Financial education, no lectures.
Investment Profile

The 7 Cybersecurity Companies You Need To Know About


Palo Alto Networks, Cisco, VeriSign, Symantec, and more

Managed by

First Trust
Ticker: CIBR

Risk Level


Risk Level


It was the summer of ‘69. And it was a big year for space travel. Armstrong stepped onto the moon and computer scientists took the first step into cyberspace.

“One small step for man, one giant leap for mankind”. The computer scientists were far less profound – a single syllable traveled from a computer at UCLA to Stanford:


Not ye olde English kind, as in, Lo! A star! Just a failed attempt to send the word “Login”.

What started that day as an experiment in host-to-host connections became the foundation for the modern-day Internet. Researchers project that by 2020, we’ll have 21 billion.

Who’s on the front line of defending cyberspace? Meet the Data Defenders:

1. Palo Alto Networks
The ones checking IDs at the door

Firewalls protect the perimeter of a computer network. And in the world of firewalls, Palo Alto Networks reigns supreme. Gartner, a globally recognized leader in IT research, ranked them as a leader in this space six years running. Their advanced firewall software is designed to let authorized traffic in, and keep unauthorized or malicious traffic out.

2. Cisco Systems
The ones that wrote the book on how to play red light green light

Internet traffic needs highways, roads, signs, on-ramps, signals, and police, just like real-life traffic. Cisco is the company that creates and maintains more than half of the market share for networking hardware like switches and routers. They also write rules and protocol to make it all run smoothly. According to Forbes, Cisco is the 63rd largest company in the world.

3. Symantec
The ones who keep building new trophy rooms to house all of their awards

You might know Symantec as the makers of Norton antivirus software – the rest of the business world knows them as the leader in overall security software. They have security products for just about everything a business or individual needs and are consistently ranked as the industry leader year after year. Their security teams are constantly working to stay ahead of the changing landscape of cybersecurity.

4. VMWare
The ones that name drop on a regular basis

Nearly 100% of Fortune 100 companies use their virtualization software. VMWare allows companies to create and run multiple virtual machines on a single physical machine – making it cheaper and easier to scale a business. VMWare’s tools allow companies to achieve global growth while still prioritizing data security.

5. Infoblox
The ones that wear their hall monitor badges with pride

In order to request information on the internet, you’ll need to obtain a hall pass (IP) from the teacher (DHCP) that explains where you want to go (DNS) and what you want to do there. It’s a system that helps good people find the information they’re looking for — but it’s also a major way that hackers exploit and attack servers. Infoblox has tools that function as the hall monitor of the internet, giving companies the ability to secure their servers from these kinds of attacks. In 2015, they had 50% of the market share in this space (no other company had more than 15%).

6. Science Applications International Corp.
The ones with top secret security clearance

When the federal government needs protection for critical infrastructure, they call on SAIC. The country’s most vital assets (think Hoover Dam, EPA structures, and defense information systems) require a strong combination of physical and virtual security. And SAIC provides it.

7. Imperva
The ones that prevent grandma from sending cash to “you” while stranded abroad

Perimeters are an important line of defense from cyberattack, but what about threats from the inside? Well-known data breaches (think, Edward Snowden) happened when an employee willingly took information from the inside, but sometimes employees can even do it by mistake (face palm). Imperva’s tools allow companies to defend against insider threats – both the malicious and the careless kind. Their technology allows companies to detect unauthorized web-bots and authorized users behaving inappropriately – and prevents them from stealing, corrupting, or committing fraud with the company’s data.

These Data Defenders are on the front line of cyberspace – protecting individuals, companies, and governments from the threat of cyberattack. Who else is on the front line?

Hopefully You
The one with the killer password that’s definitely not 123456 or starwars

In most cases, threats to your own data in cyberspace could be stopped if you just tried a little bit harder with your password. No matter how many times we’re told to avoid using “password” in our password, the message just doesn’t seem to stick. And there’s large amounts of data to prove it. Every time a database is breached and passwords get leaked to the world, a company called SplashData analyzes all of them to see how people are doing. Turns out – we still get an “F” in passwords. “123456” and “password” continue to top the charts as favorite password of the masses.

You can invest in the companies defending cyberspace, as well as other industry opportunities you see in the world.

Investing, simplified.

Start investing in funds like this on Stash.

Get the App

By Stash Team

Next for you
Stash Investments: Explore the ETFs, Invest in Your Beliefs
Explore more articlesChoose a topic to learn more about
politics budgeting love and money pop culture Retirement

Start investing

Start now with as little as $5.
Get the App

This material has been distributed for informational and educational purposes only, represents an assessment of the market environment as of the date of publication, is subject to change without notice, and is not intended as investment, legal, accounting, or tax advice or opinion. Stash assumes no obligation to provide notifications of changes in any factors that could affect the information provided. This information should not be relied upon by the reader as research or investment advice regarding any issuer or security in particular. The strategies discussed are strictly for illustrative and educational purposes and should not be construed as a recommendation to purchase or sell, or an offer to sell or a solicitation of an offer to buy any security. There is no guarantee that any strategies discussed will be effective.

Furthermore, the information presented does not take into consideration commissions, tax implications, or other transactional costs, which may significantly affect the economic consequences of a given strategy or investment decision. This information is not intended as a recommendation to invest in any particular asset class or strategy or as a promise of future performance. There is no guarantee that any investment strategy will work under all market conditions or is suitable for all investors. Each investor should evaluate their ability to invest long term, especially during periods of downturn in the market. Investors should not substitute these materials for professional services, and should seek advice from an independent advisor before acting on any information presented.

Past performance does not guarantee future results. There is a potential for loss as well as gain in investing. Stash does not represent in any manner that the circumstances described herein will result in any particular outcome. While the data and analysis Stash uses from third party sources is believed to be reliable, Stash does not guarantee the accuracy of such information. Nothing in this article should be considered as a solicitation or offer, or recommendation, to buy or sell any particular security or investment product or to engage in any investment strategy. No part of this material may be reproduced in any form, or referred to in any other publication, without express written permission. Stash does not provide personalized financial planning to investors, such as estate, tax, or retirement planning. Investment advisory services are only provided to investors who become Stash Clients pursuant to a written Advisory Agreement. For more information please visit

Note: These are just a few of the investment choices available on Stash and may not be suitable for everyone. Depending on your risk profile, you may not see the investments on Stash. See our Disclosures.