Apple, Alphabet, Amazon, Microsoft, and Tesla are considered the five most innovative companies, according to BCG’s analysis of the 50 most innovative companies of 2021.
Abbott Labs, AstraZeneca, Comcast, Mitsubishi, and Moderna join the top 50 most innovative companies for the first time this year.
The fastest movers include Toyota, who jumped from 41st to 21st; Salesforce, who jumped from 35th to 22nd; and Coca-Cola, who jumped from 48th to 28th.
90% of companies that outperform on innovation outcomes demonstrate clear C-suite ownership of the innovation agenda.
These and many other insights are from the Boston Consulting Group’s (BCG) 15th annual report defining the world’s 50 most innovative companies in 2021. BCG surveyed 1,500 global innovation executives and found a 10% point increase, to 75%, in executives reporting that innovation is a top-three priority at their companies today. That’s the most significant year-over-year increase in the 15 global innovation surveys BCG has conducted since 2005. BCG’s Most Innovative Companies 2021: Overcoming the Innovation Readiness Gap is available for download free here (28 pp., PDF). This years’ report methodology focuses on identifying the factors causing a large innovation readiness gap between the world’s most innovative companies and their peers across industries. Please see page 23 of the study for the methodology.
Key insights from BCGs’ most innovative companies of 2020 include the following:
Creating a new COVID-19 vaccine in less than a year, inventing test kits in weeks to protect public health, and redefining online shopping and safe home delivery reflect the versatility of the world’s most innovative companies in 2021. Pzifer, Moderna, and Merck & Company’s innate ability to innovate gave everyone a decade of their lives back. Delivering a vaccine in a year when the initial projection was a decade reflects the innovative efficiency of these companies. 2021 is the first year Abbott Labs, who invented and scaled the production of COVID-19 test kits, is included in the 50 most innovative companies worldwide. Amazon and Walmart’s logistics and e-commerce expertise helped ensure safe online shopping and fast home delivery was available to millions of people under stay-at-home orders.
Five factors most differentiate the most and least innovative companies. The basis of BCG’s methodology to identify the 50 most innovative companies in 2021 centers on their innovation-to-impact (i2i) framework. The framework is designed to help companies measure the readiness of their innovation programs to operate at a consistently high level of efficiency and effectiveness. The BCG i2i scoring system identified five factors that most differentiate innovative company leaders and laggards. The five factors that best indicate how innovative a company has the potential to be are shown in the following graphic:
Lack of collaboration between sales, marketing & R&D is the major obstacle to innovation. 31% of all companies surveyed see poor collaboration between marketing and R&D as the most significant obstacle to improving the return on their innovation investments. According to BCG, the collaboration between marketing, sales, and R&D is the most challenging in the Pharmaceutical industry, where 42% of respondents say it’s the biggest hurdle to achieving more significant returns on innovation.
Digital transformation of the core business is now a top priority for 75% of CEOs, and 65% of firms are doubling down on their plans for transformation with renewed urgency. BCG identified six success factors that together—and only together—flip the odds of digital transformation success from 30% to 80%. Those six success factors are close integration of digital strategy with the business strategy, commitment from the CEO through middle management, a talent core of digital superstars, business-led and flexible technology and data platforms, agile governance, and effective monitoring of progress toward defined outcomes.
Companies that know how to collaborate quickly between customer and R&D teams have an inside edge on being innovation leaders. The world’s most innovative companies also have senior management teams committed to the long-term success of nascent, unproven programs. There’s greater tolerance for risk, more of a focus on customers first and innovating around their needs, and an intuitive sense of how to close innovation gaps that hold other companies back.
There are a record number of 9,977 machine learning startups and companies in Crunchbase today, an 8.2% increase over the 9,216 startups listed in 2020 and a 14.6% increase over the 8,705 listed in 2019.
Artificial Intelligence (A.I.) and machine learning (ML)-related companies received a record $27.6 billion in funding in 2020, according to Crunchbase.
Of those A.I. and machine learning startups receiving funding since January 1, 2020, 62% are seed rounds, 31% early-stage venture rounds and 6.7% late-stage venture capital-funded rounds.
A.I. and machine learning startups’ median funding round was $4.4 million and the average was $29.8 million in 2020, according to Crunchbase.
Throughout 2020, venture capital firms continued expanding into new global markets, with London, New York, Tel Aviv, Toronto, Boston, Seattle and Singapore startups receiving increased funding. Out of the 79 most popular A.I. & ML startup locations, 15 are in the San Francisco Bay Area, making that region home to 19% of startups who received funding in the last year. Israel’s Tel Aviv region has 37 startups who received venture funding over the last year, including those launched in Herzliya, a region of the city known for its robust startup and entrepreneurial culture.
The following graphic compares the top 10 most popular locations for A.I. & ML startups globally based on Crunchbase data as of today:
Top 20 Machine Learning Startups To Watch In 2021
Augury – Augury combines real-time monitoring data from production machinery with AI and machine learning algorithms to determine machine health, asset performance management (APM) and predictive maintenance (PdM) to provide manufacturing companies with new insights into their operations. The digital machine health technology that the company offers can listen to the machine, analyze the data and catch any malfunctions before they arise. This enables customers to adjust their maintenance and manufacturing processes based on actual machine conditions. The platform is in use with HVAC, industrial factories and commercial facilities.
Alation – Alation is credited with pioneering the data catalog market and is well-respected in the financial services community for its use of A.I. to interpret and present data for analysis. Alation has also set a quick pace to evolving its platform to include data search & discovery, data governance, data stewardship, analytics and digital transformation. With its Behavioral Analysis Engine, inbuilt collaboration capabilities and open interfaces, Alation combines machine learning with human insight to successfully tackle data and metadata management challenges. More than 200 enterprises are using Alation’s platform today, including AbbVie, American Family Insurance, Cisco, Exelon, Finnair, Munich Re, New Balance, Pfizer, Scandinavian Airlines and U.S. Foods. Headquartered in Silicon Valley, Alation is backed by leading venture capitalists including Costanoa, Data Collective, Icon, Sapphire and Salesforce Ventures.
Algorithmia – Algorithmia’s expertise is in machine learning operations (MLOps) and helping customers deliver ML models to production with enterprise-grade security and governance. Algorithmia automates ML deployment, provides tooling flexibility, enables collaboration between operations and development and leverages existing SDLC and CI/CD practices. Over 110,000 engineers and data scientists have used Algorithmia’s platform to date, including the United Nations, government intelligence agencies and Fortune 500 companies.
Avora – Avora is noteworthy for its augmented analytics platform, making in-depth data analysis intuitively as easy as performing web searches. The company’s unique technology hides complexity, empowering non-technical users to run and share their reports easily. By eliminating the limitations of existing analytics, reducing data preparation and discovery time by 50-80% and accelerating time to insight, Avora uses ML to streamline business decision-making. Headquartered in London with offices in New York and Romania, Avora helps accelerate decision making and productivity for customers across various industries and markets, including Retail, Financial Services, Advertising, Supply Chain and Media and Entertainment.
Boast.ai – Focused on helping companies in the U.S. and Canada recover their R&D costs from respective federal governments, Boast.ai enables engineers and accountants to gain tax credits using AI-based tools. Some of the tax programs Boast.ai works with include US R&D Tax Credits, Scientific Research and Experimental Development (SR&ED) and Interactive Digital Media Tax Credits (IDMTC). The startup has offices in San Francisco, Vancouver and Calgary.
ClosedLoop.ai – An Austin, Texas-based startup, ClosedLoop.ai has created one of the healthcare industry’s first data science platforms that streamline patient experiences while improving healthcare providers’ profitability. Their machine learning automation platform and a catalog of pre-built predictive and prescriptive models can be customized and extended based on a healthcare provider’s unique population or client base needs. Examples of their technology applications include predicting admissions/readmissions, predicting total utilization & total risk, reducing out-of-network utilization, avoiding appointment no-shows, predicting chronic disease onset or progression and improving clinical documentation and reimbursement. The Harvard Business School, through its Kraft Precision Medicine Accelerator, recently named ClosedLoop.ai as one of the fastest accelerating companies in its Real World Data Analytics Landscapes report.
Databand – A Tel Aviv-based startup that provides a software platform for agile machine learning development, Databand was founded in 2018 by Evgeny Shulman, Joshua Benamram and Victor Shafran. Data engineering teams are responsible for managing a wide suite of powerful tools but lack the utilities they need to ensure their ops are running properly. Databand fills this gap with a solution that enables teams to gain a global view of their data flows, make sure pipelines complete successfully and monitor resource consumption and costs. Databand fits natively in the modern data stack, plugging seamlessly into tools like Apache Airflow, Spark, Kubernetes and various ML offerings from the major cloud providers.
DataVisor – DataVisor’s approach to using AI for increasing fraud detection accuracy on a platform level is noteworthy. Using proprietary unsupervised machine learning algorithms, DataVisor enables organizations to detect and act on fast-evolving fraud patterns and prevent future attacks before they happen. Combining advanced analytics and an intelligence network of more than 4.2B global user accounts, DataVisor protects against financial and reputational damage across various industries, including financial services, marketplaces, e-commerce and social platforms. They’re one of the more fascinating cybersecurity startups using AI today.
Exceed.ai – What makes Exceed.ai noteworthy is how their AI-powered sales assistant platform automatically communicates the lead’s context and enables sales and marketing teams to scale their lead engagement and qualification efforts accordingly. Exceed.ai follows up with every lead and qualifies them quickly through two-way, automated conversations with prospects using natural language over chat and email. Sales reps are freed from performing error-prone and repetitive tasks, allowing them to focus on revenue-generating activities such as phone calls and demos with potential customers.
Indico – Indico is a Boston-based startup specializing in solving the formidable challenge of how dependent businesses are on unstructured content yet lack the frameworks, systems and tools to manage it effectively. Indico provides an enterprise-ready A.I. platform that organizes unstructured content while streamlining and automating back-office tasks. Indico is noteworthy given its track record of helping organizations automate manual, labor-intensive, document-based workflows. Its breakthrough in solving these challenges is an approach known as transfer learning, which allows users to train machine learning models with orders of magnitude fewer data than required by traditional rule-based techniques. Indico enables enterprises to deploy A.I. to unstructured content challenges more effectively while eliminating many common barriers to A.I. & ML adoption.
LeadGenius – LeadGenius is noteworthy for its use of AI to provide personalized and actionable B2B lead information that helps its clients attain their global revenue growth goals. LeadGenius’s worldwide team of researchers uses proprietary technologies, including AI and ML-based techniques, to deliver customized lead generation, lead enrichment and data hygiene services in the format, methods and frequency defined by the customer. Their mission is to enable B2B sales and marketing organizations to connect with their prospects via unique and personalized data sets.
Netra – Netra is a Boston-based startup that began as part of MIT CSAIL research and has multiple issued and pending patents on its technology today. Netra is noteworthy for how advanced its video imagery scanning and text metadata interpretation are, ensuring safety and contextual awareness. Netra’s patented A.I. technology analyzes videos in real-time for contextual references to unsafe content, including deepfakes and potential cybersecurity threats.
Particle – Particle is an end-to-end IoT platform that combines software including A.I., hardware and connectivity to provide a wide range of organizations, from startups to enterprises, with the framework they need to launch IoT systems and networks successfully. Particle customers include Jacuzzi, Continental Tires, Watsco, Shifted Energy, Anderson EV, Opti and others. Particle is venture-backed and has offices in San Francisco, Shenzhen, Las Vegas, Minneapolis and Boston. Particle’s developer community includes over 200,000 developers and engineers in more than 170 countries today.
RideVision – RideVision was founded in 2018 by motorcycle enthusiasts Uri Lavi and Lior Cohen. The company is revolutionizing the motorcycle-safety industry by harnessing the strength of artificial intelligence and image-recognition technology, ultimately providing riders with a much broader awareness of their surroundings, preventing collisions and enabling bikers to ride with full confidence that they are safe. RideVision’s latest round was $7 million in November of last year, bringing their total funding to $10 million in addition to a partnership with Continental AG.
Savvie – Savvie is an Oslo-based startup specializing in translating large volumes of data into concrete actions that bakery and café owners can utilize to improve their bottom line every day. In doing so, we help food businesses make the right decisions to optimize their operations and increase profitability while reducing waste at its source. What’s noteworthy about this startup is how adept they are at fine-tuning ML algorithms to provide their clients with customized recommendations and real-time insights about their food and catering businesses. Their ML-driven insights are especially valuable given how bakery and café owners are pivoting their business models in response to the pandemic.
SECURITI.ai – One of the most innovative startups in cybersecurity, combining AI and ML to secure sensitive data in multi-cloud and mixed platform environments, SECURITI.ai is a machine learning company to watch in 2021, especially if you are interested in cybersecurity. Their AI-powered platform and systems enable organizations to discover potential breach risk areas across multi-cloud, SaaS and on-premise environments, protect it and automate all private systems, networks and infrastructure functions.
SkyHive – SkyHive is an artificial intelligence-based SaaS platform that aims to reskill enterprise workforces and communities. It develops and commercializes a methodology, Quantum Labor Analysis, to deliver real-time, skill-level insights into internal workforces and external labor markets, identify future and emerging skills and facilitate individual-and company-level reskilling. SkyHive is industry-agnostic and supporting enterprise and government customers globally with a mission to reduce unemployment and underemployment. Sean Hinton founded the technology company in Vancouver, British Columbia, in 2017.
Stravito – Stravito is an A.I. startup that’s combining machine learning, Natural Language Processing (NLP) and Search to help organizations find and get more value out of the many market research reports, competitive, industry, market share, financial analysis and market projection analyses they have by making them searchable. Thor Olof Philogène and Sarah Lee founded the company in 2017, who identified an opportunity to help companies be more productive, getting greater value from their market research investments. Thor Olof Philogène and Andreas Lee were co-founders of NORM, a research agency where both worked for 15 years serving multinational brands, eventually selling the company to IPSOS. While at NORM, Anders and Andreas were receiving repeated calls from global clients that had bought research from them but could not find it internally and ended up calling them asking for a copy. Today the startup has Carlsberg, Comcast, Colruyt Group, Danone, Electrolux, Pepsi Lipton and others. Stravito has offices in Stockholm (H.Q.), Malmö and Amsterdam.
Verta.ai – Verta is a startup dedicated to solving the complex problems of managing machine learning model versions and providing a platform to launch models into production. Founded by Dr. Manasi Vartak, Ph.D., a graduate of MIT, who led a team of graduate and undergraduate students at MIT CSAIL to build ModelDB, Verta is based on their work define the first open-source system for managing machine learning models. Her dissertation, Infrastructure for model management and model diagnosis, proposes ModelDB, a system to track ML-based workflows’ provenance and performance. In August of this year, Verta received a $10 million Series A round led by Intel Capital and General Catalyst, who also led its $1.7 million seed round. For additional details on Verta.ai, please see How Startup Verta Helps Enterprises Get Machine Learning Right. The Verta MLOps platform launch webinar provides a comprehensive overview of the platform and how it’s been designed to streamline machine learning models into production:
V7 – V7 allows vision-based A.I. systems to learn continuously from training data with minimal human supervision. The London-based startup emerged out of stealth in August 2018 to reveal V7 Darwin, an image labeling platform to create training data for computer vision projects with little or no human involvement necessary. V7 specializes in healthcare, life sciences, manufacturing, autonomous driving, agri-tech, sporting clients like Merck, GE Healthcare and Toyota. V7 Darwin launched at CVPR 2019 in Long Beach, CA. Within its first year, it has semi-automatically annotated over 1,000 image and video segmentation datasets. V7 Neurons is a series of pre-trained image recognition applications for industry use. The following video explains how V7 Darwin works:
Cybersecurity, privacy and security startups have raised $1.9 billion in three months this year, on pace to reach $7.6 billion or more in 2021, over four times more than was raised throughout 2010 ($1.7 billion), according to a Crunchbase Pro query today.
22,156 startups who either compete in or rely on cybersecurity, security and privacy technologies and solutions as a core part of their business models today, 122 have pre-seed or seed funding in the last twelve months based on a Crunchbase Pro query.
From network and data security to I.T. governance, risk measurement, and policy compliance, cybersecurity is a growing industry estimated to be worth over $300B by 2025, according to C.B. Insight’s Emerging Trends Cybersecurity Report downloadable here.
Today, 680 cybersecurity, privacy, and security startups have received $6.8 billion in funding over the last twelve months, with $4 million being the median funding round and $12.6 million the average funding round for a startup. The number of startups receiving funding this year, funding amounts and the methodology to find the top 20 cybersecurity startups are all based on Crunchbase Pro analysis done today.
The 20 Best Cybersecurity Startups To Watch In 2021
Based on a methodology that equally weighs a startup’s ability to attract new customers, current and projected revenue growth, ability to adapt their solutions to growing industries and position in their chosen markets, the following are the top 20 cybersecurity startups to watch in 2021:
Axis Security – Axis Security’s Application Access Cloud™ is a purpose-built cloud-based solution that makes application access across networks scalable and secure. Built on zero-trust, Application Access Cloud offers a new agentless model that connects users online to any application, private or public, without touching the network or the apps themselves. Axis Security is a privately held company backed by Canaan Partners, Ten Eleven Ventures, and Cyberstarts. Axis is headquartered in San Mateo, California, with research and development in Tel Aviv, Israel.
Bitglass – What makes Bitglass unique and worth watching is how they are evolving their Total Cloud Security Platform to combine cloud access security brokerage, on-device secure web gateways, and zero-trust network access to secure endpoints across all devices. Its Polyscale Architecture is delivering uptimes of 99.99% in customer deployments. Bitglass’s 2020 Insider Threat Report has several interesting insights based on their recent interviews with a leading cybersecurity community. One interesting takeaway is 61% of those surveyed experienced an insider attack in the last 12 months (22% reported at least six).
Cado Security – Cado Security’s cloud-native forensics and response platform helps organizations respond to security incidents in real-time, averting potential breaches and security incidents. The Cado Response platform is built on analytics components that perform thorough forensic analyses of compromised systems. Cado’s platform, Cado Response, is an agentless, cloud-native forensics solution that allows security professionals to quickly and comprehensively understand an incident’s impact across all environments, including cloud and containers as well as on-premise systems. “Finding the root cause of security incidents in cloud or container environments is incredibly difficult. Traditional tools don’t support these new environments, and there is a shortage of people who know both forensics and cloud security,” said CEO James Campbell, formerly Director, Cyber Threat Detection and Response at PricewaterhouseCoopers. “Our Cado Response platform completely changes how security professionals can respond to incidents in the cloud.”
Confluera – Originally mentioned as one of the 20 Best Cybersecurity Startups To Watch In 2020, Confluera’s sustained innovation pace in the middle of a pandemic deserves special mention. They are one of the most resilient startups to watch in 2021.Confluera is a cybersecurity startup helping organizations find sophisticated security attacks going on inside of corporate infrastructures. The startup delivers autonomous infrastructure-wide cyber kill chain tracking and response by leveraging the ‘Continuous Attack Graph’ to stop and remediate cyber threats in real-time deterministically. Confluera’s platform is designed to detect and prevent attackers from navigating infrastructure. Confluera technology combines machine comprehended threat detection with accurately tracked activity trails to stop cyberattacks in real-time, allowing companies to simplify security operations radically. It frees up human security personnel to focus on more important work instead of spending hours trying to join the dots between the thousands of alerts they receive daily, many of which are false positives. The following is a video that explains how Confluera XDR for Cloud Infrastructure works:
DataFleets – DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance. The platform provides data scientists and developers with a “data fleet” that allows them to create analytics, ML models, and applications on susceptible data sets without direct access to the data. Each data fleet has easy-to-use APIs, and under-the-hood, they ensure data protection using advances in federated computation, transfer learning, encryption, and differential privacy. DataFleets helps organizations overcome data privacy and innovation struggle by maintaining data protection standards for compliance while accelerating data science initiatives.
DefenseStorm – DefenseStorm’s unique approach to providing cybersecurity and cyber-compliance for the banking industry make them one of the top startups to watch in 2021. Their DefenseStorm GRID is the only co-managed, cloud-based and compliance-automated solution of its kind for the banking industry. It monitors everything on a bank’s network. It matches it to defined policies for real-time, complete and proactive cyber exposure readiness, keeping security teams and executives updated on bank networks’ real-time security status. The company’s Threat Ready Active Compliance (TRAC) Team augments its bank customers’ internal teams to protect business continuity and skills availability while ensuring cost-effective coverage and management.
Enso Security – Enso is an application security posture management (ASPM) platform startup known for the depth of its insights and expertise in cybersecurity. With Enso, software security groups can scale and gain control over application security programs to protect applications systematically. The Enso ASPM platform discovers application inventory, ownership, and risk to help security teams quickly build and enforce security policies and transform AppSec into an automated, systematic discipline.
Ethyca – Ethyca is an infrastructure platform that provides developers and product teams with the ability to ensure consumer data privacy throughout applications and services design. It also provides your product, engineering, and privacy teams with unmatched ease of use and functionality to better care about your user’s data. The company helps companies discover sensitive data and then provides a mechanism for customers to delete, see, or edit their data from the system. Ethyca’s mission is to increase trust in data-driven business by building automated data privacy infrastructure. Ethyca’s founder and CEO Cillian Kiernan is a fascinating person to speak with on the topics of privacy, security, GDPR, and CCPA compliance. He continues to set a quick pace of innovation in Ethyca, making this startup one of the most interesting in data privacy today. Here’s an interview he did earlier this year with France 24 English:
Havoc Shield – Havoc Shield reduces the burden on small and medium businesses (SMBs) by giving them access to advanced security technology that protects against data breaches, phishing, dark web activity, and other threats. The Havoc Shield platform offers comprehensive security and compliance features that meet the standards of Fortune 100 companies, making it easier for businesses working to win deals with those companies. “For a long time, cybersecurity technology has been virtually inaccessible to small businesses, who largely can’t afford those resources,” said Brian Fritton, CEO and co-founder of Havoc Shield. “We created Havoc Shield because we believe in democratizing cybersecurity for the little guy. Small businesses deserve the ability to protect what they’ve built, just as much as larger companies that have dedicated cybersecurity staff.” Since the end of Q2 2020, Havoc Shield has quadrupled its client list. In the coming months, the company aims to grow its team to help more small businesses protect themselves from threats and achieve customer trust.
Illumio – Widely considered the leader in micro-segmentation that prevents the spread of breaches inside data centers and cloud environments, Illumio is one of the most interesting cybersecurity startups to watch in 2021. Enterprises such as Morgan Stanley, BNP Paribas, Salesforce, and Oracle NetSuite use Illumio to reduce cyber risk and achieve regulatory compliance. The Illumio Adaptive Security Platform® uniquely protects critical information with real-time application dependency and vulnerability mapping coupled with micro-segmentation that works across any data center, public cloud, or hybrid cloud deployment on bare-metal, virtual machines, and containers. The following video explains why Illumio Core is a better approach to segmentation.
Immuta – Immuta was founded in 2015 based on a mission within the U.S. Intelligence Community to build a platform that accelerates self-service access to and control sensitive data. The Immuta Automated Data Governance platform creates trust across data engineering, security, legal, compliance, and business teams to ensure timely access to critical data with minimal risk while adhering to global data privacy regulations GDPR, CCPA, and HIPAA. Immuta’s automated, scalable, no-code approach makes it easy for users to access the data they need when they need it while protecting sensitive information and ensuring customer privacy. Selected by Fast Company as one of the World’s 50 Most Innovative Companies, Immuta is headquartered in Boston, MA, with offices in College Park, MD, and Columbus, OH.
Isovalent – Isovalent makes software that helps enterprises connect, monitor and secure mission-critical workloads in modern, cloud-native ways. Its flagship technology, Cilium, is the choice of leading global organizations, including Adobe, Capital One, Datadog, GitLab, and many more. Isovalent is headquartered in Mountain View, CA, and is backed by Andreessen Horowitz, Google and Cisco Investments. Earlier this month, Isovalent announced that it had raised $29 million in Series A funding, led by Andreessen Horowitz and Google with participation from Cisco Investments. Google recently selected Cilium as the next-generation dataplane for its GKE offering calling Cilium “the most mature eBPF implementation for Kubernetes out there” in its “New GKE Dataplane V2 increases security and visibility for containers” blog: https://cloud.google.com/blog/products/containers-kubernetes/bringing-ebpf-and-cilium-to-google-kubernetes-engine.
JupiterOne – JupiterOne, Inc. reduces cloud security cost and complexity, replacing guesswork with granular data about cyber assets and configurations. The company’s software helps security operations teams shorten the path to security and compliance and improve their overall posture through continuous data aggregation and relationship modeling across all assets. JupiterOne customers include Reddit, Databricks, HashiCorp, Addepar, Auth0, LifeOmic, and OhMD. Earlier this year, JupiterOne received $19 million in venture funding. The Series A round was led by Bain Capital Ventures, with additional investment from Rain Capital, LifeOmic, and individual investors. “JupiterOne has developed a compelling product that integrates quickly, has applicability across enterprise segments, and is highly reviewed by current customers,” said Enrique Salem, partner at Bain Capital Ventures and former CEO at Symantec. Salem now joins the JupiterOne board. “We see a multibillion-dollar market opportunity for this technology across mid-market and enterprise customers. Asset management is the first step in building a successful security program, and it’s currently a tedious, imperfect process that’s well-suited for automation.”
Lightspin – Lightspin is a pioneer in contextual cloud security protecting native, Kubernetes, and microservices from known and unknown risks and has recently announced a $4 million seed funding round on November 24th. They will use the proceeds of the round to finance continued R&D on how to secure cloud infrastructures. The financing round was led by Ibex Investors LLC, the firm’s first global investment from its new $100 million early-stage fund, and also included participation from private angel investors. Lightspin’s technology uses graph-based tools and algorithms to provide rapid, in-depth visualizations of cloud stacks, analyze potential attack paths and detect the root causes, all of which are the most critical vulnerabilities that attackers can exploit.
Orca Security – Orca Security is noteworthy for its innovative approach to providing instant-on, workload-deep security for AWS, Azure, and GCP without the gaps in agents’ coverage and operational costs.Orca integrates cloud platforms as an interconnected web of assets, prioritizing risk based on environmental context. Delivered as SaaS, Orca Security’s patent-pending SideScanning™ technology reads cloud configuration and workloads’ runtime block storage out-of-band, detecting vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and unsecured PII.
SECURITI.ai – SECURITI.ai is an AI-Powered PrivacyOps company that helps automate all significant functions needed for privacy compliance on a single platform. It enables enterprises to grant individual and group rights to data and comply with global privacy regulations like CCPA and bolster their brands. They collect and manage consent from multiple sources, including web properties, web forms, and SaaS applications. Their AI-Powered PrivacyOps platform is a full-stack solution that operationalizes and simplifies privacy compliance using robotic automation and a natural language interface. SECURITI.ai was founded in November 2018 and is headquartered in San Jose, California.
SecureStack – SecureStack helps software developers find security & scalability gaps in their web applications and offers ways to fix those gaps without forcing them to become security experts. The results are faster time to business and a 60%-70% reduction in the app attack surface.
The SecureStack platform’s intelligent automation manages security controls across distributed infrastructures using rules and profiles customizable by customers. SecureStack is noteworthy for its analytics and logging expertise in helping enterprises scale applications across cloud infrastructures.
Stairwell – What makes Stairwell one of the top startups to watch in 2021 is its unique approach to cybersecurity built around a vision that all security teams should be able to determine what alerts are threat-related or not and why. Mike Wiacek, the founder of Google’s Threat Analysis Group and co-founder and former Chief Security Officer of Alphabet moonshot Chronicle, leads the company as its CEO and founder. Wiacek is joined by Jan Kang, former Chief Legal Officer at Chronicle, as COO and General Counsel. Stairwell is backed by Accel Venture Partners, Sequoia Capital, Gradient Ventures, and Allen & Company LLC.
Ubiq Security – What makes Ubiq Security one of the top cybersecurity startups to watch in 2021 is how rapidly their API-based developer platform is maturing while gaining traction in the market. Ubiq Security recently signed commercial agreements with the United States Army and the Department of Homeland Security. This month, the startup announced it had raised $6.4 million in a seed equity investment round. Okapi Venture Capital, an early investor in Crowdstrike, led the round with participation from TenOneTen Ventures, Cove Fund, DLA Piper Venture, Volta Global, and Alexandria Venture Investments. Ubiq will use the funds to accelerate platform development, developer relations, and customer acquisition.
Unit21 – Unit21 helps protect businesses against adversaries through a simple API and dashboard to detect and manage money laundering, fraud, and other sophisticated risks across multiple industries. Former Affirm and Shape Security employees Trisha Kothari and Clarence Chio founded Unit21 in 2018 and work with customers like Intuit, Coinbase, Gusto, and Line to create a powerful & customizable rules engine for risk and compliance teams. Unit21’s highly flexible, customizable, and intelligent cloud-based system provides a configurable engine for transaction monitoring, identity verification, case management, operations management, and analytics and reporting. On October 19th of this year, Unit21 announced a $13 million funding round led by A.Capital Ventures. Additional participation includes investors such as Gradient Ventures (Google’s A.I. venture fund), Core V.C., South Park Commons, Diane Greene (founder of VMWare), William Hockey (founder of Plaid), Chris Britt and Ryan King (founders of Chime), Sumit Agarwal (founder of Shape Security), and Michael Vaughan (former COO of Venmo). Unit21 will use the new capital to grow its product and distribution-focused management team, increase sales and marketing efforts, and sell into new industries.
Bottom Line: Today’s largely-distributed enterprises need to make sure they are putting endpoint security first in 2021– which includes closely managing every stage of the device lifecycle, from deployment to decommission, and ensuring all sensitive data remains protected.
There’s a looming paradox facing nearly every organization today of how they’ll secure thousands of remote endpoints without having physical access to devices, and without disrupting worker productivity. Whether there’s the need to retire hardware as part of down-sizing or cost-cutting measures, or the need to equip virtual teams with newer equipment more suitable for long term work-from-home scenarios, this is one of the most pressing issues facing CISOs and CIOs today.
Wanting to learn more about how their customers are tackling their endpoint security challenges and how their companies are helping to solve it, I sat down (virtually) with Absolute Software’s President and CEO Christy Wyatt and Matthew Zielinski, President of North America Intelligent Devices Group at Lenovo. The following is my interview with both of them:
Louis Columbus:Christy and Matt, thanks so much for your time today. To get started, I would like each of you to share what you’re hearing from your customers regarding their plans to refresh laptops and other endpoint devices in 2021.
Christy Wyatt: We’re seeing a strong desire from organizations to ensure that every individual is digitally enabled, and has access to a screen. In some cases, that means refreshing the hardware they already have in the field, and in other cases, that means buying or adding devices. From the endpoint security standpoint, there’s been a shift in focus around which tools matter the most. When laptops were primarily being used on campus, there was a certain set of solutions to monitor those devices and ensure they remained secure. Now that 90% of devices are out of the building, an entirely different set of capabilities is required – and delivering those has been our focus.
Matt Zielinski: We are seeing historic levels of demand from consumers, as many are transitioning from having maybe one or two devices per household to at least one device per person. We’re also seeing the same levels of demand on both the education and enterprise side. The new dynamic of work-from-anywhere, learn-from-anywhere, collaborate-from-anywhere underscores that the device hardware and software need to be current in order to support both the productivity and security needs of hugely distributed workforces. That’s our highest priority.
Louis: Where are CISOs in their understanding, evaluation, and adoption of endpoint security technologies?
Christy: The journey has been different for the education market than for the enterprise market. Most enterprise organizations were already on the digital path, with some percentage of their population already working remotely. And because of this, they typically have a more complex security stack to manage; our data shows that the total number of unique applications and versions installed on enterprise devices is nearly 1.5 million. What they’ve seen is a trifecta of vulnerabilities: employees taking data home with them, accessing it on unsecured connections, and not being aware of how their devices are protected beyond the WiFi connection and the network traffic.
In the education space, the challenges – and the amount of complexity – are completely different; they’re managing just a small fraction of that total number of apps and versions. That said, as the pandemic unfolded, education was hit harder because they were not yet at a point where every individual was digitally connected. There was a lot of reliance on being on campus, or being in a classroom. So, schools had to tackle digital and mobile transformation at the same time – and to their credit, they made multiple years of progress in a matter of weeks or months. This rapid rate of change will have a profound effect on how schools approach technology deployments going forward.
Matt: Whether in enterprise or education, our customers are looking to protect three things: their assets, their data, and their users’ productivity. It’s a daunting mission. But, the simplest way to accomplish it is to recognize the main control point has changed. It’s no longer the server sitting behind the firewall of your company’s or school’s IT environment. The vulnerability of the endpoint is that the network is now in the user’s hands; the edge is now the primary attack surface. I think CISOs realize this, and they are asking the right questions… I just don’t know if everyone understands the magnitude or the scale of the challenge. Because the problem is so critical, though, people are taking the time to make the right decisions and identify all the various components needed to be successful.
Louis: It seems like completing a laptop refresh during the conditions of a pandemic could be especially challenging, given how entire IT teams are remote. What do you anticipate will be the most challenging aspects of completing a hardware refresh this year (2021)?
Matt: The PC has always been a critical device for productivity. But now, without access to that technology, you are completely paralyzed; you can’t collaborate, you can’t engage, you can’t connect. Lenovo has always been focused on pushing intelligent transformation as far as possible to get the best devices into the hands of our customers. Beyond designing and building the device, we have the ability to distribute asset tags and to provide a 24/7 help desk for our customers whether you’re a consumer, a school, or a large institution. We can also decommission those devices at the end, so we’re able to support the entire journey or lifecycle.
The question has really become, how do you deliver secure devices to the masses? And, we’re fully equipped to do that. For example, every Lenovo X1 Carbon laptop comes out of the box with Lenovo Security Assurance, which is actually powered by Absolute; it is in our hardware. Our customers can open a Lenovo PC, and know that it is completely secure, right out of the box. Every one of our laptops is fortified with Absolute’s Persistence technology and self-healing capabilities that live in the BIOS. It’s that unbreakable, secure connection that makes it possible for us to serve our customers throughout the entire lifecycle of device ownership.
Louis:Why are the legacy approaches to decommissioning assets falling short / failing today? How would you redesign IT asset-decommissioning approaches to make them more automated, less dependent on centralized IT teams?
Christy: There have been a few very visible cases over the past year of highly regulated organizations, experiencing vulnerabilities because of how they decommissioned – or did not properly decommission – their assets. But, I don’t want anyone to believe that that this is a problem that is unique to regulated industries, like financial services. The move to the cloud has given many organizations a false sense of security, and it seems that the more data running in the cloud, the more pronounced this false sense of security becomes. It’s a mistaken assumption to think that when hardware goes missing, the security problem is solved by shutting down password access and that all the data is protected because it is stored in the cloud. That’s just not true. When devices aren’t calling in anymore, it’s a major vulnerability – and the longer the device sits without being properly wiped or decommissioned, the greater the opportunity for bad actors to take advantage of those assets.
The other piece that should be top of mind is that once a device is decommissioned, it’s often sold. We want to ensure that nothing on that device gets passed on to the next owner, especially if it’s going to a service or leasing program. So, we’ve concentrated on making asset decommissioning as precise as possible and something that can be done at scale, anytime and anywhere.
Matt: Historically, reclaiming and decommissioning devices has required physical interaction. The pandemic has limited face-to-face encounters, so , we’re leveraging many different software solutions to give our customers the ability to wipe the device clean if they aren’t able to get the asset back in their possession, so that at least they know it is secure. Since we’re all now distributed, we’re looking at several different solutions that will help with decommissioning, several of which are promising and scale well given today’s constraints. Our goal is to provide our enterprise customers with decommissioning flexibility, from ten units to several thousand.
Louis:Paradoxically, having everyone remote has made the business case for improving endpoint security more compelling too. What do you hear from enterprises about accelerating digital transformation initiatives that include the latest-generation endpoint devices?
Christy: The same acceleration that I spoke about on the education side, we absolutely see on the enterprise side as well, and with rapid transformation comes increased complexity. There has been a lot of conversation about moving to Zero Trust, moving more services to the cloud and putting more controls on the endpoint – and not having these sort of layers in between. Our data tells us that the average enterprise device today has 96 unique applications, and at least 10 of them are security applications. That is a massive amount of complexity to manage. So, we don’t believe that adding more controls to the endpoint is the answer; we believe that what’s most important is knowing the security controls you have are actually working. And we need to help devices and applications become more intelligent, self-aware, and capable of fixing themselves. This concept of resiliency is the cornerstone of effective endpoint security, and a critical part of the shift to a more modern security architecture.
Matt: I think there are two major forcing functions: connection and security. Because we are all now remote, there’s a huge desire to feel connected to one another even though we aren’t sitting in the same room together. We’re modifying our products in real-time with the goal of removing shared pain points and optimizing for the new reality in which we’re all living and working. Things like microphone noise suppression and multiple far field microphones, so that if the dog barks or kids run into a room, the system will mute before you’ve even pressed the mute button. We’re improving camera technology from a processing standpoint to make things look better. Ultimately, our goal is to provide an immersive and connected experience.
Security, however, transcends specific features that deliver customer experiences – security is the experience. The features that make hardware more secure are those that lie beneath the operating system, in the firmware. That is why we have such a deep network of partners, including Absolute. Because you need to have a full ecosystem, and a program that takes advantage of all the best capabilities, in order to deliver the best security solution possible.
Louis:How is Absolute helping enterprise customers ensure greater endpoint security and resiliency in 2021 and beyond?
Christy: We spend a lot of time sitting with customers to understand their needs and how and where we can extend our endpoint security solutions to fit. We believe in taking a layered approach – which is the framework for defense in-depth, and an effective endpoint security strategy. The foundational piece, which we are able to deliver, is a permanent digital tether to every device; this is the lifeline. Not having an undeletable connection to every endpoint means you have a very large security gap, which must be closed fast. A layered, persistence-driven approach ensures our customers know their security controls are actually working and delivering business value. It enables our customers to pinpoint where a vulnerability is and take quick action to mitigate it.
Lenovo’s unique, high value-add approach to integrated security has both helped drive innovation at Absolute, while also providing Lenovo customers the strongest endpoint security possible. Their multilayer approach to their endpoint strategy capitalizes on Absolute’s many BIOS-level strengths to help their customers secure every endpoint they have. As our companies work together, we are both benefitting from a collaboration that seeks to strengthen and enrich all layers of endpoint security. Best of all, our shared customers are the benefactors of this collaboration and the results we are driving at the forefront of endpoint security.
Louis:How has the heightened focus on enterprise cybersecurity in general, and endpoint security specifically, influenced Lenovo’s product strategy in 2021 and beyond?
Matt: We have always been focused on our unique cybersecurity strengths from the device side and making sure we have all of the control points in manufacturing to ensure we build a secure platform. So, we’ve had to be open-minded about endpoint security, and diligent in envisioning how potential vulnerabilities and attack strategies can be thwarted before they impact our customers. Because of this mindset, we’re fortunate to have a very active partner community. We’re always scouring the earth for the next hot cybersecurity technology and potential partner with unique capabilities and the ability to scale with our model. This is a key reason we’ve standardized on Absolute for endpoint security, as it can accommodate a wide breadth of deployment scenarios. It’s a constant and very iterative process with a team of very smart people constantly looking at how we can excel at cybersecurity. It is this strategy that is driving us to fortify our Lenovo Security Assurance architecture over the long-term, while also seeking new ways of providing insights from existing and potentially new security applications.
Louis:What advice are you giving CISOs to strengthen endpoint security in 2021 and beyond?
Christy: One of our advisors is the former Global Head of Information Security at Citi Group, and former CISO of JP Morgan and Deutsche Bank. He talks a lot about his shared experiences of enabling business operations, while defending organizations from ever-evolving threats, and the question that more IT and security leaders need to be asking – which is, “Is it working?” Included in his expert opinion is that cybersecurity needs to be integral to business strategy – and endpoint security is essential for creating a broader secure ecosystem that can adapt as a company’s needs change.
I believe there needs to be more boardroom-level conversations around how compliance frameworks can be best used to achieve a balance between cybersecurity and business operations. A big part of that is identifying resiliency as a critical KPI for measuring the strength of endpoint controls.
30% of US and UK remote workers say their organizations don’t require them to use a secure access tool, including VPN, to log into corporate databases and systems, according to Ivanti’s 2021 Secure Consumer Cyber Report.
Plus, 25% of remote workers in the US and UK aren’t required to have specific security software running on their devices to access certain applications while working remotely.
And one in four US remote workers use their work email and passwords to log in to consumer websites and apps.
Cybersecurity gaps have continued to widen during the pandemic. A noteworthy survey by Ivanti illustrates exactly how remote workers are putting organizations at risk and where enterprise security is falling short, making those cybersecurity gaps challenging for CISOs to close. Ivanti’s 2021 Secure Consumer Cyber Report outlines the challenges that cybersecurity and IT teams have faced when securing remote workers in what’s being described as the “Everywhere Workplace.” Based on interviews with more than 2,000 US and UK respondents working from home in November 2020, the survey shows that authentication and endpoint security needs to improve across all devices that employees use.
IT Organizations Need Help Closing Their Cybersecurity Gaps
Of the many lessons learned from 2020, among the most valuable are how virtual workforces need self-diagnosing and self-remediating endpoints, while IT organizations need improved unified endpoint management (UEM) as part of a zero-trust strategy. Bad actors continue to target remote workers’ privileged access credentials to gain access and exfiltrate customer, financial and proprietary data, including intellectual property. Ivanti’s survey provides insights into where cybersecurity gaps need attention first:
The most challenging threat surface to protect is a person’s identity because it’s exposed across so many threat surfaces, including personal and work devices, consumer websites, and IoT devices in homes. The pandemic is proving identities are the new security perimeter. A person’s cell phone, personal tablet, and laptop is a real-time digital definition of a person’s identity. Nearly half (49%) of US remote workers use personal devices for their jobs, often without two-factor authentication enabled. The graphic below shows how organizations can close this cybersecurity gap by adopting UEM as part of their go-forward initiatives in 2021 and beyond:
Lack of consistent security software and password standards is a big contributor to US and UK organizations’ cybersecurity gaps today. One in four remote workers can access enterprise resources without any security software in place. An even more surprising finding is that 30% of remote workers in the US and UK can access corporate data without a secure access tool or VPN connection. If a remote worker’s identity is compromised, there’s a one in three chance that their organization will be breached, enabling cyberattackers to move laterally through the company’s systems:
Protecting remote workers’ identities & devices at scale requires Zero Trust. Automating as many tasks as possible while providing a continuous and seamless user experience is the surest way to close cybersecurity gaps. Getting rid of passwords and automating two-factor authentication using Zero Sign-On (ZSO), a core part of the Ivanti platform, is proving essential today. Zero Sign-On relies on proven biometrics, including Apple’s Face ID, as a secondary authentication factor to gain access to work email, unified communications and collaboration tools, and corporate-shared databases and resources. CISOs and their teams also need to consider how mobile threat defense can better secure personal devices against phishing, device, network, and malicious app threats. Late last year, MobileIron (now part of Ivanti) received its second mention in two years in the Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020. The Forrester Wave graphic is shown below:
In conclusion, enterprise cybersecurity gaps are widening due to a combination of risky consumer behavior and a lack of consistent security for mobile workforces. And these gaps will only increase as employees increasingly work from anywhere, using their personal devices to connect to corporate resources. To secure and enable the future of work, organizations need to start implementing and maturing an end-to-end zero trust security model today by leveraging new technologies and protecting their current security technology investments.
Bottom Line: CHROs and the HR teams they lead need to commit to keep learning and adopting digital technologies that help improve how they hire, engage and retain talent if they’re going to stay competitive.
Driven by the urgency to keep connected with employees, customers and suppliers, McKinsey’s recent Covid-19 survey finds global organizations are now seven years ahead of schedule on digital transformation initiatives. HR’s role is proving indispensable in enabling the fast pace of digital adoption today. By providing Business Continuity Planning (BCP), HR’s contributions to digital transformation separate the organizations that thrive despite crises versus those left behind, according to McLean & Company’s 2021 HR Trends Report. The graphic below from the report shows how effective HR has been in supporting the rapid changes needed to keep employees communicating and engaged.
The McLean and Company Trends Report also shows that talent management’s major gaps need attention now before they grow wider. These areas include analyzing the employee skills gap (24%), developing employees on new competencies (24%), and training new employees in specific new skills (21%). Improving talent acquisition, retention, diversity and inclusion, and employee experiences by digitally transforming them with greater personalization at scale and visibility is key. CHROs and the HR teams they lead need to close these gaps now.
How To Get Started Digitally Transforming Talent Management
Start with the gaps in talent management you see in your organization. The largest gaps are often in the following four areas: recruiting and talent acquisition; retention of top talent and diverse talent; lack of visibility into employee capabilities; and workforce strategies not aligned to business strategies. Key challenges that need to drive digital transformation in these four areas include the following:
Legacy recruiting and Applicant Tracking Systems prioritize HR’s needs to capture thousands of resumes instead of delivering an excellent candidate experience. Attracting and recruiting the most qualified candidates in a virtual-first world is a daunting task. Organizations who are leaders in digital transformation quickly realized this and relied on automating the applicant experience so much it began to resemble the Amazon 1-Click Ordering experience. McKinsey’s recent Covid survey found that 75% of organizations digitally transforming their operations, including HR, were able to fill tech talent gaps during the crisis:
Source: McKinsey & Company, 2020, How Covid-19 has pushed companies over the technology tipping point—and transformed business forever
Top talent retention is more of a problem than many organizations realize, with top performers receiving between five and ten recruiter calls a month or more. The average tenure of employees at companies has been decreasing for nearly two decades. And a primary driver is not for lack of opportunity, but because employees can’t find a career path internally as easily as they can find a growth opportunity at another company. It’s possible to retain the top talent by guiding employees to what’s next in their careers. Of the many approaches to providing employees a self-service option for personalized coaching guidance at scale, Eightfold’s Talent Intelligence Platform is delivering results at such notable companies as Air Asia, Micron, NetApp, and others. Eightfold found that 47% of top talent leave within two years, but most would happily stay if given the right opportunity. The following video explains how Eightfold helps its customers retain talent:
Employees often lack visibility into new internal opportunities, and both HR and business leaders lack visibility into employees’ unique capabilities. There’s often a 360-degree lack of visibility into new internal career positions from the employee’s side and a lack of awareness on the employer’s side of their employee’s innate capabilities. The lack of visibility from the employer side limits their ability to benchmark talent, create programmatic, scalable, and flexible career development opportunities and ultimately redeploy talent in an agile way that serves business strategies that are evolving rapidly in response to the impacts of the global pandemic.
Workforce strategies that don’t align and support business strategies waste opportunities to improve morale, productivity, and employees’ professional growth. While organizations have invested heavily in valuable infrastructure, including Learning Management Systems (LMS) and other employee experience and development tools, they often lack a unified platform to help deliver the right growth opportunities to the right person at the right time.
Achieving Greater Automation, Visibility And Personalization At Scale
Talent management is core to any digital business and the competitive outcomes each can produce today and in the future. To make greater contributions, Talent Management needs to deliver the following by relying on a unified platform:
Talent Management platforms need to combine ongoing business insights based on operations data, technology management data, and business transformation apps and tools to create new digitally-driven employee experiences quickly.
A key design goal of any Talent Management platform has to be delivering personalized candidate or prospect experiences at scale through every communications channel an organization relies on, both digital and human.
The best Talent Management platforms provide the apps, data, and contextual intelligence to drive task and mission ownership deep into an organization and reinforce accountability. What’s noteworthy about Eightfold’s Talent Intelligence Platform is that it has designed-in empathy and the ability to deliver quick, effective decisions that further reinforce team inclusion. Eightfold’s many customer wins in Talent Management illustrate how combining empathy, inclusion, and accountability in a platform’s design pays off.
As McLean & Company’s 2021 HR Trends Report shows, taking a band-aid approach to solving Talent Management’s many challenges is effective in the short-term. Turning Talent Management into a solid contributor to business strategies for the long-term needs to start at the platform level, however. Eightfold’s approach to combining their Talent Management, Talent Insights and Talent Acquisition modules, all supported by their Talent Intelligence Platform, enables their customers to define their digital transformation goals and strategies and get results.
The Talent Management goal many organizations aspire to today is to digitally transform candidate or prospect experiences so well that people have an immediate affinity for the company they apply to, and the self-service options are so intuitive they rival Amazon’s 1-Click Ordering Experience. Across any industry, digital transformation succeeds when customers’ expectations are exceeded so far that a new category gets created. Uber’s contextual intelligence, rating system, and ability to optimize ride requests is an example. UberEats provides the same real-time visibility into every step of each order, creating greater trust. Domino’s Pizza Tracker app keeps customers informed of every phase of their orders. What’s common across all these examples is personalization at scale, real-time automation across service providers, and real-time visibility. Those same core values need to be at the center of any Talent Management digital transformation effort today.
Bottom Line: LogicMonitor knows first-hand how much pressure DevOps teams are under to produce high-quality code in record time during the pandemic. Acquiring Airbrake proves they get it: DevOps has a high need for speed right now.
LogicMonitor Aims To Solve Today’s DevOps Paradox
The pandemic is forcing every business to make DevOps a core part of their DNA faster than any of them expected. The competitive strengths many banked on in a pre-pandemic world aren’t as relevant as having a steady pipeline of new apps, platforms, and digital channels are. It’s creating a paradox for DevOps: on the one hand, they’re expected to deliver perfect code, and on the other, it needs to be delivered in record time. Pre-pandemic, a typical DevOps team in a $500M+ enterprise has over 200 concurrent projects in progress, with over 70% dedicated to safeguarding and improving customer experiences according to IDC. Today, there are up to 2X more projects, and up to 80% are focused on cybersecurity.
No organization is perfect at DevOps today. Everyone is at various stages of maturity and growth. The pandemic puts a lot of pressure on DevOps teams to get their code right quickly and into a released app in record time. LogicMonitor must see it in their customer base every day. The trade-offs DevOps teams have to make for speed versus quality – and even security – when pushing out a release are real and often tend to overlook diagnostics. That’s why the Airbrake acquisition makes so much sense today. LogicMonitor bought Airbrake to help DevOps teams do what they do best.
The often-quoted Boston Consulting Group (BCG) article, Going All In With DevOps, illustrates the typical pressure DevOps is under to perform, including catching bugs early, solving them, and getting code into test and deployment. According to Airbrake, 73% of their DevOps customers are pushing code multiple times per week – and many said they were deploying code “multiple times per day.” What makes Airbrake a perfect fit for LogicMonitor is how their developer-centric application error and performance monitoring service provides detailed diagnostics beyond the first layer of a bug or problem. In the context of the BCG graphic below, LogicMonitor buying Airbrake gives DevOps teams the diagnostics they need to move faster through error detection and into the test, deploy and release phases.
36% of DevOps team members are struggling to keep up with increased dev speeds and demands, according to Checkmarx’s survey.
55% of DevOps team members have taken on more security responsibility during the pandemic, according to Checkmark’s survey.
DevOps teams are struggling to keep up with their workloads today. LogicMonitor believes that by automating more monitoring processes and providing deeper contextual data and insight, DevOps teams can improve their response times and quality.
Automation pays off with more efficient continuous integration and deployment (CI/CD) cycles across DevOps teams, speeding up time-to-market and improving software quality in the process. Buying Airbrake extends LogicMonitor into developer environments and enables their shared customers to gain visibility into CI/CD workflows while reducing risk and ensuring every code release meets customer expectations. The following graphic illustrates how the CI/CD pipelines support DevOps. The more efficient continuous integration, testing, delivery, and operations, the more code releases DevOps can deliver at a higher quality, on time, and to customers’ expectations.
Source: Deloitte, DevOps Point of View, An Enterprise Architecture perspective, Amsterdam, 2020
The best aspect of LogicMonitor acquiring Airbrake is how practical, pragmatic, and immediately useful their vision of providing unified observability is in supporting DevOps teams under pressure to perform today. Airbrake is LogicMonitor’s second acquisition in just over a year, having also acquired Stockholm-based log analytics company Unomaly in January 2020. LogicMonitor’s Airbrake page provides additional information.
The Pharma industry has lost $14 billion through Intellectual Property (IP) cyber theft worldwide, according to the United Kingdom Office of Cyber Security and Information Assurance.
53% of pharmaceutical IP thefts and related breaches are carried out by someone with insider access, also according to the United Kingdom Office of Cyber Security and Information Assurance.
The pharma industry’s average total cost of a data breach is $5.06 million, with one of the highest costs of remediating the breach at $10.81 million across all industries, according to a recent ProofPoint study.
Over 93% of healthcare organizations experienced a data breach in the past three years, and 57% have had more than five data breaches, according to the Cybersecurity Ventures 2020 Healthcare Cybersecurity Report.
Gartner predicts the privileged access management (PAM) market will grow at a compound annual growth rate (CAGR) of 10.7% from 2020 through 2024, reaching $2.9 billion by 2024.
Bottom Line: Having developed COVID-19 vaccines in a fraction of the time it takes to create new treatments, pharmaceutical companies need to protect the priceless IP, supporting data, and supply chains from cyberattacks.
Showing how powerful global collaboration between pharmaceutical industry leaders can be, the world’s leading vaccine producers delivered new vaccines in record time. The IP behind COVID-19 vaccines and their supporting supply chains need state-of-the-art protection comprised of cybersecurity technologies and systems, as the vaccines’ IP is an asset that cyber attackers have already tried to obtain.
Pharmaceutical’s Growing Number of Threat Surfaces Make Cybersecurity a Priority
The report provides specifics about how cyber attackers could impersonate an executive from a Chinese biomedical company known for having end-to-end cold chain expertise, which is essential for delivering vaccines reliably. The cyber attackers conducted spear-phishing attacks against global companies who support the global cold chain needed for distributing vaccines. There were credential harvesting attempts against global organizations in at least six countries known today to access vaccine transport and distribution sensitive information.
Launching a phishing campaign with the goal of harvesting details on key executives and access credentials across the cold chain is just the beginning. According to Lookout’s Pharmaceutical Industry Threat Report, some of the most significant threat surfaces are the most problematic today, including the following:
Research & Development & Clinical Trials
Collaborative research teams across pharmaceutical manufacturers globally
Scientists creating initial compounds and completing primary research to define a vaccine.
Integration of study sites at the test device and reporting system level
Manufacturing and Distribution
Plant workers’ systems, including tablets with build instructions on them
Physician & Pharmacist Networks
Distribution Channels and their supporting IT systems
Cyber attackers are taking a more synchronized, multifaceted approach to attacking Covid-19 supply chains, reiterated in CISA’s report. There’s evidence that state-sponsored cyber attackers attempt to move laterally through networks and remain there in stealth, allowing them to conduct cyber espionage and collect additional confidential information from victim environments for future operations. Cyber attackers are initially focused on phishing, followed by malware distribution, registration of new Covid-specific domain names, and always looking for unprotected threat surfaces.
10 Ways Cybersecurity Can Protect COVID-19 Vaccine Supply Chains
By combining multiple cybersecurity best practices and strategies, pharmaceutical companies stand a better chance of protecting their valuable IP and vaccines. Presented below are ten ways the pharmaceutical industry needs to protect the COVID-19 vaccine supply chain today:
Prioritize Privileged Access Management (PAM) across the vaccine supply chain, ensuring least privilege access to sensitive data starting with IP. CISA’s note finds that there have been multiple attempts at capturing privileged credentials, which often have broad access privileges and are frequently left standing open. PAM is needed immediately to institute greater controls around these privileged accounts across the supply chain and only grant just enough just-in-time access to sensitive IP, shipping and logistics data, vaccination schedules, and more. Leaders include Centrify, which is noteworthy for cloud-based PAM implementations at the enterprise and supply chain levels. Additional vendors in this area include BeyondTrust, CyberArk, Ivanti, Thycotic, Ping Identity, and Senhasegura.
Assess every supplier’s security readiness in vaccine supply chains, defining minimum levels of compliance to security standards that include a single, unified security model across all companies. In creating a secured vaccine supply chain, it’s imperative to have every supplier network member on the same security model. Taking this step ensures accountability, greater clarity of roles and responsibilities, and a common definition of privileged roles and access privileges. Leaders in this area include BeyondTrust, Centrify, CyberArk, Ivanti, and Thycotic.
Taking a Zero Trust-based approach to secure every endpoint across the vaccine manufacturer’s R&D, Clinical Trials, Manufacturing, and Distribution networks is necessary to shut down cyber attackers taking advantage of legacy security weaknesses approaches. The pharmaceutical companies and myriad logistics providers see a much faster than the expected proliferation of endpoints today. Trusted and untrusted domains from legacy server operating systems are a time sink when it comes to securing endpoints – and proving unreliable despite the best efforts that Security Operations teams are putting into them. Worst of all, they leave vaccine supply chains vulnerable because they often take an outdated “trust but verify” cybersecurity approach. Leaders include Illumio, Ivanti (MobileIron), Cisco, Appgate, Palo Alto Networks, and Akamai Technologies.
Extend the Zero Trust framework across the entire supply chain by implementing microsegmentation and endpoint security requirements across all phases of the vaccine’s development cycles. This will ensure cyber attackers don’t have the opportunity to embed code to activate later. The goal is to push Zero Trust principles to all related processes integrating with the vaccines’ pipeline, including all dependencies across the entire development lifecycle.
Incorporating Multi-Factor Authentication (MFA) across every system in the vaccine supply chain is a given. Usernames and passwords alone are not enough, and MFA is low-hanging fruit to authenticate authorized users. MFA is based on two or more factors that can authenticate who you are based on something you know (passwords, PINs, code works), something you have (a smartphone, tokens devices that produce pins or pre-defined pins), or something you are (biometrics, facial recognition, fingerprints, iris, and face scans). For example, Google provides MFA as part of their account management to every account holder and has a thorough security check-up, which is useful for seeing how many times a given password has been reused.
Alleviate the conflicts of who will pay for increasing cybersecurity measures by making supplier-level security a separate line item in any CISOs and CIO’s budget. Today certain pharma supply chain CISOs are expected to ramp up cybersecurity programs with the same budget before Covid-19. While there are slight increases in cybersecurity budget levels, it’s often not enough to cover the higher costs of securing a broader scope of supply chain operations. CISOs need to have greater control over cybersecurity budgets to protect vaccine IP and distribution. Relying on traditional IT budgets controlled by CIOs isn’t working. There needs to be a new level of financial commitment to securing vaccine supply chains.
Consider using an AIOps platform adept at unifying diverse IT environments into a single, cohesive AI-based intelligence system that can identify anomalous network behavior in real-time and take action to avert breaches. Based on conversations with CIOs across the financial services industry, it is clear they’re leaning in the direction of AIOps platforms that provide real-time integration to cloud platforms combined with greater control over IT infrastructure. LogicMonitor’s prioritizing IT integration as a core strength of their platform shows, as they have over 2,000 integrations available out of the box. Relying on Collectors’ agentless system, LogicMonitor retrieves metrics such as cloud provider health and billing information. This collector then pulls metrics from different devices using various methods, including SNMP, WMI, perf Mon JMX, APIs, and scripts.
Unified Endpoint Security (UES) needs to become a standard across all vaccine supply chains now. Vendors who can rapidly process large amounts of data to detect previously unknown threats are needed today to stop cyberattacks from capturing IP, shipment data, and valuable logistics information. Absolute Software’s approach to leveraging its unique persistence, resilience, and intelligence capabilities is worth watching. Their approach delivers unified endpoint security by relying on their Endpoint Resilience platform, which includes a permanent digital tether to every enterprise’s endpoint. Absolute is enabling self-healing, greater visibility, and control by having an undeletable digital thread to every device. Based on conversations with their customers in Education and Healthcare, Absolute’s unique approach gives IT complete visibility into where every device is at all times and what each device configuration looks like in real-time.
Pharma supply chains need to have a strategy for achieving more consistent Unified Endpoint Management (UEM) across every device and threat surface of the vaccine supply chain. UEM’s many benefits, including streamlining continuous OS updates across multiple mobile platforms, enabling device management regardless of the connection, and having an architecture capable of supporting a wide range of devices and operating systems. Another major benefit enterprises mention is automating Internet-based patching, policy, configuration management. Ivanti is the global market leader in UEM, and their recent acquisition of Cherwell expands the reach of their Neurons platform, providing service and asset management from IT to lines of business and from every endpoint to the IoT edge. Neurons are Ivanti’s AI-based hyper-automation platform that connects Unified Endpoint Management, Security, and Enterprise Service Management. Ivanti is prioritizing its customers’ needs to autonomously self-heal and self-secure devices and self-service end-users.
Track-and-traceability is essential in any vaccine supply chain, making the idea of cyber-physical passports that include serialization for vaccine batches more realistic given how complex supply chains are today. Passports are an advanced labeling technology that provides the benefits of virtual tracking, verification of specific compounds, and yield rates of key materials. Serialization is a must-have for ensuring greater traceability across vaccine supply chains proving effective in stopping counterfeiting. Having digital passports traceable electronically can further help thwart cyber attackers.
By closing the cybersecurity gaps in vaccine supply chains, the world’s nations can find new, leaner, more efficient processes to distribute vaccines and protect their citizens. It’s evident from the results achieved so far in the U.S. alone that relying on traditional supply chains and means of distribution isn’t getting the job done fast enough, and cyber attackers are already looking to take advantage. By combining multiple cybersecurity tactics, techniques, and procedures, the vaccine supply chain stands to improve and be more secure from threats.
Bottom Line: Using AI to measure and predict revenue, costs, and margin across all Professional Services (PS) channels leads to greater accuracy in predicting payment risks, project overruns, and service forecasts, reducing revenue leakage in the process.
Professional Services’ Revenue Challenges Are Complex
Turning time into revenue and profits is one of the greatest challenges of running a Professional Services (PS) business. What makes it such a challenge is incomplete time tracking data and how quickly revenue leaks spring up, drain margins, and continue unnoticed for months. Examples of revenue leaks across a customers’ life cycles include the following:
Billing errors are caused by the booking and contract process not being in sync with each other leading to valuable time being wasted.
When products are bundled with services, there’s often confusion over recognizing each revenue source, when, and by which PS metric.
Inconsistent, inaccurate project cost estimates and actual activity lead to inaccurate forecasting, delaying the project close and the potential for bad debt write-offs and high Days Sales Outstanding (DSO).
Revenue leakage gains momentum and drains margins when the following happens:
Un-forecasted delays and timescale creep
Reduced utilization rates across each key resource required for the project to be completed
Invoice and billing errors that result in invoice disputes that turn into high DSOs & write-offs
Incorrect pricing versus the costs of sales & service often leads to customer churn.
Revenue leakage gains momentum as each of these factors further drains margin
Adding up all these examples and many more can easily add up to 20-30% of actual lost solution and services margin. In many ways, it’s like death by a thousand small cuts. The following graphic provides examples across the customer lifecycle:
Why Professional Services Are Especially Vulnerable To Revenue Leakage
Selling projects and the promise of their outcomes in the future create a unique series of challenges for PS organizations when it comes to controlling revenue leakage. It often starts with inaccurately scoping a project too aggressively to win the deal, only to determine the complexity of tasks originally budgeted for will take 10 – 30% longer or more. Disconnects on project scope are unfortunately too common, turning small revenue leaks into major ones and the potential of long Days Sales Outstanding (DSO) on invoices. When revenue leaks get ingrained in a project’s structure, they continue to cascade into each subsequent phase, growing and costing more than expected.
The SPI 2021 Professional Services Maturity™ Benchmark Service published by Services Performance Insight, LLC in February of this year provides insights into the hidden costs and prevalence of revenue leakage. The following table illustrates how organizations with high levels of revenue leakage also perform badly against other key metrics, including client referencability. The more revenue leakage an organization experiences, the more billable utilization drops, on-time project deliveries become worse, and executive real-time visibility becomes poorer.
How FinancialForce Is Using AI To Fight Revenue Leakage
It’s noteworthy that FinancialForce is now on its 12th consecutive product release that includes Salesforce Einstein, and many customers, including Five9, are using AI to manage revenue leakage across their PS business. Throughout the pandemic, the FinancialForce DevOps, product management, and software quality teams have been a machine, creating rich new releases on schedule and with improved AI functionality based on Einstein. The 12th release includes prebuilt data models, lenses, dashboards, and reports.
Andy Campbell, Solution Evangelist at FinancialForce, says that “FinancialForce customers have access to best practices to minimize revenue leakage by scoping and selling the right product and services mix to allocating the optimal range and amount of services personnel and finally billing, collecting and recognizing the right amount of revenue for services provided.” Andy continued, saying that recent dashboards have been built for resource managers to automate demand and capacity planning and service revenue forecasting and assist financial analysts in managing deferred revenue and revenue leakage.
By successfully integrating Einstein into their ERP system for PS organizations, FinancialForce helps clients find new ways to reduce revenue leakage and preserve margin. Relying on AI-based insights for each phase of a PS engagement delivered a 20% increase in Customer Lifetime Value according to a FinancialForce customer. And by combining FinancialForce and Salesforce, customers see an increased bid:win ratio of 10% or more. The following graphic illustrates how combining the capabilities of Einstein’s AI platform with FinancialForce delivers results.
FinancialForce’s model building in Einstein is based on ten years of structured and unstructured data, aggregated and anonymized, then used for in-tuning AI models. FinancialForce says these models are used as starting points or templates for AI-based products and workflows, including predict to pay. Salesforce has also done the same for its Sales Cloud Analytics and Service Cloud Analytics. In both cases, Salesforce and FinancialForce customers benefit from best practices and recommendations based on decades of data, which should be particularly interesting considering the “black swan” nature of 2020 data for most of their customers.
95% of the content essential for decision making in an organization is unstructured, residing in PDFs and various file formats that defy easy indexing and quick access, according to MIT Media Labs.
80% of typical organizations’ data is unstructured, slowing down work, often leading to less-than-optimal decision-making, according to an Accenture study published earlier this year.
Organizations use 35% of their structured data for insights and decision-making, but only 25% of their unstructured enterprise data, according to an Accenture study on how data is used for decision-making.
60% to 80% of employees can’t find the information they are looking for even when there’s content management or knowledge management system in place, according to IBM’s knowledge management study.
Bottom Line: Stravito is an AI startup that’s combining machine learning, Natural Language Processing (NLP) and Search to help organizations find and get more value out of the many market research reports, competitive, industry, market share, financial analysis and market projection analyses they have by making them searchable.
When It Comes To Finding Market Research Data, Intranets Aren’t Getting It Done
Facing tight deadlines to get a marketing plan together for a new product, channel, or selling strategy, market research and product marketing teams will give up looking for a report they know they’ve bought and re-purchase it. The tighter the deadline and the more important the plan, the more this happens.
When a quick call to the Market Research Analyst who has access privileges to all the market research subscriptions doesn’t have the reports a team needs, they either move on without the data or repurchase the report. Having spent the first years of my career as a Market Research Analyst, I can attest to the accuracy of IBM’s finding that 30% of a typical knowledge workers’ day is spent searching for information and understanding its context and original methodology. All reports our organization had distribution rights to internally went on the Intranet site. There were hundreds of reports available online on an Intranet platform with mediocre search capabilities.
The company was founded by Thor Olof Philogène and Sarah Lee in 2017, who together identified an opportunity to help companies be more productive getting greater value from their market research investments. Thor Olof Philogène and Andreas Lee were co-founders of NORM, a research agency where both worked for 15 years serving multinational brands, eventually selling the company to IPSOS. While at NORM, Anders and Andreas were receiving repeated calls from global clients that had bought research from them but could not find it internally and ended up calling them asking for a copy. Today the startup has Carlsberg, Comcast, Colruyt Group, Danone, Electrolux, Pepsi Lipton and others. Stravito has offices in Stockholm (HQ), Malmö and Amsterdam.
Instead of settling for less-than-optimal market and industry data that partially deliver the insights needed for an exceptional product launch or sales campaign, marketing & senior management teams need to set their sights higher. It’s time to replace legacy Intranet sites and their limited search functions with AI-based search engines that auto-tag content and build taxonomies based on content attributes in real-time. Stravito combines AI, machine learning, NLP and Search on a single platform that can index every major file type an organization uses, creating a taxonomy that streamlines search queries.
Having AI as the foundation of the Stravito platform delivers the following benefits:
AI-powered fast search gives individuals the ability to find and share insights and information quicker than any legacy Intranet technology could. With everyone working from home and self-service being a goal every marketing, business planning and IT department is trying to achieve today, Stravito’s architecture is designed for simple queries and requests anyone can quickly learn to create.
Relying on AI and machine learning to alleviate the need to manually upload and tag hundreds of market research reports and analysis. Stravito’s approach to data categorization using AI also identifies and removes duplicate report copies and can be configured to filter out any reports past a specific date. Search perimeters, auto-tagging and in-PDF search options are all configurable. Stravito will rank PDFs by the percentage of relevant content they have for a specific search term, providing a bar graph designating which pages have the most relevant content.
Stravito’s design team has successfully combined AI, machine learning and advanced user interface design to produce an application comparable to Spotify, Google and Netflix. Developing and launching an enterprise-level search engine designed for usability first is noteworthy. Many enterprise applications still aren’t achieving this design goal despite being mentioned as a first priority by enterprise software vendors. As can be seen from their search results screen, Stravito’s approach is to combine information discovery and collaboration:
Stravito deserves credit for finding new ways to use AI and machine learning to accomplish drag-and-drop integration of any commonly used file format in an organization – and then have it assigned to a taxonomy in seconds. Stravito’s innovative use of AI, machine learning and auto-tagging provides its customers with a simple drag-and-drop interface that supports bulk uploads. The platform has API integration designed with any market research or advisory service with an API library compatible with their platform. Their customer base actively relies on Euromonitor and Mintel today, for example.
Stravito fills the gap legacy Intranet technologies and current generation collaboration platforms are not addressing. That’s the need to provide a more powerful search engine, one capable of continually adapting to new information and documents. Supervised machine learning has proven effective for taking on challenges related to creating and keeping taxonomies current. Stavito’s product strategy of providing personalized recommendations for the content of interest is a natural progression of their platform. For organizations overwhelmed with research data yet can’t seem to get the reports to decision-makers fast enough, the Stravito platform is worth checking out.