Cybersecurity is a fast-paced market segment with many interesting start-up companies in Europe. This report will provide an overview of interesting start-ups from a user and an M&A perspective. Obviously, this list cannot be 100% exhaustive, but it paints a realistic picture of the market dynamics.
See also part 1 of this report.
Contents:
PAC’s Analysis
Watch List
Dope Security
Eye Security
Getvisibility
HarfangLab
Idwall
Kasada
Mindflow
Mitigant.io
Oligo Security
OneLayer
Orca Fraud
Pentera Security
Secuvy
Sendmarc
SpecterOps
Tines
Upwind
Zenity
SHARE :
PAC considers that generative AI holds transformative potential for the financial services industry, offering tools to enhance efficiency, improve ...
Event Date : August 14, 2024
This document provides market volumes, growth rates and forecasts for the Generative AI market in Belgium for the 2022-2028 period.
Event Date : October 11, 2024
This short vendor profile provides a quick overview of the local portfolio and performance of Indra in Spain.
Event Date : May 02, 2025
This Excel document lists M&A deals in the software & IT services industry in Finland since 2013.
Event Date : October 22, 2025
Infrastructure security is fundamental to modern cybersecurity, safeguarding networks, cloud platforms, endpoints, and critical infrastructure from ...
Event Date : September 16, 2025
Insurance - InBrief Analysis - Austria
Market Reports November 07, 2025
Software & IT Services - InSight Analysis - Denmark
Market Reports November 07, 2025
Seidor - Figures - Spain – FY 31-Dec-2024
Datamart November 06, 2025
Seidor - Vendor Profile - Spain
Vendor Profile November 06, 2025
TCS (Tata Consultancy Services) - Figures - Finland – FY 31-Mar-2025
Datamart November 06, 2025
Atos: Cause for Optimism, Despite the Headlines
Blog Post February 05, 2024
Unit4 Doubles-Down on Industries & Sets Out Growth Plan
Blog Post November 07, 2025
Key Takeaways from Google Cloud Day Romania 2025
Blog Post November 06, 2025
Blog Post November 05, 2025
Orange Business Is Transforming Its Business Model
Blog Post November 04, 2025
Part 6: From Blueprint to Reality – Implementing Core Controls for Data and Application Security
Blog Post November 04, 2025