Skip to content

A curated list of publicly traded cybersecurity companies and ETFs, with investor resources, earnings transcripts, and industry insights. Includes 18 cybersecurity solution categories, each backed by real-world vendor examples and AI-driven offerings.

Notifications You must be signed in to change notification settings

TalEliyahu/awesome-cybersecurity-stocks

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 

Repository files navigation

Awesome Cybersecurity Stocks Awesome

A curated list of publicly traded cybersecurity companies, organized by their core solutions and specialized domains. This resource is designed for investors, professionals, and enthusiasts looking to explore and analyze the diverse landscape of the cybersecurity market, encompassing 18 distinct solution categories and AI-driven offerings to address a wide range of security challenges.


Table of Contents


Specialists ("Pure Play") vs. Multiservice Cybersecurity

This list categorizes companies into two main types, reflecting how cybersecurity aligns with their overall business model:

  • 🎯 Specialists ("Pure Play"): Focus exclusively on cybersecurity, dedicating their entire business to developing security solutions.
  • 🌐 Multiservice: Offer cybersecurity as part of a broader range of technology solutions, such as networking, cloud services, or application delivery.

Exclusion: Tech giants like Microsoft or AWS are not included, as cybersecurity is just one part of their diverse operations. Additionally, this list does not include micro-cap or low-cap stocks to ensure focus on established companies and ETFs with significant market presence.


Cybersecurity Stock Lists (TradingView 📈)

Endpoint Protection and Threat Detection

Secures devices such as laptops, mobile devices, and servers from threats like malware and ransomware. Common solutions include Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) for real-time monitoring and response.

Company Ticker Twitter Description Domains Resources Growth
CrowdStrike $CRWD @CrowdStrike | $CRWD Cloud-native endpoint security. More 🎯 Endpoint ThreatIntel IDR - SEC Filing
- Earning Transcripts
36.1%
SentinelOne $S @SentinelOne | $S AI-driven endpoint protection. More 🎯 Endpoint ThreatIntel Automation - SEC Filing
- Earning Transcripts
46.2%

Network Security

Protects an organization’s network perimeter and internal traffic. Typical measures include firewalls, Intrusion Prevention Systems (IPS), Virtual Private Networks (VPNs), and DDoS mitigation to block unauthorized access and attacks.

Company Ticker Twitter Description Domains Resources Growth
Check Point $CHKP @CheckPointSW | $CHKP Firewalls and threat prevention. More 🌐 NetSec AppSec Email - SEC Filing
- Earning Transcripts
5.8%
Cisco $CSCO @Cisco | $CSCO Networking and security solutions. More 🌐 NetSec AppSec AccessMgmt IAM Monitoring - SEC Filing
- Earning Transcripts
-5.6%
Fortinet $FTNT @Fortinet | $FTNT Firewalls and endpoint security. More 🌐 NetSec Endpoint AppSec Email - SEC Filing
- Earning Transcripts
10.4%
Palo Alto Networks $PANW @PaloAltoNtwks SASE and AI-based detection. More 🎯 NetSec ThreatIntel AppSec - SEC Filing
- Earning Transcripts
14%
Radware $RDWR @radware | $RDWR DDoS and app security. More 🌐 AppSec NetSec DataCenter - SEC Filing
- Earning Transcripts
2.3%
Juniper Networks $JNPR @JuniperNetworks | $JNPR Networking and enterprise solutions. More 🌐 NetSec - SEC Filing
- Earning Transcripts
10.9%
A10 Networks $ATEN @A10Networks | $ATEN Secure app delivery, counter DDoS threats. More 🌐 NetSec - SEC Filing
- Earning Transcripts
3%

Identity and Access Management

Controls user identities, authentication, and authorization. This category commonly includes solutions such as Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Privileged Identity Management (PIM) to ensure that only the right individuals have appropriate access.

Company Ticker Twitter Description Domains Resources Growth
CyberArk $CYBR @CyberArk | $CYBR Privileged access management. More 🎯 IAM - SEC Filing
- Earning Transcripts
30.3%
Okta $OKTA @Okta | $OKTA Identity and SSO. More 🎯 IAM - SEC Filing
- Earning Transcripts
21.8%

Cloud and Application Security

Secures cloud services, applications, and containers. It often involves technologies like Web Application Firewalls (WAF), Zero Trust frameworks, and Secure Access Service Edge (SASE) to enforce consistent security policies and monitor for threats in cloud environments.

Company Ticker Twitter Description Domains Resources Growth
Akamai $AKAM @Akamai | $AKAM CDN, DDoS mitigation, and app security. More 🌐 NetSec AppSec - SEC Filing
- Earning Transcripts
5.9%
Cloudflare $NET @Cloudflare | $NET Edge network services for CDN, DDoS, and Zero Trust. More 🌐 NetSec AppSec - SEC Filing
- Earning Transcripts
27.6%
F5 $FFIV @F5 | $FFIV Multi-cloud app security and load balancing. More 🌐 AppSec NetSec - SEC Filing
- Earning Transcripts
-1.4%
Zscaler $ZS @Zscaler | $ZS Zero Trust cloud security. More 🎯 AppSec - SEC Filing
- Earning Transcripts
34%

Data Protection and Governance

Safeguards data through backup, encryption, and access controls while ensuring compliance with regulations such as GDPR or HIPAA. It covers data integrity, recovery, and lifecycle management.

Company Ticker Twitter Description Domains Resources Growth
Broadcom $AVGO @Broadcom | $AVGO Enterprise security products from Symantec. More 🌐 Endpoint Email DataSec - SEC Filing
- Earning Transcripts
44%
Commvault $CVLT @Commvault | $CVLT Backup, recovery, and data management. More 🌐 DataSec - SEC Filing
- Earning Transcripts
7%
Varonis $VRNS @Varonis | $VRNS Data governance, security, and analytics. More 🎯 DataSec IAM Monitoring - SEC Filing
- Earning Transcripts
12.1%
Rubrik $RBRK @RubrikInc | $RBRK Data protection and cloud-based security. More 🌐 DataSec - SEC Filing
- Earning Transcripts
4.7%

Security Analytics and Threat Intelligence

Uses solutions like Security Information and Event Management (SIEM) and vulnerability management solutions, often supplemented with machine learning/AI, to detect, analyze, and respond to cyber threats by correlating security data from various sources.

Company Ticker Twitter Description Domains Resources Growth
Elastic N.V. $ESTC @elastic | $ESTC Search-based analytics, SIEM, and observability. More 🌐 Monitoring ThreatIntel DataSec - SEC Filing
- Earning Transcripts
19%
Qualys $QLYS @Qualys | $QLYS Cloud-based vulnerability management and compliance. More 🎯 VulnMgmt GRC Monitoring - SEC Filing
- Earning Transcripts
12%
Rapid7 $RPD @Rapid7 | $RPD Security analytics and vulnerability management. More 🎯 VulnMgmt ThreatIntel Monitoring Consulting - SEC Filing
- Earning Transcripts
8%
SecureWorks $SCWX @SecureWorks | $SCWX Managed security services and threat intelligence. More 🎯 Monitoring ThreatIntel IDR Consulting - SEC Filing
- Earning Transcripts
-21.1%
Tenable $TENB @TenableSecurity | $TENB Cyber exposure and vulnerability management. More 🎯 VulnMgmt Monitoring - SEC Filing
- Earning Transcripts
13%

Non-US Traded Cybersecurity Companies

These cybersecurity companies are listed on international stock exchanges outside of the United States, offering a wide range of security solutions across various domains.

Company (IR) Ticker / Stock Exchange Twitter Description Domains Revenue Growth (2024)
Cyberoo $CYB.MI - Borsa Italiana @CYBEROO_ITALIA | $CYB Provides MDR, threat protection, and cybersecurity services for businesses. More 🎯 Monitoring ThreatIntel Consulting IDR 27.3%
Darktrace $DARK.L - LSE @Darktrace | $DARK Offers AI-driven cybersecurity for real-time threat detection and response. 🎯 ThreatIntel NetSec Monitoring 24.0%
NCC Group $NCC.L - LSE @NCCGroupplc | $NCC Cybersecurity consulting, managed services, and software security testing. More 🎯 Consulting -1.0%
Thales $HO.PA - Euronext Paris @ThalesGroup | $HO Develops digital security solutions (encryption, IAM, secure communications). 🌐 DataSec IAM 9.2%
Trend Micro $TMICY - OTC (OTCMKTS) @TrendMicro | $TMICY Threat detection, cloud security, and endpoint protection. More 🎯 Endpoint NetSec Email 4.4%
WithSecure Oyj $WITH.HE - Nasdaq Helsinki @WithSecure | $WITH.HE Endpoint protection, vulnerability mgmt, cloud security, consulting. More 🎯 Consulting VulnMgmt 5.5%
Yubico AB $YUBICO.ST - Nasdaq Stockholm @Yubico | $YUBICO Hardware-based authentication (YubiKeys) for orgs and individuals. 🎯 IAM N/A

Cybersecurity ETFs

These exchange-traded funds invest in diversified portfolios of companies operating across various cybersecurity domains, offering investors broad exposure to the cybersecurity market.

ETF Name Ticker Description Total Return for 2024 AUM (USD)
Amplify Cybersecurity ETF $HACK Tracks the Prime Cyber Defense Index, focusing on companies directly involved in the cybersecurity industry. 23.3% $1.94 billion
First Trust NASDAQ Cybersecurity ETF $CIBR Aims to match the Nasdaq CTA Cybersecurity Index™, targeting cybersecurity-focused tech and industrials firms. 18.2% $7.53 billion
Global X Cybersecurity ETF $BUG Invests in companies benefiting from cybersecurity tech adoption, specifically those developing/managing security protocols to prevent intrusions/attacks. 9.6% $823.43 million

▲ Back to Top


Business of Cybersecurity

Explore resources that offer insights into the business, strategy, and trends shaping the cybersecurity industry. These blogs, newsletters, reports, and podcasts provide valuable perspectives for professionals, founders, and investors looking to deepen their understanding of this dynamic field.

Blogs and Newsletters

  • Venture in Security
    Ross Haleliuk explores the business of cybersecurity, focusing on the ecosystem, players, angel investing, venture capital, go-to-market strategies, and product-led growth.

  • Strategy of Security
    Cole Grolmus analyzes the business and strategy of cybersecurity, covering trends, companies, products, and case studies relevant to cybersecurity leaders and operators.

  • Anton on Security
    Dr. Anton Chuvakin shares analysis on market sub-segments, with a focus on log management and emerging cybersecurity challenges.

  • Return on Security
    Mike Privette provides insights on security trends, a weekly newsletter about cybersecurity investments, and product trend reports.

Podcasts

  • The Cyber Brain
    Weekly conversations with tech buyers on motivations, challenges, and strategies for cybersecurity marketers and founders.

  • Hacker Valley
    Features discussions with cybersecurity marketers about effective go-to-market strategies and lessons from successes and failures.

Market Insights and Research

▲ Back to Top


Cybersecurity Solutions Categories

This section outlines 18 distinct cybersecurity solution categories, each supported by real-world vendor examples and AI-driven offerings to address diverse security challenges.

1. Network Security NetSec

  • Network Traffic Analysis (NTA): Monitors/analyzes network traffic for suspicious activity (e.g., Cisco Stealthwatch, Darktrace).
  • Firewalls: Secures network perimeters/controls traffic flow (e.g., Palo Alto Networks NGFW, Cisco ASA).
  • Intrusion Detection/Prevention Systems (IDS/IPS): Detects/prevents unauthorized access (e.g., Snort, Suricata).
  • Micro-Segmentation: Restricts lateral movement within networks by enforcing security policies at a granular level, enhancing zero-trust architectures (e.g., Illumio Core).
  • Network Access Control (NAC): Enforces security policies by controlling device access to enterprise networks, ensuring compliance before granting access (e.g., Aruba ClearPass).

2. Endpoint Security Endpoint

  • Endpoint Detection and Response (EDR): Real-time endpoint threat detection with capabilities for proactive identification of advanced threats (e.g., CrowdStrike Falcon, Carbon Black).
  • Extended Detection and Response (XDR): Cross-layer detection and response, providing unified threat visibility and action across endpoints, networks, and cloud environments (e.g., Microsoft Defender XDR, Palo Alto Cortex XDR).
  • Mobile Threat Defense (MTD): Protects mobile devices (e.g., Lookout, Zimperium).
  • Endpoint Protection Platforms (EPP): Comprehensive device security (e.g., Symantec Endpoint Security, Trend Micro Apex One).
  • Device Management: Centralized endpoint compliance/security (e.g., Microsoft Intune, Workspace ONE).
  • Mobile Device Management (MDM): Centralized management and security of mobile devices, supporting diverse needs such as corporate fleets, personal devices in BYOD environments, and large-scale deployments (e.g., Cisco Meraki, VMware Workspace ONE, Jamf Pro, Ivanti, SOTI MobiControl, ManageEngine Mobile Device Manager Plus).

3. Monitoring and Operations Monitoring

  • SIEM (Security Info and Event Management): Centralized platforms for collecting, analyzing, and correlating security data to uncover potential threats (e.g., Splunk, IBM QRadar).
  • XIEM (Extended IEM): Enhances traditional SIEM capabilities with advanced analytics and machine learning for deeper insights. (e.g., LogRhythm XIEM, Exabeam).
  • Behavioral/Insider Threat Analytics: Detects anomalous and malicious activity by analyzing user and entity behavior patterns (e.g., Varonis, Securonix).

4. Change Management ChangeMgmt

  • Configuration Monitoring: Ensures authorized configurations only (e.g., Chef InSpec, Puppet Enterprise).
  • Patch Management: Automates vulnerability patches (e.g., ManageEngine Patch Manager Plus, Ivanti Patch).

5. Orchestration and Automation Automation

  • SOAR: Platforms to automate incident investigation, containment, and remediation (e.g., Splunk Phantom, Palo Alto Cortex XSOAR).
  • XOAR: Extended Orchestration for complex environments (e.g., IBM Resilient, Google Chronicle SOAR).
  • Autonomous SOC Solutions: AI-driven systems to automate security operations, including detection and response processes (e.g., StrikeReady, Arcanna.ai).

6. Threat Intelligence ThreatIntel

  • Threat Intelligence Platforms (TIPs): Aggregate/analyze threat data (e.g., Recorded Future, ThreatConnect).
  • AI-Driven Threat Detection: Uses AI for threat detection (e.g., Darktrace, Vectra AI).
  • User/Entity Behavior Analytics (UEBA): Analyzes activity patterns to detect potential security incidents before they escalate (e.g., Securonix UEBA, Exabeam).
  • Deepfake Detection: Identifies AI-generated content for media integrity (e.g., Reality Defender, Truepic).

7. Data Center Security DataCenter

  • Physical Security Controls: Prevents unauthorized data center access (e.g., HID Global, Bosch).
  • Data Center Firewalls: Monitors/protects traffic within DCs (e.g., Fortinet FortiGate DC Firewall, Juniper SRX).

8. Data Security and Protection DataSec

  • Data Loss Prevention (DLP): Prevents data leakage.
    • Endpoint DLP, Network DLP, Storage DLP, Email DLP, etc.
  • AI-Based Data Flow Mapping: Automates the discovery of sensitive data flows and risks (e.g., 1Touch.io, Cyberhaven).
  • Cloud Access Security Broker (CASB): Provides visibility, compliance enforcement, and data protection for cloud-based services, ensuring secure usage of SaaS, IaaS, and PaaS environments (e.g., Cisco Cloudlock, Forcepoint CASB).
  • Airgap Security: Utilizes physical or virtual isolation to protect systems from network threats, ensuring no direct network connectivity for critical systems.

9. Identity and Access Management IAM

  • Privileged Access Management (PAM): Secures privileged accounts (e.g., CyberArk, BeyondTrust).
  • Multi-Factor Authentication (MFA): Multiple identity verifications (e.g., Duo, Okta MFA).
  • IGA (Identity Governance/Admin): Manages user permissions (e.g., SailPoint, IBM Security IGA).
  • IAM: Controls system/data access (e.g., Okta, Azure AD).
  • Secure Mobile Access: VPN/MFA for mobile users (e.g., Palo Alto Prisma Access, Zscaler Private Access).
  • AI for Identity Security: Enhances identity verification processes with behavior analysis and fraud detection (e.g., Twine Security, RedBlock.ai).

10. Application Security AppSec

  • DAST: Tests running apps for vulnerabilities (e.g., Burp Suite, OWASP ZAP).
  • SAST: Analyzes source code (e.g., SonarQube, Checkmarx).
  • IAST: Combines DAST + SAST (e.g., Contrast Security, Synopsys Seeker).
  • RASP: In-app runtime protection (e.g., Imperva RASP, Signal Sciences RASP).
  • SCA: Open-source vulnerability tracking (e.g., Snyk, WhiteSource).
  • WAF: Web app firewall (e.g., Akamai Kona, Imperva WAF).
  • Mobile App Security: Dev-time & runtime protection (e.g., Veracode Mobile, NowSecure).
  • Cloud Workload Protection Platforms (CWPP): Provides comprehensive security for cloud-native workloads, including containers, virtual machines, and serverless functions. Features include vulnerability scanning, runtime monitoring, and compliance enforcement (e.g., Aqua Security, Sysdig Secure, Prisma Cloud).
  • Software Supply Chain Security: Protects against risks in software development pipelines, including vulnerabilities, misconfigurations, and secrets in code repositories (e.g., GitGuardian, JFrog Xray, Sonatype Nexus).
  • SBOM Tracking: Manages and tracks Software Bill of Materials for transparency and security in software components (e.g., Anchore, CycloneDX).
  • AIBOM (AI Bill of Materials): Tracks and documents datasets, models, and dependencies in AI systems to enhance transparency and ensure secure deployment.
  • AI for Application Security: Identifies vulnerabilities during development and deployment (e.g., Mobb.ai, Pixee.ai).

11. Email Security Email

  • Secure Email Gateway (SEG): Filters malicious email (e.g., Proofpoint, Mimecast).
  • Anti-Phishing: Educates/detects phishing (e.g., KnowBe4, Cofense).
  • Cloud Email Security: Secures hosted email (e.g., Microsoft Office 365 Defender, Google Workspace).
  • AI-Enhanced Email Threat Detection: Identifies AI-crafted phishing attempts using advanced NLP and behavioral analysis (e.g., Tessian, Abnormal Security).

12. Security Awareness & Training Training

  • Phishing Simulation: Tests staff on phishing recognition (e.g., KnowBe4, Cofense PhishMe).
  • Security Awareness: Ongoing staff education (e.g., SANS Security Awareness).
  • AI-Based Training Solutions: Personalizes awareness programs using behavior analysis (e.g., Culture.ai, Outthink.io).

13. Professional Services & Consulting Consulting

  • Risk Assessment Services: Evaluate and mitigate cybersecurity risks (e.g., Qualys Risk, Rapid7 Risk).
  • Compliance Readiness: Prepare organizations for regulatory requirements (e.g., Deloitte, PwC).
  • Adversarial Simulation and Vulnerability Assessments: Simulates real-world attack scenarios and conducts detailed assessments to uncover vulnerabilities in applications, systems, and networks, offering actionable insights for improving security resilience (e.g., NCC Group, Trustwave).
  • AI-Driven Compliance Management: Leverages AI for automating compliance with regulatory standards (e.g., Styrk.ai, SurePath.ai).
  • Managed Detection and Response (MDR): Combines advanced threat detection, 24/7 monitoring, and response services to identify and mitigate threats (e.g., CrowdStrike Falcon Complete, Rapid7 MDR).
  • Incident Response Services: Expert-led investigation, containment, and recovery during or after security incidents, minimizing impact and reducing recovery time (e.g., Palo Alto Networks Unit 42).

14. Vulnerability Management VulnMgmt

  • Continuous Vulnerability Management: Regular scans/remediation (e.g., Qualys VM, Nessus).
  • CAASM (Cyber Asset Attack Surface Mgmt): Reduces overall attack surface (e.g., CyCognito, RiskIQ).

15. Incident Detection and Response IDR

  • Breach & Attack Simulation (BAS): Tests security defenses through real-world attack scenarios to uncover vulnerabilities and gaps (e.g., SafeBreach, AttackIQ).
  • Incident Response Platforms: Streamlines and automates workflows to manage and contain security incidents effectively (e.g., IBM Resilient, ServiceNow Security IR).

16. Industrial Control Systems ICS

  • ICS Security Platforms: Protect operational tech from cyber threats (e.g., Nozomi Networks, Claroty).
  • SCADA Security: Secures critical infrastructure (e.g., Siemens SCADA, Honeywell Industrial Cybersecurity).

17. Governance, Risk, and Compliance GRC

  • Compliance Management: Tracks adherence to standards (e.g., RSA Archer GRC, LogicManager).
  • Risk Management: Identifies/mitigates organizational risks (e.g., ServiceNow GRC, MetricStream).

18. Third-Party Risk Management TPRM

  • Vendor Risk Assessment: Evaluates third-party security posture (e.g., BitSight, RiskRecon).
  • Supply Chain Security: Monitors dependencies/supply chain (e.g., CyberGRX, Venafi).
  • AI-Driven Third-Party Risk Insights: Offers automated insights into vendor vulnerabilities (e.g., Prevalent AI, Panorays AI).

▲ Back to Top


Contributing

  • 🌟 Star this repository if you found it helpful.
  • 🐛 Report Issues to suggest fixes or improvements.
  • 🚀 Submit a Pull Request to add new stocks or insights.

Disclaimers

  • Investment Disclaimer: This list is for informational purposes only and should not be construed as financial advice. Always do your own research before making investment decisions.
  • Trademark Disclaimer: All product or company names are trademarks™ or registered® trademarks of their respective holders. Use does not imply endorsement.

Contact

License

This work is licensed under the MIT License.
© 2025 Tal Eliyahu

▲ Back to Top

About

A curated list of publicly traded cybersecurity companies and ETFs, with investor resources, earnings transcripts, and industry insights. Includes 18 cybersecurity solution categories, each backed by real-world vendor examples and AI-driven offerings.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published