The Cyber 100: Cybersecurity Companies You Should Know

8 min read
The Cyber 100 Companies

Meet Some of the Most Influential Players in This Essential Industry

For a relatively young industry, the cybersecurity business is booming. By one account, the global cybersecurity market grew from $3.5 billion in 2004 to about $138 billion in 2017, and is forecast to hit $232 billion by 2022.

Such projections are obviously an inexact science. Cybersecurity, by its very nature, is a volatile and unpredictable field that experiences its share of market fluctuations and turnover as new players come and go.

However, the idea that there is a cybersecurity industry “bubble” that will one day burst seems almost ludicrous against the backdrop of nonstop cyberattacks impacting governments, nonprofits and companies great and small across all industries.

As one of the nation’s leading cybersecurity educational partners, the University of San Diego is deeply invested in contributing to the thought leadership is this essential and fast-growing field, providing ongoing coverage on our USD Cybersecurity Blog and publishing periodic special reports.

Meet 100 of the most influential players in cybersecurity — an industry that is essential to the global economy and continues to experience lightning-fast growth.

Our Top 10 

Herjavec Group

Information Security Services

Toronto, Canada

Herjavec Group has gained industry notoriety both for its work providing cybersecurity products and services to enterprise organizations and for its high-profile founder and CEO — Robert Herjavec is not only a leading voice within the cybersecurity industry, he is also on the cast of ABC’s “Shark Tank.”

Established in 2003 in Toronto, the company describes itself as “one of the world’s most innovative cybersecurity operations leaders,” specializing in “complex, multi-technology environments.” Herjavec is also passionate about developing the cybersecurity workforce (see video interview with Cybercrime Magazine).


Security Awareness Training

Clearwater, Fla.

KnowBe4’s business model is built on a pretty scary statistic (“Did you know that 91% of successful data breaches started with a spear phishing attack?”), and its mission involves dealing with the cybersecurity elephant in the room: “your weakest link — employees.”

In 2011, founding CEO Stu Sjouwerman hired Kevin Mitnick, a man once known as “The World’s Most Wanted Hacker,” as his Chief Hacking Officer. Together they built industry-leading employee cybersecurity training programs on what the company now calls “the world’s most popular integrated Security Awareness Training and Simulated Phishing platform.”


Enterprise Immune System

Cambridge, England

In the world of cybersecurity, harnessing the power of artificial intelligence to identify and counteract sophisticated cyberattacks with minimal human intervention is a highly complex “no-brainer.” Cambridge, England-based Darktrace is leading the way in this arena, leveraging the extraordinary capabilities of AI and machine learning to develop its so-called Enterprise Immune System. With its ability to detect and pre-empt threats by understanding an organization’s “digital DNA,” Darktrace likens its technology to the human immune system.

According to the company, its self-learning Cyber AI Platform is able to “uncover rare and previously unseen patterns in information, amid the noise of everyday activity across an organization’s digital systems. By detecting subtle deviations from the organization’s ‘pattern of life’, it can distinguish friend from foe – and highlight true cyber-threats or attacks that would otherwise go unnoticed.”


Advanced Threat Protection  

Milpitas, Calif. 

This company touts its frontline human expertise — “industry-recognized threat researchers, malware analysts, intelligence analysts, and investigators [who] live on the front lines of cyber conflict every day” — in making the bold claim that “FireEye knows more about cybersecurity than anyone.”

FireEye has leveraged this expertise to build an award-winning ecosystem of innovative cybersecurity solutions. The company takes a holistic approach to security, combining hardware, software and human consulting services / to provide clients with “a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant consulting.”


Security Data & Analytics Solution

Boston, Mass.

Rapid7 specializes in cybersecurity and data analytics, offering vulnerability management, application security, IT operations, penetration testing, (security information and event management) SIEM, managed services and security advisory services.

The company offers a range of technology and consulting services, including a Rapid7 Insight Cloud model that “collects data from across your environment, making it easy for teams to manage vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate your operations.” Established in 2000, the company now serves some 9,000 customers in 140+ countries.

Check Point Software Technologies

Unified Threat Management 

San Carlos, Calif.

Established in 1993 in Israel and now employing an estimated 5,000 people worldwide, Check Point is a multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, cloud security, mobile security, data security and security management.

Boasting “an industry leading catch rate of malware, ransomware and other targeted attacks,” Check Point describes itself as “the worldwide leader in securing the internet,” with a customer-centric mission focused on “developing new and innovative security solutions that redefine the security landscape.”


Enterprise Security Solutions 

Sunnyvale, Calif.

Ken Xie, Fortinet’s Co-founder, chairman and CEO, has a long, successful track record of entrepreneurship in cyberspace dating back to 1993 when he started a network security company called SIS, designing software firewalls while studying at Stanford. In 1996 he started NetScreen after he realized the performance limitations of software firewalls running on PCs/servers, and ended up selling the firm to Juniper for $4 billion.

Fast-forward to 2000, he and his brother (president and CTO) co-founded Fortinet, now one of the fastest growing network security companies. The two lead a team of respected tech innovators in serving approximately 70 per cent of the Fortune 100 and numerous governments around the world with a broad portfolio of spanning network, infrastructure, edge, cloud and IoT solutions. Fortinet employs more than 6,000 people in 79 countries.

VMware Carbon Black

Endpoint & Server Security Platform

Waltham, MA

VMware Carbon Black’s specialty is endpoint security. After all, “in today’s mobile world, endpoints are the new perimeter — and every endpoint is a possible entry point.” Its VMware Carbon Black Cloud analyzes attackers’ behavior patterns to detect and stop never-seen-before attacks, analyzing more than 500 billion events per day across millions of global endpoints to help clients stay of emerging attacks.

As a leader in endpoint security, it created the application control and endpoint detection and response (EDR) categories, and pioneered next-generation antivirus.

According to the company, its VMware Carbon Black Cloud returns the fewest false positives among next-generation antivirus vendors.


Privileged Access Security

Petach-Tikva, Israel

CyberArk claims to be the only security software company focused on eliminating cyber threats that use insider privileges to attack the enterprise. It aims to prevent hackers from exploiting the expansive “privileged access” credentials of system admins or super-users; because such users’ access gives them the “keys to the kingdom,” using privileged credentials to breach a system can cause catastrophic damage to a business.

These types of attacks can be committed by internal privileged users abusing their level of access or external attackers targeting and stealing privileges from users to operate stealthily as “privileged insiders.” Offering Privileged Access Management (PAM) solutions that it uses to secure, manage and monitor privileged access, CyberArk is among the security companies committed to strengthening “the weakest link” when it comes to cybercrime — humans.


Endpoint Security

Irvine, Calif.

CrowdStrike bills its Falcon Platform as a single, cloud-delivered, artificial intelligence-powered solution that unifies next generation antivirus (NGAV), endpoint detection and response (EDR), device control, managed threat hunting, vulnerability assessment and IT hygiene.

Now one of the industry’s fastest growing companies, CrowdStrike was founded in 2011 by George Kurtz and Dmitri Alperovitch in response to massive cyberattacks affecting nearly all industries caused by malware that went undetected by antivirus software. They built CrowdStrike to offer a new approach that combined the most advanced endpoint protection with expert intelligence to pinpoint the adversaries perpetrating the attacks, not just the malware. CrowdStrike was named Best Security Company for 2020 by SC Magazine.

[RELATED] 10 Reasons to Join a Cyber Security Master’s Degree Program >>

(No. 11–100 — A to Z)

  1. A10 Networks | DDoS Cyber Attack Protection | San Jose, CA
  2. Accenture | Enterprise Security Strategy | New York, NY
  3. Akamai Technologies | Secure Cloud & Mobile Computing | Cambridge MA
  4. AlienVault | Threat Detection & Response | San Mateo, CA
  5. Arctic Wolf | SOC-as-a-Service | Waterloo, Canada
  6. AT&T Network Security | Managed Security & Consulting | Bedminster, NJ
  7. Avast | Cyber Attack Protection | Prague, Czech Republic
  8. BAE Systems | Cybersecurity Risk Management | Surrey, UK
  9. Booz Allen | Cybersecurity Solutions & Services | New York, NY
  10. Bugcrowd | Bug Bounty Platform | San Francisco, CA
  11. Callsign | Data Breach Detection & Prevention | London, UK
  12. Centrify | Unified Identity Management | Santa Clara, CA
  13. Checkmarx | Software Development Security | Tel-Aviv, Israel
  14. Cisco | Threat Protection & Network Security | San Jose, CA
  15. Coalfire | Cyber Risk Management | Louisville, CO
  16. Code Dx | Application Vulnerability Management | Northport, NY
  17. Cofense | Phishing Attack Defense | Leesburg, VA
  18. Cybereason | Endpoint Protection & Hunting Engine | Boston, MA
  19. Deep Instinct | Deep Learning Security | New York, NY
  20. Deloitte | Global Risk Management | New York, NY
  21. DFLabs | Automated Incident & Breach Response | Lombardy, Italy
  22. Digital Defense | Vulnerability Management and Threat Assessment | San Antonio, TX
  23. Duo Security | Cloud Based Two-Factor Authentication | Ann Arbor, MI
  24. eSentire | Threat Detection & Prevention | Cambridge, Canada
  25. F5 | Cloud & Data Center Security | Seattle, WA
  26. Fidelis Cybersecurity | Threat Detection & Response | Bethesda, MD
  27. Forcepoint | Insider, Cloud & Network Security | Austin, TX
  28. Gigamon | Data Center & Cloud Security | Milpitas, CA
  29. Guidance Software | Endpoint Security, Incident Response | Pasadena, CA
  30. HackerOne | Bug Bounty Platform | San Francisco, CA
  31. i-Sprint | Identity & Access Management | Singapore
  32. IBM Security | Enterprise IT Security Solutions | Waltham, MA
  33. Imperva | Data & Applications Security | Redwood Shores, CA
  34. Infoblox | Automated Network Control & Security | Santa Clara, CA
  35. Infosec News | Cybersecurity News | Golf, IL
  36. Intel Security Group | Hardware Enabled Security | Santa Clara, CA
  37. Intruder | Vulnerability Management Scanner | London, UK
  38. Kaspersky Lab | Malware & Anti-Virus Solutions | Moscow, Russia
  39. Kenna Security | Vulnerability Threat Management | Chicago, IL
  40. Kount | Fraud Prevention | Boise, ID
  41. KPMG | Cyber Risk Management | London, UK
  42. Leidos | Cyber Defense Solutions | Reston, VA
  43. Lockheed Martin | Cybersecurity Solutions & Services | Bethesda, MD
  44. LogRhythm | Log Management & Security Analytics | Boulder, CO
  45. Lookout | Mobile Security for Android & iOS Apps | San Francisco, CA
  46. McAfee | Consumer & Enterprise Security | Santa Clara, CA
  47. Microsoft | Home/Business Security Solutions, Redmond WA
  48. Mimecast | Email Security | Lexington, MA
  49. Mitre | Government Security Solutions | McLean, VA
  50. MobileIron | Enterprise Mobility Management | Mountain View, CA
  51. Netscout | Situational Awareness & Incident Response | Westford, MA
  52. Nexusguard | Cloud Enabled DDoS Mitigation | Hong Kong
  53. Northrop Grumman | Cyber & Homeland Security Services | McLean, VA
  54. Palo Alto Networks | Threat Detection & Prevention | Santa Clara, CA
  55. Ping Identity | Identity & Access Management Platform | Denver, CO
  56. Proofpoint | Security-as-a-Service | Sunnyvale, CA
  57. PulseSecure | Enterprise Mobile Security | San Jose, CA
  58. PwC | Cybersecurity Consulting & Advisory | London, UK
  59. One Identity | Identity & Access Management | Aliso Viejo, CA
  60. OneLogin | Enterprise Identity Management | San Francisco, CA
  61. OneSpan | Authentication & Fraud Prevention | Chicago, IL
  62. Optiv | Information Security Services | Denver, CO
  63. Radware | Application Security & Delivery | Tel Aviv, Israel
  64. Raytheon | Cybersecurity Services | Waltham, MA
  65. Resecurity | Endpoint Protection & Risk Management | Los Angeles, CA
  66. RiskIQ | Digital Threat Management | San Francisco, CA
  67. RSA | Intelligence Driven Security | Bedford, MA
  68. Sailpoint | Identity & Access Management | Austin, TX
  69. ScienceSoft | Cybersecurity Software & Services | McKinney, TX
  70. Secude | Global Security Solutions | New York, NY
  71. SecureWorks | Managed Security Services | Atlanta, GA
  72. Sera-Brynn | Cyber Risk Management | Suffolk, VA
  73. Siemplify | Security Orchestration & Incident Response | New York, NY
  74. Sophos | Anti-Virus & Malware Protection | Abingdon, UK
  75. Splunk | Big Data Security | San Francisco, CA
  76. Symantec | Endpoint, Cloud & Mobile Security | Mountain View, CA
  77. Telesign | Mobile Identity Verification | Marina Del Rey, CA
  78. Telos | Risk Management & Compliance | Ashburn VA
  79. Tenable | Vulnerability Scanning | Columbia, MD
  80. ThreatQuotient | Threat Intelligence Platform | Reston, VA
  81. Threat Stack | Cloud Infrastructure Security | Boston, MA
  82. Thycotic | Privileged Account Management | Washington, DC
  83. Transmit Security | Identity & Access Management | Boston, MA
  84. Trend Micro | Server, Cloud & Content Security | Tokyo, Japan
  85. Tripwire | Advanced Cyberthreat Detection | Portland, OR
  86. Trustwave | Managed Security Services | Chicago, IL
  87. Varonis Systems | Data Security & Analytics | New York, NY
  88. Valimail | Automated Email Authentication | San Francisco, CA
  89. Verimatrix | Content Protection & Mobile Application Security | San Diego, CA
  90. Webroot | Security Analysis & Threat Detection | Broomfield, CO
  91. White Ops | Bot Fraud Detection & Prevention | Brooklyn, NY
  92. ZeroFOX | Public Attack Surface Protection | Baltimore, MD
  93. Zimperium | Mobile Threat Defense | San Francisco, CA

8 Top-Paying Cybersecurity Jobs

Get the Free PDF

Download your copy of this blog post for convenient access.