<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Cybersecurity Investors Anonymous]]></title><description><![CDATA[I provide cybersecurity research consulting services to institutional investors, and I'm here to teach you what I know about the cybersecurity space. This publication is geared for the investing community, rather than cybersecurity practitioners.]]></description><link>https://www.cybersecurityinvestorsanonymous.com</link><image><url>https://substackcdn.com/image/fetch/$s_!-BT_!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa07c70e1-f686-4673-8df6-a2694489bd41_521x521.png</url><title>Cybersecurity Investors Anonymous</title><link>https://www.cybersecurityinvestorsanonymous.com</link></image><generator>Substack</generator><lastBuildDate>Fri, 03 Apr 2026 20:20:22 GMT</lastBuildDate><atom:link href="https://www.cybersecurityinvestorsanonymous.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Penny Eckel]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[pennyeckel@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[pennyeckel@substack.com]]></itunes:email><itunes:name><![CDATA[Penny Eckel]]></itunes:name></itunes:owner><itunes:author><![CDATA[Penny Eckel]]></itunes:author><googleplay:owner><![CDATA[pennyeckel@substack.com]]></googleplay:owner><googleplay:email><![CDATA[pennyeckel@substack.com]]></googleplay:email><googleplay:author><![CDATA[Penny Eckel]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[AI Disruption and the Software Bloodbath]]></title><description><![CDATA[How to think about investing in software during the AI transition]]></description><link>https://www.cybersecurityinvestorsanonymous.com/p/ai-disruption-and-the-software-bloodbath</link><guid isPermaLink="false">https://www.cybersecurityinvestorsanonymous.com/p/ai-disruption-and-the-software-bloodbath</guid><dc:creator><![CDATA[Penny Eckel]]></dc:creator><pubDate>Tue, 03 Feb 2026 20:52:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-BT_!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa07c70e1-f686-4673-8df6-a2694489bd41_521x521.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The indiscriminate selling in software has been relentless, but it also presents an opportunity for investors who are willing to dive below the narrative of AI as a software business killer, into the reality of the impact.</p><p>Let&#8217;s look beyond the obvious counter-narrative points about enterprises moving more slowly, sunk cost in enterprise SaaS, retraining staff, and capital expenditure on AI infrastructure build-outs. One, because those horses have been beaten to death, and two because those things didn&#8217;t prevent companies from spending the time and money to refactor workloads for the cloud, or for cloud consulting services and development staff. For all their virtues, they have not been convincing enough points to cause investors to pause and think through the nuances of this particular situation.</p><p>The enterprise shift to the cloud taught us that when the incentives are great enough, enterprises are increasingly willing to spend resources on re-doing things. <br><br>Even though that&#8217;s the case, the transition from on-premises software to cloud-native taught us something else- there are always winners and losers. How do we tell the difference? </p><p>The most important way to answer that question is to consider what <em>unique</em> threats AI presents to enterprise software companies based on the users and use cases those companies serve. <br><br><strong>Three-Layer Positioning</strong><br>Let&#8217;s frame up what I consider to be the most fundamental shift with AI in its current iteration, which is its use as a new type of <em>interface</em>. </p><p>If we think of enterprise software in very simple terms, its purpose is to allow the storage of -and interaction with- a subset of an enterprise company&#8217;s <em>information</em>. We can imagine it has three layers.</p><ol><li><p> The <strong>user interface</strong> is the surface layer.<br><br>This is where we type our information into forms, where we search for information, and where information is displayed for us. It&#8217;s our interactive window into what the software is supposed to do for us.<br></p></li><li><p>The <strong>search, read, and write </strong>functions are the middle layer.<br><br>This layer handles the exchange of instructions between what the user wants to do in the user interface layer, and the information stored in the deepest (database) layer. <br></p></li><li><p>The <strong>database </strong>is the deepest layer. <br></p><p>It&#8217;s like a giant warehouse where all the information for a piece of software is stored on different shelves, and the place from which data is retrieved when a user requests it.</p></li></ol><p>You may be wondering what this has to do with AI disruption, and here is the answer: AI has the <em>potential</em> to disrupt existing software at all three layers in the future, but the most immediate disruption potential exists at the surface -the user interface layer-right now. </p><p>Remember, timing is everything. If enterprise companies are busy replacing software that holds the most value in its surface layers first, it gives software vendors offering deeper layer solutions more time to adjust to AI adoption and to potentially leverage it to their advantage. Therein lies our opportunity as investors.</p><p>To illustrate what I mean by surface layer user interface replacement, take the example of working with an AI chatbot like ChatGPT or Claude. You type in a question, and it serves up an (hopefully accurate) answer in the time it takes to sip your coffee. It&#8217;s much more time effective than going out to google search and sifting through results of mixed relevance, especially as you ask the AI bot subsequent questions. It hasn&#8217;t necessarily replaced the deepest layer -the database layer- because the information is probably about the same as what you could find on your own if you wanted to work hard enough. But it&#8217;s greatly reduced the friction between you as the user and the information you&#8217;re trying to find. Even though this example is more consumer focused, for the vast majority of non-technical people making decisions about how to use AI within their organizations, this is a use case they&#8217;re thinking about.</p><p><em>NOTE:</em> As I said before, AI has the potential to disrupt the other two layers as well. It can do many things in the background without human intervention. Cybersecurity has strong examples of this. I will write about that in a separate entry in the future.</p><p>The following are some questions I use to evaluate my stance on a software company&#8217;s exposure to AI disruption based on their users, use cases, and who they&#8217;re selling to.  </p><ol><li><p>Which software companies are most valued for their use as a user interface for working with a subset of a company&#8217;s data?</p></li><li><p>Who are the early adopters within an enterprise organization to leverage AI coding tools to improve their work experience?</p></li><li><p>Who is least likely?</p></li><li><p>Which existing software companies are best-positioned to accommodate new AI workloads, both technically, and from a business model/pricing standpoint?</p></li><li><p>What AI-driven activity might happen within a software vendor&#8217;s customer base for its earnings growth to either slow or expand?</p></li></ol><p>I&#8217;ll use some real company examples to highlight my thinking. </p><p><em>NOTE</em>: As we start talking about specific companies, I want to add a disclaimer here that this is not investment advice, and more importantly, I am not saying that companies I see as better-positioned than others will be able to actually capitalize on that opportunity, and similarly, I&#8217;m not saying that companies I view as having more exposure to AI disruption won&#8217;t figure out a way to spin it in their favor. But we have to work with what&#8217;s going on today, and I think this article would be pretty useless without some real examples of what I&#8217;m talking about. With that out of the way, let&#8217;s proceed.</p><h4>Potential Winners - Database Companies and Deepest Layer Defense </h4><p><strong>ESTC, MDB</strong></p><p>From my perspective, database companies like MongoDB <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$MDB&quot;}" data-component-name="CashtagToDOM"></span>  and Elastic <span class="cashtag-wrap" data-attrs="{&quot;symbol&quot;:&quot;$ESTC&quot;}" data-component-name="CashtagToDOM"></span>  are well positioned to benefit from new AI workloads. I worked in software for a long time in various technical roles, and there was a time in my life where I couldn&#8217;t be convinced there was a wide-spread, enterprise-scale use case where an unstructured database like MongoDB was superior, or even on par with a SQL database. But times have certainly changed, and the volume, structure, and processing of massive amounts of data has also changed. AI may finally be the nail the NoSQL database hammer was searching for all along. These database companies have also added relational data and SQL-like query capabilities to their platforms which have broadened the use cases they can effectively serve. <br><br>Widespread adoption of these databases, open source versions that allowed for early experimentation, and their scalability all set them up for success in the AI world. If a developer is working on a proof of concept for a new AI use case, nothing can slow down time-to-market faster than having to learn a new database technology. The wheel does not need to be re-invented in databases right now, the wheel everyone is focused on re-inventing is the user interface.<br><br>Perhaps equally as important is that these database companies don&#8217;t have to do much to revamp their business or pricing models to suit the influx of new data from AI workloads. Having to accommodate this change doesn&#8217;t slow them down in any way. They are already priced for data ingestion and expansion, and additional data works to their benefit. Retro-fitting a new pricing model during a technological sea change and expecting customers to get on board is no easy feat, as software vendors in other categories are likely to find out.</p><h4>Potential Losers - User Interfaces for Technical Teams </h4><p><strong>TEAM, DDOG </strong></p><p>Software vendors that offer what are essentially user interfaces for data or workflow within technical teams are in the most trouble. Particularly if they are very expensive or difficult to work with.</p><p>They are facing several headwinds.</p><p>Technical teams are the earliest experimenters and adopters of AI, and can easily understand its best use cases and limitations. It&#8217;s much easier for an enterprise company&#8217;s internal development team to build a replacement for some of Atlassian&#8217;s functionality, than it is for a non-technical sales and marketing team to build a replacement for the product managing their inbound leads. <br><br>If &#8220;software developers can rebuild software faster&#8221; doesn&#8217;t sound like a profound insight, I&#8217;d like to point out the obviousness of the statement is not reflected in software stock prices as they sit today. There is no differentiation happening as software names continue to get sold across the board.</p><p>Further, when a product is used by focused teams, rather than cross-organizationally, it&#8217;s easier to plan and measure a replacement. What will it cost, what will it save, how much easier will their lives be if they don&#8217;t have to use this product&#8217;s interface any longer? Much easier to sort when you don&#8217;t have to run across HR, Sales, IT, and every other team a workflow routes through to figure out the answers to those questions. The security complexity becomes more manageable as well (an entry for another day).</p><h4>Time Will Tell - Cross-Organizational User Interfaces </h4><p><strong>CRM, NOW </strong></p><p>Companies that sell to non-technical audiences, and/or are used more widely across the organization than just within technical teams are likely to fair better. Here is why.</p><p>Replacing an entire piece of enterprise software touching multiple departments across the organization is extremely disruptive to businesses processes and productivity. Not only that, but predicting cost and setting budget becomes much more challenging as well. You may be wondering why I don&#8217;t put these companies in firmly in the &#8220;Potential Winners&#8221; category. I believe it&#8217;s more likely small use cases will slowly get peeled off from these vendors and simplified by AI over time, which will feel like paper cuts to companies like Salesforce and impact their growth rate, but will not create the immediate disruption exposure cross-organizationally. <br><br>A bigger challenge to these companies is going to be hanging onto seats, and worrying about how they might leverage AI to make their products less cumbersome to configure and more user friendly over time before something new and shiny comes along solidly enough to cause a real problem. I believe they have time to do it.</p><p><strong>Final thoughts</strong></p><p>The question that emerges from this framework is:<br>At what price is it safe/smart to own a software company based on its three-layer positioning and current valuation? Blood is certainly running in the streets. <br><br></p><p></p>]]></content:encoded></item><item><title><![CDATA[What are the most valuable metrics for Cybersecurity Investors?]]></title><description><![CDATA[With a focus on growth]]></description><link>https://www.cybersecurityinvestorsanonymous.com/p/what-are-the-most-valuable-metrics</link><guid isPermaLink="false">https://www.cybersecurityinvestorsanonymous.com/p/what-are-the-most-valuable-metrics</guid><dc:creator><![CDATA[Penny Eckel]]></dc:creator><pubDate>Thu, 07 Mar 2024 00:10:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa07c70e1-f686-4673-8df6-a2694489bd41_521x521.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A reader asked how cybersecurity investors value business metrics differently from their broader SaaS counterparts, and as an example, how ACV and CAC might mean different things to an investor in a company like $GTLB vs. a cybersecurity company like $ZS. </p><p>It&#8217;s a question I feel qualified to answer only partially, as I don&#8217;t have conversations with institutional public equity investors around anything except cybersecurity companies. What I can speak on is what they prioritize when it comes to valuing cybersecurity companies against each other.</p><p>I'm going to focus on the most important metrics for growth in this post using a handful of examples, though there are some cybersecurity companies like $TENB and $QLYS that trade on profitability, where FCF margin and FCF growth are the more important metrics. To answer the example question specifically, in the 6 or so years I've been doing this, CAC has not come up in my conversations with investors.</p><p>What they are all looking for is how much business a company sold and renewed in the quarter (&#8220;bookings&#8221;), and whether that is an acceleration or deceleration based on previous guidance. The trouble is the bookings metric, especially with older cybersecurity companies, is not typically provided to investors by the company. Instead, investors must do their best to approximate it. Let me explain.</p><p>There are two major business models within cybersecurity, and the rest of cybersecurity companies fall somewhere in between these two models. The first and older model is a hybrid mix of perpetual and subscription revenue like what $PANW, $FTNT, and $CHKP have. They sell perpetual licenses for their on-prem firewalls, plus recurring support and subscriptions. The second model is an almost purely subscription/recurring revenue model, with a little bit of consumption pricing mixed in ($CRWD, $S, $ZS).</p><p>The preferred metric for growth is ARR. If the company doesn't give an ARR number, then investors look at Revenue + some other way to approximate bookings, which might be cRPO or Billings. Sometimes a company gives an ARR number, but it doesn&#8217;t represent the majority or entirety of their revenue, so Billings will still play an important role. </p><p>This all helps determine how investors value certain metrics depending on the company&#8217;s business model. Net-new ARR is highly important for $CRWD because all of its revenue is derived from ARR. Even though they give a Billings number, it's less important because net-new ARR is a more precise indication of future business. On the other hand, $PANW, with its hybrid mix of perpetual and subscription revenue, has several revenue segments, of which "next-gen&#8221; ARR is one component. If they don't blow next-gen ARR out of the water, it might not be the end of the world if they can make up for it in other revenue segments.</p><p>At the same time, weak Billings is going to impact $PANW and $FTNT (given their hybrid revenue models) much more heavily than $CRWD due to the fact investors are still looking for ways to approximate bookings for the rest of their hybrid revenue segments. $ZS is interesting because, despite the fact their revenue is all recurring, they do not give a net-new ARR number. As a result, their Billings number is also more consequential than $CRWD's in the eyes of investors.</p><p>Nuances like this can easily be lost on an analyst trying to apply the same fundamental analysis to companies that tend to get grouped within the same sector, like $CRWD, $OKTA, $ZS, and $PANW. They may be further skewed when trying to apply that same formula to a basket of 50 SaaS stocks across a variety of sectors. These companies each have different business models that create variability in the importance of their financial metrics and how indicative those metrics are of future business.</p><p><strong>Remember This</strong><br>Everyone is trying to measure acceleration or deceleration in growth in bookings, and an analyst must use what the company gives them to do their best to approximate it. The most valuable metrics are the ones that help an analyst do that job. In cybersecurity, those are most often a combination of ARR/net-new ARR, cRPO, and/or Billings.</p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Thoughts - FinThreads ]]></title><description><![CDATA[Quick and dirty thoughts on Cybersecurity prior to Q423 earnings next week]]></description><link>https://www.cybersecurityinvestorsanonymous.com/p/cybersecurity-thoughts-finthreads</link><guid isPermaLink="false">https://www.cybersecurityinvestorsanonymous.com/p/cybersecurity-thoughts-finthreads</guid><dc:creator><![CDATA[Penny Eckel]]></dc:creator><pubDate>Fri, 02 Feb 2024 18:35:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa07c70e1-f686-4673-8df6-a2694489bd41_521x521.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you are on Threads, feel free to follow me over there @pennyjilleckel. I&#8217;m writing this note for the FinThreads community. Please keep in mind that I'm not in the business of calling quarters- in other words, these are intermediate term trends I&#8217;m observing and this is not investment advice. Regarding this quarter, everything in cybersecurity has run up into earnings so far, so pick your spots carefully. There may be opportunities to swoop in on a name that suffers from a post-earnings sell-off due to too-high expectations.</p><p>Over the last several quarters, the firewall market has slowed, and FTNT has already taken a beating because of it. Meanwhile, CHKP is at all-time highs and received a couple of upgrades recently.</p><p>What I can tell you about CHKP is they have a steady business and a very conservative management team. They don't grow much, but their growth doesn't slow much either. We&#8217;re talking 5% growth. It&#8217;s bulled up because people are looking for value in a space where we&#8217;ve seen a big run-up in valuations, and without understanding the nuances, it is relatively cheap. CHKP trades at 6.3x EV/rev(Cy24), while PANW, CRWD, ZS are all double digits, and even FTNT is trading around 8x after the beating it endured last year. Generally, I view CHKP as a safe, defensive name in the space- a nice way to participate in cybersecurity without taking on as much risk, though that will be reflected in modest returns.&nbsp;</p><p>I like FTNT as a company, but I&#8217;m not convinced the stock has been beaten down enough to tamp down high expectations. They are returning to what I believe will be sustained pre-pandemic growth levels, but investors are not ready to let go of those parabolic growth levels from 2022 and early 2023, and we&#8217;ve watched the stock creep higher in line with those expectations. I think a beat and raise are priced in, consensus is low, and it could be achievable, but it&#8217;s not a bet I&#8217;m willing to make. I think this is a slightly higher risk trade going into the call, so I&#8217;m pointing it out if that&#8217;s your style.</p><p>One that is very interesting to me is CYBR, which we&#8217;d categorize as an Identity vendor for financial industry purposes. They had a huge upward inflection in their business in late 2018 and rode that trend for a year or so. When the pandemic happened, everyone was scrambling to re-architect their networks for wfh, and CYBR didn&#8217;t do as well as vendors like ZS, FTNT, and PANW who benefited not only from the re-architecture, but also pull-forward demand of hardware based security due to supply chain constraints/concerns. Side note: I think the digestion of this additional capacity, combined with multiple price increases from those vendors are what&#8217;s impacting firewall growth.&nbsp;</p><p>Returning to CYBR- now that those network security re-architecture projects are being digested, we are seeing CYBR&#8217;s business tick back up again. New cybersecurity regulations are mandating Privileged Access Management (which CYBR dominates) for high-risk orgs, which is a nice tailwind for them. CYBR is not as cheap as CHKP, but it&#8217;s growing faster and is still under a double digit EV/rev multiple for now. OKTA, which is not a direct competitor but is an Identity vendor, has continued to fumble around and create problems for itself. All other pure-play Identity vendors were acquired over the past few years, so investors who want exposure to the Identity space are buying CYBR. It&#8217;s also completed a transition from perpetual licensing to subscription, which has made its business less lumpy and more predictable. </p><p>Speaking of perpetual to subscription transitions, VRNS has been going through a painful one. They continue to trudge through it, now in their second year. They&#8217;re small and don&#8217;t get as much love as other security companies because they operate in a niche space -unstructured data security- with little competition as a point solution vendor. For this reason, it&#8217;s hard for investors to value it and triangulate its place in the market. I think it&#8217;s pretty fairly valued, but I like it better under $40. Still, if one doesn&#8217;t mind enduring the transitional pains they&#8217;re going through, there is upside potential here. I still view it as a potential acquisition target, but if I were buying it for that purpose, I would need to build a position starting closer to $30. You can read more about my criteria for what makes a good acquisition target <a href="https://www.cybersecurityinvestorsanonymous.com/p/what-makes-a-good-pe-acquisition">here</a>.</p><p>If, like me, you feel things in cybersecurity are getting a bit extended, these are decent companies to hold for the long term, but pick your spot based on your investment style. I&#8217;ll have more to share on the Fy reporters in a couple of weeks before their earnings start flowing in March. This feels like a year where looking for the right short in cybersecurity has more potential upside than in the last few years. I&#8217;ll share more on that when I write about the next round of reporters. Send me any questions you have on Threads.</p>]]></content:encoded></item><item><title><![CDATA[$PANW and $FTNT: Follow up - What's driving firewall growth?]]></title><description><![CDATA[I received a question from a reader of yesterday&#8217;s post asking where all these new firewalls are being deployed- in traditional datacenters or in the cloud?]]></description><link>https://www.cybersecurityinvestorsanonymous.com/p/panw-and-ftnt-follow-up-whats-driving</link><guid isPermaLink="false">https://www.cybersecurityinvestorsanonymous.com/p/panw-and-ftnt-follow-up-whats-driving</guid><dc:creator><![CDATA[Penny Eckel]]></dc:creator><pubDate>Wed, 12 Jul 2023 21:02:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa07c70e1-f686-4673-8df6-a2694489bd41_521x521.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I received a question from a reader of yesterday&#8217;s post asking where all these new firewalls are being deployed- in traditional datacenters or in the cloud? It&#8217;s a great question, and I wanted to provide an answer for others who might be interested.</p><p>There are the standard deployments in traditional datacenters and in the cloud that are kind of always going on at a steady rate. Aside from that, many companies went through network re-architecture over the pandemic to accommodate work-from-home requirements, and that drove a lot of firewall growth over the lock-down period. This was obviously only a temporary growth driver for PANW and FTNT, so how are they still growing their firewall businesses?</p><p>A bigger, more sustainable driver of growth has been all of the network segmentation that&#8217;s being driven by &#8220;<strong>Zero Trust</strong>.&#8221; Zero Trust is a concept born out of Google that represents a paradigm shift in the way a network should be architected in order to promote optimal security. I&#8217;ll circle back to this in a minute.</p><p>To illustrate this shift, imagine a medieval kingdom surrounded by a perimeter wall, with all the individuals makings of a kingdom inside- a castle for the king, a blacksmith, food storage, an alehouse- you get the idea. The wall surrounding the kingdom represents a firewall. The individual makings of the kingdom all represent applications that exist inside a company&#8217;s network, a.k.a inside the perimeter. The perimeter wall around the castle has a gate with a few guys who decide who gets to go in and out. Firewalls are a bit like that too, with rules about what traffic to allow or disallow. </p><p>Now, unlike medieval kingdoms, a company&#8217;s network often has more than one gate, which you can probably imagine makes it more difficult to keep track of who is going in and out. For many companies, one such gate was the SolarWinds ($SWI) software. Unfortunately, in late 2020, it was discovered that SolarWinds&#8217; network management platform, Orion, had been hacked, and that a large number of enterprise companies and government agencies were affected. Orion had access to pretty much everything on a customer&#8217;s network. It was bad.</p><p>I bring this up because everything in cybersecurity gets done faster after big hacks- they&#8217;re a catalyst for change and for making big dollar cybersecurity purchases.</p><p>The SolarWinds hack acted as one such catalyst. After the hack, many cybersecurity vendors saw an opportunity to take hold of the &#8220;Zero Trust&#8221; concept, turn it into a marketing buzzword, and start selling the heck out of it. No matter what the vendor was doing before, they were now able to help customers with Zero Trust in some form or another. The SolarWinds hack also accelerated the adoption of the Zero Trust concept across the traditional networking and security groups within the enterprise customer base simply because many of them used SolarWinds or something similar and needed to reconsider their own architecture to prevent a recurring hack of the same nature.</p><p>So what does this have to do with medieval kingdoms, and more importantly, firewall growth for PANW and FTNT?</p><p>Well, before customers started adopting the zero trust framework, their networks resembled the kingdom as I described it before- a perimeter wall surrounding all the individual makings of a kingdom, with a gate to get in or out. The trouble is, some rogue who shouldn&#8217;t be inside the perimeter wall inevitably figures out a way to get in, and once they&#8217;re in, they can move freely throughout the kingdom- stealing from the blacksmith, hassling the castle guards, terrorizing the women at the alehouse. </p><p>If we examine a customer&#8217;s network that has been re-architected using the zero trust framework, the kingdom might look different. It would still have the individual makings of a kingdom surrounded by a large perimeter wall, but now it also has an individual wall around the castle, and one around the alehouse and food stores, and another around the blacksmith. If a rogue who shouldn&#8217;t be inside the walls gets in, he&#8217;s suddenly met with several other walls he must find a way through before he can actually steal, hassle, or terrorize.</p><p>This concept of protecting smaller pieces inside the kingdom represents Zero Trust, which is kind of what it sounds like- don&#8217;t trust anyone or anything unless they prove who they are and why they need access&#8230; you may have gotten inside the big perimeter wall around the kingdom, but why do you need to see the blacksmith? </p><p>In my example, Zero Trust is achieved using what is called <strong>network segmentation</strong>, and the individual walls represent firewalls. If a customer really wants to do network segmentation with a purpose-built solution, they might use a Software Defined Networking (SDN) solution like VMware&#8217;s NSX or Cisco&#8217;s ACI**, but they are very expensive and come with a lot of  implementation challenges&#8230; they&#8217;re not always practical. Instead, many customers segment their networks by putting a firewall in front of each application, or in front of smaller groups of applications.</p><p>This is a big reason why PANW and FTNT have been able to grow their firewall businesses so handily- this ongoing re-architecting of the network to achieve better security. A customer decides to segment their network and suddenly, they need five firewalls instead of one. </p><p>It&#8217;s hard to say how long this network re-architecture and subsequent firewall growth will last. I&#8217;ll admit it&#8217;s gone on longer than I thought possible. In the meantime, PANW and FTNT investors can enjoy the growth that comes from these trends.</p><p><em>**Note: I do not cover VMW or CSCO and can&#8217;t speak to the quality of these solutions.</em></p>]]></content:encoded></item><item><title><![CDATA[$PANW and $FTNT: The Value Firewall Threat to PANW's Growth]]></title><description><![CDATA[...and some lessons learned along the way]]></description><link>https://www.cybersecurityinvestorsanonymous.com/p/panw-and-ftnt-the-value-firewall</link><guid isPermaLink="false">https://www.cybersecurityinvestorsanonymous.com/p/panw-and-ftnt-the-value-firewall</guid><dc:creator><![CDATA[Penny Eckel]]></dc:creator><pubDate>Tue, 11 Jul 2023 17:27:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa07c70e1-f686-4673-8df6-a2694489bd41_521x521.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>When I was first coming up to speed on the cybersecurity space back in 2017, I remember hearing a lot of talk in the investment community about how the firewall market was dying at the hands of the cloud. The narrative was that nobody was going to need hardware based appliances, and even the virtualized ones weren&#8217;t going to be helpful for customers running workloads in AWS and Azure (GCP wasn&#8217;t really on the radar at that time). I spent a lot of time working to understand why that was the case, and by and large, I came to agree with that sentiment.</p><p>Yet despite this mass migration of applications to the cloud by enterprises the world over, PANW and FTNT are two of the strongest stocks in the security space. It turns out some part of the narrative was wrong. The truly surprising thing isnt&#8217; that these two companies have managed to survive mass cloud migrations. It&#8217;s the fact that firewalls continue to be the biggest aspects of their businesses, and more importantly, this is where the most significant battle between these two vendors is being waged today- five years after the investment community thought firewall growth would have died off already. There is a lesson here- <strong>Don&#8217;t Trust the Narrative, Narratives Change</strong>.</p><p>For those familiar with PANW, the inclination might be to assume the investments they&#8217;ve made in acquiring and building new cloud products are fueling their growth. If we were to stop there and take it at face value - more cloud workloads equals more growth for a security company with a lot of cloud products - we&#8217;d be right, but as it turns out, actually more wrong than right because PANW is still a very firewall dependent company. Last year they grew revenue 29% YoY, but 2/3** of that growth came from their firewall business. <br><br><em>**I don&#8217;t want to suggest this is something management is trying to obfuscate in their numbers, but they have changed the way they do revenue breakouts in their reports several times over the past couple of years, and this number has been tougher to get to over time. I&#8217;m not the only investor annoyed by this, so please don&#8217;t get discouraged if you are just now diving into PANW.</em></p><p>Then you have FTNT, who has grown their Enterprise business to about 40% of revenue, from less than 20% five years ago. No easy feat for a security company starting out as an SMB and Mid-market vendor, and with few cloud products in their portfolio. </p><p>So we have on one hand, PANW, with a primarily Enterprise security business, investing heavily across product, sales, and marketing in its cloud security solutions. It has no real Secure SD-WAN (the convergence of security and networking) or OT security (commerical IoT) story.</p><p>On the other, we have FTNT, very focused and invested in Secure SD-WAN and OT security, with little cloud security story, and a majority SMB and Mid-market customer base (albeit with a fast growing Enterprise business).</p><p>When we look at the two businesses this way, they seem to swim in different lanes&#8230; with the exception of their core firewall business, and that is what&#8217;s so fascinating about them. There is also another lesson here- <strong>Do the Work</strong>. Without understanding this breakdown, it&#8217;s easy to miss what&#8217;s currently happening between them. They&#8217;ve not only collectively wrecked the &#8220;firewall is dead&#8221; narrative, customers are actually deciding which vendor to work with on the basis of TCO of their firewall deployments. All of the investments PANW and FTNT have made in other aspects of their businesses have certainly helped their growth, but at the end of the day, customers still need firewalls, and they&#8217;re picking the best firewalls they can get for the price. The interesting thing about the investment FTNT has made in Secure SD-WAN is that it has further increased the value proposition of FTNT&#8217;s firewall, without requiring a separate product offering. They&#8217;ve taken two products and combined them into one.</p><p>So why does this matter? </p><p>Budgets are getting tighter this year across the board. PANW and FTNT have both done multiple price increases over the past couple of years, but FTNT is still the value firewall between the two of them, and FTNT&#8217;s aforementioned growth in Enterprise business it starting to encroach upon PANW&#8217;s. It took a while, but the swim lanes are converging, and FTNT is taking share of the firewall market from PANW. If we were still under the impression PANW&#8217;s growth was primarily being driven by its cloud product portfolio, we may not think losing firewall share to FTNT is that material to their business, but since we&#8217;ve done the work, we now know that is not the case.</p><p>I&#8217;m not in the business of making predictions. I think given the recent run up in stock prices, FTNT and PANW are both facing very high expectations from investors this quarter, at a time when customers are taking more time to make decisions and digest current projects before making big investments in new ones. <strong>The point is really that if FTNT continues to take firewall market share from PANW, this will certainly impact PANW&#8217;s business and therefore its stock price, and I think that&#8217;s a point many investors may overlook. </strong></p><p>FTNT&#8217;s value firewall is an imminent threat for PANW, one that is more imminent than PANW management would like to admit to investors.</p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[$S: The $S Problem and Opportunity]]></title><description><![CDATA[Quick and dirty post-earnings thoughts on $S]]></description><link>https://www.cybersecurityinvestorsanonymous.com/p/s-the-s-problem-and-opportunity</link><guid isPermaLink="false">https://www.cybersecurityinvestorsanonymous.com/p/s-the-s-problem-and-opportunity</guid><dc:creator><![CDATA[Penny Eckel]]></dc:creator><pubDate>Fri, 02 Jun 2023 14:33:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa07c70e1-f686-4673-8df6-a2694489bd41_521x521.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>$S is down big after earnings. They revised prior revenues down $27mm. Obviously it's never good when a company revises past numbers downward. Apparently, their sales reps were using Salesforce in such a way that when a customer wanted to renew a contract and also buy a new upsell item, the sales reps were creating entirely new contracts that included the base product as well as the upsell item. The problem was the old contracts still existed, so they were essentially double counting some of their sales. How an auditor didn't catch this, I have no idea. </p><p>Another issue, and one I suspect had less of an impact on the downward revision, was they were annualizing consumption based revenue. Consumption revenue is not as predictable as subscription revenue. It probably wasn't a big deal when that line item was a small portion of revenue, but became an issue as revenues grew over time. </p><p>Altogether, these were a a $27mm problem. On top of this, they missed and guided revenue down. Once the street can't trust a company's numbers, it's very tough to recover.</p><p>These are the current problems, and they present what I would consider to be a glaring opportunity&#8230; which is that $S is beginning to take the shape of a company that fits the profile of a perfect acquisition target. You can read a previous article on my substack that details my criteria for what makes a good acquisition target, but to summarize:</p><ul><li><p>It&#8217;s Misunderstood</p></li><li><p>It&#8217;s Cheap</p></li><li><p>It Fits the Bill</p></li><li><p>Management has to want to sell</p></li><li><p>The acquisition price needs to clear 52 week highs</p></li></ul><p>How well does $S fit the criteria? A heck of a lot better after that call last night. I&#8217;ll touch on each point. To start, it&#8217;s now <strong>misunderstood</strong> by the street because it misunderstood it&#8217;s own numbers to the point it had to go back and revise them. Not a good look. It&#8217;s already on it&#8217;s way to being hated. It&#8217;s getting <strong>cheap</strong> too, it just took $2B off its market cap after earnings. It <strong>fits the bill</strong> because it has an excellent endpoint solution being used by many enterprise customers and MSSP partners, and any cybersecurity platform provider without a competitive endpoint solution could benefit from adding a solid endpoint to their platform. If <strong>management doesn&#8217;t want to sell yet</strong>, just wait until the pain of a lack of faith and recovery in the stock price wears them down over time. This could take 6+ months to happen. <strong>The acquisition price needs to clear 52 week highs</strong>, and it&#8217;s currently sitting around $30 from Q2 2022, instead of the closer to $50 level it was at in Q1 2022.</p><p>$11.50 is where I plan to start buying heavily, as that's about 3x EV/ARR (Fy24), which is what $SUMO got sold for, and $S is a much better company that $SUMO. I think investors are going to do the math and expect a sale at some point. If I&#8217;m going to hold something for 6 months or more, I want to make sure I have an entry price that can sustain broader market moves without sweating it too much. I do believe we&#8217;re headed for a recession and we will see multiples come in as a result.</p><p>A question I now have is how many other companies have been annualizing consumption-based revenue? A recession could spell trouble for them in more than one way.</p>]]></content:encoded></item><item><title><![CDATA[What makes a good PE acquisition target?]]></title><description><![CDATA[A look at recent public cybersecurity acquisitions and what they have in common]]></description><link>https://www.cybersecurityinvestorsanonymous.com/p/what-makes-a-good-pe-acquisition</link><guid isPermaLink="false">https://www.cybersecurityinvestorsanonymous.com/p/what-makes-a-good-pe-acquisition</guid><dc:creator><![CDATA[Penny Eckel]]></dc:creator><pubDate>Fri, 24 Mar 2023 18:42:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa07c70e1-f686-4673-8df6-a2694489bd41_521x521.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Within the past year or so, a multitude of public cybersecurity companies have been bought (mostly) by PE. So before the next one goes, I thought this would be a good time to talk about what makes a public cybersecurity company a good PE acquisition target. When I think about these characteristics, my goal is to own stocks of companies I think are going to get bought, and to start buying them at levels where I think PE might be interested in them. Let&#8217;s look at some recent acquisitions in the space and outline what they have in common, so you can do the same.</p><p><strong>Recent PE Acquisitions of Public Cybersecurity Companies</strong></p><p>SAIL - acquired by Thoma Bravo</p><p>PING - acquired by Thoma Bravo</p><p>FORG - acquired by Thoma Bravo</p><p>SUMO - acquired by Francisco Partners</p><p>MNDT - acquired by Google (Obviously not PE, but PE was sniffing around this one before Google acquired it, and some of its characteristics were in line with what I&#8217;d consider a good PE target, so I&#8217;m including it)</p><p><strong>Common Characteristics</strong></p><p>It&#8217;s my job as a cybersecurity research consultant for institutional investors to understand what these cybersecurity companies do, how they operate, their management teams&#8217; backgrounds, how they compete in the market, and their financial profiles. It&#8217;s also important for me to understand how analysts and investors think about the companies I research, and the reason is that I can&#8217;t present my research in a way that is helpful unless I understand what it is they want to know about a company.</p><p>After almost 6 years of doing this type of research and seeing companies get acquired over that period of time, it becomes very evident when a company on my coverage list starts looking like an acquisition target. So what are those common characteristics? Using the 5 companies above as examples, let&#8217;s take a look.</p><p><em><strong>It&#8217;s Misunderstood</strong></em></p><p>There are several reasons a company might be misunderstood by the broader investing community, and not just by retail, but by institutional investors and analysts as well. It might be that the company is a niche player, or competing in a niche space, or it may be that their category is too complicated or boring, that they are the only public company in their category, or that they are a small player in a very saturated market and investors don&#8217;t understand how they could possibly compete in it (this was the case for SUMO for a long time). Sometimes a company goes through a lot of change in management or strategy over a period of time, and the stock gets extremely beaten down and no one wants to own it. You might even say these stocks are hated (I would place MNDT in this category of misunderstanding). No matter the reason, companies that get bought by PE are usually misunderstood.</p><p>The first three companies in my list up above, SAIL, PING, and FORG, were all part of the Identity Governance, Management, and Federation spaces. If that sounds extremely boring to you, you&#8217;re not alone. The identity sub sector of cybersecurity isn&#8217;t sexy, and you can tell just by attending their conferences, which are not designed to be flashy, but are educational. By contrast, companies like CRWD and ZS dump a ton of money into marketing and big, fancy booths at the big security conferences. That type of promotional activity also helps their stock because the analysts walking around trying to understand what all of these companies do are naturally going to gravitate to the ones that are more interesting and fun. <em>Interesting and fun companies on the surface do not generally make good PE acquisition targets.</em></p><p>If it&#8217;s well understood, it&#8217;s probably too expensive and doesn&#8217;t need PE help anyway, which brings me to the next characteristic&#8230;</p><p><em><strong>It&#8217;s Cheap</strong></em></p><p>A lot of companies in my coverage list are way too big and expensive for PE. CRWD currently has a $30B market cap and is trading for ~10x revenue&#8230; forget it. We are generally looking for companies that are trading around a $5B market cap or below, which was true for all 5 of the companies in my list up above before they got bought. They should be trading for single digit multiples of revenue, and if they are down in the 2-3x revenue range, that is ideal.</p><p>There are times when a good company goes through a tough time and becomes an excellent value. OKTA is a good example of a company that went through a tough time recently, and if it had remained at the beaten up level it was trading at, I thought it would be an acquisition target. The stock traded down to around $45, which meant OKTA had a roughly $7.5B market cap (a little high for a PE target) and was trading for 3.2x forward revenue. This was a relative bargain though since the other identity companies I listed above were getting bought in the 7-10x revenue range, and OKTA is a market leader with solid growth. As you can see, the stock did not stay that low for long, as many investors understood the relative value and bought it up right away. It now trades around $83, and has a $13.25B market cap. I was buying OKTA heavily below $50. </p><p><em>Side note: This is where understanding fundamentals can have a positive impact on your trading strategy. If you want to see how I use fundamentals to inform my trading, check out my <a href="https://savvytrader.com/Penny/cybersecurity-and-cloud">SavvyTrader portfolio</a>. Coincidentally, OKTA was one of my first entries there.</em></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wnat!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0818033-4770-43da-97b1-2c492a1cee00_1389x236.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wnat!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0818033-4770-43da-97b1-2c492a1cee00_1389x236.png 424w, https://substackcdn.com/image/fetch/$s_!wnat!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0818033-4770-43da-97b1-2c492a1cee00_1389x236.png 848w, https://substackcdn.com/image/fetch/$s_!wnat!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0818033-4770-43da-97b1-2c492a1cee00_1389x236.png 1272w, https://substackcdn.com/image/fetch/$s_!wnat!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0818033-4770-43da-97b1-2c492a1cee00_1389x236.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wnat!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0818033-4770-43da-97b1-2c492a1cee00_1389x236.png" width="1389" height="236" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d0818033-4770-43da-97b1-2c492a1cee00_1389x236.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:236,&quot;width&quot;:1389,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:56539,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wnat!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0818033-4770-43da-97b1-2c492a1cee00_1389x236.png 424w, https://substackcdn.com/image/fetch/$s_!wnat!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0818033-4770-43da-97b1-2c492a1cee00_1389x236.png 848w, https://substackcdn.com/image/fetch/$s_!wnat!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0818033-4770-43da-97b1-2c492a1cee00_1389x236.png 1272w, https://substackcdn.com/image/fetch/$s_!wnat!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0818033-4770-43da-97b1-2c492a1cee00_1389x236.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>You may be wondering why I thought a company as big as OKTA might be an acquisition target. Especially since I just said we&#8217;re generally looking for things under $5B in market cap. Well, it&#8217;s more than just the relative value of OKTA, and that brings me to the next characteristic&#8230;</p><p><em><strong>It Fits the Bill</strong></em></p><p>If you follow a space long enough, you start to notice patterns. A really obvious pattern to the cybersecurity community was that Thoma Bravo seemed to be buying up every identity company on the planet over the past couple of years. They bought SAIL, PING, and FORG just last year. The reason I thought OKTA might be a target for them as well wasn&#8217;t just because it was a relative value, but because Thoma Bravo is clearly building a large Identity portfolio and has some kind of plan in place to dominate the Identity space. For that reason, OKTA fit the bill of a company they might be interested in.</p><p>If you look at the firewall space, you&#8217;ll see that the major players (PANW, FTNT, and CHKP) have all added cloud security capabilities over the past several years, and especially for PANW, it&#8217;s become a huge part of their growth strategy. I bring this up because if you look at the portfolio companies of PE firm Francisco Partners and sort by the Security sector, you&#8217;ll see they have invested in several cloud security solutions already. Further, they own Sonicwall, a mid-market firewall company. It&#8217;s easy to see how a company like SUMO, which offers a cloud observability and security platform, can fit into Francisco Partners&#8217; portfolio of security companies. (If it isn&#8217;t easy to see yet, it will be as you get to know the cybersecurity space. That&#8217;s what I intend to help with)</p><p>So what about MNDT? I think of all the traits MNDT had that made it a good PE acquisition target, this trait was the weakest. It made a lot more sense for Google, a company that is trying to get enterprise customers to take Google Cloud seriously from a security standpoint, to buy MNDT, which for all its weaknesses had some of the most brilliant minds in cybersecurity working for it. I was a huge believer in MNDT, and I might write a separate piece about them because I think there is a lot to learn from their journey if you are trying to better understand the space and how investors think about the companies in it.</p><p>The next point is going to sound obvious, but hear me out&#8230;</p><p><em><strong>Management has to want to sell</strong></em></p><p>Imagine you spend a decade or more building a software company. You put your blood, sweat, and tears into it. You take the company public and learn how to deal with analysts and investors breathing down your neck. Then one day you have a bad quarter or a bad analyst day and your stock takes a nose dive. It probably seems to you like an over-reaction&#8230; wouldn&#8217;t years of strong performance be enough to buy you a little slack over a rough quarter? Not so fast. The market is forward looking, and it doesn&#8217;t take much for the narrative on the street to flip and for the viability of your beloved company&#8217;s future to be called into question. Analysts are building financial models out over several years, and so any change in the numbers today or next quarter can alter those models pretty quickly and crush your valuation via your stock price.</p><p><em>The question is- can you fix it before or after that happens, and do you want to?</em></p><p>For many companies bought by PE, the answer is no. The conditions really have to be right (or wrong) for a management team to want to sell. What contributes to those conditions? This is going to be the most speculative part of this article, but here are some things I think contribute:</p><ul><li><p><strong>Deteriorating market conditions:</strong> Maybe spending has rotated to other areas of security and the outlook is uncertain, or maybe a recession is imminent. Uncertainty is bad for public companies, especially those who are not market leaders or are operating in sectors that are not considered a priority.</p><p></p><p>For example, SAIL offered identity governance solutions which allowed customers to automate and manage the rollout and revocation of employees&#8217; access policies. Before that, they were doing it manually, which they could theoretically do again. In a recession, will a customer buy that tool, or allocate dollars to securing endpoints? Endpoint security cannot be done manually.</p></li><li><p><strong>They&#8217;re tired: </strong>Some of these founders and management teams have just been doing it forever, and I think they are just tired. The founder of SAIL has been working in the space for 35 years, and the CEO of PING has been running the company for 21 years. </p><p></p><p>Kevin Mandia, who took over as CEO of FEYE before it became MNDT, is just a super smart guy who wants to make the world a more secure place, and he got stuck with trying to run a product company after Dave DeWalt blew up FEYE&#8217;s stock price. Kevin Mandia was a services guy, not a product guy. I think he was tired of fighting to show investors the value, and getting folded into Google will give him an opportunity to focus on what he actually cares about. </p><p></p><p>SUMO&#8217;s CEO didn&#8217;t found the company, and had some bad luck with timing, going public shortly before the pandemic, and having to do layoffs right as they were gaining traction going upmarket into enterprise, and then just fighting to get that company to a good place with a new management team around him.</p><p></p><p>By contrast, OKTA&#8217;s CEO founded the company and is younger and hungrier to keep going, and I think that would&#8217;ve prevented a sale to PE anyway. No way a bad quarter or two is going to convince him to sell the company for less than what he thinks it will one day be worth.</p><p></p><p>Watch management teams present at their analyst days and pay attention to the level of enthusiasm on earnings calls to get a hint about how they&#8217;re feeling.</p></li><li><p><strong>They&#8217;re distressed or going through a transition: </strong>In many cases, companies can see the writing on the wall due to internal and external factors. A PE firm might buy a company and take it private, help them through a transition, and take them public again. An example of a transition might be a company that is struggling with transtioning from a perpetual licensing model to subscription, and they may be doing that as they&#8217;re trying to get their customers moved over to a cloud-based version of their product. Maybe they are also transitioning to a new management team.</p><p></p><p>When public companies go through these types of transitions and they don&#8217;t go as smoothly as expected, it gives investors a view into the sausage being made, which can tarnish the image of a public company from an investor&#8217;s eyes. I think SPLK is a company whose stock price is suffering from a prolonged and muddy transition, but other characteristics do not make it a good PE target.</p></li></ul><p><em><strong>Final Rule of Thumb: The acquisition price needs to clear 52 week highs</strong></em></p><p>Investors are not likely to agree to a PE buyout of a stock that has had a temporary pullback due to a bad quarter or a broader market selloff. For example, SentinelOne ($S) is an excellent endpoint security company that currently has a market cap under $5B, and is trading for ~5.5x revenue. What PE firm wouldn&#8217;t like to own it for that price given it&#8217;s very high growth rate? The trouble is if you look at the stock price, it&#8217;s 52 week high is $41.68, and no PE firm is going to pay that much per share to acquire it. Why does the 52 week high matter? Because if you&#8217;re an investor you are expecting the stock to get back there eventually, only time can cause you to lose hope. Why would you take $20/share when it was trading at twice that less than a year ago?</p><p>Now, starting in Q4 of 2022, it started getting down into the $15/share range, which is where it&#8217;s currently trading. If the stock hasn&#8217;t rallied much from where it&#8217;s at now, then in Q4 of this year, once it&#8217;s 52 week high is in the $15 range instead of $41.68, I will be looking at it as a certainty for acquisition. That could be by PE or another cybersecurity platform company. I think it&#8217;s a good value at this price, but it could dip lower into the $12-13 area, where I will be a heavy buyer. Could a non-PE buyer try to swoop in now? Of course, but remember, management has to want to sell.</p><p><em>The companies that get bought by PE have generally been trading lower or sideways for over a year.</em></p><p><strong>Going Forward: Companies I Think Meet The Criteria</strong></p><p>Now that I&#8217;ve outlined these common characteristics of companies that make good PE acquisition targets, I&#8217;m going to be writing about some I think are shaping up to be potential targets. Recessions are the perfect time for PE to go shopping, as multiples compress and valuations become more reasonable. This means good setups for investors who know what to look for.</p>]]></content:encoded></item><item><title><![CDATA[$FTNT and $PANW: How $FTNT rose to become a serious enterprise Security Platform leader]]></title><description><![CDATA[TLDR: This is a brief history of the firewall market and security platform, and how $FTNT rose to compete directly with $PANW.]]></description><link>https://www.cybersecurityinvestorsanonymous.com/p/ftnt-and-panw-how-ftnt-rose-to-become</link><guid isPermaLink="false">https://www.cybersecurityinvestorsanonymous.com/p/ftnt-and-panw-how-ftnt-rose-to-become</guid><dc:creator><![CDATA[Penny Eckel]]></dc:creator><pubDate>Tue, 31 Jan 2023 20:17:53 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/2f6d90e1-6bc4-4c19-861a-d90a987762f8_707x655.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>TLDR: This is a brief history of the firewall market and security platform, and how $FTNT rose to compete directly with $PANW. If you&#8217;d like to see my active positions, I put them on my <a href="https://savvytrader.com/Penny/cybersecurity-and-cloud">Savvy Trader Profile</a>. You can also see my performance there.</p><h4>A (very) Brief History of Next-Gen Firewalls and Security Platforms</h4><p>Six years ago, when I started in the space, $PANW was still riding the massive wave it had created in the firewall business with its next-gen firewall capabilities. The next-gen capabilities essentially took what required 3 different hardware appliances from 3 different vendors at an enterprise level, and condensed those requirements down to a single operation on a single $PANW appliance, using what they referred to as their &#8220;single pass architecture.&#8221;</p><p>Prior to $PANW arriving on the scene, its big pure play competitor in the enterprise firewall space, $CHKP, had only offered one of those required appliances and operations. $FTNT was not considered an enterprise firewall vendor until a bit later, when they started making major inroads upmarket in 2018-2019, as firewall features approached better parity with $PANW&#8217;s and cost-conscious enterprise customers began looking for something cheaper than $PANW, but more advanced than $CHKP. </p><p>Even before $PANW&#8217;s arrival, $FTNT was in the UTM space, which was a way for mid-market companies to buy a single appliance that performed all 3 capabilities for a lower cost, but its architecture couldn&#8217;t support enterprise network traffic volumes. Single pass architecture made $PANW&#8217;s appliance more performant, and able to handle enterprise traffic volumes. When other vendors like $FEYE popped up and added things like sand-boxing, $PANW was able to easily add similar modules to its appliance and maintain its single pass capabilities. </p><p>This was really the advent of the security platform. The next step in the evolution of the security platform was all of the security vendors deciding what kind of security platforms they were going to be when they grew up. The answers were somewhat different depending on what area of security the vendor serviced (i.e. network security, endpoint, identity, etc.) but for this piece, I will focus on explaining what it meant for firewall vendors like $PANW and $FTNT.</p><p>**Please keep in mind that I just reduced the history of the next-gen firewall market and security platform into a few paragraphs, and that required some simplification.</p><h4>The Cloud &#8230; dun dun dun</h4><p>Sometime around 2019, while security vendors were starting to add new capabilities to their offerings, the traditional firewall market was cooling off a bit. MSFT&#8217;s Azure and AMZN&#8217;s AWS cloud platforms were taking off, and that meant fewer hardware firewalls were being bought for customers&#8217; on-prem networks. Firewall vendors were being forced to decide more quickly how they were going to grow their security platforms - and their businesses - going forward. This is where the deviation in strategy between $PANW and $FTNT really became evident.</p><p>$PANW, whose customer base is comprised almost entirely of enterprise customers, hired a new CEO and headed down the cloud security path at a rapid pace. They bought up several cloud security startups at big premiums and started integrating them into their platform. We know from looking at the stock price that focusing on cloud security has been a successful strategy for them (if you ignore the recent sell-off and zoom out to 2019). Now, even though $PANW sells all of those cloud modules, it&#8217;s important to note that 70% of their business is in what they call &#8220;Network Security.&#8221; Network Security includes hardware firewall appliances, virtual firewalls, and SASE (their $ZS competitive product). It does not include their Cloud Security or SOC Security offerings. This is important when it comes to competition, especially from $FTNT, and the impact on PANW&#8217;s overall business. Pesky $FTNT, who was once an ankle biter, is now a formidable competitor. You may be wondering; how did that happen? I&#8217;ve got 4 reasons for you.</p><h4>Fortinet&#8217;s Security Platform Strategy</h4><p>When forced like other security vendors to decide where to go next due to the shift to cloud, $FTNT took a different approach. It doubled down on on-prem security and network offerings. Initially, that didn&#8217;t seem like the best idea, especially to investors who were all abuzz about cloud taking over the world, but it&#8217;s actually worked out for them. Here&#8217;s how they did it:</p><ol><li><p>$FTNT integrated SD-WAN capabilities into its proprietary firewall appliances, and once customers began to understand the advantages, they were selling like hotcakes. The best part for customers was (and still is) the SD-WAN capabilities were free with firewall appliance purchases. It&#8217;s hard to compete with free if you&#8217;re $PANW&#8230; they&#8217;ve been developing their own SD-WAN capabilities for their firewall appliances, but it hasn&#8217;t sold well. One might assume it&#8217;s because it doesn&#8217;t work well since they&#8217;ve been successful at selling pretty much everything else. They also bought a cloud SD-WAN company (CloudGenix) and added it as a module, but it&#8217;s expensive. Because of this, $PANW has not made much progress in SD-WAN.</p></li></ol><ol><li><p>$FTNT took an additional step with its platform strategy by building out its security offerings in the OT (Operational Tech) space. OT is all of the equipment running in hospitals, airports, utility companies, on factory floors, like machine tools, automated pumping mechanisms, etc. That OT security business has been growing ~50% a year, granted it was off a small base, but it&#8217;s not so small anymore.</p></li><li><p>Since $FTNT worked its way up-market from servicing SMB and Mid-market customers, it has a smaller share of the enterprise, but its customer base is about 3-4 times the size of $PANW&#8217;s. It offers security platforms at each level, which provides additional expansion opportunities and further diversifies its business. One thing to keep in mind is that smaller companies may not fare as well in a recession, so $FTNT does have some exposure there.</p></li><li><p>$FTNT firewalls are 25-30% cheaper than PANW&#8217;s, and lately the channel partners of these companies, and subsequently their customers, are recognizing the capabilities of the firewalls as &#8220;good enough&#8217; when compared to $PANW&#8217;s. $FTNT&#8217;s price performance leadership and &#8220;good enough&#8221; firewall feature parity are very attractive to enterprise customers, especially in a recession, and extra especially when $PANW&#8217;s pricing is fast approaching a ceiling for what customers are willing to pay for it.</p></li></ol><p>This is how $FTNT is narrowing the gap between its own share of the enterprise firewall market and that of $PANW&#8217;s.</p><p>Both companies have done well, and it would be easy to chalk that up to a healthy firewall market, but I think these nuances are really important if you are an investor in either company going forward, especially given how different their strategies are. I&#8217;ll write a lot more about PANW and FTNT in the future, but I thought this would be a good primer if you&#8217;re coming into it with no prior knowledge about the firewall market.   </p><h4>What about $CHKP?</h4><p>I didn&#8217;t spend much time on $CHKP, so you might be wondering; how does $CHKP fit into all this? Well, the profile of a $CHKP customer is they are generally slow-moving and not first adopters, or even second or third adopters of new technology. They are not rushing to the cloud right away to try new things, or making massive changes to their network architectures, and as a result, $CHKP has a really steady business. It&#8217;s not growing fast, but it&#8217;s not going anywhere fast either. Their management team is also quite conservative, which minimizes surprises during earnings season, but frustrates investors who feel they could be doing more to promote and market their business, and to compete with $PANW and $FTNT in other areas. $CHKP is a company I buy as a defensive name when cloud stocks are getting sold. It usually trades in a nice range, and again, there are very few surprises with this company.</p><p></p><div><hr></div><p>If you are an institutional investor and would like to subscribe to our professional research down the road, you can find me on <a href="https://www.linkedin.com/in/penny2129/">LinkedIn</a>.</p><p><strong>Disclosure:</strong>&nbsp;I am not an Investment Advisor, and the information I provide through this publication is not investment advice. Do your own research.</p><p>You can see my positions, performance, and general market commentary here:</p><p><a href="https://savvytrader.com/Penny/cybersecurity-and-cloud">Cybersecurity Portfolio on Savvy Trader</a></p><p>I wrote this article myself, and it expresses my own opinions. I am not receiving compensation for it (other than through Substack, when the time comes). I have no business relationship with any company whose stock is mentioned in this article.</p>]]></content:encoded></item><item><title><![CDATA[$CRWD and $S: Fighting it out in a recession-strained Endpoint Security market]]></title><description><![CDATA[TLDR: Although I&#8217;ve been bullish on both vendors for a long time, recent news has introduced risk and reframed my thinking on both $CRWD and $S in the near term.]]></description><link>https://www.cybersecurityinvestorsanonymous.com/p/crwd-and-s-fighting-it-out-in-a-recession</link><guid isPermaLink="false">https://www.cybersecurityinvestorsanonymous.com/p/crwd-and-s-fighting-it-out-in-a-recession</guid><dc:creator><![CDATA[Penny Eckel]]></dc:creator><pubDate>Tue, 31 Jan 2023 19:00:50 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e93a1407-4094-4b08-b042-d5a7c1b6970d_707x655.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>TLDR: Although I&#8217;ve been bullish on both vendors for a long time, recent news has introduced risk and reframed my thinking on both $CRWD and $S in the near term.</p><p>I have been bullish on $CRWD since before they went public, when I had an opportunity to talk with a Product Manager about their architecture. I knew they were going to be disruptive, and the acquisitions of Cylance, Carbon Black, and Symantec really created an environment in which $CRWD could flourish in a saturated endpoint market. With $S, which went public more recently, I really wanted to wait and see how things played out before making any decisions about how effective they were going to be competing with $CRWD. </p><p>What I came to realize is that in a vast market with a lot of legacy players, there was plenty of room for $CRWD and $S to do well swimming in their own lanes, and I&#8217;ve been bullish on both despite the fact many analysts and investors were talking about how the newly public $S was going to encroach on $CRWD&#8217;s business. You can look back on $CRWD&#8217;s chart and see where the narrative started to change after $S IPO&#8217;d. As these two vendors grow their businesses, it naturally follows that they will compete more heavily as time goes on, and while that was happening to a small degree last year, now we have a catalyst for acceleration. So what is it?<br><br>The catalyst that has forced $CRWD and $S&#8217;s lanes to converge more rapidly is the fear of a recession. Gone are the days of blank check enterprise security budgets. Customers (those of CRWD and S) are going to be analyzing budgets across the board with much more scrutiny. They&#8217;re going to ask the tough questions like, &#8220;Why are you so much more expensive than X vendor?&#8221; To be honest, I wasn&#8217;t convinced recession fears were much of a catalyst for anything other than customers pausing to consider their budgets, which would only create short term demand hiccups and not actual demand destruction as far at the endpoint space was concerned. However, a <a href="https://www.crn.com/news/security/crowdstrike-poaches-two-execs-from-rival-sentinelone">headline</a> from the week before last announcing $CRWD had poached $S&#8217;s CMO and CPO (of 5 years) changed my thinking. Why?<br><br>It's important to understand that $CRWD is a market leader in its segment, and is widely considered the best of the best when it comes to endpoint security. By who? The cybersecurity channel that resells and implements security solutions for a variety of vendors, by customers, and by investors. It&#8217;s not easy to build an excellent reputation in the channel as a new vendor, and yet, $CRWD has managed to do it in only a few years. They did it by developing a solid product, great marketing, and a winning channel program. None of those things have changed. It begs the question- why does a company with excellence in all three areas need to steal executive level talent from what is considered by many to be its biggest competitor? I think the answer is obvious. They have more money than $S, and they did it to handicap their competition. I can&#8217;t judge them too harshly for that, but unfortunately, I, along with other investors, are going to see this as an act of desperation. In many ways it validates that narrative that was wrong for so long about how $S was encroaching on their business. Now we know for sure that it is.</p><p>Unfortunately for $S, this is in no way a positive for them either. Going into a recession, and to the extent it actually materializes, I had been of the opinion $S had an advantage over $CRWD in that the base cost of their solution had been running about ~25% cheaper than $CRWD. Some might say it doesn&#8217;t have all the bells and whistles of $CRWD&#8217;s solution, but who is buying bells and whistles in a recession anyway? Further, many channel partners are of the opinion the solutions are at enough parity to be competitive, and clearly they are or $CRWD would not be stealing talent. So what is $CRWD doing with those two new hires they stole from $S?<br><br>The ex-CMO of $S will now be in charge of Channel at $CRWD, and will help them move down market. The ex-CPO of $S will continue as CPO at $CRWD and will oversee data, identity, cloud, and endpoint. This is a good time to mention that for most cybersecurity vendors, the Channel is absolutely critical to their sales and growth initiatives. I don&#8217;t need to explain why this is bad for $S, there has never been a time where losing 2 key executives to a competitor has been a net positive for a company. The more interesting thing is how this could impact $CRWD negatively, other than the &#8220;validating the competition narrative&#8221; I outlined earlier. Imagine you work at $CRWD for years to develop an amazing channel program and build a highly competitive product. You&#8217;re crushing it. You&#8217;re warding off ankle biters left and right, and then suddenly the CEO you work for hires the guy you&#8217;ve been competing against for all these years and makes him your boss, rather than promoting you, or at least putting him under you. I can&#8217;t say I would be pleased about that personally, or that I would be very motivated to continue working at $CRWD. It feels a bit like they&#8217;re cutting off their nose to spite their face. In turn, $S announced several new executive hires this morning, including $CRWD&#8217;s Global VP of Product Marketing.</p><p>Anyway, it&#8217;s going to be a very interesting earnings cycle, and while there&#8217;s no way to know for certain, I&#8217;m not expecting either vendor to blow it out of the water, especially when it comes to guidance. I believe $S will experience some short term difficulties as a result of the news, but nothing they can&#8217;t recover from. We will see if $CRWD is able to successfully move down market- their growth rate (and stock price) depends on it.</p><div><hr></div><p>If you are an institutional investor and would like to subscribe to our professional research down the road, you can find me on <a href="https://www.linkedin.com/in/penny2129/">LinkedIn</a>.</p><p><strong>Disclosure:</strong>&nbsp;I am not an Investment Advisor, and the information I provide through this publication is not investment advice. Do your own research.</p><p>You can see my positions, performance, and general market commentary here:</p><p><a href="https://savvytrader.com/Penny/cybersecurity-and-cloud">Cybersecurity Portfolio on Savvy Trader</a></p><p>I wrote this article myself, and it expresses my own opinions. I am not receiving compensation for it (other than through Substack, when the time comes). I have no business relationship with any company whose stock is mentioned in this article.</p>]]></content:encoded></item><item><title><![CDATA[Coming soon]]></title><description><![CDATA[This is Cybersecurity Investors Anonymous.]]></description><link>https://www.cybersecurityinvestorsanonymous.com/p/coming-soon</link><guid isPermaLink="false">https://www.cybersecurityinvestorsanonymous.com/p/coming-soon</guid><dc:creator><![CDATA[Penny Eckel]]></dc:creator><pubDate>Tue, 31 Jan 2023 18:46:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-BT_!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa07c70e1-f686-4673-8df6-a2694489bd41_521x521.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This is Cybersecurity Investors Anonymous.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecurityinvestorsanonymous.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecurityinvestorsanonymous.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item></channel></rss>