<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Security & Markets!]]></title><description><![CDATA[My take on cyber security companies & how the market is shaping for the next big change]]></description><link>https://www.securityandmarkets.com</link><image><url>https://substackcdn.com/image/fetch/$s_!wFLF!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94b8e51c-0c20-49e0-8394-0f96418ecf57_447x447.png</url><title>Security &amp; Markets!</title><link>https://www.securityandmarkets.com</link></image><generator>Substack</generator><lastBuildDate>Wed, 13 May 2026 10:45:18 GMT</lastBuildDate><atom:link href="https://www.securityandmarkets.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Shubham Goel]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[shubham_goel@live.com]]></webMaster><itunes:owner><itunes:email><![CDATA[shubham_goel@live.com]]></itunes:email><itunes:name><![CDATA[Shubham Goel]]></itunes:name></itunes:owner><itunes:author><![CDATA[Shubham Goel]]></itunes:author><googleplay:owner><![CDATA[shubham_goel@live.com]]></googleplay:owner><googleplay:email><![CDATA[shubham_goel@live.com]]></googleplay:email><googleplay:author><![CDATA[Shubham Goel]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[XDR Wars: Who Holds the Key? ]]></title><description><![CDATA[SentinelOne, CrowdStrike, and Palo Alto Networks Face Off in a Market Showdown]]></description><link>https://www.securityandmarkets.com/p/xdr-wars-who-holds-the-key</link><guid isPermaLink="false">https://www.securityandmarkets.com/p/xdr-wars-who-holds-the-key</guid><dc:creator><![CDATA[Shubham Goel]]></dc:creator><pubDate>Sun, 09 Apr 2023 11:44:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ZJBZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3174ca55-e867-4132-b148-0a8cc19e8b3b_796x1474.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.securityandmarkets.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.securityandmarkets.com/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.securityandmarkets.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Security &amp; Markets!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.securityandmarkets.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Security &amp; Markets!</span></a></p><p><strong>Important: Before proceeding to read this post, please take a moment to read and understand the disclaimer at the end of the post. </strong></p><h4>Quick Sectional Links</h4><ol><li><p><a href="https://www.securityandmarkets.com/i/103505610/how-does-an-xdr-work">How does an XDR work?</a></p></li><li><p><a href="https://www.securityandmarkets.com/i/103505610/why-do-you-need-an-xdr">Why do you need an XDR?</a></p></li><li><p><a href="https://www.securityandmarkets.com/i/103505610/why-do-i-care">Why do I care?</a></p></li><li><p><a href="https://www.securityandmarkets.com/i/103505610/lets-look-at-some-of-the-major-players">Let&#8217;s look at some of the major players</a> </p></li><li><p><a href="https://www.securityandmarkets.com/i/103505610/technology">Technology</a></p></li><li><p><a href="https://www.securityandmarkets.com/i/103505610/pricing">Pricing</a></p></li><li><p><a href="https://www.securityandmarkets.com/i/103505610/gtm-strategy">GTM Strategy</a></p></li><li><p><a href="https://www.securityandmarkets.com/i/103505610/customers">Customers</a></p></li><li><p><a href="https://www.securityandmarkets.com/i/103505610/acquisitions">Acquisitions</a> </p></li><li><p><a href="https://www.securityandmarkets.com/i/103505610/financials">Financials</a></p></li><li><p><a href="https://www.securityandmarkets.com/i/103505610/innovators-dilemma">Innovator&#8217;s Dilemma</a></p></li><li><p><a href="https://www.securityandmarkets.com/i/103505610/crowdstrike-vs-sentinelone">CrowdStrike vs SentinelOne</a></p></li><li><p><a href="https://www.securityandmarkets.com/i/103505610/can-we-see-a-new-player-in-xdr">Can we see a new XDR player?</a></p></li><li><p><a href="https://www.securityandmarkets.com/i/103505610/hot-take">Hot Take!</a></p></li></ol><p>The cybersecurity industry has undergone substantial changes in recent years, primarily due to the rise of sophisticated cyber attacks and threat actors. Consequently, security technologies, including Extended Detection and Response (XDR), have evolved from conventional products like EDR, EPP, and antivirus solutions. Organizations are bolstering their security defenses by moving to a more comprehensive solution. <strong>In this post, we will be covering the why, what and how of XDR and talk about three major cybersecurity companies, namely CrowdStrike (<span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$CRWD&quot;}" data-component-name="CashtagToDOM"></span> ), SentinelOne (<span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$S&quot;}" data-component-name="CashtagToDOM"></span>), and Palo Alto Networks (<span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$PANW&quot;}" data-component-name="CashtagToDOM"></span>)</strong>. In this post I tried to cover all three major vendors and highlight the positives of one over the other. </p><p>Additionally, this blog aims to delve into the features and benefits of these XDR solutions, as well as their distinct approaches to threat detection, response, and remediation. We will also explore how XDR fits into the broader cybersecurity landscape and why it is increasingly becoming a crucial tool for organizations seeking to proactively manage evolving threats. </p><p>XDR is an endpoint solution that combines advanced threat detection, comprehensive visibility, and coordinated response across multiple security layers, providing a holistic defense against sophisticated cyber threats that may span across endpoints, networks, cloud environments, and now applications. With its unified and proactive approach, XDR empowers organizations to detect, investigate, and mitigate cyber threats in real-time, providing a more resilient and adaptive defense against ever-evolving cyber threats. <strong>Here is a quick recap on how the industry evolved over the last few decades - </strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZJBZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3174ca55-e867-4132-b148-0a8cc19e8b3b_796x1474.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZJBZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3174ca55-e867-4132-b148-0a8cc19e8b3b_796x1474.png 424w, https://substackcdn.com/image/fetch/$s_!ZJBZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3174ca55-e867-4132-b148-0a8cc19e8b3b_796x1474.png 848w, https://substackcdn.com/image/fetch/$s_!ZJBZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3174ca55-e867-4132-b148-0a8cc19e8b3b_796x1474.png 1272w, https://substackcdn.com/image/fetch/$s_!ZJBZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3174ca55-e867-4132-b148-0a8cc19e8b3b_796x1474.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZJBZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3174ca55-e867-4132-b148-0a8cc19e8b3b_796x1474.png" width="414" height="766.6281407035176" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3174ca55-e867-4132-b148-0a8cc19e8b3b_796x1474.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1474,&quot;width&quot;:796,&quot;resizeWidth&quot;:414,&quot;bytes&quot;:262806,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZJBZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3174ca55-e867-4132-b148-0a8cc19e8b3b_796x1474.png 424w, https://substackcdn.com/image/fetch/$s_!ZJBZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3174ca55-e867-4132-b148-0a8cc19e8b3b_796x1474.png 848w, https://substackcdn.com/image/fetch/$s_!ZJBZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3174ca55-e867-4132-b148-0a8cc19e8b3b_796x1474.png 1272w, https://substackcdn.com/image/fetch/$s_!ZJBZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3174ca55-e867-4132-b148-0a8cc19e8b3b_796x1474.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>How does an XDR work?</strong></h3><p>I&#8217;ll try to explain it via analogy (<em>If it doesn&#8217;t work for you, I apologies</em>), imagine you are at Meta&#8217;s Menlo Park office. You might have seen the number of buildings and each building has its own physical security guard. In addition, there is a central location from where all the physical security activity is monitored and they have their response team working from that central location. Whenever someone enters any building, that building&#8217;s security guard will ask the visitor their name, reason, place, etc. all this information is sent to the central security office for further processing. In this case, each individual guard is monitoring the entire building and sends all the information to a centralized location. </p><p>Similarly, these XDR agents are individual security guards for the building sitting on individual hosts (laptop, server, cloud instance) and collect the telemetry of the machine and send it to a centralized cloud for processing. </p><p>This picture by <a href="https://twitter.com/cyb3rops?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor">Florian Roth</a> perfectly summarizes the current state of XDR  but I do see more use cases for XDR. I&#8217;ll cover those use cases in the technical section of this post.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!I1OJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46b5dd7-1fce-4370-91ac-3841e58902e9_1160x1510.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!I1OJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46b5dd7-1fce-4370-91ac-3841e58902e9_1160x1510.png 424w, https://substackcdn.com/image/fetch/$s_!I1OJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46b5dd7-1fce-4370-91ac-3841e58902e9_1160x1510.png 848w, https://substackcdn.com/image/fetch/$s_!I1OJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46b5dd7-1fce-4370-91ac-3841e58902e9_1160x1510.png 1272w, https://substackcdn.com/image/fetch/$s_!I1OJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46b5dd7-1fce-4370-91ac-3841e58902e9_1160x1510.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!I1OJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46b5dd7-1fce-4370-91ac-3841e58902e9_1160x1510.png" width="258" height="335.8448275862069" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b46b5dd7-1fce-4370-91ac-3841e58902e9_1160x1510.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1510,&quot;width&quot;:1160,&quot;resizeWidth&quot;:258,&quot;bytes&quot;:2039287,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!I1OJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46b5dd7-1fce-4370-91ac-3841e58902e9_1160x1510.png 424w, https://substackcdn.com/image/fetch/$s_!I1OJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46b5dd7-1fce-4370-91ac-3841e58902e9_1160x1510.png 848w, https://substackcdn.com/image/fetch/$s_!I1OJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46b5dd7-1fce-4370-91ac-3841e58902e9_1160x1510.png 1272w, https://substackcdn.com/image/fetch/$s_!I1OJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46b5dd7-1fce-4370-91ac-3841e58902e9_1160x1510.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!P1br!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85950cbd-d72d-46ff-bd29-c4784a58c111_886x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!P1br!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85950cbd-d72d-46ff-bd29-c4784a58c111_886x512.png 424w, https://substackcdn.com/image/fetch/$s_!P1br!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85950cbd-d72d-46ff-bd29-c4784a58c111_886x512.png 848w, https://substackcdn.com/image/fetch/$s_!P1br!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85950cbd-d72d-46ff-bd29-c4784a58c111_886x512.png 1272w, https://substackcdn.com/image/fetch/$s_!P1br!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85950cbd-d72d-46ff-bd29-c4784a58c111_886x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!P1br!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85950cbd-d72d-46ff-bd29-c4784a58c111_886x512.png" width="886" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/85950cbd-d72d-46ff-bd29-c4784a58c111_886x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:886,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;XDR Buyer&#8217;s Toolkit - Palo Alto Networks&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="XDR Buyer&#8217;s Toolkit - Palo Alto Networks" title="XDR Buyer&#8217;s Toolkit - Palo Alto Networks" srcset="https://substackcdn.com/image/fetch/$s_!P1br!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85950cbd-d72d-46ff-bd29-c4784a58c111_886x512.png 424w, https://substackcdn.com/image/fetch/$s_!P1br!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85950cbd-d72d-46ff-bd29-c4784a58c111_886x512.png 848w, https://substackcdn.com/image/fetch/$s_!P1br!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85950cbd-d72d-46ff-bd29-c4784a58c111_886x512.png 1272w, https://substackcdn.com/image/fetch/$s_!P1br!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85950cbd-d72d-46ff-bd29-c4784a58c111_886x512.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Source -</strong> <em><a href="https://www.paloaltonetworks.co.uk/blog/2019/12/cortex-what-is-xdr/">What is XDR by Palo Alto Networks?</a></em></p><p>Nir Zuk, founder and CTO of <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$PANW&quot;}" data-component-name="CashtagToDOM"></span>  coined the "XDR" term during their Ignite'18 user conference and this image by <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;PANW&quot;}" data-component-name="CashtagToDOM"></span> is just an overview of XDR architecture . When we talk about the entire attack chain, endpoint is just one piece in the puzzle. A mature system would help the analyst understand the larger picture and hence the artifacts from other sources like network, cloud, apps and other data source would only complement the current detection &amp; response. "X" in XDR stands for extended which translates to &#8220;everything&#8221; that can be ingested to a data lake and used to perform analysis on that data in a central location. </p><h3>Why do you need an XDR?</h3><p>XDR is an essential tool for organizations for several reasons. XDR solutions offer endpoint visibility, enabling real-time monitoring and analysis of endpoint behavior, which is crucial for identifying anomalies and threats. XDR solutions provide detailed information about threats and suspicious activities, which helps organizations investigate and remediate threats quickly. While XDR can be a valuable tool in enhancing an organization's cybersecurity posture and improving its ability to detect and respond to threats, it may not be a specific compliance requirement in and of itself. However, implementing effective cybersecurity measures, including XDR capabilities, can help organizations meet their compliance obligations by providing better visibility into potential security incidents, facilitating timely response, and mitigating potential impacts of security breaches.</p><h3>Why do I care?</h3><p>According to research from <a href="https://expertinsights.com/insights/50-endpoint-security-stats-you-should-know/">Ponemon Institute</a>, <strong>approximately 70% of all breaches occurs from an endpoint. This is an interesting statistic as it highlights the importance of endpoint security layer and, more importantly, underlines the attack surface that endpoints presents.</strong> According to&nbsp;<a href="https://www.verifiedmarketresearch.com/product/global-endpoint-security-market-size-and-forecast-to-2025/">Verified Market Research</a>, the global endpoint security market is expected to grow at a <strong>CAGR of roughly 7.87%, from $13.43B in 2020 to $24.7B by 2028</strong>. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8YqD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3376e07-47fd-44f5-9d96-1278fb6e9bd7_1538x858.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8YqD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3376e07-47fd-44f5-9d96-1278fb6e9bd7_1538x858.png 424w, https://substackcdn.com/image/fetch/$s_!8YqD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3376e07-47fd-44f5-9d96-1278fb6e9bd7_1538x858.png 848w, https://substackcdn.com/image/fetch/$s_!8YqD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3376e07-47fd-44f5-9d96-1278fb6e9bd7_1538x858.png 1272w, https://substackcdn.com/image/fetch/$s_!8YqD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3376e07-47fd-44f5-9d96-1278fb6e9bd7_1538x858.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8YqD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3376e07-47fd-44f5-9d96-1278fb6e9bd7_1538x858.png" width="1456" height="812" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f3376e07-47fd-44f5-9d96-1278fb6e9bd7_1538x858.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:812,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:568015,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8YqD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3376e07-47fd-44f5-9d96-1278fb6e9bd7_1538x858.png 424w, https://substackcdn.com/image/fetch/$s_!8YqD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3376e07-47fd-44f5-9d96-1278fb6e9bd7_1538x858.png 848w, https://substackcdn.com/image/fetch/$s_!8YqD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3376e07-47fd-44f5-9d96-1278fb6e9bd7_1538x858.png 1272w, https://substackcdn.com/image/fetch/$s_!8YqD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3376e07-47fd-44f5-9d96-1278fb6e9bd7_1538x858.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Source -</strong> <em><a href="https://www.verifiedmarketresearch.com/product/global-endpoint-security-market-size-and-forecast-to-2025/">Verified Market Research - Endpoint Security Market Size And Forecast</a></em></p><p>TAM (Total Addressable Market) for these vendors is much&nbsp;more&nbsp;as they do offer different module and claim to have different TAM for each module. Some of the modules are Threat Intelligence, Vulnerability Management, and Identity Management and others and they always try to present themselves as a platform for security and not just endpoint security. Here are some TAM reports shared by CrowdStrike in their investor presentation - </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!holw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F077ba095-2c43-472f-bd6a-92bdb6ecf990_3350x1016.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!holw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F077ba095-2c43-472f-bd6a-92bdb6ecf990_3350x1016.png 424w, https://substackcdn.com/image/fetch/$s_!holw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F077ba095-2c43-472f-bd6a-92bdb6ecf990_3350x1016.png 848w, https://substackcdn.com/image/fetch/$s_!holw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F077ba095-2c43-472f-bd6a-92bdb6ecf990_3350x1016.png 1272w, https://substackcdn.com/image/fetch/$s_!holw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F077ba095-2c43-472f-bd6a-92bdb6ecf990_3350x1016.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!holw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F077ba095-2c43-472f-bd6a-92bdb6ecf990_3350x1016.png" width="1456" height="442" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/077ba095-2c43-472f-bd6a-92bdb6ecf990_3350x1016.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:442,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:742933,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!holw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F077ba095-2c43-472f-bd6a-92bdb6ecf990_3350x1016.png 424w, https://substackcdn.com/image/fetch/$s_!holw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F077ba095-2c43-472f-bd6a-92bdb6ecf990_3350x1016.png 848w, https://substackcdn.com/image/fetch/$s_!holw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F077ba095-2c43-472f-bd6a-92bdb6ecf990_3350x1016.png 1272w, https://substackcdn.com/image/fetch/$s_!holw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F077ba095-2c43-472f-bd6a-92bdb6ecf990_3350x1016.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Source - CrowdStrike Investor <a href="https://ir.crowdstrike.com/events-and-presentations#:~:text=Investor%20Presentation">Presentation</a> </em></p><h3>Let&#8217;s look at some of the major players </h3><p>Endpoint security is set to experience new challenges with ever-changing demands from enterprises. <strong>You can see from the image how quickly the industry changed; look at Gartner's magic quadrant from 2017.</strong> </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6QUh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1880b026-994d-4a93-8b05-c1b03a09dec8_3584x1834.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6QUh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1880b026-994d-4a93-8b05-c1b03a09dec8_3584x1834.png 424w, https://substackcdn.com/image/fetch/$s_!6QUh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1880b026-994d-4a93-8b05-c1b03a09dec8_3584x1834.png 848w, https://substackcdn.com/image/fetch/$s_!6QUh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1880b026-994d-4a93-8b05-c1b03a09dec8_3584x1834.png 1272w, https://substackcdn.com/image/fetch/$s_!6QUh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1880b026-994d-4a93-8b05-c1b03a09dec8_3584x1834.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6QUh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1880b026-994d-4a93-8b05-c1b03a09dec8_3584x1834.png" width="1456" height="745" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1880b026-994d-4a93-8b05-c1b03a09dec8_3584x1834.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:745,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1596517,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6QUh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1880b026-994d-4a93-8b05-c1b03a09dec8_3584x1834.png 424w, https://substackcdn.com/image/fetch/$s_!6QUh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1880b026-994d-4a93-8b05-c1b03a09dec8_3584x1834.png 848w, https://substackcdn.com/image/fetch/$s_!6QUh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1880b026-994d-4a93-8b05-c1b03a09dec8_3584x1834.png 1272w, https://substackcdn.com/image/fetch/$s_!6QUh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1880b026-994d-4a93-8b05-c1b03a09dec8_3584x1834.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em><strong>Source - </strong>Gartner<strong>, Left - </strong><a href="https://www.gartner.com/en/documents/3559631">Gartner&#8217;s magic quadrant 2017</a><strong>, Right - </strong><a href="https://www.gartner.com/doc/reprints?id=1-2AJ91JO6&amp;ct=220707&amp;st=sb">Gartner&#8217;s magic quadrant 2022</a></em></p><p>This field is poised for even more risk, innovation and significant market shifts in the next few years. Therefore, vendors need to adapt to changed demands and threat landscape and keep innovating with incremental progress. Like other security areas, endpoint security has quite a few vendors. However, some major vendors in endpoint space are&nbsp;<a href="https://substack.com/discover/stocks/PANW">PANW 0.00</a>,&nbsp;<a href="https://substack.com/discover/stocks/CRWD">CRWD 0.00</a>, $S,&nbsp;<a href="https://substack.com/discover/stocks/MSFT">MSFT 0.00</a>, Trend Micro ($TMICY), McAfee, Sophos,&nbsp;<a href="https://substack.com/discover/stocks/VMW">VMW 0.00</a>&nbsp;, Cybereason, BitDefender and some newer players like Cynet, Confluera (Acquired by XM Security). <strong>It makes a cogent argument to include all of them in the comparison; however, I have listed down three major players based on several reasons like market vision, features, positioning, leadership, revenue growth, customer count for XDR and 2022 Gartner's magic quadrant. </strong></p><p><strong>You might wonder why <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$PANW&quot;}" data-component-name="CashtagToDOM"></span> is included with comparatively low MQ rating (2022)? </strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yErD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F483b58cf-b6c3-4529-b217-3e76fa81e40b_1014x1040.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yErD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F483b58cf-b6c3-4529-b217-3e76fa81e40b_1014x1040.png 424w, https://substackcdn.com/image/fetch/$s_!yErD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F483b58cf-b6c3-4529-b217-3e76fa81e40b_1014x1040.png 848w, https://substackcdn.com/image/fetch/$s_!yErD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F483b58cf-b6c3-4529-b217-3e76fa81e40b_1014x1040.png 1272w, https://substackcdn.com/image/fetch/$s_!yErD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F483b58cf-b6c3-4529-b217-3e76fa81e40b_1014x1040.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yErD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F483b58cf-b6c3-4529-b217-3e76fa81e40b_1014x1040.png" width="352" height="361.02564102564105" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/483b58cf-b6c3-4529-b217-3e76fa81e40b_1014x1040.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1040,&quot;width&quot;:1014,&quot;resizeWidth&quot;:352,&quot;bytes&quot;:1401656,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yErD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F483b58cf-b6c3-4529-b217-3e76fa81e40b_1014x1040.png 424w, https://substackcdn.com/image/fetch/$s_!yErD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F483b58cf-b6c3-4529-b217-3e76fa81e40b_1014x1040.png 848w, https://substackcdn.com/image/fetch/$s_!yErD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F483b58cf-b6c3-4529-b217-3e76fa81e40b_1014x1040.png 1272w, https://substackcdn.com/image/fetch/$s_!yErD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F483b58cf-b6c3-4529-b217-3e76fa81e40b_1014x1040.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://substack.com/discover/stocks/PANW">PANW 0.00</a>&nbsp;is one complete vendor with all the pieces in place, and that too with solid execution. You look at the network, cloud and SOAR functionalities; it does make life easier for the end users.&nbsp;<strong>Additionally, they have solid innovation, research and leadership teams, and I'd bet my bottom dollar on them to eat a good market share from incumbent players like Cybereason (looking for a&nbsp;<a href="https://www.theinformation.com/articles/2-5-billion-valuation-security-firm-cybereason-hires-jpmorgan-to-find-buyer">buyer</a>), Trend Micro and&nbsp;<a href="https://substack.com/discover/stocks/VMW">VMW 0.00</a></strong>.<em> </em></p><p>An ideal strategy for <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$PANW&quot;}" data-component-name="CashtagToDOM"></span>  would be to compete with&nbsp;<a href="https://substack.com/discover/stocks/CRWD">CRWD 0.00</a>&nbsp;and&nbsp;<a href="https://substack.com/discover/stocks/S">S 0.00</a>&nbsp;(<em>As <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$S&quot;}" data-component-name="CashtagToDOM"></span> AND <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$CRWD&quot;}" data-component-name="CashtagToDOM"></span> are still working on consolidation and <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$PANW&quot;}" data-component-name="CashtagToDOM"></span> is way ahead)</em> but <strong>target the organization they can beat left, right and centre and simultaneously improve their current portfolio.</strong>&nbsp;<a href="https://substack.com/discover/stocks/CRWD">CRWD 0.00</a>&nbsp;and&nbsp;<a href="https://substack.com/discover/stocks/S">S 0.00</a>&nbsp;are architecturally stable and more polished products in terms of XDR. It would be good to target customers who are in their renewal cycle and can't go with the incumbents due to the rising sophisticated attacks.&nbsp;</p><h4>Technology</h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Sv3f!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2ee466f-ed3b-468a-970b-a31b21b3a58c_2726x1912.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Sv3f!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2ee466f-ed3b-468a-970b-a31b21b3a58c_2726x1912.png 424w, https://substackcdn.com/image/fetch/$s_!Sv3f!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2ee466f-ed3b-468a-970b-a31b21b3a58c_2726x1912.png 848w, https://substackcdn.com/image/fetch/$s_!Sv3f!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2ee466f-ed3b-468a-970b-a31b21b3a58c_2726x1912.png 1272w, https://substackcdn.com/image/fetch/$s_!Sv3f!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2ee466f-ed3b-468a-970b-a31b21b3a58c_2726x1912.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Sv3f!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2ee466f-ed3b-468a-970b-a31b21b3a58c_2726x1912.png" width="1200" height="841.4835164835165" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a2ee466f-ed3b-468a-970b-a31b21b3a58c_2726x1912.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:1021,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:1525092,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Sv3f!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2ee466f-ed3b-468a-970b-a31b21b3a58c_2726x1912.png 424w, https://substackcdn.com/image/fetch/$s_!Sv3f!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2ee466f-ed3b-468a-970b-a31b21b3a58c_2726x1912.png 848w, https://substackcdn.com/image/fetch/$s_!Sv3f!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2ee466f-ed3b-468a-970b-a31b21b3a58c_2726x1912.png 1272w, https://substackcdn.com/image/fetch/$s_!Sv3f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2ee466f-ed3b-468a-970b-a31b21b3a58c_2726x1912.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4>Pricing  </h4><ul><li><p><strong>SentinelOne:</strong> SentinelOne offers a <strong>flat rate for their endpoint security solution, which includes all features and functionalities.</strong> The pricing is based on the number of endpoints protected, with discounts available for longer-term contracts.</p></li><li><p><strong>CrowdStrike:</strong> CrowdStrike <strong>offers tiered pricing based on the number of endpoints protected and the level of support required</strong>. They have multiple packages, and you can choose from the standard Falcon Prevent package or the complete Falcon Prevent package.</p></li><li><p><strong>Palo Alto Network:</strong> Palo Alto Network offers a variety of pricing models for their endpoint security solution. <strong>The pricing is based on the number of endpoints protected and also offers a consumption-based pricing model.</strong></p></li></ul><h4>GTM Strategy</h4><ul><li><p><strong>SentinelOne: </strong>For years, <strong>SentinelOne has prioritized a partner-friendly approach in its go-to-market strategy, particularly with strategic partnerships like MSSPs</strong>. To enhance these relationships, they have developed capabilities such as multi-tenancy, automation, and role-based access control. Additionally, they are expanding their relationships from MSSPs to VARs (Value Added Resellers) and VADs (Value Added Distributors) across the world.</p><p><strong>SentinelOne also recognizes the importance of the cloud in its go-to-market strategy and has seen significant customer interest in its cloud offerings and Wiz partnership</strong>. The company views cloud and endpoint sales as complementary and has had success with standalone cloud deals. By treating its endpoint and cloud businesses as competitive advantages, SentinelOne plans to continue growing across all these different vectors.</p></li></ul><ul><li><p><strong>CrowdStrike:</strong> CrowdStrike's go-to-market strategy revolves around <strong>utilizing its technology and establishing strategic partnerships to extend its market coverage. </strong>Initially, the company aimed at the large enterprise sector and promoted the Falcon platform to such organizations, which delivers an extensive array of endpoint protection, threat intelligence, and response services. To reach out to the SMB market, <strong>CrowdStrike developed Falcon Go, a lightweight package designed exclusively for SMBs. Moreover, the company is exploiting its strategic association with Dell to provide the Falcon platform to Dell's customers worldwide.</strong> This partnership allows CrowdStrike to access a wider market, including small to medium-sized businesses, via various channels, such as traditional resell agreements on devices sold through Dell's direct sales team and as the cornerstone of Dell's managed cybersecurity services offerings.</p></li><li><p><strong>Palo Alto Networks:</strong> For the last few years, <strong>Palo Alto&#8217;s strategy is to acquire innovative technology companies and integrate their products into their offerings.</strong> They focus on smaller to mid-sized acquisitions in the product category and utilize the expertise of the acquired companies' founders to drive growth. They have been successful with this approach and <strong>have developed a unique go-to-market approach</strong>. Additionally, they are focused on enhancing their go-to-market capabilities, particularly in cloud and Cortex total market capabilities and are working on product enhancements in XDR space. This will definitely give them confidence in opening up a large total addressable market in future quarters.&nbsp;</p></li></ul><h4><strong>Customers </strong></h4><ul><li><p><strong>SentinelOne: </strong>In their fiscal fourth quarter 2023, <strong>SentinelOne gained approximately 750 customers, resulting in a year-over-year increase of around 50%, with the total number of customers reaching north of 10,000</strong>. Among some customers, SentinelOne closed a <strong>multi year eight-figure deal in Q3&#8217;23 which was the largest since inception.</strong> </p></li><li><p><strong>CrowdStrike:</strong> CrowdStrike has a strong customer base and a steady growth in their numbers. <strong>They recently added 6,694 net new customers for the fiscal year and now the total count is 23,000+ paid customers.</strong> CrowdStrike also serves 556 of the Global 2000, 271 of the Fortune 500 and 15 of the top 20 U.S. banks. They also added an <strong>8-figure net new ARR deal to their revenue last quarter.</strong> They are also the second fastest company to $2B ARR just behind Zoom communications (Covid Play). </p></li><li><p><strong>Palo Alto Networks:</strong> Palo Alto Networks has close to <strong>4500 customers for their Cortex platform and they also added multiple high 7-figure deals over the last quarter.</strong> They are also trying to pilot <a href="https://www.paloaltonetworks.com/cortex/cortex-xsiam">XSIAM</a> (In simple terms, a SOC platform!) with few customers and trying to bundle it with XDR. Customers can only opt for XSIAM if they have XDR, so the company is attempting to upsell customers to purchase XSIAM due to its features and consolidation play, with the aim of generating more revenue by offering a bundled package to customers.</p></li></ul><h4><strong>Acquisitions </strong></h4><ul><li><p><strong>SentinelOne: </strong>In 2019, SentinelOne acquired <a href="http://SC Magazine SentinelOne forks over $155 million for log management company Executives are keen to incorporate Scalyr's cloud-based data and event ingestion tool into their extended detection and response platform. .09-Feb-2021">Scalyr</a>, a log management and analysis platform, which was aimed at enhancing their cybersecurity solutions. In March 2022, SentinelOne announced the acquisition of <a href="https://www.scmagazine.com/news/vulnerability-management/best-deception-technology-the-attivo-networks-threatdefend-platform">Attivo Networks</a>, a leading identity security and lateral movement protection company. Attivo Networks was a leader in Identity based prevention, detection, and response capabilities. </p></li><li><p><strong>CrowdStrike:</strong> CrowdStrike made several acquisitions to enhance its capabilities. This includes the acquisitions of <a href="https://www.sdxcentral.com/articles/news/crowdstrike-pays-400m-buys-humio-for-xdr-boost/2021/02/">Humio</a>, a log management and observability technology provider, and <a href="https://www.google.com/search?q=Preempt+Security,&amp;sxsrf=APwXEdeJOnl_5NxUrBtZO4oYBQ2HcAM6cA:1680779030502&amp;source=lnms&amp;tbm=nws&amp;sa=X&amp;ved=2ahUKEwjxlLzojZX-AhWdxTgGHen_D4kQ_AUoAXoECAIQAw&amp;biw=1680&amp;bih=971&amp;dpr=2#:~:text=CRN,23%2DSept%2D2020">Preempt Security,</a> a zero trust and conditional access technology provider. In September 2022, CrowdStrike acquired <a href="http://CrowdStrike to acquire Reposify to bolster visibility and ...  Indiatimes.com https://ciosea.economictimes.indiatimes.com &#8250; security">Reposify</a> that provides an external attack surface management (EASM) platform that scans the internet for exposed assets of an organization to detect and eliminate risk from vulnerable and unknown assets. </p></li><li><p><strong>Palo Alto Networks:</strong> Palo Alto Networks has made several acquisitions, including an Israel-based company named <a href="https://www.paloaltonetworks.com/company/press/2018/palo-alto-networks-closes-acquisition-of-secdo">Secdo</a> in 2018, which brings sophisticated EDR capabilities, including unique data collection and visualization. Later, they completed the acquisition of <a href="https://techcrunch.com/2019/02/19/palo-alto-networks-to-acquire-demisto-for-560m/">Demisto</a> for Security Orchestration, Automation, and Response (SOAR) technology, <a href="https://www.sdxcentral.com/articles/news/palo-alto-networks-buys-twistlock-puresec-in-410m-deal/2019/05/">PureSec</a> for serverless security, <a href="https://www.sdxcentral.com/articles/news/palo-alto-networks-buys-twistlock-puresec-in-410m-deal/2019/05/">Twistlock</a> for container security, Zingbox for Internet of Things (IoT) security, <a href="https://siliconangle.com/2019/11/25/palo-alto-networks-acquires-cloud-native-security-startup-aporeto-150m/">Aporeto</a> for Zero Trust Network Security, <a href="https://techcrunch.com/2020/03/31/palo-alto-networks-to-acquire-cloudgenix-for-420m/">CloudGenix</a> for SD-WAN technology, and <a href="http://ZDNet Palo Alto Networks acquires attack surface manager Expanse in $800m deal Expanse's platform will be added to the Cortex product suite. .11-Nov-2020">Expanse</a> for attack surface management. Additionally, Palo Alto Networks also acquired <a href="https://www.paloaltonetworks.com/company/press/2018/palo-alto-networks-completes-acquisition-of-redlock">RedLock</a>, a cloud security analytics company, in 2018 to strengthen its cloud security offerings. In 2020, they completed the acquisition of <a href="https://www.paloaltonetworks.com/company/press/2020/palo-alto-networks-completes-acquisition-of-the-crypsis-group">The Crypsis Group</a>, a leading incident response, risk management, and digital forensics consulting firm. In February 2021, they acquired <a href="https://www.google.com/search?q=Bridgecrew&amp;sxsrf=APwXEde1Cl9H10jiIP3Mmb-64NkmQ3wJPA:1680778966387&amp;source=lnms&amp;tbm=nws&amp;sa=X&amp;ved=2ahUKEwjW6_LJjZX-AhVBzzgGHecyBFkQ_AUoAXoECAEQAw&amp;biw=1680&amp;bih=971&amp;dpr=2#:~:text=TechCrunch,16%2DFeb%2D2021">Bridgecrew</a>, a developer-focused cloud security company and creator of the tool <a href="https://www.checkov.io/">Chekov</a>, and in December 2022, Palo Alto completed the acquisition of <a href="http://Agencies Palo Alto Networks completes acquisition of Cider Security With the addition of Cider's cutting-edge capabilities, Palo Alto Networks Prisma&#174; Cloud platform helps customers &quot;shift security left&quot; to... .21-Dec-2022">Cider Security</a>, a leader in application security (AppSec) and software supply chain.</p></li></ul><h4>Financials</h4><ul><li><p><strong>SentinelOne :  </strong> </p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FDKU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57761665-f6ae-4211-accd-c1d4187f19e5_1128x288.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FDKU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57761665-f6ae-4211-accd-c1d4187f19e5_1128x288.png 424w, https://substackcdn.com/image/fetch/$s_!FDKU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57761665-f6ae-4211-accd-c1d4187f19e5_1128x288.png 848w, https://substackcdn.com/image/fetch/$s_!FDKU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57761665-f6ae-4211-accd-c1d4187f19e5_1128x288.png 1272w, https://substackcdn.com/image/fetch/$s_!FDKU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57761665-f6ae-4211-accd-c1d4187f19e5_1128x288.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FDKU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57761665-f6ae-4211-accd-c1d4187f19e5_1128x288.png" width="1128" height="288" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/57761665-f6ae-4211-accd-c1d4187f19e5_1128x288.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:288,&quot;width&quot;:1128,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:61029,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!FDKU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57761665-f6ae-4211-accd-c1d4187f19e5_1128x288.png 424w, https://substackcdn.com/image/fetch/$s_!FDKU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57761665-f6ae-4211-accd-c1d4187f19e5_1128x288.png 848w, https://substackcdn.com/image/fetch/$s_!FDKU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57761665-f6ae-4211-accd-c1d4187f19e5_1128x288.png 1272w, https://substackcdn.com/image/fetch/$s_!FDKU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57761665-f6ae-4211-accd-c1d4187f19e5_1128x288.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><strong>CrowdStrike : </strong></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iQ_1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d76e9e-40c7-4431-94fa-1eb13eb7b982_976x286.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iQ_1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d76e9e-40c7-4431-94fa-1eb13eb7b982_976x286.png 424w, https://substackcdn.com/image/fetch/$s_!iQ_1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d76e9e-40c7-4431-94fa-1eb13eb7b982_976x286.png 848w, https://substackcdn.com/image/fetch/$s_!iQ_1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d76e9e-40c7-4431-94fa-1eb13eb7b982_976x286.png 1272w, https://substackcdn.com/image/fetch/$s_!iQ_1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d76e9e-40c7-4431-94fa-1eb13eb7b982_976x286.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iQ_1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d76e9e-40c7-4431-94fa-1eb13eb7b982_976x286.png" width="976" height="286" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/40d76e9e-40c7-4431-94fa-1eb13eb7b982_976x286.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:286,&quot;width&quot;:976,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:54372,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!iQ_1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d76e9e-40c7-4431-94fa-1eb13eb7b982_976x286.png 424w, https://substackcdn.com/image/fetch/$s_!iQ_1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d76e9e-40c7-4431-94fa-1eb13eb7b982_976x286.png 848w, https://substackcdn.com/image/fetch/$s_!iQ_1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d76e9e-40c7-4431-94fa-1eb13eb7b982_976x286.png 1272w, https://substackcdn.com/image/fetch/$s_!iQ_1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40d76e9e-40c7-4431-94fa-1eb13eb7b982_976x286.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><strong>Palo Alto Networks :</strong> </p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!n1Ka!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b343da8-aa55-4b64-8a3c-2fb8ec366b44_1084x246.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!n1Ka!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b343da8-aa55-4b64-8a3c-2fb8ec366b44_1084x246.png 424w, https://substackcdn.com/image/fetch/$s_!n1Ka!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b343da8-aa55-4b64-8a3c-2fb8ec366b44_1084x246.png 848w, https://substackcdn.com/image/fetch/$s_!n1Ka!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b343da8-aa55-4b64-8a3c-2fb8ec366b44_1084x246.png 1272w, https://substackcdn.com/image/fetch/$s_!n1Ka!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b343da8-aa55-4b64-8a3c-2fb8ec366b44_1084x246.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!n1Ka!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b343da8-aa55-4b64-8a3c-2fb8ec366b44_1084x246.png" width="672" height="152.50184501845018" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b343da8-aa55-4b64-8a3c-2fb8ec366b44_1084x246.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:246,&quot;width&quot;:1084,&quot;resizeWidth&quot;:672,&quot;bytes&quot;:48426,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!n1Ka!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b343da8-aa55-4b64-8a3c-2fb8ec366b44_1084x246.png 424w, https://substackcdn.com/image/fetch/$s_!n1Ka!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b343da8-aa55-4b64-8a3c-2fb8ec366b44_1084x246.png 848w, https://substackcdn.com/image/fetch/$s_!n1Ka!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b343da8-aa55-4b64-8a3c-2fb8ec366b44_1084x246.png 1272w, https://substackcdn.com/image/fetch/$s_!n1Ka!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b343da8-aa55-4b64-8a3c-2fb8ec366b44_1084x246.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><strong>Summary :</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1_nb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bf70d86-3b58-4808-9fb6-c910597421fe_2838x1548.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1_nb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bf70d86-3b58-4808-9fb6-c910597421fe_2838x1548.png 424w, https://substackcdn.com/image/fetch/$s_!1_nb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bf70d86-3b58-4808-9fb6-c910597421fe_2838x1548.png 848w, https://substackcdn.com/image/fetch/$s_!1_nb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bf70d86-3b58-4808-9fb6-c910597421fe_2838x1548.png 1272w, https://substackcdn.com/image/fetch/$s_!1_nb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bf70d86-3b58-4808-9fb6-c910597421fe_2838x1548.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1_nb!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bf70d86-3b58-4808-9fb6-c910597421fe_2838x1548.png" width="1200" height="654.3956043956044" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2bf70d86-3b58-4808-9fb6-c910597421fe_2838x1548.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:406669,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-large" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!1_nb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bf70d86-3b58-4808-9fb6-c910597421fe_2838x1548.png 424w, https://substackcdn.com/image/fetch/$s_!1_nb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bf70d86-3b58-4808-9fb6-c910597421fe_2838x1548.png 848w, https://substackcdn.com/image/fetch/$s_!1_nb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bf70d86-3b58-4808-9fb6-c910597421fe_2838x1548.png 1272w, https://substackcdn.com/image/fetch/$s_!1_nb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bf70d86-3b58-4808-9fb6-c910597421fe_2838x1548.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em><strong>Source -</strong> Charts from <a href="https://finbox.com/NASDAQGS:CRWD/compare/NYSE:S,NASDAQGS:PANW">Finbox</a></em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.securityandmarkets.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Security &amp; Markets!! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong><a href="https://www.amazon.com/Innovators-Dilemma-Revolutionary-Change-Business/dp/0062060244">Innovator&#8217;s Dilemma</a></strong></h3><p>One of the most critical challenges for the security industry is the innovation dilemma. You might remember a time when we had Avira, Avast, McAfee, FireEye, and a couple of others. These are great companies built for ages but they share a similar pain of innovation. Although, some of the companies were sold at a good sum, they had a great opportunity to be a part of this market. </p><p><strong>Why can&#8217;t these companies disrupt themselves?</strong></p><p>You take <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;IBM&quot;}" data-component-name="CashtagToDOM"></span> as an example, they had the finest mainframe computer, disrupted by <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;DELL&quot;}" data-component-name="CashtagToDOM"></span> laptops, <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;DELL&quot;}" data-component-name="CashtagToDOM"></span> ruled the market and was the talk of the town before being disrupted by <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;AAPL&quot;}" data-component-name="CashtagToDOM"></span>, apple ruled the market with the launch of iPhone and Samsung started their phone offerings with android OS and captured a great share and so on and so forth.  </p><blockquote><p><strong>The point is that there is always an external company that reads the market better than these incumbent exceptional companies. The problem is when you keep listening to your existing customers, you keep improving what you already have. </strong></p></blockquote><p>They are still innovating but only to improve the existing product(s). When small becomes big and you are spinning out of the growth stage, introducing processes, and bureaucracy, and adding more checks, you find yourself in a rabbit hole where it&#8217;s hard to move the building blocks. <strong>Therefore, it&#8217;s essential to zoom out and see how to remain small when you are big, how to stay nimble just as you were a startup  and operate like  <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;UBER&quot;}" data-component-name="CashtagToDOM"></span> (Yes, I&#8217;m biased),  <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;ABNB&quot;}" data-component-name="CashtagToDOM"></span>, <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;NFLX&quot;}" data-component-name="CashtagToDOM"></span> , etc. and disrupt your own company and reinvent yourself before a disruption from an external one.</strong></p><h3>CrowdStrike vs SentinelOne</h3><p>I have watched nearly all the public interviews featuring <a href="https://www.crowdstrike.com/about-crowdstrike/executive-team/george-kurtz/">George Kurtz</a> and <a href="https://investors.sentinelone.com/governance/board-of-directors/person-details/default.aspx?ItemId=3698337f-8e98-4fff-a26b-de06a6f73cbe">Tomer Weingarten</a>, and I must say they are exceptional leaders who have built outstanding companies. I have also spoken to several people from <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$S&quot;}" data-component-name="CashtagToDOM"></span>  and read countless reviews praising Tomer's leadership, which is indisputable. I still believe that <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$S&quot;}" data-component-name="CashtagToDOM"></span>  has an edge when it comes to the ecosystem. Having a background from Israel and IDF, with the camaraderie in the security community, they have a unique advantage in leveraging partnerships and opening more channels for cross-selling and upselling. <strong>Have the cashed in well?</strong> Not really, till now I don't feel industry has the same feeling about the technology behind the product. They still need to prove and communicate well the investors and buyers. The recent exclusive partnership with Wiz highlights their focus on making the software more stable, as many of their existing offerings overlap with Wiz. <strong>This partnership is beneficial for both <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$S&quot;}" data-component-name="CashtagToDOM"></span>  and Wiz, as they are likely to face strong headwinds from increased competition in their respective spaces (XDR and CNAPP)</strong>. While the recent departure of two executives has made headlines, I believe that $S has made some great hires recently, and the new leadership will steer the company to greater heights (you can get an org chart from <a href="https://theorg.com/org/sentinelone">here</a>).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CLAp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6ee2ea8-9c04-4046-9ad5-361251e4564f_1504x1576.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CLAp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6ee2ea8-9c04-4046-9ad5-361251e4564f_1504x1576.png 424w, https://substackcdn.com/image/fetch/$s_!CLAp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6ee2ea8-9c04-4046-9ad5-361251e4564f_1504x1576.png 848w, https://substackcdn.com/image/fetch/$s_!CLAp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6ee2ea8-9c04-4046-9ad5-361251e4564f_1504x1576.png 1272w, https://substackcdn.com/image/fetch/$s_!CLAp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6ee2ea8-9c04-4046-9ad5-361251e4564f_1504x1576.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CLAp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6ee2ea8-9c04-4046-9ad5-361251e4564f_1504x1576.png" width="282" height="295.5576923076923" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b6ee2ea8-9c04-4046-9ad5-361251e4564f_1504x1576.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1526,&quot;width&quot;:1456,&quot;resizeWidth&quot;:282,&quot;bytes&quot;:302921,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CLAp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6ee2ea8-9c04-4046-9ad5-361251e4564f_1504x1576.png 424w, https://substackcdn.com/image/fetch/$s_!CLAp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6ee2ea8-9c04-4046-9ad5-361251e4564f_1504x1576.png 848w, https://substackcdn.com/image/fetch/$s_!CLAp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6ee2ea8-9c04-4046-9ad5-361251e4564f_1504x1576.png 1272w, https://substackcdn.com/image/fetch/$s_!CLAp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6ee2ea8-9c04-4046-9ad5-361251e4564f_1504x1576.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>On the other hand, CrowdStrike has a strong distribution and marketing strategy led by George Kurtz and his team. CrowdStrike positions itself as a one-stop-shop for protecting against nation-state attacks, which is a powerful marketing message that resonates well with the security audience and investors (From CrowdStrike Recent Investor Call - <em><strong>&#8220;They hear George on the radio, they watch on TV, they know CrowdStrike&#8221;</strong></em>). In some cases, companies are reluctant to switch from CrowdStrike, as the saying goes, <strong>"if it ain't broke, don't fix it."</strong> The software is packaged well and easy for analysts to understand, making it a popular choice for many. There is enough space for the market to have both these vendors thrive for the next decade.  </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FJst!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6079ef8-f659-472a-8dab-4100294df291_1632x1636.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FJst!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6079ef8-f659-472a-8dab-4100294df291_1632x1636.png 424w, https://substackcdn.com/image/fetch/$s_!FJst!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6079ef8-f659-472a-8dab-4100294df291_1632x1636.png 848w, https://substackcdn.com/image/fetch/$s_!FJst!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6079ef8-f659-472a-8dab-4100294df291_1632x1636.png 1272w, https://substackcdn.com/image/fetch/$s_!FJst!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6079ef8-f659-472a-8dab-4100294df291_1632x1636.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FJst!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6079ef8-f659-472a-8dab-4100294df291_1632x1636.png" width="322" height="322.88461538461536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a6079ef8-f659-472a-8dab-4100294df291_1632x1636.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1460,&quot;width&quot;:1456,&quot;resizeWidth&quot;:322,&quot;bytes&quot;:346705,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FJst!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6079ef8-f659-472a-8dab-4100294df291_1632x1636.png 424w, https://substackcdn.com/image/fetch/$s_!FJst!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6079ef8-f659-472a-8dab-4100294df291_1632x1636.png 848w, https://substackcdn.com/image/fetch/$s_!FJst!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6079ef8-f659-472a-8dab-4100294df291_1632x1636.png 1272w, https://substackcdn.com/image/fetch/$s_!FJst!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6079ef8-f659-472a-8dab-4100294df291_1632x1636.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Can we see a new player in XDR?</h3><p>It can be argued that the XDR market is saturated with strong market players, making it difficult for newcomers to enter. Nonetheless, I strongly believe that true XDR players are rare and distinguishable by their clear vision and capabilities. Success in this market depends on a solid team, a good product, and strong partnerships, which can help a new vendor gradually acquire market share. While there is room for new players with superior technology and strong market differentiators, such differentiation must be robust, as the migration process is critical for every business. No business would want to spend more money and, more importantly, a significant amount of time migrating to an average or mediocre XDR solution.</p><div class="poll-embed" data-attrs="{&quot;id&quot;:62769}" data-component-name="PollToDOM"></div><h3><strong>Hot Take!</strong></h3><p>It has been interesting to observe how the XDR industry has evolved over the past few years. With customers demanding more consolidated vendors, it would be challenging to establish dominance and capture the market share from these three vendors. Among the three, <strong><span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$S&quot;}" data-component-name="CashtagToDOM"></span>  boasts the most sophisticated and superior technology, and with an EV/Sales ratio of approximately 8.8x, it appears to be undervalued in my opinion</strong>. However, recent departures and headwinds from longer sales cycles and IT spending cuts make it intriguing to monitor price movements in the next two quarters. Despite high marketing spend, they have struggled to convert campaigns into a compelling narrative. On the other hand, <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$CRWD&quot;}" data-component-name="CashtagToDOM"></span>  <strong>has effectively leveraged partnerships, recording top-tier revenue through its partners. They have also established themselves as one of the most successful AWS ISV partners for Amazon</strong>. With their new partnerships, such as with Dell, and new SMB opportunities, they present an exciting investment prospect. <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$PANW&quot;}" data-component-name="CashtagToDOM"></span><strong>'s advantage lies in its large customer base and ability to upsell enterprise customers on XDR &amp; XSIAM offerings.</strong> They are miles ahead in terms of being a platform security company with solid integrations with most of the vendors. In my view, these three vendors will continue to dominate the market for the next 3-5 years as customers demand more consolidated and efficient solutions. We are likely to witness more acquisitions and exclusive partnerships aimed at maintaining a competitive edge in the market. <strong>The decision to opt for superior technology, a better go-to-market strategy, or a larger market opportunity rests with the investors or the buyers.</strong></p><p>As always, if you want the &#8220;meat&#8221; of the blog and need more in-depth information, feel free to <a href="https://calendly.com/shubham_goel/30min">reach out</a> separately. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.securityandmarkets.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Security &amp; Markets!! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.securityandmarkets.com/p/xdr-wars-who-holds-the-key?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.securityandmarkets.com/p/xdr-wars-who-holds-the-key?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em><strong>Disclaimer :</strong> The information provided by Security &amp; Markets ("we," "us," or "our") on https://securityandmarkets.com/ (the "site") is for general informational purposes only. All information on the site is provided in good faith; however, we make no representation or warranty of any kind, express or implied, regarding the accuracy, adequacy, validity, reliability, availability, or completeness of any information on the site. The information published on this post is based on publicly available information obtained from online websites, quarterly reports, and resource documentations posted online. The author of this blog clarifies that there is no relationship or affiliation of the author's current or previous employer(s) with this blog. Under no circumstances shall we have any liability to you for any loss or damage of any kind incurred as a result of the use of the site or reliance on any information provided on the site. Your use of the site and your reliance on any information on the site is solely at your own risk. We recommend independently verifying any information obtained from the site before making any decisions or taking any actions based on it. By using the site, you acknowledge and accept this disclaimer and agree to use the information provided at your own risk.</em></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.securityandmarkets.com/p/xdr-wars-who-holds-the-key/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.securityandmarkets.com/p/xdr-wars-who-holds-the-key/comments"><span>Leave a comment</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Making your First Cloud Security Investment?]]></title><description><![CDATA[Before you make your investment, let's learn about cloud security, vendors and overall market.]]></description><link>https://www.securityandmarkets.com/p/making-your-first-cloud-security</link><guid isPermaLink="false">https://www.securityandmarkets.com/p/making-your-first-cloud-security</guid><dc:creator><![CDATA[Shubham Goel]]></dc:creator><pubDate>Fri, 03 Feb 2023 15:17:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rOi9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d10fcc9-0740-4cb1-b829-e190766e98d5_826x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Quick Sectional Links</strong> - </p><ol><li><p><a href="https://shubhamgoel.substack.com/i/100672012/what-is-cloud-native-application-protection-platform-cnapp">What is Cloud Native Application Protection Platform (CNAPP)?</a></p></li><li><p><a href="https://shubhamgoel.substack.com/i/100672012/why-do-we-need-security-in-the-cloud-shouldnt-awsgcpazureoci-provide-it-natively">Why do we need security in the cloud? Shouldn&#8217;t AWS/GCP/Azure/OCI provide it natively?</a></p></li><li><p><a href="https://shubhamgoel.substack.com/i/100672012/why-do-i-care">Why do I care?</a></p></li><li><p><a href="https://shubhamgoel.substack.com/i/100672012/what-are-the-key-components-of-cnapp">What are the key components of CNAPP?</a></p></li><li><p><a href="https://shubhamgoel.substack.com/i/100672012/lets-look-at-some-big-and-upcoming-players">Let&#8217;s look at some big and upcoming players</a></p></li><li><p><a href="https://shubhamgoel.substack.com/i/100672012/how-to-find-the-right-value">How to find the right value?</a></p></li><li><p><a href="https://shubhamgoel.substack.com/i/100672012/good-danger-zone">Good Danger Zone?</a></p></li><li><p><a href="https://shubhamgoel.substack.com/i/100672012/under-pressure-to-innovate-quickly-who-will-be-the-winner">Under pressure to innovate quickly! Who will be the winner?</a></p></li><li><p><a href="https://shubhamgoel.substack.com/i/100672012/hot-take">Hot Take!!</a></p></li></ol><p>With more and more companies moving their data center from on-prem to cloud, it has increased the importance of cloud security manyfold. Cloud-based solutions have brought numerous advancements in the industry and over the past 5 years, we have seen new vendors eating the pie with exorbitant valuations. Let&#8217;s learn more about the underlying technology and why security is important for the cloud. The reason for this blog is not only to cater to the security audience but provide insight to a <strong>wider audience including individual &amp; institutional investors, software engineers, product managers, </strong>and all other folks who are interested in learning about this space. </p><div><hr></div><h3>What is Cloud Native Application Protection Platform (CNAPP)? </h3><p>Gartner coined the term "CNAPP" in 2020 (After coining CSPM, CIEM, CWPP, etc.), and if we go by their own definition - </p><p><em>&#8220;CNAPPs consolidate multiple cloud-native security tools and data sources, including container scanning, cloud security posture management, infrastructure as code scanning, cloud infrastructure entitlements management and runtime cloud workload protection platforms.&#8221;</em></p><p>Simplifying what Gartner wrote - These suites of software are designed to protect cloud-based infrastructure, applications, and data. These will ensure user and device authentication, data and resource access control, and data privacy protection.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rOi9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d10fcc9-0740-4cb1-b829-e190766e98d5_826x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rOi9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d10fcc9-0740-4cb1-b829-e190766e98d5_826x600.png 424w, https://substackcdn.com/image/fetch/$s_!rOi9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d10fcc9-0740-4cb1-b829-e190766e98d5_826x600.png 848w, https://substackcdn.com/image/fetch/$s_!rOi9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d10fcc9-0740-4cb1-b829-e190766e98d5_826x600.png 1272w, https://substackcdn.com/image/fetch/$s_!rOi9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d10fcc9-0740-4cb1-b829-e190766e98d5_826x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rOi9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d10fcc9-0740-4cb1-b829-e190766e98d5_826x600.png" width="826" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7d10fcc9-0740-4cb1-b829-e190766e98d5_826x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:826,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;What is CNAPP? | Components, Benefits &amp; Importance | Zscaler&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="What is CNAPP? | Components, Benefits &amp; Importance | Zscaler" title="What is CNAPP? | Components, Benefits &amp; Importance | Zscaler" srcset="https://substackcdn.com/image/fetch/$s_!rOi9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d10fcc9-0740-4cb1-b829-e190766e98d5_826x600.png 424w, https://substackcdn.com/image/fetch/$s_!rOi9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d10fcc9-0740-4cb1-b829-e190766e98d5_826x600.png 848w, https://substackcdn.com/image/fetch/$s_!rOi9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d10fcc9-0740-4cb1-b829-e190766e98d5_826x600.png 1272w, https://substackcdn.com/image/fetch/$s_!rOi9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d10fcc9-0740-4cb1-b829-e190766e98d5_826x600.png 1456w" sizes="100vw" loading="lazy" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Source: Gartner (How to protect your clouds with CSPM, CWPP, CNAPP, and CASB)</em></p><h3>Why do we need security in the cloud? Shouldn&#8217;t AWS/GCP/Azure/OCI provide it natively?</h3><p>Let&#8217;s understand it via an analogy - When you buy the latest smart lock for your house, the smart lock provider will ensure that their patented ML/AI-based (Yikes!!) smart lock will provide the highest level of security. It&#8217;s on the user to configure that smart lock, keep different patterns for different users and monitor the activity of who is entering the house.  </p><p><em>For example, if you put 0000 as your password, you can&#8217;t really blame the smart lock provider. If you forget to lock the door, it&#8217;s on you and not the provider. </em></p><p>Similarly, these cloud vendors (<a href="https://aws.amazon.com/compliance/shared-responsibility-model/">AWS</a>/<a href="https://cloud.google.com/architecture/framework/security/shared-responsibility-shared-fate">GCP</a>/<a href="https://learn.microsoft.com/en-us/azure/security/fundamentals/shared-responsibility">Azure</a>/<a href="https://www.oracle.com/a/ocom/docs/cloud/oracle-ctr-2020-shared-responsibility.pdf">OCI</a>) operate in a shared responsibility model where a cloud service provider is responsible for managing the security of the public cloud while the subscriber of the service is responsible for securing what is in the cloud. Over the years the move to the cloud has brought a wide range of security challenges. There is a huge rise in the usage of cloud resources which has made the environment remarkably complex and difficult to protect. </p><h3>Why do I care?</h3><p>The cloud security market is currently valued at<strong> $7.8B in 2022</strong> and it is expected to grow at a <strong>CAGR of 19.9%  to $19.9B by 2027 </strong>according to a report published by <a href="https://www.marketsandmarkets.com/Market-Reports/cloud-native-application-protection-platform-market-139031032.html?utm_source=PRNewswires&amp;utm_medium=Referral&amp;utm_campaign=PaidPr">marketsandmarkets</a>.<strong> </strong>Doesn&#8217;t seem that large right now but with the pace of innovation, offerings and move to cloud computing, it will definitely outpace that CAGR. <strong>If you zoom out and see how things are aligned, it is very similar to entering an EDR market in early 2012-13</strong>. That makes this entire industry interesting and something to watch out for next couple of years. Here is a small finding from Mckinsey on the total addressable market for the entire cybersecurity suite and how cloud security is still under 5 percent. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ngqg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1d579a2-8b2f-4cbb-9c49-fed1015eb51d_1648x1330.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ngqg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1d579a2-8b2f-4cbb-9c49-fed1015eb51d_1648x1330.png 424w, https://substackcdn.com/image/fetch/$s_!ngqg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1d579a2-8b2f-4cbb-9c49-fed1015eb51d_1648x1330.png 848w, https://substackcdn.com/image/fetch/$s_!ngqg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1d579a2-8b2f-4cbb-9c49-fed1015eb51d_1648x1330.png 1272w, https://substackcdn.com/image/fetch/$s_!ngqg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1d579a2-8b2f-4cbb-9c49-fed1015eb51d_1648x1330.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ngqg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1d579a2-8b2f-4cbb-9c49-fed1015eb51d_1648x1330.png" width="1456" height="1175" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f1d579a2-8b2f-4cbb-9c49-fed1015eb51d_1648x1330.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1175,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:206476,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ngqg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1d579a2-8b2f-4cbb-9c49-fed1015eb51d_1648x1330.png 424w, https://substackcdn.com/image/fetch/$s_!ngqg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1d579a2-8b2f-4cbb-9c49-fed1015eb51d_1648x1330.png 848w, https://substackcdn.com/image/fetch/$s_!ngqg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1d579a2-8b2f-4cbb-9c49-fed1015eb51d_1648x1330.png 1272w, https://substackcdn.com/image/fetch/$s_!ngqg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1d579a2-8b2f-4cbb-9c49-fed1015eb51d_1648x1330.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Source: <a href="https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/cybersecurity/new-survey-reveals-2-trillion-dollar-market-opportunity-for-cybersecurity-technology-and-service-providers">Mckinsey</a> (&#8220;New survey reveal $2T market opportunity for cybersecurity technology and service providers&#8220;)</em></p><h3>What are the key components of CNAPP? </h3><p>Going by the definition, CNAPP provides a more integrated approach that covers the entire app lifecycle from development to runtime protection.  With CNAPP, you can uncover vulnerabilities in open source, find cloud misconfigurations, proactively detect threats, remediate in real-time, and tick your sheet with comprehensive compliance, and reporting. </p><p>Now that we have covered the what, why, and how parts, let&#8217;s talk about a few key components of the CNAPP security suite before we move forward. I wouldn&#8217;t be surprised if we have a new cloud security jargon this year and I would have to update this blog but as of now, these are some of the major components - </p><ol><li><p>CSPM - <strong>Cloud security posture management</strong> identifies and remediates risk by automating visibility, uninterrupted monitoring, threat detection, and remediation workflows to search for misconfigurations across diverse cloud environments/infrastructures. CSPM determines whether all the cloud applications and services are configured and securely correctly.</p><p></p></li><li><p>IaC - <strong>Infrastructure as Code</strong> provides engineering teams with version control and continuous integration/continuous delivery (CI/CD) to the testing and deployment process. In simple terms, it is helping set up cloud infrastructure in a programming language.  Why it&#8217;s important? In the old IT days, you would file a ticket with IT to get a server set up, and then after a few days, it is assigned to you. In this modern age, engineers can spin up their instance in a few seconds and whatever you do inside their space is a black box. IaC is all about the process of moving the <a href="https://www.aquasec.com/cloud-native-academy/devsecops/shift-left-devops/">security to the left</a> i.e. earlier in the application development life cycle. </p><p></p></li><li><p>CWPP - <strong>Cloud Workload Protection Platform </strong>includes a <strong><a href="https://en.wikipedia.org/wiki/Computer_security">cloud-native security strategy</a></strong> that is primarily used to secure workloads. The main use case for CWPP is to <strong>offer high security to workloads</strong>. What are workloads? Cloud-based workloads are applications, services, computing, or capabilities running on cloud resources for example VMs, Containers, Kubernetes, and Serverless. </p><p></p></li><li><p>CIEM - <strong>Cloud Infrastructure Entitlement Management</strong> technologies discover all identities and users, and their entitlements and enforce identity and access governance controls to reduce excessive entitlements and right-size privilege access across the multi-cloud infrastructure. </p><p></p></li><li><p>CDR - <strong>Cloud Detection &amp; Response</strong> is relatively a newer term but does the same <a href="https://en.wikipedia.org/wiki/Endpoint_detection_and_response">EDR</a> job for the cloud. CDR gives an edge to security teams to control the visibility in the cloud and detect threats on the cloud in real time. </p></li></ol><h3><strong>Let&#8217;s look at some big and upcoming players - </strong></h3><p>Let&#8217;s see how these companies are stacked against each other in terms of technology. I don&#8217;t think it&#8217;s fair to compare the features of company A vs B, I strongly believe it&#8217;s more relevant to compare the <strong>outcomes of feature A vs B</strong>. If you want greater visibility and can compromise on efficiency, maybe you do want an agent-based system. If you want to choose the vendor with the latest eBPF technology (Though you can have an API-based eBPF) but you cannot give up on the efficiency of the machine, maybe it&#8217;s not the right approach for the company. In short, not every feature is the end-all-be-all, you need to see how the industry trend is going (as an investor), does it align with your environment (as a buyer), does it provide value for your money, and so and so forth.</p><p>For example, not taking a dig but this <a href="https://resources.fugue.co/hubfs/Resources%20Content/Assets/Comparison2022.pdf">report</a> from one of the vendors cannot be consumed as is. Why? Customer segments are completely different what works for Customer A with a small environment will not be true for Customer B with a large IT presence. When you compare results from MITRE evaluation, it&#8217;s not a good idea to consume them at face value, there are other nuances to think about on how those detections are reported. Shrewd execs and investors take everything into consideration and evaluate all these matrices while investing or buying the product. </p><p>The reasons for choosing some of these companies are as follows - </p><ol><li><p>Pure cloud security player (Mostly private players)</p></li><li><p>Provide all these key components of CNAPP</p></li><li><p>70% or more YoY growth</p><p></p></li></ol><p>There are other notable players who are doing a great job in providing cloud security like <a href="https://www.paloaltonetworks.com/prisma/whyprisma">Palo Alto Networks</a>, <a href="https://www.netskope.com/platform">Netskope</a>, <a href="https://ermetic.com/platform/">Ermetic</a>, <a href="https://www.uptycs.com/">Uptycs</a> (XDR + CNAPP), and Snyk (<a href="https://www.fugue.co/fugue-platform">Fugue Acquisition</a>). <strong>I have kept them outside of the scope for a head-to-head comparison (again, looking for pure cloud players only with the growth condition) but they do offer great products and something definitely to consider.</strong>   </p><ul><li><p><strong>History &amp; Financial</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EWKs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda0c368e-9560-4c67-ae9a-813754fa66b7_3400x1314.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EWKs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda0c368e-9560-4c67-ae9a-813754fa66b7_3400x1314.png 424w, https://substackcdn.com/image/fetch/$s_!EWKs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda0c368e-9560-4c67-ae9a-813754fa66b7_3400x1314.png 848w, https://substackcdn.com/image/fetch/$s_!EWKs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda0c368e-9560-4c67-ae9a-813754fa66b7_3400x1314.png 1272w, https://substackcdn.com/image/fetch/$s_!EWKs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda0c368e-9560-4c67-ae9a-813754fa66b7_3400x1314.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EWKs!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda0c368e-9560-4c67-ae9a-813754fa66b7_3400x1314.png" width="1200" height="464.010989010989" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da0c368e-9560-4c67-ae9a-813754fa66b7_3400x1314.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:563,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:542165,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EWKs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda0c368e-9560-4c67-ae9a-813754fa66b7_3400x1314.png 424w, https://substackcdn.com/image/fetch/$s_!EWKs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda0c368e-9560-4c67-ae9a-813754fa66b7_3400x1314.png 848w, https://substackcdn.com/image/fetch/$s_!EWKs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda0c368e-9560-4c67-ae9a-813754fa66b7_3400x1314.png 1272w, https://substackcdn.com/image/fetch/$s_!EWKs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda0c368e-9560-4c67-ae9a-813754fa66b7_3400x1314.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ul><ul><li><p><strong>Technology Overview</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NemL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdabd953-9382-4908-9980-748596ce52a2_3406x1022.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NemL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdabd953-9382-4908-9980-748596ce52a2_3406x1022.png 424w, https://substackcdn.com/image/fetch/$s_!NemL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdabd953-9382-4908-9980-748596ce52a2_3406x1022.png 848w, https://substackcdn.com/image/fetch/$s_!NemL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdabd953-9382-4908-9980-748596ce52a2_3406x1022.png 1272w, https://substackcdn.com/image/fetch/$s_!NemL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdabd953-9382-4908-9980-748596ce52a2_3406x1022.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NemL!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdabd953-9382-4908-9980-748596ce52a2_3406x1022.png" width="1200" height="360.16483516483515" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cdabd953-9382-4908-9980-748596ce52a2_3406x1022.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:437,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:488181,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NemL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdabd953-9382-4908-9980-748596ce52a2_3406x1022.png 424w, https://substackcdn.com/image/fetch/$s_!NemL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdabd953-9382-4908-9980-748596ce52a2_3406x1022.png 848w, https://substackcdn.com/image/fetch/$s_!NemL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdabd953-9382-4908-9980-748596ce52a2_3406x1022.png 1272w, https://substackcdn.com/image/fetch/$s_!NemL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdabd953-9382-4908-9980-748596ce52a2_3406x1022.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ul><p><em>Source: Data is sourced from <a href="https://www.crunchbase.com/">Crunchbase</a>, <a href="https://pitchbook.com/">Pitchbook</a>, <a href="https://growjo.com/">Growjo</a>, <a href="https://www.gartner.com/en">Gartner</a>, <a href="https://www.wiz.io/">Wiz</a>, <a href="https://orca.security/resources/">Orca</a>, <a href="https://www.aquasec.com/resources/">Aqua</a>, <a href="https://docs.lacework.com/">Lacework</a>, <a href="https://docs.sysdig.com/en/">Sysdig</a></em></p><p>We have seen these numbers pop up for other B2B businesses but for a security company (<a href="https://www.wiz.io/blog/100m-arr-in-18-months-wiz-becomes-the-fastest-growing-software-company-ever">Wiz</a>) to achieve astronomical growth (100M ARR in 18 months) is a little odd. <strong>What did Wiz do differently?</strong></p><p>In my opinion, there are a couple of reasons for their growth, they already had a strong team and had sold their first company to <a href="https://techcrunch.com/2015/09/08/microsoft-confirms-purchase-of-cloud-security-firm-adallom/">Microsoft</a> for a reported $250M. The same team built the Microsoft Azure cloud security group to $<a href="https://www.forbes.com/sites/petercohan/2021/10/30/outpacing-palo-alto-networks-wizs-valuation-soars-11000-in-10-months/?sh=16ed55fd63d2">1.5B</a> revenue machine. Of course, a strong team doesn&#8217;t always guarantee success but what made them different was great technology. They are agentless, which makes it easier for companies to migrate and in their own terms <em>&#8220;Wiz can be rolled out in minutes via an agentless, API-centered approach to seamlessly scan workloads and give organizations full visibility of their cloud environment.&#8220;  </em>Wiz analyses the entire security environment via a graph database and it surfaces prioritized risks for development teams to fix. This gives an edge in faster processing as there are no complex joins to find the relationship between different entities. In simple terms, it is easier &amp; faster to analyze  the relationship between your container A and user A. Graphdb is useful in analyzing and setting the relationship between nodes &amp; edges with anomalous behavior being all about <a href="https://tstillz.medium.com/revealing-malware-relationships-with-graphdb-part-1-b1416e751c47">nodes and edges</a>. <a href="https://www.businesswire.com/news/home/20220203005208/en/Aqua-Security-CNAPP-is-First-to-Combine-Frictionless-Cloud-Workload-Visibility-With-Active-Protection-Across-the-Application-Lifecycle">Aqua</a>, <a href="https://cybertheory.io/cloud-security-with-challenges-comes-solutions/">Orca</a>, <a href="https://docs.lacework.com/console/view-the-lacework-polygraph">Lacework</a>, and <a href="https://sysdig.com/careers/job/staff-graph-database-engineer-4803661/">Sysdig</a> have come up with or plan to offer similar graph-based technology, so we will see how they align their offerings for the next few quarters. </p><blockquote><p><strong>Again, this is not an in-depth review for these company&#8217;s technologies and  financials, this is just a brief introduction about them. If you want a detailed review, feel free to reach out separately. </strong></p></blockquote><p></p><h3>How to find the right value? </h3><p>You can go through the above metric and list down some of the key points for these companies and do your own due diligence. In this market, where the buzz is only around FCF, it is definitely not possible for these above-mentioned companies as they are still in the early phase. <strong>One of the key metrics that you can think of for cloud security companies apart from a solid founding team is to look for 2.5-3x YoY ARR growth, 110-130% net dollar retention, healthy gross margin (50-70%), and a good NPS score. </strong></p><p><strong>Again, please do your due diligence and look for other factors too. </strong></p><h4></h4><h3><strong><a href="https://www.youtube.com/watch?v=siwpn14IE7E">Good Danger Zone</a></strong><a href="https://www.youtube.com/watch?v=siwpn14IE7E">? </a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eSpM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf19f87d-1413-45f5-a15b-59eac08b12ce_688x688.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eSpM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf19f87d-1413-45f5-a15b-59eac08b12ce_688x688.png 424w, https://substackcdn.com/image/fetch/$s_!eSpM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf19f87d-1413-45f5-a15b-59eac08b12ce_688x688.png 848w, https://substackcdn.com/image/fetch/$s_!eSpM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf19f87d-1413-45f5-a15b-59eac08b12ce_688x688.png 1272w, https://substackcdn.com/image/fetch/$s_!eSpM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf19f87d-1413-45f5-a15b-59eac08b12ce_688x688.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eSpM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf19f87d-1413-45f5-a15b-59eac08b12ce_688x688.png" width="460" height="460" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/df19f87d-1413-45f5-a15b-59eac08b12ce_688x688.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:688,&quot;width&quot;:688,&quot;resizeWidth&quot;:460,&quot;bytes&quot;:469289,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eSpM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf19f87d-1413-45f5-a15b-59eac08b12ce_688x688.png 424w, https://substackcdn.com/image/fetch/$s_!eSpM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf19f87d-1413-45f5-a15b-59eac08b12ce_688x688.png 848w, https://substackcdn.com/image/fetch/$s_!eSpM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf19f87d-1413-45f5-a15b-59eac08b12ce_688x688.png 1272w, https://substackcdn.com/image/fetch/$s_!eSpM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf19f87d-1413-45f5-a15b-59eac08b12ce_688x688.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Cloud is a beast when it comes to the attack surface, it's difficult to monitor with the amount of noise and hard to write behavior-based detections.  However, cloud is one part of the entire attack chain, it could be a misconfigured container but it wouldn't be difficult for an attack to not move to endpoints to get more data from an executive's laptop and acquire more surface-level data. These vendors are solid in terms of cloud coverage and provide immediate ROI but the key for any security vendor is to cover all the bases. It&#8217;s difficult to predict anything but if history is any indication, if you only operate in your niche market and reduce your pace of innovation, there will be a new player to replace/fight you in the next 24-48 months. <strong>In contrast, look at how <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$PANW&quot;}" data-component-name="CashtagToDOM"></span> aged really well and started with a firewall as their core offering. In the last 5 years, while they were crushing the competitors ( <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$FTNT&quot;}" data-component-name="CashtagToDOM"></span> &amp; <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$CHKP&quot;}" data-component-name="CashtagToDOM"></span>), they saw a plateau of growth and ventured into other security areas, acquired companies and became leaders in a few, and ate a decent market share in all the core security businesses (Firewall/ZTNA, SASE, XDR, SOAR, CNAPP). </strong></p><p><strong>Vendors like <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;CRWD&quot;}" data-component-name="CashtagToDOM"></span> , <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;S&quot;}" data-component-name="CashtagToDOM"></span>, <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$PANW&quot;}" data-component-name="CashtagToDOM"></span>  have already made a move to observability space with their offering of <a href="https://www.crowdstrike.com/products/observability/">Logscale</a>, <a href="https://www.sentinelone.com/press/sentinelone-acquires-scalyr-to-revolutionize-xdr-and-security-analytics/">Scalyr</a> (acquisition), and <a href="https://www.paloaltonetworks.com/cortex/cortex-data-lake">Cortex Data Lake</a>. </strong></p><h3><strong>Under pressure to innovate quickly! </strong>Who will be the winner? </h3><p>In my opinion, all cloud security vendors operate in their own niche and can definitely thrive for a few more years. In order to fight in this market, Wiz/Orca/Aqua/Lacework/Sysdig need to produce cloud security innovations at an incredible pace or they will be consumed by a more unified vendor. The user persona for these products is simple and we should also think about making these platforms easy to use. If you have built the next-generation AI engine but an analyst cannot use it, it is probably of no use. It&#8217;s a tough market to survive and with <em>security unification</em>, it would be important to show the value and stack the offerings against bigger players ( <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$CRWD&quot;}" data-component-name="CashtagToDOM"></span>  , <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$S&quot;}" data-component-name="CashtagToDOM"></span> , <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$DDOG&quot;}" data-component-name="CashtagToDOM"></span> &amp; <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$PANW&quot;}" data-component-name="CashtagToDOM"></span> ) to produce a good fight or being acquired by the "bravo's" of the world. </p><p><em>Security Unification</em> - method to integrate multiple security technologies into a single framework. There is definitely a tradeoff when it comes to unification, either you lose on the quality or you lose on time navigating between different vendors. Any company that can bridge the gap (tough to offer everything out there), will get a <strong>bigger piece of the pie </strong>for the next few years. </p><h3>Hot Take!!</h3><p>There could be an opportunity for companies like Tines, Swimlane, or a new vendor to make security software more relevant. If they make the right pitch and put more emphasis on how specialized software (PANW for firewall, CRWD for XDR, Wiz for Cloud, Symantec for DLP) is the only way to go, they can definitely squeeze in there and eat some market (TAM is small but it is meaningful). Their job would be to consolidate alerts, make sense of them, perform supervised and unsupervised learning, do additional filtering, and provide a prioritized list to the analysts. </p><p></p><p>I have tried to keep the blog as simple as it can get so that when you give your next CNBC interview or talk to your friends about security, you don&#8217;t react like <a href="https://www.youtube.com/watch?v=E_YIZyVzymA">Mark Minervini</a>.</p><p><em><strong>Disclaimer:</strong> I am not a financial adviser and neither this article should drift your choice to invest in one company over the other. Details listed on the blog are just for <strong>informational purposes</strong>, and <strong>shouldn&#8217;t be taken as investment advice</strong> and I do have investments in some of the companies mentioned here.  </em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.securityandmarkets.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">If you want to learn with me and help the security industry grow, please consider subscribing to make better investing decisions. Feel free to reach out to <strong>Shubham_goel@live.com</strong> if you need an in-depth analysis or advice.  </p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.securityandmarkets.com/p/making-your-first-cloud-security?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.securityandmarkets.com/p/making-your-first-cloud-security?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item></channel></rss>