← Back to Library

Top 12 deep dives to understand the cybersecurity market

Ross Haleliuk cuts through the noise of the cybersecurity industry by arguing that the market's chaotic fragmentation isn't a bug, but a feature of a system designed to sell "silver bullets" rather than solve problems. While most analysts count the hundreds of overlapping vendors as a sign of inefficiency, Haleliuk reframes this as a structural reality where few startups fail, yet few truly win big, creating a unique economic landscape that defies standard venture capital logic.

The Economics of Redundancy

Haleliuk begins by challenging the common complaint that the industry suffers from an oversupply of similar tools. "It is common to hear that there are 'too many vendors' in cybersecurity, and that 'we don't need 200+ products in the same category doing the same thing'." However, he quickly pivots to ask the more difficult question: what actually drives this proliferation? The author suggests that the sheer volume of "me too" startups is fueled by a market dynamic where failure is rare, but massive success is equally elusive. This creates a stagnant ecosystem where capital flows endlessly into marginal improvements rather than transformative solutions.

Top 12 deep dives to understand the cybersecurity market

This analysis is particularly sharp because it moves beyond the surface-level observation of market saturation to the underlying incentives. In many tech sectors, a lack of consolidation signals a lack of product-market fit. Here, Haleliuk argues the opposite: "relatively few businesses in the industry fail and equally, few win big." This creates a "market for silver bullets," a concept he explores with co-author Mayank Dhiman, where buyers are desperate for a single solution to stop all threats, a demand that no single product can satisfy.

Cybersecurity is not a market for lemons. It is a market for silver bullets.

The reference to the "Market for Lemons" is a deliberate nod to economic theory, but Haleliuk flips the script. Unlike the classic Akerlof model where bad products drive out good ones due to information asymmetry, the security market is driven by fear and compliance. As Haleliuk notes, "the majority of the companies buy security products for compliance, but there's much more to this." This distinction is vital for investors and founders; it means the market isn't driven by pure efficacy, but by the need to check boxes and manage liability.

The Mafia Networks and Consolidation

The piece also dissects the human element of the industry, tracing the lineage of successful startups back to a handful of dominant alumni networks. Haleliuk writes, "Some companies play an outsized role in shaping the industry: not just because of what they accomplish, but also because of the kind of startups their alumni create." He identifies specific groups, such as the "Splunk, Okta, Cylance, Palo Alto, CrowdStrike, and Zscaler mafias," as the primary engines of innovation.

This framing mirrors the historical dynamics seen in other tech hubs, much like the "PayPal Mafia" that spawned LinkedIn, YouTube, and Tesla. Just as that group leveraged their shared experience to dominate new sectors, Haleliuk argues that cybersecurity is similarly stratified by these tight-knit networks. "This article is a continuation of the series about the cybersecurity mafia networks," he notes, listing predecessors like the Check Point and Cisco networks. The implication is clear: in security, who you know and where you came from often matters more than the novelty of the code you write.

Critics might argue that this "mafia" framing overstates the influence of alumni networks and understates the role of pure market forces or open-source innovation. However, the data on venture-scale returns suggests that network effects are indeed a primary filter for success.

The Illusion of Choice and the Reality of Layer Zero

Perhaps the most provocative argument in the collection is the concept of "layer zero." Haleliuk posits that true security power lies not with the point-solution vendors, but with the foundational infrastructure providers. "The entities best positioned to deliver real security are the ones building the core technologies," he asserts. He defines layer zero as the foundational layer of infrastructure—cloud providers, operating systems, and identity platforms—that dictates the rules of engagement for all other tools.

This is a stark warning to the thousands of startups building tools on top of these platforms. Haleliuk explains that for layer zero owners, adding security is "just an architectural decision," whereas for everyone else, "delivering security becomes a negotiation with the underlying layer." This dynamic explains why the market remains fragmented: vendors are fighting for relevance on a battlefield where the terrain itself is controlled by a few giants.

Whoever owns the control point, gets an opportunity to build a billion-dollar company.

Haleliuk applies a simple heuristic to identify these control points: "If you had to turn off all the systems in your stack, which ones would you turn off last?" The answer, usually the Security Information and Event Management (SIEM) platform or an Identity provider, reveals where the real power lies. This reframes the entire industry conversation away from "what new tool do we need?" to "who owns the data flow?"

The Bottom Line

Haleliuk's compilation offers a necessary corrective to the industry's obsession with novelty, revealing that the top markets—network, endpoint, identity, email, and cloud security—have remained stubbornly consistent for decades. The strongest part of this argument is its clear-eyed assessment of the "layer zero" problem, which explains why consolidation is so difficult despite two decades of attempts. The biggest vulnerability, however, is the assumption that buyers will eventually stop purchasing "silver bullets" for compliance and start demanding architectural integration; until that shift happens, the fragmentation Haleliuk describes will persist.

Deep Dives

Explore these related deep dives:

  • The Market for Lemons

    The article directly references and contrasts cybersecurity against the 'market for lemons' concept from George Akerlof's Nobel Prize-winning paper on information asymmetry. Understanding this foundational economic theory helps readers grasp why the author argues cybersecurity operates differently.

  • PayPal Mafia

    The article discusses 'mafias' from Splunk, Okta, CrowdStrike, and other security companies - alumni networks that spawn new startups. The PayPal Mafia is the original template for this phenomenon in tech, providing essential context for understanding how industry-shaping networks form.

Sources

Top 12 deep dives to understand the cybersecurity market

by Ross Haleliuk · Venture in Security · Read full article

There are now nearly 250 deep dives into Venture in Security, many of which are essential for understanding the market, whether you are a CISO, a security professional, founder, investor, or anyone else interested in building a well-rounded view of security. You know as well as I do that there are plenty of reports about individual market segments, but the fundamentals are critical regardless which segment you look at. Venture in Security covers the fundamentals. In this issue, I’ve compiled a selection of 12 of the most critical deep dives for anyone looking to truly understand our industry.

This issue is brought to you by… Tines.

Manual evidence collection, scattered tools, and repetitive audits can take a real toll on security and GRC teams. This new GRC playbook, created by Drata and Tines, offers a practical look at how teams are shifting to continuous, automated compliance.

Inside, you’ll find:

Detailed workflows for evidence collection, monitoring, audit prep, and vendor risk

Implementation guidance from credential setup to scaling

Best practices for building resilient, proactive GRC programs

Top 12 deep dives to understand the cybersecurity market.

Why there are so many cybersecurity vendors, what it leads to and where do we go from here.

It is common to hear that there are “too many vendors” in cybersecurity, and that “we don’t need 200+ products in the same category doing the same thing”. What is rare is seeing analysis as to why there are so many similar vendors - what is driving the establishment of the new companies, and fueling the cybersecurity gold rush.

In this article, I am looking at some of the factors that lead to the emergence of hundreds of “me too” startups, why relatively few businesses in the industry fail and equally, few win big, and why there are only 18 pure-play cybersecurity companies listed on the US stock exchange.

It’s been nearly 3 years since I published this article but it is as relevant today as it was back then.

20 years of cybersecurity consolidation: how 200 companies became 11.

Everyone in cyber likes to talk about consolidation but very few people understand how it looks in the wild. This isn’t a usual article, it’s a lookback at the past 20 years of consolidation history in our industry. Here’s a preview:

12 ways to fail a cybersecurity startup.

“Why do startups fail?” is one of the most commonly ...