Consolidation activity is accelerating across and within software sectors as acquirors in maturing IT businesses seek to deploy significant available capital to enhance growth and broaden their footprint. This issue of Updata's Software M&A Update highlights M&A, capital markets and venture activity in the infrastructure and security software industry, and describes trends of note.

Infrastructure Management Cycle Continues – Fragmentation, Growth, Consolidation…Repeat
During the course of 2005, larger companies within the Infrastructure Management sector have significantly outperformed smaller ones. A group of the 9 largest vendors (Bellwether Index) declined 3.0% since the beginning of 2005… Read More>>

Security Consolidation Accelerates, while Emerging Needs Ensure a Steady Stream of New Market Entrants
Updata’s Bellwether Security Vendor share price index (12 largest pure-play vendors in terms of market capitalization) is down 13% in 2005 YTD, versus a flat NASDAQ… Read More>>

Public Company Valuations
Selected valuations of publicly-traded software companies.
Read More>>

Network and Systems Management Software
Security Software

M&A Transactions
Merger and acquisition deals for the most recent quarter, featuring actual deal values with corresponding revenue and EBITDA valuation multiples. Read More>>

Infrastructure Software
Security Software

Venture Capital Investments
Selected VC investments in software companies, including amount raised and stage of financing. Read More>>

Infrastructure Software
Security Software

Recent Updata M&A Transactions
A sample of Updata’s recent M&A transactions. Read More>>

Upcoming Events
Join Updata for a Webinar, “Internet-Infrastructure Software Convergence: New Paradigms, New Opportunities,” on Monday, November 12, 12:30pm-1:30pm. Read More>>

 



Infrastructure Management Cycle Continues – Fragmentation, Growth, Consolidation…Repeat

Stock Market – Large Caps and Rapid Growers Lead the Pack. During the course of 2005, larger companies within the Infrastructure Management sector have significantly outperformed smaller ones. A group of the 9 largest vendors (Bellwether Index) declined 2.0% since the beginning of 2005 as compared to a group of 11 small cap vendors (Small Cap Index) which declined 21% during the same period. NASDAQ increased 1% over the same period. (Figure 1).

Figure 1


This trend is consistent with broader investor preference for larger cap companies and is a departure for the Infrastructure Management group from its performance during late 2004 when both the Small Cap and Bellwether Indices closely tracked NASDAQ.

The broader Infrastructure Management group experienced relatively strong 11% mean year-over-year quarterly growth for the most recently reported quarter, with 19% average expected EPS growth (FactSet). This growth has supported trading multiples in this sector consistent with trading multiples for other enterprise software sectors. In addition to favoring larger cap companies, investors also favor companies achieving higher rates of growth. (Figure 2).


Figure 2



M&A Market – Consistent Volume and Expanding Valuations. In 2005, the volume of Infrastructure Management deals announced jumped significantly to $18.5 billion as compared to $3.3 billion in announced deals during the same period in 2004. However, the transactions during 2005 included two large, storage related transactions (Sun/Storage Technologies and Symantec/Veritas). Excluding these two transactions, 2005 is generally on the same pace as 2004 with 46 announced deals totaling $3.7 billion and versus 39 during 2004. Despite this steady volume, we have seen a marked improvement in the median Deal Value/Trailing Revenue multiple of disclosed or estimated deals to 3.2x during the year ended September 2005 from 2.4x during the year ended September 2004. (Figure 3) (Note that multiples vary widely based on individual transaction circumstances and, in many cases, are unobtainable.)


Figure 3


We believe that this improvement in M&A, multiples can be attributed to a combination of ongoing consolidation activity (which we discuss later in this report) and relatively strong buyer demand from multiple sources. Large cap buyers within and outside the sector have been active buyers of Infrastructure Management vendors accounting for approximately half of the announced transactions since the beginning of 2004. Large buyers outside of the Infrastructure Management group have included EMC, Cisco, Tibco and Oracle, among others. A significant amount of M&A activity within the sector is also attributable to repeat buyers consolidating solution offerings (Figure 4).


Figure 4



Venture Market - Stable. Venture investing activity in the Infrastructure Management sector reflects the relative maturity of the sector and has been focused on niche growth opportunities. During 2004, 22 transactions were completing totaling $208 million. Year to date 2005, 23 transactions consisting of $204 million of invested capital have been completed.

Emerging IT Management and Operating Challenges. The Infrastructure Management market is large ($7 billion in 2004: Gartner) and growing (10% compound annual growth 2004 to 2009: Gartner). The size and growth of the sector has been a function of the rapid evolution of enterprise IT over the past few decades. This continued evolution combined with new, external factors will drive Infrastructure Management tool and solution procurement decisions over the next few years.

New Ways to Leverage IT. Enterprise adoption of new technologies such as web services, wireless and VoIP is leading to more business functions and processes becoming enmeshed in and enabled by the IT infrastructure. For example, a recent Goldman Sachs survey of 100 IT executives within the Fortune 1000 indicates that 54% have deployed, or will deploy in the next 12 months, infrastructure with the intent of supporting web services applications. This is resulting in increasingly complex and critical infrastructure environments for which broadly deployed Infrastructure Management tools and approaches are inadequate. In addition, the universe of businesses (including SMB) that can leverage IT in the context of critical business processes is expanding as new economic models for acquiring technology including open source and software as a service (SaaS) take hold. IDC estimates that annual spending on SaaS will grow at a rate of 25% from approximately $3 billion in 2004 to approximately $7.2 billion in 2008. Many existing Infrastructure Management solutions are designed and priced for large organizations with access to skilled IT management professionals.

Visibility in the Executive Suite. Where IT was once solely the domain of the IT department a number of external factors has forced management to pay much closer attention to the management of IT infrastructure including: regulatory and compliance requirements associated with Sarbanes Oxley, IAS and Basel II as well as increasing demand for data and application reliability and availability.  This trend is driving demand for new capabilities to evaluate, analyze and report on IT infrastructure.

Continued budget pressure. Despite the changes mentioned above, overall IT budgets have only increased marginally over the past four years (2.6% on average: Merrill Lynch) and are not expected to grow rapidly in the coming years. This pressure has forced IT managers to seek software solutions that allow them to “do more with less” and maximize the life and capacity of previous capital investments.

Enterprises are Seeking Alternative Solutions. Current approaches to infrastructure management are not adequate in the face of these emerging trends. According to Giga, 70% to 80% of problems are reported by end users through the service desk and not detected by infrastructure management tools. According to Gartner, most enterprises experience only 10% to 20% utilization of their IT infrastructure. Signs that enterprises are responding to these issues include continued adoption of standards such as the IT Infrastructure Library (ITIL), efforts to centralize and share performance data, and continued standardization of the elements in the IT environment. However, we believe that enterprises will require new Infrastructure Management functionality and solutions to adequately respond creating opportunities for strong growth within the sector.

Emerging Opportunities for Focused Vendors. The Infrastructure Management sector is dominated by the “Big 4” of BMC, CA, HP and IBM who on a combined basis account for an estimated 60% of license revenue in the market (Gartner) with broad, “framework” offerings. The balance of the market is populated by numerous smaller vendors with more narrowly focused solutions. In Figure 5, we have laid out a high level view of the Infrastructure Management landscape and identified the key areas of functionality within the broader segments in bold which represent the areas of strong potential growth where smaller, focused vendors are gaining traction with customers by solving targeted problems. In general, we believe that two key categories capture the majority of these opportunities:



Figure 5


Business Services Management (BSM) – Managing IT Like a Business. BSM-oriented solutions allow enterprises to align IT with its business operations by allowing IT managers to link information on the availability and performance across IT infrastructure components with the IT-enable business processes.  Vendors addressing this opportunity enable enterprises to understand complex dependencies among infrastructure components, correlate relevant data, perform business-relevant analysis and automate underlying service delivery and management processes. According to Gartner and Updata estimates, the BSM market was approximately $600 million in 2004 and is expected to grow at a compound annual rate of 21% through 2009.  Figure 6 provides a list of representative vendors addressing the components of functionality that comprise the BSM opportunity.



Figure 6


Publicly traded companies appear in UPPERCASE.

Real-Time Infrastructure (RTI) – Operating IT as a Utility. RTI goes by several names but in essence represents an infrastructure model where components are distributed, shared, and dynamically optimized. Vendors addressing this opportunity enable enterprises to virtualize, dynamically provision, and automate components of the IT infrastructure based upon business policies. Several of the major vendors including IBM, HP, CA and Sun have all announced major initiatives targeting this opportunity. However, we believe that we are very early in the evolution and adoption of this approach and that, again, key components of functionality will be developed and delivered by smaller, focused vendors. Figure 7 provides a list of representative vendors addressing the components of functionality that comprise the RTI opportunity.



Figure 7


Publicly traded companies appear in UPPERCASE.

Continued Support for Robust M&A Activity. There are a number of factors supporting continued strong M&A activity in the Infrastructure Management sector from the perspective of capital market conditions generally and ongoing consolidation trends in this sector specifically.

Capital Market Conditions. As depicted in Figures 1 and 2, investors are placing premiums on leadership and growth. As a result, the Big 4 and second tier sector vendors alike have undertaken acquisitions to achieve growth and advance their market position. For example, since late 2004, HP has announced or completed four acquisitions (Novadigm, AppIQ, RLX and Peregrine) that add significant functionality around the OpenView platform. The larger vendors have ample supplies of cash to support acquisition activity. The vendors included in the Bellwether group have an average of more than $3 billion in cash on the balance sheet (or the equivalent of $4 per share in cash) based upon public filings for the most recent quarter. In addition to the presence of motivated and qualified strategic buyers, the Infrastructure Management sector has started to attract its share of the significant amounts of private equity focused on the broader enterprise software market. Recent examples include the July 2004 $235MM acquisition of Sniffer Technologies by Silver Lake and Texas Pacific, the October 2005 $200 million acquisition of the TrackIT business from Intuit by TA Associates and the recently announced $1.2 billion acquisition of Serena Software by Silver Lake. Strong demand for acquisitions from multiple sources is balanced by adequate supply. While the IPO market for venture backed firms has improved markedly over the past few years, the hurdles for going public and the implicit costs of being public has lead many VC-backed technology companies to view M&A as their most likely exit.

Sector Conditions.  The Infrastructure Management market has experienced various cycles of fragmentation and consolidation as enterprise IT has evolved.  Current sector dynamics support continued consolidation around BSM and RTI oriented solutions.  Customer desires for simplified environments, unified support and discounted pricing are best provided by large vendors offering complete suites.  CA’s recent acquisition of Concord Communications, which had shortly before that acquired Aprisma, is a good example of this dynamic.  Another consolidation driver is broader convergence of the management of disparate infrastructure technologies that are typically handled with separate staff and tools.  We have seen early signs of consolidation between systems and infrastructure management (EMC/Smarts), infrastructure management and security (Micromuse/GuardedNet and Altiris/Pedestal), and security and storage management (Symantec/Veritas).  We expect this trend to broaden and accelerate providing additional support for M&A in this sector.

 

Top



Security Consolidation Accelerates, while Emerging Needs Ensure a Steady Stream of New Market Entrants

Stock Market – Valuations remain strong despite modest year-to-date declines. Updata’s Bellwether Security Vendor share price index (12 largest pure-play vendors in terms of market capitalization) is down 13% in 2005 YTD through early November, versus a flat NASDAQ (see Figure 1). The index of 19 Small-cap Security Vendors declined 2% during this time. Disparity in performance between large and small vendors in part reflects an active M&A market that is fueling speculation about future takeouts of smaller firms, e.g. Symantec recently acquired public vulnerability management vendor Bindview.

Large cap and small cap security vendors trade at an average of 76% and 71% of their 52-week highs, respectively, and at multiples above the average for infrastructure software companies. Mean forward (2005e) enterprise value/revenue and EBITDA multiples for Bellwethers are 4.0x and 14.0x, respectively. Among small-cap security vendors, mean forward revenue and EBITDA multiples are 2.7x and 22.7x respectively.

Robust security demand growth continues to buoy public security valuations. Projected long-term EPS growth for the industry (based on the Street equity analyst average) is 22%, representing two to three times overall projected software industry demand growth.


Figure 1


Security Bellwether Index: CHKP, COGT, GEMP, ISSX, JNPR, MFE, MVSN, RSAS, SFNT, SYMC, TMIC, VRSN, WBSN Small Cap Security Index: ACTI, ALDN, BCSI, BVEW, CGFW, DMRC, ENTU, HIFN, IDNX, INTZ, NTIQ, SCUR, SNWL, SRFZF, TMWD, VDSI, VISG, WGRD, ZIXI


M&A Market – Consolidation is Accelerating. Updata recorded 98 security-related M&A transactions announced in 2005 through early November. This represents two times the number of deals announced during the same 2004 period. Overall deal volume is approximately $2.6 billion year-to-date, versus $1.6 billion during the same period last year (excluding the Juniper-Netscreen deal).

Almost one-third of M&A volume comprises nine acquisitions by Computer Associates, Microsoft and Symantec. Approximately two-thirds of deal volume is driven by these and other large infrastructure software vendors including Check Point, Cisco, BMC, Oracle and VeriSign. This signals continuing convergence of security with other areas of IT. Active M&A sectors this year include anti-spyware, identity management, digital rights management, and managed security services.

On average, multiples of purchase price to 12-month trailing revenues remain steady over the prior year, at about 7x. This disguises vast variations from deal to deal. Based on disclosed data, purchase price multiples paid in transactions correlate most strongly with targets’ historical annual revenues growth. This is evidenced by the correlation chart in Figure 2, which compares multiples of enterprise value over last full-year revenues paid in acquisitions of public security targets (and targets that filed to go public), versus such targets’ last full year-over-year revenue growth rate.


Figure 2



Notable deals this year include:

  • Oracle’s acquisition of three identity management companies this year – Oblix, Thor and OctetString. This highlights the tremendous activity around secure access, authentication, provisioning and directory management as infrastructure vendors realize the important of identity management to compliance and leveraging the value of the internet. Since 2004, Updata records 34 M&A transactions in the space.


  • Sand Hill IT Security/Acquisition Corp.’s October merger with content security vendor St. Bernard Software, in an all-stock transaction valued at about $51 million. Sand Hill is a public acquisition vehicle that went public in 2004, raising about $25 million. Since then, it reportedly reviewed 700 companies as merger candidates before deciding on St. Bernard.


  • Check Point’s first major acquisition, of intrusion prevention vendor Sourcefire for $225 million in cash. Announced in October, the deal represents an estimated revenue multiple in excess of 7 times Sourcefire’s last 12-month revenues.


  • Secure Computing’s public-to-public $281 million cash and stock acquisition of Cyberguard, representing an enterprise value/revenues multiple of about 4x. This deal, announced in August, was one of three public-to-public M&A transactions so far this year.


  • Network Appliance’s June-announced acquisition of storage security vendor Decru for $272 million in cash and stock, representing a whopping estimated multiple of 45 times Decru’s last 12-month revenues. This transaction highlights the importance of security to storage.


  • Earthlink’s August acquisition of anti-spyware and content security vendor Aluria (an Updata client), signaling expanding participation of ISPs in the security market.


  • MCI’s acquisition of managed security services vendor Netsec in January for $105 million cash, representing an estimated multiple in excess of 7x trailing revenues. MCI subsequently was acquired by Verizon. This deal is the most compelling evidence to date that carriers are moving to provide security solutions to their considerable customer bases.

Venture Market – Still Active, Holding Steady. Security continues to be one of the most active technology investment areas. Year-to-date through early November, Updata tracks 114 announced venture and private equity financings of IT security firms, with volume totaling $1.1 billion. This is a modest decline versus 2004, which recorded 148 financings valued at $1.3 billion during the same period. The 2003 January-to-early November period recorded 151 security sector investments valued at $0.9 billion.

The most active investment areas so far this year include intrusion prevention, outbound traffic monitoring, identity management, application security, wireless security, data security/DRM, anti-spyware, event management, configuration and patch management.

One quarter of security investments year-to-date represent first institutional, or A, rounds. This represents a reduction from 2004, which saw about one-third of investments going to A rounds. The year-to-date ratio of security acquisitions to first-round financings has risen to 4:1, versus a ratio of roughly 1:1 two years ago – evidence of market consolidation. However, the sizeable number of companies continuing to receive funding points to continued vibrancy in the security space, which empirically has provided superlative exit multiples (largely through M&A). The favorable security M&A environment should continue for the foreseeable future, despite a higher concentration of acquisition volume driven by a small number of major infrastructure vendors. This is due to the continuing importance and ever-changing nature of the space, as emerging opportunities described in the next section illustrate.

Select Emerging Opportunities within Security

Wireless Security. Wireless usage is booming. IDC cites 41% growth year-on-year for Wi-Fi hardware. Usage is “deepening” as well – most PDA users send confidential e-mails and almost half check bank balances using their devices, according to Symantec, and many access files from corporate networks over VPN’s. This wireless proliferation is creating security risks as half of wireless local-area (WLAN) networks are unprotected according to McAfee, and studies suggest low awareness about wireless related security dangers. Even among those seeking to secure communications and devices, confusion abounds as “the wireless security products market is still young and, in many cases, ill-defined,” notes SC Security magazine in October. Expect today’s confusion and complacency to dissipate rapidly as damages from wireless break-ins and viruses grow. PDA worms and spam are rapidly on the rise. Impetus from compliance mandates will also hasten demand growth. In-Stat research projects that WLAN and wireless infrastructure and device security demand will explode to $8.4 billion by 2008. Innovative vendors will benefit as security and infrastructure software/hardware vendors, as well as communications companies seek to incorporate wireless security capabilities.

Endpoint Port Security. Unauthorized use of USB- and Fire-wire attached storage devices pose great risks to organizations. They can bypass perimeter defenses, introduce malicious code and quickly download large volumes of internal information. Although e-mail and IM pose similar threats, messaging risks are far better managed than endpoint risks. A growing array of policy-based endpoint access control tools, desktop firewalls, data encryption, digital rights management and “extrusion” (outbound traffic) monitoring solutions are available to mitigate the dangers; however market penetration is still relatively low among enterprises and many solutions to date are generally tactical in their focus. Ultimately, endpoint security solutions will be integrated into other network security and event management platforms.

Strong Authentication. Passwords are passé. They are relatively easy to crack or steal, for example via spyware. Further, the number of passwords needed for people to access enterprise resources has become unmanageable. Surveys show that most people keep passwords on Post-its, spreadsheets or other unsafe locations. As a result, strong authentication, such as PKI and two-factor authentication, will become increasingly dominant in the enterprise as it has already become in many financial and government organizations. Microsoft’s recent acquisition of Alacris, which facilitates roll-out of strong authentication, points to eventual sun-setting of simple password protection on the desktop. Given significant identity theft issues, the sooner the better.

Application Security. Emergence of service-oriented architectures (SOA) and distributed development magnify the importance of building security into applications. Vulnerabilities in shared code can rapidly propagate across applications, multiplying the damage and the cost to locate and fix affected sites. Further, liability risks faced by software developers selling flawed products are growing as more lawsuits hit courts and Congress debates legislation to penalize purveyors of insecure software. The solution lies in full lifecycle application protection in the form of development stage code testing and post-production application security products. Vendors offering automated detection and remediation products are expected to enjoy surging demand as a result.

VOIP Security. Transmission of voice data over the internet will soon become commonplace – witness the entrance of traditional carriers into VOIP and eBay’s $2.6 billion acquisition of Skype. As voice-over-internet proliferates, telephony will be vulnerable to the same types of attacks as other IP traffic and applications, including denial-of-services attacks and eavesdropping. As a result, expect reports of breaches to rapidly rise and spending on VOIP security to jump in 2006.

In-the-Clouds Managed Security. By 2010, Gartner research estimates that 30% of software will be delivered on a hosted or software-as-a-service (SAAS) basis, and that five of the top 10 applications vendors will leverage SAAS. SAAS lets users pay as they go, while avoiding deployment expenses common to behind-the-firewall software deployments. SAAS also supports emergence of services-orientated architectures (SOAs) that enable modular application development and delivery. As part of this trend, security is also increasingly being delivered as a service, for example in the form of subscriptions to Web-hosted products such as Symantec’s Norton suite. Managed security, a remote monitoring service, is also evolving as more organizations eschew deployment of security devices on customer premises and turn to an in-the-clouds model. In-the-clouds vendors are managed security services providers that both monitor and host security applications. Gartner and others have predicted that the in-the-clouds model would eventually replace traditional monitoring of customer premise devices as the dominant managed security services model.

Compliance Management. Compliance – tightly intertwined with security – is likely the single largest IT budget growth driver today and over the next several years. While the term is utilized to describe many types of solutions, in essence it labels the requirement that organizations maintain objectively verifiable, robust procedures to protect the security, integrity and privacy of IT assets and data. By this definition, many security vendors – such as those in identity management, messaging security and consulting – support compliance. The overall effect of compliance is accelerated dissolution of functional silos. First, through combination of security functionality, for example through appliances and event managers. Second, through infrastructure stack convergence among security, storage and network management vendors. As a result, security vendors offering horizontal solutions readily integratable across IT environments are best placed to benefit from the compliance wave. (See Updata’s July report on IT compliance.)

 




 (Please Click Here for PDF of Valuations)

Network & Systems Management Public Company Valuations
Relevant financial data for publicly traded companies
($ in millions)
Market Value
Financial Data
Enterprise Value as a Multiple of
Company
Price 11/10/05
% of 52
Week Hi
Market
Cap
Enterprise
Value (1)
LTM
Revenue

MRQ
Rev.

Growth YoY

LTM Gross
Margin
LTM EBITDA
Margin
Revenues
EBITDA (2)
LTM
CY 05
CY 06
LTM
CY 05
CY 06
Network and Systems Management Bellwethers
BMC Software
$20.17
93.0%
$4,455
$3,235
$1,491
1.7%
78.2%
17.5%
2.2x
2.2x

2.1x

12.4x
11.0x

8.6x

Computer Associates
$29.20
92.1%
$17,316
$17,487
$3,696
6.3%
81.3%
25.8%
4.7x
4.7x
4.3x
18.3x
15.3x
13.9
Compuware
$8.04
80.6%
$3,145
$2,262
$1,239
-1.0%
63.9%
15.5%
1.8x
1.8x
1.7x
11.8x
N/A
N/A
Hewlett-Packard
$28.27
95.8%
$82,464
$73,692
$85,172
9.9%
23.5%
8.3%
0.9x
0.8x
0.8x
10.4x
10.0x
8.8x
International Business Machines
$83.99
84.8%
$135,829
$148,997
$94,378
-7.8%
38.8%
18.6%
1.6x
1.6x
1.6x
8.5x
8.9x
8.3x
Mercury Interactive
$27.33
55.1%
$2,717
$2,206
$776
30.2%
81.2%
18.3%
2.8x
2.6x
2.4x
15.6x
11.9x
10.3
NetIQ
$11.86
88.0%
$624
$392
$204
-16.2%
78.7%
-1.4%
1.9x
1.9x
2.0x
NM
15.1x
27.1x
Quest Software
$14.83
89.4%
$1,490
$1,276
$438
25.4%
88.8%
21.1%
2.9x
2.7x
2.4x
13.8
10.8x
9.6x
Symantec
$19.51
57.3%
$21,529
$17,597
$3,164
70.8%
79.1%
34.8%
5.6x
4.1x
3.3x
16.0x
NA
8.9x
 
Mean
81.8%
13.2%
68.2%
17.6%
2.7x
2.5x
2.3x
13.3x
11.9x
9.8x
Median
88.0%
6.3%
78.7%
18.3%
2.2x
2.2x
2.1x
13.1x
11.0x
9.3x

 

Market Value
Financial Data
Enterprise Value as a Multiple of
Company
Price 11/10/05
% of 52
Week Hi
Market
Cap
Enterprise
Value (1)
LTM
Revenue

MRQ
Rev.

Growth YoY

LTM Gross
Margin
LTM EBITDA
Margin
Revenues
EBITDA (2)
LTM
CY 05

CY 06

LTM
CY 05

CY 06

Network and Systems Management Small Cap
Altiris
$16.38 
45.7%
$464
$323
$190
19.9%
80.7%
12.8%
1.7x
1.7x

1.6x

13.3x
10.0x

9.2x

InfoVista      (4)
$5.57
83.5%
$109
$71
$42
18.8%
80.1%
3.9%
1.7x
1.6x
1.4x
43.9x
N/A
N/A
Keynote Systems
$12.81
87.7%
$265
$131
$54
10.9%
72.6%
14.1%
2.4x
2.4x

N/A

17.4x
16.2
N/A
Motive
$3.97
26.5%
$105
$37
$85
-34.3 %
65.5%
-3.2%
0.4x
0.5x
0.6x
NM
N/A
N/A
Micromuse
$7.85
96.6%
$642
$438
$152
12.8%
83.6%
11.7%
2.9x
2.6x
2.3x
24.5x
23.7x
18.8x
NetScout Systems
$5.73
72.6%
$181
$104
$92
15.4%
75.8%
7.9%
1.1x
1.1x
1.0x
14.2x
N/A
N/A
OPNET Technologies
$9.01
94.8%
$184
$102
$68
-1.8%
77.7%
7.8%
1.5x
1.5x
1.3x
22.4x
N/A
N/A
Opsware
$5.28
66.3%
$536
$433
$49
63.4%
65.9%
-27.1%
8.9x
7.5x
4.9x
NM
N/A
N/A
Packeteer
$8.43
48.2%
$296
$183
$107
7.7%
74.2%
16.7%
1.7x
1.7x
1.5x
10.2x
10.5x
8.5x
Peregrine Systems
$25.25
98.8%
$385
$366
$192
-7.4%
76.1%
1.5%
1.9x
N/A
N/A
123.7x
N/A
N/A
Visual Networks
$1.24
26.1%
$43
$40
$48
0.0%
70.6%
8.5%
0.8x
0.9x
0.8x
21.5x
N/A
N/A
 
Mean
67.9%
9.6%
74.8%
5.0%
1.6x
1.6x
1.3x
20.9x
15.1x
8.8x
Median
72.6%
10.9%
75.8%
7.9%
1.7x
1.6x
1.4x
21.5x
13.3x
9.2x
(1) Enterprise value is equal to market capitalization plus debt and pfd stock minus cash and cash equivalents
(2) EBITDA excludes all one-time charges and expenses
(3) Outliers, as indicated by a box, are excluded from mean calculations
(4) Infovista share price and financials converted from Euros


(Please Click Here for PDF of Valuations)

Security Software Public Company Valuations
Relevant financial data for publicly traded companies
       
($ in Millions)      
Market Value
Financial Data
Enterprise Value as a Multiple of
Company
Price
11/10/05
% of 52
Week Hi
Market
Cap
Enterprise
Value (1)
LTM
Revenue

MRQ
Rev.

Growth YoY

LTM Gross
Margin
LTM EBITDA
Margin
Revenues
EBITDA (2)
LTM
CY 05
CY 06
LTM
CY 05
CY 06
Security Software Bellwethers
Check Point
$22.47
85.7%
$5,619
$3,946
$566
9.1%
95.7%
57.1%
7.0x
6.8x

6.0x

12.2x
11.4x

10.8x

Cogent
$25.17
65.8%
$2,418
$2,050
$145
64.0%
62.8%
46.6%
14.1x
12.7x

9.0x

30.3x
25.6x

18.1x

Gemplus
 $2.43
87.0%
 $1,570
 $1,142
 $1,076
15.5% 32.8% 12.1% 1.1x 1.0x 0.9x 8.8x 7.8x 6.4x
Internet Security Systems
 $24.48
95.0%
 $1,159
 $940
 $319
13.9% 74.0% 22.4% 2.9x 2.9x 2.5x 13.2x 14.1x 12.2x
Juniper
 $24.45
80.8%
 $14,802
 $12,817
 $1,919
45.7% 68.9% 29.9% 6.7x 6.2x 5.1x 22.3x 17.5x 14.2x
Macrovision
 $16.30
58.2%
 $837
 $590
 $202
-4.6% 84.0% 32.4% 2.9x 2.9x 2.6x 9.0x 12.4x 7.2x
McAfee
 $29.57
88.1%
 $3,185
 $2,037
 $978
14.1% 84.4% 27.2% 2.1x 2.0x 1.8x 7.7x 6.0x 5.2x
RSA Security
 $12.93
54.1%
 $940
 $637
 $312
-0.6% 80.3% 15.9% 2.0x 2.1x 1.9x 12.9x 13.1x 10.9x
SafeNet
 $32.10
84.0%
 $833
 $669
 $250
6.6% 49.4% 16.6% 2.7x 2.5x 2.2x 16.1x 11.8x 8.9x
Symantec
 $19.51
57.3%
 $21,529
 $17,597
 $3,164
70.8% 78.7% 34.5% 5.6x 4.1x 3.3x 16.1x NA 8.9x
Trend Micro
 $33.48
68.3%
 $4,532
 $3,816
 $595
13.4% 96.5% 41.8% 6.4x 6.2x 5.5x 15.3x 14.5x 12.3x
VeriSign
 $24.20
67.1%
 $6,442
 $5,694
 $1,617
27.5% 67.8% 26.3% 3.5x 3.4x 3.3x 13.4x 13.1x 12.2x
Websense
 $59.00
94.7%
 $1,443
 $1,155
 $140
32.4% 92.8% 38.4% 8.2x 7.7x 6.2x 21.5x 20.3x 16.6x
 
Mean
  75.9%       23.7% 74.5% 30.8% 4.3x 4.0x 3.4x 15.3x 14.0x 11.1x
Median
  80.8%       14.1% 78.7% 29.9% 3.5x 3.4x 3.3x 13.4x 13.1x 10.9x


Market Value
Financial Data
Enterprise Value as a Multiple of
Company
Price 11/10/05
% of 52
Week Hi
Market
Cap
Enterprise
Value (1)
LTM
Revenue

MRQ
Rev.

Growth YoY

LTM Gross
Margin
LTM EBITDA
Margin
Revenues
EBITDA (2)
LTM
CY 05

CY 06

LTM
CY 05

CY 06

Security Software Small Cap
ActivCard
$3.30
33.8%
$145
$(33)
$43
26.8%
56.7%
-64.1%
NMM
NM

N/A

NM
N/A

N/A

Aladdin
$17.97
55.9%
$270
$197
$79
16.1%
79.7%
20.0%
2.5x
2.4x
2.1x
12.5x
12.0x
9.8x
BindView
$3.92
89.9%
$200
$171
$73
2.5%
88.0%
0.9%
2.4x
2.2x

2.0x

256.5x
N/A
N/A
Blue Coat
$50.51
97.5%
$701
$648
$108
58.0%
67.9%
 8.7%
6.0x
4.9x
3.7x
 68.7x
N/A
N/A
CyberGuard
$9.52
98.8%
$319
 $305 $305
$68
11.2%
69.1%
11.0%
4.5x
4.4x
3.8x
41.0x
28.9x
N/A
Digimarc
$6.32
63.1%
$131
$105
$98
13.9%
36.8%
-2.9%
1.1x
1.0x
0.9x
NM
N/A
N/A
Entrust
$4.75
71.6%
$298
$214
$100
10.8%
63.6%
11.7%
2.1x
2.1x
1.9x
18.3x
N/A
N/A
Hi/fn
$5.66
60.5%
$78
$34
$46
-34.2%
68.1%
-4.0%
0.7x
0.7x
N/A
NM
N/A
N/A
Identix
$4.49
54.5%
$402
$372
$80
36.4%
35.7%
-8.0%
4.7x
4.4x
3.6x
NM
N/A
370.4x
Intrusion
$2.91
46.9%
$20
$19
$7
17.9%
56.8%
 -41.8%
2.8x
2.9x
N/A
NM
N/A
N/A
NetIQ
$11.86
88.0%
$536
$304
$204
-16.2%
78.7%
-1.4%
1.5x
1.5x
1.5x
NM
11.7x
21.0x
Secure Computing
$13.82
98.2%
$528
$455
$104
11.1%
86.5%
20.7%
4.4x
4.2x
3.8x
21.0x
19.9x
16.9x
SonicWALL
$7.21
99.0%
$477
$233
$131
15.8%
69.4%
8.0%
1.8x
1.7x
1.6x
22.1x
16.7x
14.7x
SurfControl (6)
$8.52
71.5%
$259
$175
$99
7.4%
98.0%
16.1%
1.8x
1.7x
1.7x
10.9x
8.9x
 7.9x
Tumbleweed
$3.08
70.0%
$155
$130
$50
22.2%
79.9%
1.1%
2.6x
2.5x
2.1x
234.1x
N/A
N/A
Vasco Data Security
$11.53
95.7%
$435
$425
$46
79.4%
63.5%
20.0%
9.2x 
8.2x
5.4x
45.8x
37.9x
N/A
Viisage
$5.25
52.8%
$262
$249
$70
-28.1%
31.4%
9.5%
3.5x
3.9x
3.4x
37.2x
39.6x
28.5x
WatchGuard
$3.45
72.9%
$117
$41
$75
-8.3%
66.3%
-10.8%
0.5x
0.5x
0.5x
NM
NM
48.9x
Zix
$1.96
35.5%
$80
$81
$14
-9.6%
-7.0%
-214.3%
5.6x
5.1x
N/A
NM
N/A
N/A
 
Mean
71.4%
12.3%
62.6%
-11.6%
2.8x
2.7x
2.3x
30.8x
20.0x
16.5x
Median
71.5%
11.2%
67.9%
1.1%
2.5x
2.5x
2.1x
37.2x
18.3x
19.0x
(1) Enterprise value is equal to market capitalization plus debt and pfd stock minus cash and cash equivalents
(2) EBITDA excludes all one-time charges and expenses      
(3) Outliers, as indicated by a box, are excluded from mean calculations    
(4) Gemplus share price and financials converted from Euros      
(5) Trend Micro share price and financials converted from Yen      
(6) SurfControl share price converted from GBP



Infrastructure Software M&A Transactions         
Infrastructure Software merger & acquisition deals since July 1, 2005, featuring actual deal values with corresponding revenue multiples
             
($ in millions)        
Ann't Date
Target
Acquiror
Deal Value

LTM Rev

Mult of LTM Rev

Description
21-Nov Lasso Logic SonicWALL
NA
NA
NA
Data backup solutions
16-Nov Collation IBM
$46.0
$5.0
9.2x
Agent-free application infrastructure mapping software
16-Nov Constant Data BakBone Software
$5.5
NA
NA
Mirroring and snapshotting sw including clustering tool
11-Nov
Serena Software
Silver Lake Partners
$1,061.4 $243.1 4.4x
IT change management
3-Nov
SolarMetric
BEA Systems
NA NA NA
Object persistence
17-Oct
Legadero Software
Borland Software
NA NA NA
IT mgmt & governance solutions for SW dev & delivery
14-Oct
Ambeo
Embarcadero Technologies
$6.2 NA NA
Database auditing, access, and usage monitoring
14-Oct
iLumin
Computer Associates
$47.4 NA NA
Enterprise message management and archiving
7-Oct
Innobase OY
Oracle Corporation
NA NA NA
Open source transactional database technology
5-Oct
Intuit (Information Technology Solutions business)
TA Associates
$200.0 NA NA
IT help desk and asset management software
3-Oct
RLX Technologies
Hewlett-Packard
NA $24.0 NA
Open source blade management software
28-Sep
M7
BEA Systems
NA NA NA
Eclipse-based web application development tools
23-Sep
META SecurityCompliance management solutions
Scalable Software
NA NA NA
Scalable Software
19-Sep
Peregrine Systems Inc
Hewlett-Packard
$370.0 $191.1 1.9x
Asset Management
19-Sep
AppIQ
Hewlett-Packard
NA NA NA
SAN management technology
8-Sep
PalmSource
ACCESS
$267.0 $71.9 3.7x
Provider of PalmOS
6-Sep
Swan Labs Corporation
F5 Networks
$43.0 NA NA
WAN optimization and application acceleration
30-Aug
KMXperts
BMC Software
NA NA NA
Knowledge mgmt for IT support centers
17-Aug
Rainfinity
EMC Corporation
NA NA NA
Virtualization
8-Aug
Zetta Systems
Overland Storage, Inc
$9.0 NA NA
Real-time data protection SW for digital storage solutions
5-Aug
Xdrive Inc
America Online Inc
NA NA NA
Online storage
29-Jul
Extended Systems
Sybase
$63.1 $40.1 1.6x
Mobile software solutions
26-Jul
Sheer Networks (1)
Cisco Systems
$97.0 NA NA
Intelligent solutions for monitoring and managing networks

Mean
4.9x
Median
4.0x



Security Software M&A Transactions         
Security Software merger & acquisition deals since July 1, 2005, featuring actual deal values with corresponding revenue multiples
             
($ in millions)        
Ann't Date Target Acquiror Deal Value LTM Rev Mult of LTM Rev Description
21-Nov enKoo SonicWALL
NA
NA
NA
Secure remote access technology
16-Nov OctetString Oracle
NA
NA
NA
Virtual directory software
16-Nov Thor Technologies Oracle
$90
$12
7.5x
Cross-platform provisioning solutions
15-Nov Teros Citrix
NA
NA
NA
Application security solutions
15-Nov Integrated Biometric Technology Viisage
$60
$33
1.8x
Fingerprinting products, services and solutions
14-Nov Funk Software Juniper Networks
$122
NA
NA
Policy-based network access security solutions
14-Nov Eracom Technologies SafeNet
$25
NA
NA
Cryptographic and transaction security solutions
3-Nov
Cryptine Networks (Prof Svcs Unit)
Helio Solutions
NA NA NA
Security professional services
1-Nov
OmniPod
MessageLabs
NA NA NA
Hosted, secure IM platform
31-Oct
WhiteCanyon
Detto
NA NA NA
Personal identity theft protection; permanent deletion technology
27-Oct
St. Bernard Software
Sand Hill IT Security Acquisition
$51 $24 2.1x
Internet, email filtering appliances; patch mgmt; backup
21-Oct
Abridean
nCipher
$12 $2 5.4x
User management and provisioning solutions
6-Oct
Sourcefire
Check Point
$225 $33 6.8x
Intrusion prevention and real-time network awareness
5-Oct
US Networks
Perimeter Internetworking
NA NA NA
Managed network and security services provider
3-Oct
BindView Development
Symantec
$177 $72 2.4x
Agent-less IT security compliance software
30-Sep
Axiliance SA
Bee Ware
NA NA NA
Web Application firewall
23-Sep
META Security Group
Scalable Software
NA NA NA
Compliance management solutions
22-Sep
WholeSecurity
Symantec
NA NA NA
Behavior-based anti-phishing, anti-virus
20-Sep
Enatel
Bull Evidian 
NA NA NA
Enterprise single sign-on (SSO) access management
19-Sep
Alacris
Microsoft
NA NA NA
Certificate management and identity assurance software
16-Sep
Yul Data Security 
2e2 Group
NA $7 NA
Data Management, Data Security and Storage Solutions
12-Sep
Process Software
HALO Technology Holdings
NA NA NA
Networking, Email, and Anti-Spam Solutions
6-Sep
Grisoft (65%)
Intel Capital / Enterprise Investors
$52 NA NA
Anti-virus software
22-Aug
Aluria
Earthlink
NA NA NA
Anti-spyware
19-Aug
KaVaDo
Xcelera (Protegrity)
NA NA NA
Web application security
18-Aug
CyberGuard
Secure Computing
$281 $66 4.3x
Global provider of security solutions
17-Aug
NEXL
MTM Technologies
NA NA NA
Managed security services 
16-Aug
Sygate
Symantec
$150 $25 6.0x
Endpoint compliance solutions
2-Aug
LODOGA Security
TransDigital (SiegeWorks)
$0.1 NA NA
Risk mgmt; managed application firewall
1-Aug
MediaDefender
ARTISTdirect
$43 NA NA
Internet anti-piracy solutions
27-Jul
Protocom
ActivCard
$28 NA NA
Credential management solutions
26-Jul
Trymedia Systems
Macrovision
$34 NA NA
Secure distribution products for video gaming industry
26-Jul
Qurb
Computer Associates
NA NA NA
Antispam, antiphishing and antifraud tools 
25-Jul
Paragon Total Solutions
ComnetiX
$4 $3 1.5x
Biometrics
20-Jul
FrontBridge
Microsoft
NA $25 NA
Outsourced e-mail anti-virus protection
15-Jul
Mycom (Managed Services Div and mailMAX)
Secure Pipe
NA NA NA
Managed security services and Email Filtering Technology
14-Jul
iDEFENSE
Verisign
$40 NA NA
Security intelligence services
14-Jul
A2P
Stordata
NA NA NA
Data integration, storage, security and data protection services
13-Jul
Finmatica (MSI)
Arkoon
NA NA NA
Content encryption
12-Jul
BMD Solutions
FusionStorm
NA NA NA
Security consulting
8-Jul
Askaris
Onyx Internet
NA NA NA
Network security consultancy
7-Jul
JP Mobile
Good Technology
$75 $10 7.5x
Security software for wireless access
4-Jul
SwissSign
Swiss Post 
NA NA NA
Secure electronic data exchange
1-Jul
GuardedNet
Micromuse
$16 NA NA
Security management and incident response solutions

Mean
4.5x
Median
4.8x



Infrastructure Software Venture Capital Investments
Infrastructure Software venture capital investments since July 1, 2005
     
($ in millions)  
Invest.
Date
Company Description Amount Round
1-Nov Continuent Open-source database availability middleware 5.8 B
28-Oct CloudShield Deep packet inspection platform for network operators 10.0 D
26-Oct Centeris Mixed network server management 5.0 A
9-Oct Wily Performance mgmt sw for Java Web applications 6.8 D2
30-Sep XenSource Open source virtualization solutions 17.1 B
22-Sep SymphonIQ Web application performance monitoring 2.0 A
20-Sep Everdream Web-hosted desktop and mobile computing svcs 20.0 F
14-Sep Blue Lane Inline patch proxy for enterprise servers 13.3 B
14-Sep Bladelogic Data center automation software 7.0 D
6-Sep CentrePath Intelligent data path management solutions 5.0 B
1-Sep Q Quality of experience (QoE) software solution  1.5 A
31-Aug Collation Application infrastructure mapping software 1.4 Bridge
22-Aug Coradiant Datacenter performance monitoring 12.7 D
19-Aug LeftHand Networks  SAN solutions 25.0 C
16-Aug BDNA Business asset management solutions 2.5 C2
9-Aug OpTier Transaction workload management 9.5 C
2-Aug Evolvent Technologies Fed sector information assurance and tech svcs 2.2 A




Security Software Venture Capital Investments
Security Software venture capital investments since July 1, 2005
     
($ in millions)  
Invest.Date Company Description Amount Round
9-Nov BioPassword (fka BioNet Systems) Two-factor authentication; biometrics $8.0 B2
2-Nov Cernium Video security software $7.5 C
2-Nov Trust Digital Mobile security configuration $9.0 B
28-Oct CloudShield Deep-packet inspection firewall $10.0 D
20-Oct ForeScout Integrated security platform; access, policy, intrusion, vul. assess. $10.0 D
19-Oct Vernier Endpoint access control $21.0 E
18-Oct NetworkStreaming Web application firewalls $6.0 A
17-Oct NetContinuum Application firewall appliance $15.0 D2
10-Oct Sana Security (fka Company 51) Intrusion prevention $1.2 Bridge
5-Oct Intellitactics Security event management $3.5 F
4-Oct iPolicy Networks (fka PolicyOne) Carrier firewall, IDC appliance $15.0 B
29-Sep Identity Engines  Identity management - stealth mode $8.7 A
27-Sep Preventsys (fka LNM Newco) Security policy management; auditing $3.6 C2
26-Sep Dolphian Content filtering $2.5 C
19-Sep Alert Logic Network threat management, intrusion detection $2.3 A
12-Sep Verid Identity verification and authentication services  $13.2 F
12-Sep Kidaro stealth mode $4.0 A
5-Sep SkyRecon Distributed behavioral security software  $3.8 A
1-Sep Secure Elements Patch management $3.0 B3
17-Aug Secure Computing Firewall, authentication, anti-spam, anti-virus, int. prev. $70.0 A
17-Aug PacketMotion App. level processing within the network pipe - stealth $14.0 B2
16-Aug NetDevices Service gateways for security, VPN, switching and other $25.0 B
12-Aug Tizor Systems Data server auditing $12.0 B
12-Aug Guardium Database content security $ 5.5 C
9-Aug Centrify MS Active Directory utility $14.0 B
8-Aug Sensory Networks Network security accelerator $10.1 C
8-Aug Persystent Technology Self-repair and security software $ 7.0 B
5-Aug Verance Audio watermarking solutions 5.0 B
2-Aug Evolvent Technologies Federal information assurance and technology services $4.5 A
27-Jul Securinex stealth mode $1.3 AA
26-Jul Senforce Endpoint access control $3.7 A2
26-Jul Identrus Identity credentials services $20.0 B
22-Jul Granite Edge Networks Internal network security $5.0 B
18-Jul Nevis Networks Personal DMZ $12.5 B2
18-Jul NeoScale Systems Secure storage; content encryption $11.0 D
18-Jul ConSentry Networks (fka Tidal Networks) Enterprise LAN security $17.0 C
13-Jul Arkoon Network Security Security appliances $2.4 C



 

Top





Updata Team:

Kevin McNerney: kmcnerney@updata.com
Don More: dmore@updata.com
Joel Strauch: jstrauch@updata.com
Robert Lung: rlung@updata.com
Scott Beck: sbeck@updata.com

 

Updata Capital, Inc. Disclaimer
The information and opinions in this report were prepared by Updata Capital, Inc. ("Updata"). The information herein is believed by Updata to be reliable and has been obtained from and based upon public sources believed to be reliable, but Updata makes no representation as to the accuracy or completeness of such information. Updata may provide, may have provided or may seek to provide M&A advisory services to one or more companies mentioned herein. In addition, employees of Updata may have purchased or may purchase securities in one or more companies mentioned in this report. Opinions, estimates and analyses in this report constitute the current judgment of the author as of the date of this report. They do not necessarily reflect the opinions of Updata and are subject to change without notice. Updata has no obligation to update, modify or amend this report or to otherwise notify a reader thereof in the event that any matter stated herein, or any opinion, estimate, forecast or analysis set forth herein, changes or subsequently becomes inaccurate. This report is provided for informational purposes only. It is not to be construed as an offer to buy or sell or a solicitation of an offer to buy or sell any financial instruments or to participate in any particular trading strategy in any jurisdiction.

Top

Visit our website: http://www.updatacapital.com/uci/index.htm