Qi Anxin, the leading network security enterprise, has been listed, which has attracted great attention in China.

The Links:   PM75CSE120 SKIIP 613 GB 123 CT THE IC INFO