From perimeter to data: The five layers of cyber security
With more and more devices, cars, homes and – not least – production and manufacturing processes being connected to the internet, businesses and individuals are increasingly exposed to cyber-risks and vulnerable to cyber-attacks. This growing need for protection means a requirement for more sophisticated approaches to cyber security – something that is providing attractive opportunities for investors to participate in the growth prospects of companies at the forefront of these developments. Indeed, the layered approach that this article discusses has proven to be the most effective as malefactors only need to be right once, while security professionals – and the organisations they protect – need to be right all the time.
Perimeter security: the first line of defence
The transformation of network security defence
Network security covers both hardware and software technologies, and processes and devices that protect a network and its data from harm. Again, the expansion of the cloud and working from home/anywhere are fundamentally changing the landscape here; networks now also include the path to the cloud and hybrid infrastructures that may consist of on-premises data centres, public/private cloud instances, and SaaS applications.
Perimeter and network security
With an increasing use and a deeper integration of cloud technologies into business processes and with the establishment of flexible work models (on-site, remote and hybrid), many organizations are struggling with more complex network and data vulnerability issues. Innovators in this sector are thus rethinking established security concepts and developing new models. For instance, Zscaler and CrowdStrike have developed a solution based on the idea of “zero trust”, where user identity, device posture (i.e., a device’s security credentials), and access policies are used to grant or withhold access rights. These risk-based conditional access solutions help steering a multitude of individual access requirements from users by detecting in real time possible threats which may arise when identities don’t match with corresponding access rights. This, in turn, protects complex and thus more vulnerable IT environments from breaches.
Endpoint security: where a network’s safety begins
Given the increasing proliferation of devices connected to organization’s networks, the growth of the “internet of things” (IoT), and the unique risks associated with “bring your own device” (BYOD) policies, endpoint security is likely to represents a particularly strong growth area for the foreseeable future. Indeed, some estimates suggest that the endpoint security market will grow at a CAGR of 8.3% by 2028, reaching a value of USD 24.58 bn.1
Endpoint security
Formed in 2011, CrowdStrike has developed a comprehensive endpoint security offering comprising of a range of unified modules to prevent breaches. Their Falcon platform collects cyber security data – processing over 6 trillion events per week2 – and leverages AI to constantly improve its performance ands deliver one of the highest detection and efficacy rates in the industry.
The company’s annual recurring revenue grew by 65% year-on-year to exceed 1.7 billion, as of January 31, 2022.3
Endpoint security market: projected market CAGR of 9.4% by 2026, reaching a value of USD 22 billion4
Application security: defending apps and users
Application security is as multifaceted as applications themselves. It includes not only the procedures used to protect websites and apps while in use, but also those used during their development and design.
Again, the rise of the cloud is changing the game here. With more and more organizations hosting resources in this way, application security is becoming ever more complex. Recent research suggests that the global application security market will experience a CAGR of 18.30% by 2028 reaching a value of USD 22.54 bn, up from USD 6.95 USD bn in 2021.5
Application security
One of the leaders in a range of cyber security areas and disciplines, Zscaler’s “Private Access” (ZPA) solution applies the principles of zero trust and segmentation to give users secure and direct connectivity to apps while eliminating unauthorized access via “zero trust network access” (ZTNA). ZPA is currently the world’s most deployed ZTNA platform6 , and this model is expected to become dominant in the coming years – Gartner predicts that, by 2025, over 70% of remote access deployments will use ZTNA7.
Application security – projected market CAGR of over 18% by 2028, reaching a value of USD 22.54 billion8
Data security: the heart of protection
Data security
According to Cowen Research and Boston Consulting Group, the “human element” is responsible for at least three quarters of cyber breaches. Issues here include, for example, users failing to follow security protocols or becoming victim to deceptive communications or other forms of social engineering. For this reason, security awareness training for staff remains key to limiting such breaches. KnowBe4, the world’s largest security awareness training and simulated attack platform9 , offers a range of programmes to help build more resilient and secure organizations. Founded in 2010, the company employs over 47,000 staff and its annual recurring revenue grew by 44% year-on-year in 2021 to reach over USD 285 million. It was also named a “Leader in Security Awareness and Training Solutions” by Forrester Research in Q1 2022.
Allianz Global Investors identifies first movers in cybersecurity
When it comes to cyber security, it is vital for companies to stay a step ahead of malicious actors. Cybercrime is, and will continue to be, a difficult-to-assess risk. Leading companies providing solutions in this area are thus likely to benefit from the growing need for holistic cyber security approaches – a need that will only become more pertinent, and complex to address, in the coming years.
Allianz Global Investors identifies innovators and first movers in cyber security across the full range of cyber security solutions, especially those that provide innovative solutions to protect applications, organizations, and users in complex cloud environments.
1 https://www.globenewswire.com/news-release/2023/01/20/2592453/0/en/endpoint-security-market-size-worth-usd-24-58-billion-by-2028-report-by-fortune-business-insights.html
2 https://www.crowdstrike.com/blog/the-crowdstrike-security-cloud-network-effect/
3 https://strategyofsecurity.com/earnings-crowdstrike-and-sentinelone-2022-annual-earnings-recap
4 https://www.prnewswire.com/news-releases/endpoint-security-global-market-report-2022-sector-to-reach-22-billion-by-2026-at-a-cagr-of-9-4-301712341.html,%20as%20of%20March%202023
5 https://www.vantagemarketresearch.com/industry-report/application-security-market-1406,%20as%20of%20June%202022
6 https://www.zscaler.com/products/zscaler-private-access
7 https://www.datacenterknowledge.com/security/gartner-zero-trust-will-replace-your-vpn-2025, as of October 2022
8 https://www.vantagemarketresearch.com/industry-report/application-security-market-1406, as of June 2022
9 https://www.knowbe4.com/en/products/enterprise-security-awareness-training/
2900311