Cybersecurity: the emergence of new offers in response to new threats - European Champions Alliance
post-template-default,single,single-post,postid-1333,single-format-standard,ajax_fade,page_not_loaded,,qode_grid_1300,footer_responsive_adv,qode-content-sidebar-responsive,qode-child-theme-ver-1.0.0,qode-theme-ver-10.1.1,wpb-js-composer js-comp-ver-7.6,vc_responsive,elementor-default,elementor-kit-6046

Cybersecurity: the emergence of new offers in response to new threats


Cybersecurity: the emergence of new offers in response to new threats

By Dominique Teissier, our Serial CEO & digital transformation expert for ECA, head of our Focus Group Cyber Security

Cybersecurity is no longer limited to the “peripheral” defence of information systems. In the face of new, more sophisticated threats, the offer now encompasses numerous channels. This article focuses on two of them: the protection of data assets and the management of identities and access to information.

Protecting the most important

Cybersecurity began, some twenty years ago, with the concern to protect access to the Information System. We used to talk about peripheral security, the associated image being that of a fortified castle with its walls, its portcullis, its drawbridge.

However, by 2005, it became clear that the threats were much more insidious, and new products were developed to deal with them.

New products have been developed to deal with these threats. For example, they have sought to protect against the theft or malicious use of company data, often originating from within the company. This subject is all the more burning as the company is more and more an open world (presence of subcontractors or occasional collaborators, partners), and therefore, if it seems unlikely to be able to protect everything, at least it is necessary to delimit the 10% or so of the company’s information assets which must absolutely be guaranteed against violations, leaks, alterations.

Cybersecurity meets the desire to guarantee data

This focus on the data, on the crucial subset of data, has given place to many approaches. Pell-mell:

The notion of a “bastion” to be protected tooth and nail, allowing only privileged access;
The desire to detect data leaks by tracking them, either on the Internet (and DarkWeb) or on internal company media, and by revealing the possible origins of the leaks;
And in return, the creation of a trusted space where, after encryption, the essential sets of documents and data are housed.
Here we see the two main concerns converge: Cybersecurity and Data Guarantee (at the level of the company, or even at the level of a continent in its logic of digital sovereignty).

A flourishing offer in France and Germany

In this new field, many new companies have emerged and consolidation has only just begun. Most of the players are less than 7 years old. Thus of these French companies (we quote only a part of them) :

WALLIX, SYSTANCIA, ODASEVA: privileged access to the company’s key information assets.
CYBELANGEL, ALEPH-NETWORKS, SEALD … detect and analyse data leaks.
OODRIVE, WOOXOO-ATEMPO, TANKER and in its LEDGER domain, allow to create and manage trusted spaces to house key data.
In Germany, companies such as EPERI or SECUCLOUD are active in the same field.

Several of these companies have largely surpassed the 20 M€ valuation threshold, or are quickly approaching it, which shows the dynamism of this domain. The European Champions Alliance will focus on accelerating their international expansion.

Managing identities and access to information

Other Cybersecurity sectors are in effervescence, such as trusted communication spaces, IAM (identification and authentication management), email security and anti-spam/anti-phishing, protection of nomadic connections, software security, IoT security and, what goes hand in hand, industrial IT systems.

Thus, for IAM, there are several very active companies, which is not surprising since both eCommerce and remote access to the information system require making sure that the user is who he/she claims to be. Among these numerous companies, we can mention in particular : in Germany DRIVELOCK, CRYPTOVISION, ACHELOS, IDNOW ; in Switzerland PSYND ; in Austria YOUNIQX ; in France REACHFIVE, ALSYD, SYSTANCIA, UNIKNAME, WALLIX, EVIDIAN (ATOS group) …

These companies vary greatly in size, so it is likely that the boom will be followed by a period of consolidation.

We will come back in a future article to some other areas that are also very active.

For more information, please visit

Visit our European Champions Alliance Cyber Security Focus Group page:

See our first article on cybersecurity:

Translated with (free version)

Andrea Vaugan