CyberArk reboots network security

CEO Udi Mokady: Media reports on electronic surveillance make explaining our product unnecessary.

CyberArk, the information security company, recently launched its new logo. The logo does not just represent a cosmetic change for the company, founded in 1999, rather it signals the revolution that is underway in the information security world. CEO Udi Mokady, who founded the company along with Alon Cohen, wasn’t paying attention and was photographed beneath the old logo that is on their office building in Petah Tikva. Afterwards, he asked that the photos be scrapped, indicating that CyberArk is no longer the start-up it was more than a decade ago.

The new logo joins another, no less significant, milestone - the deal in which IBM acquired Israeli company Trusteer two months ago. Mokady has no connection to the exit, and his company serves a different market niche in the information security world, but the big acquisition lends added credibility to the possibility of another Israeli security company reaching the top.

“I am convinced that the problem of information security is substantial, and therefore I am not surprised,” says Mokady talking to “Globes,” commenting on the recent blossoming of the information security industry. “It is in keeping with the attitudes toward the problem. There are not many industries in the world about which you can say that that the entire industry has been rebooted and needs a fresh start. To say that after all the investments, amounting to billions of dollars, enterprises still do not feel secure is a revolution. There aren’t many industries undergoing revolutions.”

CyberArk’s own revolution, according to Mokady, began as early as 2005. At that time, the company shifted its strategic focus and decided to concentrate on monitoring and neutralizing privileged accounts in enterprise’s computing networks. These accounts - through which people who should not be exposed to sensitive information can access files and processes that they are not meant to see on the networks - are part of operating systems’ defaults, and they have played a role in a significant number of cyber-attacks during recent years.

Fourteen years ago, when CyberArk started out, the name of the company was taken from the manner in which it worked - creating a sort of a virtual safe that was intended to protect information that the enterprise shares with parties outside the enterprise’s computer network. Mokady explained their strategic shift: “We succeeded in that world, but our clients pulled us in a different direction. They said that they were troubled by the fact that employees in their computing departments could do whatever they wanted, with no oversight. At the same time, regulation grew, and stories about inside personnel leaking sensitive material were publicized, and they decided that it was negligent to operate in such a manner.”

The Chinese military attacks

Over the past year, which Mokady describes as “the year of the great revolution in the security industry,” there have been two dramas that dominated the headlines, and along the way provided a tremendous boost to CyberArk’s public relations. The first was a report by US information security company Mandiant, published in February 2013, which, for the first time, clearly identified a unit of the Chinese military - with details including geographic location and identities of participants - as responsible for hundreds of cyber-attacks on business targets in the US.

The report is quite frightening - it points to many years of intensive work, on the parts of thousands of soldiers working in computing, towards developing methodologies and tools for attack, all funded by the Chinese government. On page 34 of the report, one of the stages in the unit’s work strategy is detailed, and it is based on “enhanced” use of privileged account permissions - the very mechanism that CyberArk is trying to control - in order to infiltrate resources on the computing network under attack.

The second media drama was supplied by Edward Snowden, who exposed US government surveillance techniques employed for tracking its citizens. Snowden, who worked as a network security administrator at the NSA, said in a video that was released to the press that, in this role, he was exposed to many things he shouldn’t have seen. This was possible because of the privileged account used by the network administrator. According to Mokady, the Snowden story, in a roundabout way, turned into a promotion for their company, because it made explaining the importance of the product almost completely unnecessary.

These dramas turned clients’ attention towards more advanced solutions in the security realm, but there are also claims that the values that we are seeing in the capital markets and in private companies already indicate the beginning of a bubble. “I don’t agree that the high values indicate a bubble,” says Mokady, “These are real companies with clients, and clients who are in panic. The companies are receiving these premiums because the problem is real.”

There are quite a few new solutions in security; to what degree are clients willing to continue chasing the “next new thing” in the field?

“I think we can explain Check Point’s breakout in the mid-‘90s scientifically. It had to happen according to the timelines of developments in the computing world. The next changing point was in 2011, when it was proven that firewalls were not enough. Right now, we are experiencing seismic changes, because enterprises are realizing that the bad guys are leading in innovation. There will be an evening out of demand, but right now, the situation favors the bad guys, and there will never be complete calm.” Darwinism in the security industry

CyberArk’s numbers support Mokady’s analysis of market activity. According to estimates, this past year the company had sales of $60-70 million, with growth of 30%-40% in each of the past few years. The company is profitable, with 1,400 customers, among them some of the biggest businesses in the world. The company employs 300 people, roughly half of them in their R&D center in Israel, managed by Chen Bitan, and it is in the process of recruiting an additional 50 employees.

If we take into account the multiples in the Trusteer deal, or the market cap of listed company Imperva (NYSE: IMPV) (8-9 time sales), then CyberArk could reach Wall Street in 2014 with a respectable valuation of $600-700 million. “We are building a big company, and, after Trusteer, we can say that we are the biggest privately-held information security company in Israel,” says Mokady, “An IPO is a likely milestone going forward. The timetable has not yet been set, and it is not urgent to us. We will approach it from a position of power.”

As for the investors, of course, after 14 years, an exit would be good news. Two years ago there was a financing round in which $40 million was raised from Goldman Sachs and JVP, most of which was used to buy out the original investors, a sort of a “mini-exit.” Up until that round, in which the company was valued at $200 million, CyberArk had raised $30 million, and had received a loan of a few million dollars from Plenus.

Today, the primary shareholders are JVP and Vertex funds, and Goldman Sachs. “Goldman came to us when they were looking to invest in very profitable companies, and they were very impressed,” said Mokady, “I highly recommend to my colleagues who believe in a company and want to grow, to take long-term investors.” Along with Imperva, Trusteer, and Varonis, which is on its way to an IPO, CyberArk is on a very short list of Israeli IT security companies that “made it,” aside from Check Point, of course.

According to Mokady, “There were many companies in the field that did not make it, Mokady says. It’s important to remember that there have been two financial crises in the middle, and we had to be very flexible in terms of solving problems for clients, and not believing that only what we thought of in the lab would work. It was a kind of Darwinism.”

Published by Globes [online], Israel business news - www.globes-online.com - on November 4, 2013

© Copyright of Globes Publisher Itonut (1983) Ltd. 2013

Commuter jam credit: Eyal Izhar Israeli commuters impose 45 minute limit

Data show that employees would rather change jobs than travel longer, so companies with fast public transport access find it easiest to hire.

Nochi Danner credit: Tamar Matsafi Nochi Dankner reinvented

Still mired in debt, a court case sheds light on the new life of the former 'golden boy' of Israeli business, since his release from prison.

Relocation credit: Michal Raz-Haimovitz How to turn the tech relocation tide

With thousands of tech employees leaving Israel, the Innovation Authority proposes measures that could reverse the trend.

Gal Rosenblum credit: Jonathan Bloom Israel's Adidas franchise chief boosted 2024 sales 40%

Gal Rosenblum talks about his perfect job, which combines his love of sport, fashion and data analysis.

Michael Rogers  credit: Team8 The spy who came into Israeli tech

Former US National Security Agency head Michael Rogers is now a partner at VC fund Team8. He talks to "Globes" about intelligence, geopolitics, and what amazes him about Israel's tech industry.

Dr. Neal Tsur credit: Yossi Zamir "Trump was just an excuse for market drop"

Dr. Neal Tsur studies what makes complex systems like stock markets ripe for change, and he has put his money where his theory is.

Roy Goldenberg  credit: Jonathan Bloom Making a better world for the disabled

Personal experience motivated Roy Goldenberg to become Israel director of TOM Tikkun Olam Makers. "TOM will be one of the biggest organizations to come out of Israel," he says.

Itay Raved  credit: Jonathan Bloom From a rooftop in India to running Tesla Israel

Itay Raved's career drifted from law to media consulting to acting, before he finally found his niche.

Dr. Adi Tzoref-Lorenz credit: Jonathan Bloom "My research says I don't accept there is no answer"

The death of a cancer patient spurred Dr. Adi Zoref-Lorenz into developing the OHI index, which allows the diagnosis of the HLH side effect from cancer immunotherapy, based on two blood tests.

Dr. R  credit: Jonathan Bloom Wounded in his tank, now R develops protection systems

"I was close to death, but it sharpened my awareness of the products we develop for the IDF."

Ella Kenan  credit: Yossi Cohen A fighter of fake news about Israel

Ella Kenan saw online denial of October 7 happening straightaway. "I realized we had 24 hours, or we were doomed"

Liron Horshi credit: Jonathan Bloom Wiz's talent manager nurtures $1b workforce

Wiz's $32 billion sale to Google was rooted in the cloud security product if offers but could not have been achieved without the quality of its employees built by human resources chief Liron Horshi.

Yoav Shoham  credit: Eyal Izhar Yoav Shoham: AI isn't too smart, it's too dumb

AI21 Labs founder and CEO Prof. Yoav Shoham talks to "Globes" about dubious doomsday predictions, what should really concern us, and what could make Israel a global AI leader.

Record public company profits  credit: Tali Bogdanovsky Profits peak, but reckoning awaits

In what may seem a paradox, profits grew in almost every sector on the Tel Aviv Stock Exchange last year, but the boom was largely fueled by government spending.

Insightec COO and general manager Eyal Zadicario credit: Ness Productions After 25 years of losses Insightec focuses on profit

Insightec COO and general manager Eyal Zadicario tells "Globes" about himself and the Israeli ultrasound company's long battle to change the medical world.

Amit Shaked credit: Tomer Lesher Driven to succeed but balancing ambition with wellbeing

At just 14, cybersecurity company Rubrik VP Amit Shaked began a B.Sc. in Computer Science and Math and mapped out his entire future, which included IDF service in the 8200 unit, and an inevitable huge startup exit.

Twitter Facebook Linkedin RSS Newsletters גלובס Israel Business Conference 2018