LOGO

Container Security Acquisitions Surge with Cloud Adoption

February 8, 2021
Container Security Acquisitions Surge with Cloud Adoption

Recent Surge in Container Security Acquisitions

The past week witnessed another significant event in the container security landscape, with Rapid7’s acquisition of Alcide for $50 million. This purchase exemplifies a growing trend of larger organizations actively acquiring cloud-native security startups. The question arises: what is driving this increased merger and acquisition activity within this specific sector?

Early Movers and Subsequent Acquisitions

Palo Alto Networks initiated this trend, securing Twistlock for $410 million in May 2019. VMware followed suit a year later with the acquisition of Octarine. Subsequently, Cisco added PortShift to its portfolio in October, and Red Hat completed the acquisition of StackRox last month, preceding Rapid7’s recent move.

Accelerated Cloud Adoption

The accelerated shift towards cloud-native strategies, particularly during the pandemic, has undeniably heightened the focus on security. However, attributing the current acquisition wave solely to COVID-19 would be an oversimplification, as companies were already progressing in this direction prior to the pandemic’s onset.

Market Saturation and Platform Consolidation

It’s crucial to recognize that security startups specializing in a niche area, such as container security, often experience market saturation more rapidly than those offering broader solutions. Customers frequently prioritize consolidating onto a single platform, rather than managing a fragmented collection of vendors and integrating their disparate systems.

Understanding Containers and Kubernetes

Containers offer a method for software delivery by dividing large applications into smaller, independent components called microservices. These microservices are then packaged and deployed within containers. Kubernetes functions as the orchestration layer, managing container deployment and termination.

The Security Challenges of Automation

This high degree of automation introduces unique security challenges, demanding meticulous container configuration and protection against potential vulnerabilities. The sheer number of variables involved, coupled with the transient nature of containers, complicates this task considerably.

Investment Firm Perspective

Yoav Leitersdorf, managing partner at YL Ventures, a security-focused investment firm, highlights that these challenges are fueling the interest of larger companies in container security startups. “These acquisitions are strategically filling gaps in the security capabilities offered by established players,” he stated.

Shifting Workload Dynamics

Leitersdorf further explains that the changing nature of workloads, migrating from traditional on-premise environments to cloud-native architectures (including containers and serverless computing), is a key driver. “Major cloud providers are leading this migration, necessitating security vendors to address this expanding segment,” he added.

Market Consolidation is Inevitable

Sandy Carielli, a cybersecurity analyst at Forrester, emphasizes that the acquisition trend extends beyond workload shifts. She believes companies specializing in a single domain, like container security, are prime targets for acquisition by larger organizations. She predicts that within the next year, independent container security vendors will be rare.

Expansion into Adjacent Markets

“This market was poised for consolidation. Over the past few years, several container security specialists have gained recognition, while others have focused on niche applications or struggled with market visibility. Even the leading container security firms are now expanding into related areas like serverless security and software composition analysis,” Carielli noted.

Unique Container Architecture

Enrique Saleem, a partner at Bain Capital with extensive experience in security investments, points to the unique architecture of containers as a contributing factor. “Containers differ fundamentally from traditional systems, and existing security solutions often lack visibility into containerized environments—a critical requirement for effective security,” he explained.

Build vs. Buy Decision

Consequently, customers often seek out newer, container-focused startups to address these challenges. Larger companies, rather than developing new functionality internally, often opt to acquire expertise. “Existing security companies are recognizing this and are prioritizing acquisitions to gain container and cloud expertise,” Saleem said.

A Continuously Evolving Landscape

Shuly Galili, founding partner at UpWest, emphasizes that security is a constantly evolving field, with markets shifting in response to changing requirements. As one area consolidates, new opportunities emerge, fostering continued growth within the security startup ecosystem.

Expanding Cloud Adoption and New Opportunities

“Cloud adoption is progressing and presents a substantial market opportunity for new startups. Industries with legacy infrastructure, such as healthcare and manufacturing, are increasingly migrating to the cloud, recognizing the need for improved efficiency and innovation,” she stated. The pandemic served as a catalyst for this realization.

The Rise of Kubernetes and AI

This shift has created new opportunities to address emerging challenges. “As Kubernetes becomes the standard cloud operating system, the demand for innovative services—including streamlined deployments, artificial intelligence, and risk management—is growing rapidly,” Galili explained.

Emerging Threats and Data Security

Leitersdorf also anticipates the emergence of new cloud security threats as organizations navigate new attack vectors and vulnerabilities in cloud-native environments. He foresees growing markets in various areas, particularly data security within these environments.

The Future of Cloud Security

“An interesting area we’ll see increased activity in is data security within cloud-native environments. New capabilities around data flow mapping and technologies such as distributed tracing will enable a new category of companies,” he concluded.

#container security#cloud security#acquisitions#cloud adoption#cloud native#cybersecurity