The security market is changing, and quickly. Each year, the RSA Conference hosts tens of thousands of delegates and hundreds of security vendors. In a conversation yesterday, John Stewart suggested that it might be an interesting idea to look at how the vendor population had changed over time, to get a sense for how the security market was moving.

To that end, the exhibitor lists are available online: 2014, 2016.

I’ve run a diff between the two years, and manually cleaned up duplicates that weren’t exact matches (e.g. where an ‘Inc.’ suffix had been added or removed). There may, therefore, be some errors in the data; corrections welcome to the email address in the footer.

That left 151 companies that were exhibitors in 2014, who were not present in 2016. Astonishingly, 307 companies exhibiting in 2016 were not present in 2014. The full lists are below.

Some interesting research possibilities:

  • What happened to the companies that left? Are they still around, and just not exhibiting? Were they acquired (e.g. Trusteer)? How many folded, and why?
  • How do the removed and new companies fit into a capability map of the security market? Can we infer useful market trends from the overall movements? Does this data help us start to model how consolidation within a category behaves, or when a category is likely to become an acquisition target by the security conglomerates?
  • The underlying data also includes each stand location – from this, we could probably infer some signal about stand cost (e.g. the very outer edge is cheapest, and the price goes up as you move inward). It would be interesting to see the migration patterns for companies year-on-year, and whether this was correlated with anything interesting (e.g. revenue). It feels like there would be a cool chart in here.
  • Can we infer anything interesting from the intersection of the two above? e.g. does a series of new companies in the same category appearing in the outer edge in one year indicate that a smaller number will make it into the next inward ring next year? Once a company moves outward, how likely is it to be able to recover?

Happy to contribute to a paper if anyone is interested.

Present in 2014, missing in 2016.

  • 10ZIG Technology Inc.
  • 21CT, Inc.
  • 3M Privacy Solutions
  • 6WIND
  • AFORE
  • Accellion
  • AccessData
  • Accuvant
  • Adallom
  • Agiliance
  • AhnLab
  • AirWatch
  • AlephCloud
  • Alert Logic
  • AlertEnterprise
  • AppRiver
  • Attachmate
  • Authentify
  • Axway, Inc.
  • Barracuda Networks
  • Beijing Zhongguancun Overseas Science Park
  • Bit9, Inc.
  • Black Lotus
  • BlueCat
  • Brainloop
  • CHERRY
  • CORISECIO GmbH
  • CSG Invotas
  • Celestix
  • Champlain College
  • Click Security
  • Collective Software
  • Coverity, Inc.
  • Covertix Ltd.
  • Cryptography Research, Inc.
  • Cryptomathic
  • CyFIR
  • Cyberoam Inc.
  • Cyvera Ltd
  • DBAPP Security
  • DaoliCloud Information Technology (Beijing) Co., LTD.
  • Defence Intelligence
  • Deja vu Security
  • DeviceLock
  • DynamiCode Company Limited
  • Emerging Threats
  • Endace Division of Emulex
  • Enforcive
  • Fiberlink
  • FileTrek
  • Fox Technologies, Inc.
  • Freescale
  • Glimmerglass Optical Cyber Solutions
  • GreenSQL.com
  • Guardian Analytics
  • HBGary
  • Halon Security, Inc.
  • Heshengda Information Security Technology Co., Ltd
  • HitmanPro
  • InfoExpress, Inc.
  • Information Security Media Group (ISMG)
  • Intellicus
  • Ionic
  • Ipswitch File Transfer
  • IronKey
  • KS Mobile
  • Key Source International
  • Klocwork
  • LOGbinder
  • Link11
  • Lumension
  • LynuxWorks, Inc.
  • MITRE
  • Malcovery Security
  • Marble Security
  • Metaforic
  • MicroStrategy
  • MirageWorks
  • Mocana
  • Modulo
  • Mycroft Inc.
  • NSA
  • NagraID Security
  • Nallatech Inc.
  • Narus, Inc.
  • National Institute of Standards and Technology
  • Net Optics, Inc.
  • NetCitadel
  • NetIQ
  • NetScout
  • New Horizons Computer Learning Centers
  • Norman Shark
  • Northrop Grumman
  • Oberthur Technologies
  • One World Labs, Inc.
  • PORTCULLIS
  • Paraben Corporation
  • PerspecSys Inc.
  • Phoenix TS
  • Pike Enterprises, Inc.
  • Portnox
  • PrivateCore
  • Procera Networks
  • Protected-networks.com GmbH
  • QIHU Technology Co., Ltd.
  • Quotium
  • Riscure North America
  • Riverbed Technology
  • SYSMATE
  • SafeNet, Inc.
  • Seccuris USA Inc.
  • Seculert
  • Secunia
  • Secure Access Technologies, Inc.
  • Shape Security
  • SilverSky
  • Sims Recycling Solutions
  • SmartDisplayer Technology
  • SnoopWall
  • Software Diversified Services
  • SolarWinds
  • Solutionary
  • Soonr
  • Sourcefire
  • SpectorSoft Corporation
  • StrikeForce Technologies, Inc.
  • Symplified
  • Sypris
  • TIBCO Software
  • TalariaX sendQuick
  • The Hacker Academy
  • Threat Stack
  • ThreatSim
  • ThreatTrack Security
  • Tilera Corporation
  • TrulyProtect
  • Trusteer, an IBM Company
  • Unisys
  • Venustech Cybervision Co., Ltd
  • Verdasys, Inc.
  • Viewfinity
  • Visible Statement
  • Voltage Security
  • WWPass Corporation
  • Watchdata Technologies
  • Wave Systems Corp.
  • Websense
  • Wontok
  • Xceedium, Inc.
  • itWatch
  • nPulse Technologies

Present in 2016, but not present in 2014.

  • 2FA
  • 360 Total Security
  • 5nine Software
  • A10 Networks
  • ADLINK Technology
  • AHA Products Group
  • Abatis (UK) Ltd
  • Absolute
  • Acunetix
  • Agari
  • Ahope
  • AirCUVE
  • Allot Communications
  • AppViewX
  • Area 1 Security
  • Arellia
  • Artifex Software Inc.
  • Attivo Networks
  • Audit Square
  • Auth0
  • AuthLite
  • Avanan Inc.
  • AvePoint
  • Avecto
  • Avira Operations GmbH & Co. KG
  • BT
  • BUFFERZONE
  • Balabit
  • Basis Technology
  • Bastille
  • Beijing Huajia Technology
  • Beijing Venustech Inc.
  • Beijing Watchsmart Technologies
  • Biscom
  • BitSight Technologies
  • Bitglass
  • BittWare
  • Bivio Networks
  • Black Duck Software
  • BluVector
  • BlueTalon
  • Bluebox Security
  • Blueliv
  • Boldon James
  • Bomgar
  • BooleBox
  • Boxcryptor
  • Bricata
  • BrightPoint Security
  • CENTRI Technology
  • CYBERBIT
  • Cambridge Intelligence
  • Capgemini
  • Carbon Black
  • Carr & Ferrell LLP
  • Cavium, Inc.
  • Centre for Secure Information Technologies (CSIT)
  • Centripetal Networks, Inc.
  • Certified Security Solutions (CSS)
  • Cheetah Mobile
  • CloudPassage
  • Cloudera
  • Cloudpath Networks
  • CoSoSys
  • Colopoint GmbH
  • Comcast Business Enterprise Solutions - MSuite
  • Confer Technologies
  • Covata
  • Cradlepoint
  • CrowdStrike
  • Cryptsoft
  • Cryptzone
  • CyberInt
  • CyberSponse
  • Cybereason
  • Cylance
  • D3 Security
  • DBAPPSecurity
  • DarkMatter
  • DataBlink, Inc.
  • DataLocker Inc.
  • Deep Instinct
  • Department of Homeland Security, Science & Technology
  • Detack GmbH
  • Digital Guardian
  • Digital Shadows
  • Dispersive Technologies
  • Distil Networks
  • Dome9 Security
  • Druva
  • ECI Telecom Ltd.
  • ETRI(Electronics and Telecommunications Research Institute)
  • EZchip
  • Early Warning
  • EdgeWave
  • Egis Technology Inc.
  • EgoSecure
  • Encode UK Limited
  • Endgame
  • Engage Communication
  • Enigmedia
  • Exabeam
  • Executive Women’s Forum
  • Fastly, Inc.
  • Federal Reserve Bank of San Francisco
  • FinalCode
  • Fireglass
  • Flexera Software
  • Flowmon Networks
  • Forcepoint, Powered by Raytheon
  • Fornetix
  • Fortscale Security
  • Fox-IT
  • GB&Smith
  • Gemalto
  • Geninetworks
  • Global Learning Systems
  • GlobalSCAPE
  • Great Bay Software
  • Green Hills Software
  • Ground Labs
  • Guardicore
  • H3C Technologies Co., Ltd.
  • HAWK Network Defense, Inc.
  • Happiest Minds Technologies
  • Heat Software
  • Hexadite, Inc.
  • Hitachi ID Systems
  • Hypori, Inc.
  • IBASE Technology, Inc.
  • IDenticard
  • INCA Internet Co., Ltd
  • INSIDE Secure
  • IPOQUE GmbH
  • Idappcom Ltd.
  • Illumio
  • Illusive Networks
  • Inspired eLearning
  • IntelliGo Networks, LLC
  • International Association of Privacy Professionals
  • Interrmedia.net, Inc.
  • Interset
  • Invincea
  • Invotas International
  • Israel Export Institute
  • Janus Technologies, Inc.
  • KISA(Korea Internet & Security Agency)
  • KOTRA
  • Kalray, Inc.
  • KnowBe4
  • LastPass Enterprise
  • Level 3 Communications
  • Lockheed Martin
  • Logtrust
  • Lookingglass
  • Luxar Tech
  • Lynx Software Technologies, Inc.
  • MIRACL
  • Malwarebytes
  • ManagedMethods
  • MediaPro, Inc.
  • Menlo Security
  • MessageSolution, Inc.
  • Minerva Labs Ltd
  • Morphick Inc
  • NC4
  • NCC Group
  • NIARA Inc.
  • NIST
  • NRI SecureTechnologies
  • NSRI(National Security Research Institute)
  • NTT Group Security
  • National Security Agency
  • Negev Telcom
  • NetLib
  • Netskope
  • Netsparker
  • Netwrix
  • Nexusguard
  • Niagara Networks
  • Novetta
  • NowSecure
  • Nubo Software Ltd.
  • Nuix
  • ObserveIT
  • Office of the Comptroller of the Currency
  • One Scorpion Security
  • Onspring
  • Ontario, Canada Delegation
  • Optimal IdM
  • Optiv
  • Osirium Ltd
  • Outpost 24
  • PFP Cybersecurity
  • PKWARE
  • Palamida, Inc
  • Palerra
  • Palo Alto Networks
  • Peach Fuzzer
  • Penn State Univerisity
  • Phantom
  • PhishLabs
  • PhishLine
  • Plixer
  • Pradeo
  • Prelert
  • Prevoty
  • Prosoft Systems Intl.
  • ProtectWise
  • Protegrity
  • Protiviti
  • Pulse Secure
  • Quick Heal Technologies
  • Rambus Cryptography Research
  • Recorded Future
  • Red Hat
  • RedOwl
  • RedVector
  • Resilient Systems
  • Return Path
  • RiskSense
  • RiskVision (Formerly Agiliance)
  • Rogue Wave Software
  • Rook Security
  • SAP SE
  • SAS
  • SAVIYNT
  • SOTI
  • SS8
  • SaferZone
  • SailPoint Technologies
  • Savvius, Inc.
  • SecuGen Corp.
  • SecurEnvoy
  • SecureLink, Inc.
  • Security Compass
  • Security First Corp.
  • Secusmart GmbH
  • SentinelOne
  • ServiceNow
  • Siemplify
  • Silobreaker
  • Simeio Solutions
  • Skyport Systems
  • Soha Systems, Inc.
  • Sparkle Power
  • Sqrrl
  • Staminus
  • SuperCom
  • Surevine
  • SurfWatch Labs
  • Synopsys
  • TICTO
  • TRUSTe
  • TaaSera
  • TeachPrivacy
  • Telecom Brokers
  • Telefonica
  • Telesoft-Technologies Ltd
  • Terranova WW Corporation
  • The Media Trust
  • The Open Group
  • ThetaRay
  • ThreatBook
  • ThreatConnect
  • ThreatQuotient
  • ThreatSTOP
  • ThreatStream
  • ThreatTrack
  • Titan IC Systems
  • Titania
  • TrapX Security
  • Trusted Knight
  • UKTI Defence & Security Organisation
  • Untangle
  • Utimaco Inc.
  • VMray GmbH
  • Verint
  • ViaSat, Inc.
  • Votiro
  • Vysk Communications
  • Waratek
  • Watchful Software
  • WebRAY(BeiJing)Tech Co.,Ltd.
  • Wheel Systems
  • WhiteHat Security Inc.
  • WhiteSource
  • Whitewood
  • WinMagic
  • WireX
  • X15 Software
  • Yubico
  • Zenedge, Inc.
  • Zentera Systems
  • Zertificon Solutions
  • Zhongguancun Overseas Science Park
  • Ziften
  • Zimperium
  • Zonefox
  • digitronic computersysteme gmbh
  • gateprotect GmbH
  • iSIGHT Partners
  • iovation
  • itWatch GmbH
  • secunet
  • tyntec
  • whiteCryption