No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
Corporate Compliance Insights
Home Risk

Value Versus Valuation

by Feris Rifai
February 26, 2016
in Risk
growing good investments

Venture capital funding from last year surpassed 2014’s total, and in the wake of this continued increase in investment, “unicorns” now abound in VC portfolios—currently clocking in at well over 100. This is also noticed more specifically within the scope of the cybersecurity market. To date, the aggregate value of the top 10 cybersecurity exits is nearly $16 billion, a favorable sign for investors. But the constant streams of breach media coverage and a chance at scoring a “unicorn” are goading investors to bet blindly. Investors are sometimes guided by flashy trends and overlook the true value vendors offer customers. The prospect of high valuations, not actual value, seems to be guiding some investments.

Until recently, the security industry desperately needed disruption to adapt to the rapid adoption of mobile, cloud and the Internet-of-Things. Everyone wanted a piece of the action—and they took it. Now, investors and CISOs alike are left with an assortment of new technology that is part solution, part insurance policy, with no way of knowing its true value. Amid this barrage of new solutions, some VCs have lost sight of what’s worth investing in and CISOs aren’t sure if solutions can actually deliver on their promise. To solve this problem, it’s time to move from valuation to value—from speculation to measurable utility.

The Reality of the Security Market

With new technologies accessing networks at an accelerated pace, the security measures we employed just five years ago are no longer enough to stand on their own. Threats are evolving and changing every day as attackers become more adept at infiltrating these new devices and breaking down our walls. It’s inevitable in the cat-and-mouse game that is security that as employees become even more tied to their connected devices–smartphones, smartwatches, tablets, etc.–CISOs will continue to scramble to understand how to control access to their network and ensure their data is secure. This challenge has left most organizations today with a layered security approach created to address specific risks. However, current security solutions operate in complete isolation and report their findings independently of one another. The result: organizations with disjointed solutions, alert storms and poor security postures, and investments that continue to perpetuate the solutions driving these issues. Attackers are exploiting these weaknesses today.

Investing in Security Today

To circumvent this growing problem, it’s imperative for the next wave of investment in security vendors to take into account the actual value they will deliver to customers. Until now, investment has been a very cut-and-dried approach; the demand for a product equals the reason to invest. But demand is never-ending for security—threat actors continue to launch attacks against private companies, massive enterprises and even the government—requiring VCs to become more nuanced in their approach. The alternative is to continue playing in a ballooning investment market that will lead to VC and client fatigue for security firms.

To identify the right security investments, investors need to fully understand the underlying security problems from the client perspective and evaluate how different solutions map back to and deliver on vendors’ promises. For instance, investors can check in with current customers to assess how they feel about the product. Are they continuing to invest in the solution? Have they done away with other similar products they had previously employed? It’s not about preference, brand or previous wins; it’s about the value vendors actually deliver to their customers and how those customers are responding to it. Additionally, VCs can use this insight to gauge the incremental value that a prospect’s solution adds to other solutions in their portfolio and the general security ecosystem. If the added value is there, it can be a good investment. If it can’t be measured, it should be a red flag.

How Can Vendors Address This Problem?

Despite the fatigue and confusion that comes with investing in security, there are many vendors solving real security problems for their clients, rather than just jumping on the latest trends.

To avoid falling under the “trend” label, security vendors should focus on their strengths—particularly on what they can properly secure. It may not be directly tied to the hottest buzzwords of the moment, but, if thought about in conjunction with the collaborative and holistic experience they can create for customers, it can play to their favor. It’s sometimes best to work with others to solve complex problems, which security undoubtedly has become. Vendors also need to closely collaborate with their clients to create persistent value and become an integrated part of the enterprise ecosystem.

Even though security is an important piece of today’s network infrastructure, it doesn’t mean customers can—or will—continue to absorb solutions that are half-baked or temporary, and they shouldn’t. Yes, purchase decisions are being driven by everyone, including Boards seeking to mitigate security problems and liability. But although demand may seem healthy, investors cannot bet on every new security solution and, as they gain a thorough understanding of security issues plaguing CISOs from the inside out, they simply won’t. Focus on the security vendors that provide the right people with the right information at the right time to assess and mitigate their cyber risk. They will come out on top.

Security is one of the biggest challenges organizations face today. Investors see this and know they can find value in the solutions that solve this problem. But only vendors that deliver will survive the trials of time—and that will have everything to do with the value they offer, the real problems they solve and the business outcomes they provide. In this process, investors need to be more discerning in their investments to ensure the best remain. Otherwise, security will continue to be plagued by too many solutions that offer to solve the latest big problem, only to fail to improve an organization’s overall security posture.


Previous Post

Individual Criminal Prosecutions and Deterrence

Next Post

Data Breach Planning and Preparation

Feris Rifai

Feris Rifai

Feb 26 - Feris Rifai headshotFeris Rifai co-founded Bay Dynamics with Ryan Stolte in 2001 to create a company with a culture of accountability and excellence. Through his effective leadership, Bay Dynamics has become a premier provider of security analytics and information risk intelligence products. Feris and the Bay Dynamics team were able to establish long-term partnerships with key organizations that include Symantec, Microsoft, Dell and others.

Related Posts

supply chain

Only 1 in 4 Manufacturers Have High Confidence in ESG Readiness of Their Supply Chains, Survey Finds

by Staff and Wire Reports
January 27, 2023

Ever-evolving regulatory requirements, consumer demand and investor expectations are all forcing manufacturers to increase the transparency of their supply chain,...

cco pressure

Survey: CCO Pressure High, Resources Low

by Staff and Wire Reports
January 27, 2023

Too few organizations are embracing compliance culture, according to a survey by FTI Consulting and Ethico, which found that while...

growth what next

Growing Pains: Mid-Sized Auditing Firms Are Seeing an Influx of New Clients, But at What Cost?

by Jey Purushotham
January 25, 2023

The era of exponential growth among mid-tier accounting firms is upon us, driven largely by the trend of top-tier firms...

board tech purchase

Directors: Don’t Approve a Tech Purchase Without Asking These Questions

by Jean Hill
January 25, 2023

Board directors don’t need to be able to fix a broken server, but they do need basic technology competence, which...

Next Post
Advance planning is a must for data security

Data Breach Planning and Preparation

Compliance Job Interview Q&A

Jump to a Topic

AML Anti-Bribery Anti-Corruption Artificial Intelligence (AI) Automation Banking Board of Directors Board Risk Oversight Business Continuity Planning California Consumer Privacy Act (CCPA) Code of Conduct Communications Management Corporate Culture COVID-19 Cryptocurrency Culture of Ethics Cybercrime Cyber Risk Data Analytics Data Breach Data Governance DOJ Download Due Diligence Enterprise Risk Management (ERM) ESG FCPA Enforcement Actions Financial Crime Financial Crimes Enforcement Network (FinCEN) GDPR HIPAA Know Your Customer (KYC) Machine Learning Monitoring RegTech Reputation Risk Risk Assessment SEC Social Media Risk Supply Chain Technology Third Party Risk Management Tone at the Top Training Whistleblowing
No Result
View All Result

Privacy Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2022 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe

© 2022 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT