cyberscope - 2015 market review

14
2015 STRICTLY PRIVATE AND CONFIDENTIAL CyberScope 2015 Market Review

Upload: resultsig

Post on 11-Apr-2017

280 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: CyberScope - 2015 Market Review

2015 STRICTLY PRIVATE AND CONFIDENTIAL

CyberScope2015 Market Review

Page 2: CyberScope - 2015 Market Review

2

About Results International

DEEP DOMAIN EXPERTISE IN THREE INTER-RELATED SECTORS… …AND BROAD INDUSTRY NETWORKS

A MARKET-LEADING CORPORATE FINANCE ADVISORY FIRM… …WITH GLOBAL REACH

• 40 person team; 250+ completed transactions

• Broad global network

• Creative solutions

• Senior level focus on every transaction

• Founded in 1991

• Entrepreneurial and owner-managed

Marketing

HealthcareTechnology

QUARTERLY TECH REPORT – 2015 ANNUAL REVIEW: CYBERSECURITY

Page 3: CyberScope - 2015 Market Review

3

Avecto has received a $49m growth equity investment from JMI Equity

OPPORTUNITYResults International was appointed to support the company in evaluating its investment options, preparing for a highly competitive process, seeking out the most appropriate partners on a global basis and executing a transaction.

OUTCOMEResults leveraged its relationships with top tier global growth equity investors to identify a number of the best strategic partners for Avecto. These firms had exemplary track records backing high growth technology companies and shared the shareholders’ excitement about Avecto’s positioning in the fast-growth cyber security market.

PAUL KENYON & MARK AUSTIN, FOUNDERS & CO-CEOS, AVECTO, COMMENT:“From start to finish the Results team were fantastic. They drove the process forwards relentlessly, were always on top of the detail but never lost sight of the big picture. We would recommend them to anyone.”

Results International is delighted to have advised Avecto, the leading endpoint security software firm, on its $49m (£32m) minority investment from JMI Equity, a US-based growth equity investor focused on backing leading software and services companies.

SITUATIONAvecto is a market leader in the large and fast-growing $3 billion endpoint security sector. Headquartered in Manchester, UK, with offices in Boston, USA, Melbourne, Australia and Frankfurt, Germany, Avecto was founded by entrepreneurs Mark Austin and Paul Kenyon in 2008. Since that time, the company has demonstrated significant growth, serving a roster of over 600 enterprise clients and adding over 100 new customers per year for the past five years.

QUARTERLY TECH REPORT – 2015 ANNUAL REVIEW: CYBERSECURITY

Page 4: CyberScope - 2015 Market Review

4

70

80

90

100

110

120

130

140

150

160

Broadline Endpoint Network DataMonitoring & Analysis Global Security NASDAQ Comp

Results International Global Cybersecurity Indices

Notes: Based on share prices as at 31st December 2015; indices weighted by market capitalisationSources: Capital IQ and Results analysis

Sep-15 Oct-15 Nov-15Jan-15 Feb-15 Mar-15 Apr-15 May-15 Jun-15 Jul-15 Aug-15

3.0%

(1.6%)

5.7%

(22.6%)

(6.7%)

4.1%

(7.5%)

Q4 2015 PERFORMANCEBroadline 11.1%Endpoint (1.8%)Network (5.8%)Data

(18.5%)Monitoring & Analysis (7.4%)Global Security (3.3%)

LAST

12

MON

TH S

HARE

PRI

CE P

ERFO

RMAN

CEQUARTERLY TECH REPORT – 2015 ANNUAL REVIEW: CYBERSECURITY

Dec-15

Page 5: CyberScope - 2015 Market Review

5

(40.0%)

(30.0%)

(20.0%)

(10.0%)

0.0%

10.0%

20.0%

30.0%

7.9%

17.0%

(7.8%) (10.0%)

4.5%

16.5%12.2%

19.9%

2.6%

(26.6%)

(16.3%)

2.4%

(5.7%)

16.0%

(34.8%)

(3.3%) (4.0%)

7.8%

0.0%

16.3%

(33.5%)

(80.0%)

(60.0%)

(40.0%)

(20.0%)

0.0%

20.0%

40.0%

60.0%

(18.1%)

47.6%

1.6%13.8% 14.7%

(63.8%)

9.3%

(47.9%)

3.6% 1.7%

(25.7%)

43.7%

(30.3%)

15.4%

(34.3%)

28.1%

(4.0%)

34.8%

(17.0%)(12.3%)(5.4%)

Cybersecurity: Share Price Performance

(1) These companies have IPO’d within the last 12 months, the share price movement represents the change between each stock’s respective IPO date (see slide 5) and 31 st December 2015Note: Based on share prices as at 31st December 2015Sources: Capital IQ and Results analysis

LAST

12

MON

THS

Q4 2

015

BROADLINE ENDPOINT NETWORK DATAMONITORING & ANALYSIS

(1)

(1)

QUARTERLY TECH REPORT – 2015 ANNUAL REVIEW: CYBERSECURITY

(1)

(1)

Page 6: CyberScope - 2015 Market Review

6

Cybersecurity: Selected Stocks – Performance Since IPO

COMPANY IPO DATE DESCRIPTION RAISED

($M)INDICATIVE PRICE

RANGE ($)IPO LISTING

PRICE ($)INCREASE VS.

RANGEDAY 1

INCREASECURRENT

INCREASE(1)CURRENT EV ($M)

EV / REVENUE

2015EEV / EBITDA

2015E

Nov-15Email security, continuity and archiving

78 10.00-12.00 10.00 (9.1%) 1.0% (4.0%) 608 4.6 x n.m.

Jul-15Detection, analytics and penetration testing

103 13.00-15.00 16.00 14.3% 58.0% (5.4%) 440 4.1 x n.m.

Jun-15 Antivirus and network security 552 n.a. 3.54 n.a. 7.4% 9.3% 2,164 4.5 x 30.1 x

Sep-14 Privileged account security 86 13.00-15.00 16.00 14.3% 87.1% 182.1% 1,374 9.0 x 35.4 x

Jun-14 Mobile security and management 100 8.00-10.00 9.00 0.0% 22.4% (59.9%) 192 1.3 x n.m.

Nov-13 Network security and data storage 64 18.00-21.00 18.00 (7.7%) 19.7% 3.8% 845 2.7 x 17.7 x

Sep-13 Forensics and malware protection 304 12.00-14.00 20.00 53.8% 80.0% 3.7% 3,073 4.9 x n.m.

Sep-12 Cloud security and compliance 91 11.00-13.00 12.00 0.0% 18.0% 175.8% 1,111 6.8 x 20.5 x

Jul-12 Firewalls and network security 260 34.00-37.00 42.00 18.3% 26.5% 319.4% 15,394 14.0 x n.m.

Apr-12 Communication security 82 10.00-12.00 13.00 18.2% 8.3% 400.1% 2,835 10.7 x n.m.

(1) Current increase from IPO price; market data as of 31st December 2015Note: Calendarised to December year end; $ millions, except share price data; multiples capped at 20x EV / Revenue and 50x EV / EBITDASources: Capital IQ and Results analysis

Nasdaq

Nasdaq

Nasdaq

Nasdaq

NYSE

NYSE

Nasdaq

LSE

Nasdaq

QUARTERLY TECH REPORT – 2015 ANNUAL REVIEW: CYBERSECURITY

Nasdaq

Page 7: CyberScope - 2015 Market Review

7

Cybersecurity: Valuation Benchmarks

Note: Symantec’s (Broadline) 2016 forecast revenue excludes the Veritas business unit (in active sale discussions with Carlyle)Note: Global Security represents the median of all stocks in Broadline, Endpoint, Network, Data and Monitoring & Analysis, with no weighting appliedNote: EV = Enterprise Value; financials calendarised to December year end; median values reportedSee Selected Publicly Traded Companies (slide 12) for details of companies included in each categorySources: Capital IQ and analyst reports

REVENUE GROWTH (2015-16E) EV / REVENUE 2015E

EBITDA MARGIN 2015E EV / EBITDA 2015E

Broadline Endpoint Network Data Monitoring & Analysis

Global Security

(10.0%)

(5.0%)

0.0%

5.0%

10.0%

15.0%

20.0%

25.0%

30.0%

(4.2%)

11.1%8.0%

28.1%

22.8%

16.6%

Broadline Endpoint Network Data Monitoring & Analysis

Global Security(5.0%)

0.0%

5.0%

10.0%

15.0%

20.0%

25.0%

30.0%

35.0% 32.2%

19.4%16.4%

2.4%

(1.4%)

15.4%

Broadline Endpoint Network Data Monitoring & Analysis

Global Security

0.0 x

1.0 x

2.0 x

3.0 x

4.0 x

5.0 x

6.0 x

7.0 x

3.4 x2.8 x

3.1 x

6.4 x

4.1 x4.4 x

Broadline Endpoint Network Data Monitoring & Analysis

Global Security

0.0 x

5.0 x

10.0 x

15.0 x

20.0 x

25.0 x

10.4 x

20.8 x

14.4 x

n.m.

20.5 x

14.1 x

QUARTERLY TECH REPORT – 2015 ANNUAL REVIEW: CYBERSECURITY

Page 8: CyberScope - 2015 Market Review

8

Cybersecurity: Global M&A Activity Q1 2011 – Q4 2015

Sources: Press Releases, Capital IQ, Mergermarket, 451 Research and Results analysis

QUARTERLY TECH REPORT – 2015 ANNUAL REVIEW: CYBERSECURITY

Q1 2011

Q2 2011

Q3 2011

Q4 2011

Q1 2012

Q2 2012

Q3 2012

Q4 2012

Q1 2013

Q2 2013

Q3 2013

Q4 2013

Q1 2014

Q2 2014

Q3 2014

Q4 2014

Q1 2015

Q2 2015

Q3 2015

Q4 2015

0

5

10

15

20

25

30

35

40

0

2,000

4,000

6,000

8,000

10,000

12,000

26 26 26 27

23 23

32

24

15

31

2522

32

28 27

22

34 33

22

35

No. of Deals Total Disclosed Deal Value

NUM

BER

OF

DEAL

S

TOTA

L DI

SCLO

SED

DEAL

VAL

UE ($

M)

Page 9: CyberScope - 2015 Market Review

9

Cybersecurity: Selected Deals in 2015

DATE BUYER TARGET EV ($M) EV / REVENUE

EV / EBITDA COMPANY DESCRIPTION TARGET

LOCATION

Dec-15 PE Consortium 9,671.4 7.0x 28.3x Desktop and mobile anti-virus and web browser protection

Dec-15 31.8 - - Anti-virus and anti-spam endpoint security and encryption

Dec-15 35.0 - - Web-based and on-premises network security threat analysis and management

Nov-15 85.0 - - Data encryption, information protection and control

Nov-15 18.7 - - Secure web gateway, web and email filtering

Oct-15Firewall business

- - - McAfee next generation firewall and enterprise firewall business

Oct-15 452.5 6.0x - Network visibility and behaviour anomaly detection

Oct-15 300.0 1.8x 6.7x(1) HP’s next generation network intrusion prevention and response business

Oct-15 400.0 8.0x - Encryption and key management vendor

Oct-15 30.5 3.8x(2) - Privilege & administrative rights management and application control

Sep-15 425.0 2.0x - Secure enterprise mobility solutions

Aug-15 - - - Range of security software from antivirus to firewall and mobile security

Aug-15 - - - Online cybersecurity analytics and big data platform

Aug-15 - - - Endpoint security integrity and threat detection

Aug-15 8.5 - - Mobile app threat identification and prevention

Aug-15 - - - Privileged user access, password management and network authentication

Jul-15 - - - Data encryption and tokenisation of personally identifiable information

Jul-15 190.0 - - Real-time behavioural analytics and breach detection software

Note: In certain cases EV/Revenue are publicly reported estimates; TTM financials have been used where possible; EV = transaction value scaled to 100% shareholding plus net debt (incl. minority interest)(1) Multiple based on EBIT (2) Multiple based on FY16 projected revenueSources: Press Releases, Capital IQ, Mergermarket, 451 Research and Results analysis

QUARTERLY TECH REPORT – 2015 ANNUAL REVIEW: CYBERSECURITY

(tech assets)

(China)

Page 10: CyberScope - 2015 Market Review

10

Cybersecurity: Selected Deals in 2015

DATE BUYER TARGET EV ($M) EV / REVENUE

EV / EBITDA COMPANY DESCRIPTION TARGET

LOCATION

Jun-15 635.0 - - Cloud-delivered network security and intelligence

Jun-15 - - - Cybersecurity anomaly detection and predictive analytics

Jun-15 - - - Cloud-based email security for managed service providers

Jun-15 19.8 5.0x - Intelligent identity management application developer

Jun-15 16.5 1.9x - Vulnerability assessment and penetration testing

May-15 40.0 2.0x - Mobile virtual private network provider (VPN)

Apr-15 150.0 5.0x - Enterprise identity and access management

Apr-15 1,300.0 3.5x(1) - Web filtering and data theft prevention

Apr-15 850.0 3.9x 65.6x Data security and compliance management solutions

Apr-15 80.0 - - Mobile threat management platform

Mar-15 - - - Mobile VPN service for secure browsing

Mar-15 2,400.1 - - Enterprise security solutions against advanced threats

Mar-15 59.8 - - Predictive cyberthreat detection and prevention

Mar-15 40.1 - - Firewall and intrusion detection software

Feb-15 - - - Online two-factor authentication software

Feb-15 79.8 - - CPU level threat prevention engine

Feb-15 - - - Data-centric security software

Jan-15 - - - Mobile security and risk analytics

Note: In certain cases EV/Revenue are publicly reported estimates; TTM financials have been used where possible; EV = transaction value scaled to 100% shareholding plus net debt (incl. minority interest)(1) Multiple of CY2015 projected revenues, as per Raytheon conference call on 20/04/15Sources: Press Releases, Capital IQ, Mergermarket, 451 Research and Results analysis

QUARTERLY TECH REPORT – 2015 ANNUAL REVIEW: CYBERSECURITY

Page 11: CyberScope - 2015 Market Review

11

Cybersecurity: Selected Fundraisings in 2015

DATE COMPANY TYPE OF ROUND

FUNDS RAISED

($M)INVESTOR PARTICIPATION COMPANY DESCRIPTION COMPANY

LOCATION

Dec-15 Venture 66.0 GE Asset Management, Fairhaven Capital Partners, Brookline Venture Partners, LLR Partners, Mass Mutual Ventures Advanced data loss prevention platform

Dec-15 Series C 50.0 NewSpring Capital Cyberthreat intelligence monitoring and management

Dec-15 Series A 49.0 JMI Equity Proactive endpoint protection software

Nov-15 Seed 2.3 Albion Ventures, Notion Capital, Winton Technology Ventures, C5 Holdings Enterprise security intelligence

Nov-15 Series B 250.0 Accel Partners, Insight Venture Partners Network vulnerability detection systems

Oct-15 Series B 22.0 New Enterprise Associates, Bessemer Venture Partners, Marker, Citi Ventures, Innovation Endeavors

Deception-based advanced threat protection

Oct-15 Venture 54.5 .406 Ventures, Accomplice, Highland Capital, KPCB, Sequoia Capital Endpoint and server security

Oct-15 Series C 59.0 SoftBank, CRV, Spark Capital Real-time endpoint threat detection and response

Oct-15 Series B 25.0 Third Point Ventures, Tiger Global Management, Data Collective, Granite Hill Capital, Westly Group, SineWave Ventures

Endpoint threat detection and protection

Oct-15 Series B 85.0 JMI Equity, New Enterprise Associates, Accel Partners, Split Rock Partners Endpoint data protection and security

Sep-15 Series G 150.0 TPG, Institutional Venture Partners, T. Row Price Associates, Andreessen Horowitz, Franklin Templeton, Geodesic Partners

Enterprise security and systems management

Sep-15 Series B 110.0 TPG Growth, EMC, Lightspeed Ventures, Google Capital Security-as-a-Service platform

Sep-15 Series D 110.0 FMR, Google Capital, Microsoft Ventures, Baidu, Qualcomm Ventures, New Enterprise Associates, Union Square Ventures Internet security protection

Sep-15 Series D 75.0 Iconiq Capital, Accel Partners, Lightspeed Venture Partners, Social+Capital Cloud access security broker

Aug-15 Series E 52.0 Institutional Venture Partners, Trident Capital, KPCB, GGV Capital Security management and threat intelligence

Jul-15 Series C 42.0 DFJ Growth, KKR, Dell Ventures, CapitalOne Ventures, TenEleven Ventures Website performance and security

Jul-15 Series C 100.0 Google Capital, Rackspace, Accel Partners, Warburg Pincus Endpoint protection and threat intelligence

Jul-15 Series D 30.0 Pinnacle Ventures, Qihoo 360 Technology, Redpoint Ventures Secure cloud protection for Windows and Android

Sources: Press Releases, Capital IQ, Mergermarket and Results analysis

QUARTERLY TECH REPORT – 2015 ANNUAL REVIEW: CYBERSECURITY

Page 12: CyberScope - 2015 Market Review

12

Cybersecurity: Selected Fundraisings in 2015

DATE COMPANY TYPE OF ROUND

FUNDS RAISED

($M)INVESTOR PARTICIPATION COMPANY DESCRIPTION COMPANY

LOCATION

Jun-15 Series B 21.0 Bessemer Venture Partners, Foundry Group, TechStars, ff Venture Capital, Idea Fund, Correlation Ventures Bot detection and mitigation platform

Jun-15 Venture 84.0 Insight Venture Partners Application security testing and attack prevention

Jun-15 Series B 23.0 Comcast Ventures, Menlo Ventures, Globespan Capital Partners, Commonwealth Capital Partners, Flybridge Capital Partners Data security analytics

May-15 Venture 14.9 Goldman Sachs, EDB Investments, Siemens Venture Capital, Alcatel-Lucent, Mitsui, Fairhaven Capital, Arsenal Venture Partners Real-time endpoint threat detection

May-15 Series C 35.0Cisco, Glynn Capital, Evolution Equity, Lumia Capital, Mohr Davidow Ventures, Northgate, Greylock , Sequoia Capital, Sutter Hill Ventures

Cloud-delivered network security and intelligence

May-15 Series B 25.0 Spark Capital, Lockheed Martin, CRV Real-time cyberattack detection and response

Apr-15 Series C 30.0 BDS Ventures, Hewlett Packard Ventures, Index Ventures, Rembrandt Venture Partners, Sequoia Capital Cloud access security

Apr-15 Series C 30.0 Redpoint Ventures, Benchmark Capital, Google Ventures, Radar Partners, True Ventures

Two-factor authentication network security

Apr-15 Series C 100.0 Accel Partners, BlackRock, Andreessen Horowitz, Data Collective, Formation 8, General Catalyst Partners, Valor Capital Group

Enterprise data centre and cloud computing security

Apr-15 Series D 25.0 AITV, Cisco Ventures, EPIC Ventures, Fortinet, Granite Ventures, Intel, Trident Capital, Vanedge Capital, VMware Virtualised infrastructure security

Mar-15 Venture 52.0 Andreessen Horowitz Enterprise security and systems management

Mar-15 Series A 18.0 Hoxton Ventures, Talis Capital, Invoke Capital Partners Behavioural cyber defence technology

Mar-15 Series B 30.0 Third Point Ventures, Mayfield Fund, Telstra, Pelion Ventures Cloud application security services

Feb-15 Series B 25.0 GGV Capital, Icon Ventures, Kleiner Perkins Caulfield & Byers, Google Ventures, Greylock Partners, Allegis Capital Crowd security intelligence platform

Feb-15 Venture 15.0 83North Venture Capital, Bessemer Venture Partners Secure mobile gateway and threat prevention

Jan-15 Series B 15.0 Sequoia Capital, Index Ventures, EMC, Zohar Zisapel User activity auditing and threat protection

Jan-15 Series B 8.0 Harmony Partners, New Science Ventures, .406 Ventures Cloud data encryption platform

Jan-15 Series C 40.1 Jafco Ventures, TechOperators, Google Ventures, Meritech Capital, KPCB Data security platform

Sources: Press Releases, Capital IQ, Mergermarket and Results analysis

QUARTERLY TECH REPORT – 2015 ANNUAL REVIEW: CYBERSECURITY

Page 13: CyberScope - 2015 Market Review

13

Cybersecurity: Selected Publicly Traded Companies

Note: Symantec’s 2016 forecast revenue excludes the Veritas business unit (in active sale discussions with Carlyle)Note: Calendarised to December year end; $ millions, except share price data; multiples capped at 20x EV / Revenue and 50x EV / EBITDA; net debt includes minority interestSource: Capital IQ

QUARTERLY TECH REPORT – 2015 ANNUAL REVIEW: CYBERSECURITY

PRICE % OF 52 MARKET TOTAL NET ENTERPRISE REVENUE REV. GROWTH GROSS MARGIN EBITDA MARGINCOMPANY (31-DEC-15) WEEK HIGH CAP CASH DEBT VALUE CY2015 CY15-16 HISTORICAL CY2015 CY2016 CY2015 CY2016 CY2015 CY2016BROADLINESymantec 21.00 76.9% 14,186 3,357 (1,617) 12,569 5,372 (25.0%) 82.3% 31.1% 35.1% 2.3 x 3.1 x 7.5 x 8.9 xTrend Micro 41.02 90.5% 5,599 1,038 (1,037) 4,561 1,029 16.6% 82.3% 33.3% 32.5% 4.4 x 3.8 x 13.3 x 11.7 x

ENDPOINTAVG Technologies 20.05 68.8% 1,054 145 121 1,175 427 4.4% 86.1% 36.0% 35.6% 2.8 x 2.6 x 7.6 x 7.4 xCyberArk 45.14 59.1% 1,623 250 (250) 1,374 153 32.2% 85.7% 25.3% 22.6% 9.0 x 6.8 x 35.4 x 30.0 xF-Secure 2.80 67.2% 441 88 (88) 354 159 5.8% 94.9% 19.4% 19.0% 2.2 x 2.1 x 11.4 x 11.0 xMobileIron 3.61 27.9% 290 98 (98) 192 147 16.8% 81.8% (38.3%) (19.1%) 1.3 x 1.1 x n.m. n.m.Sophos 3.86 89.5% 1,934 68 230 2,164 477 11.1% 80.0% 15.1% 14.7% 4.5 x 4.1 x 30.1 x 27.8 x

NETWORKBarracuda Networks 18.68 39.9% 995 154 (149) 845 311 10.1% 78.9% 15.4% 16.6% 2.7 x 2.5 x 17.7 x 14.9 xCheck Point Software 81.38 92.0% 15,153 1,299 (1,299) 13,854 1,629 8.0% 88.2% 57.6% 57.0% 8.5 x 7.9 x 14.8 x 13.8 xFortinet 31.17 62.0% 5,543 908 (908) 4,635 1,009 23.6% 70.0% 16.4% 17.0% 4.6 x 3.7 x 28.1 x 21.9 xF5 Networks 96.96 71.7% 6,827 774 (774) 6,052 1,952 7.1% 82.7% 33.3% 40.1% 3.1 x 2.9 x 9.3 x 7.2 xPalo Alto Networks 176.14 87.8% 15,663 761 (269) 15,394 1,097 38.4% 72.9% 5.7% 24.2% 14.0 x 10.1 x n.m. 41.9 xRadware 15.34 61.6% 695 92 (92) 603 216 5.0% 82.1% 19.8% 18.1% 2.8 x 2.7 x 14.1 x 14.6 xSecunet 24.07 99.4% 156 26 (26) 130 98 5.1% 59.7% 9.8% 9.9% 1.3 x 1.3 x 13.4 x 12.7 x

DATAFireEye 20.74 37.5% 3,546 1,170 (472) 3,073 625 31.1% 58.9% (32.0%) (18.1%) 4.9 x 3.7 x n.m. n.m.Imperva 63.31 81.2% 2,056 254 (254) 1,802 230 26.3% 77.7% 3.3% 6.2% 7.8 x 6.2 x n.m. n.m.Mimecast 9.60 89.1% 573 34 35 608 134 19.5% 68.3% 8.2% 7.0% 4.6 x 3.8 x n.m. n.m.Proofpoint 65.01 86.2% 2,911 416 (76) 2,835 264 29.9% 66.4% 1.5% 3.2% 10.7 x 8.3 x n.m. n.m.

MONITORING & ANALYSISGuidance Software 6.02 58.9% 184 18 (18) 166 105 5.3% 66.9% (1.4%) 1.4% 1.6 x 1.5 x n.m. n.m.Qualys 33.09 59.7% 1,285 174 (174) 1,111 164 22.8% 78.3% 33.0% 32.7% 6.8 x 5.5 x 20.5 x 16.8 xRapid7 15.13 57.8% 667 227 (227) 440 108 28.5% 76.0% (28.6%) (26.2%) 4.1 x 3.2 x n.m. n.m.

25th percentile 59.1% 153 5.8% 70.0% 3.3% 6.2% 2.7 x 2.6 x 11.4 x 11.2 xMedian 68.8% 264 16.6% 78.9% 15.4% 17.0% 4.4 x 3.7 x 14.1 x 14.2 x75th percentile 87.8% 1,009 26.3% 82.3% 31.1% 32.5% 6.8 x 5.5 x 20.5 x 20.6 x

OPERATING METRICS VALUATION METRICSREVENUE EBITDA

Page 14: CyberScope - 2015 Market Review

14

Contact Us

Disclaimer: This document has been produced by Results International Group LLP (“Results”) and is furnished to you solely for your information and may not be reproduced or redistributed, in whole or in part, to any other person. No representation or warranty (expressed or implied) is made as to, and no reliance should be placed on, the fairness, accuracy or completeness of the information contained herein and, accordingly, none of Results’ officers or employees accepts any liability whatsoever arising directly or indirectly from the use of this document.Authorised and regulated by the Financial Conduct Authority.

Mark WilliamsDIRECTOR – LONDON

t +44 (0)20 7514 8242e [email protected]

QUARTERLY TECH REPORT – 2015 ANNUAL REVIEW: CYBERSECURITY

27 Soho Square, London, W1D 3AYt +44 20 7629 7575

588 Broadway, Suite 1010, New York, 10012 | t +1 646 747 6500

3 Pickering Street, Nankin Row #03-03, Singapore, 048660 | t +65 6221 3575

Pierre-Georges RoyPARTNER – NEW YORK

t +1 (0)646 747 6505e [email protected]

Chris LewisPARTNER – LONDON

t +44 (0)20 7514 8236e [email protected]

Maurice WatkinsPARTNER – NEW YORK

t +1 (0)646 747 6500e [email protected]

Andrew KeffordPARTNER – APAC

t +65 (0)6221 3575e [email protected]