📊 This is a company profile preview from Tablestat.com Request a Free Trial Now

Company profile: Secure Computing

1.1 - Company Overview

Secure Computing Logo

Secure Computing

Headquarter: United States
Founded: 20XX🔒
Employees: 100-500🔒

Company description

  • Provider of enterprise gateway security solutions in the United States; the company was acquired by McAfee in September 2008.

Products and services

🔒

Key contacts

🔒
🔒

Financial details

🔒

1.2 - Competitors and similar companies to Secure Computing

Coda Intelligence Logo

Coda Intelligence

HQ: United States Website
  • Description: Provider of an AI-driven, cloud-agnostic cybersecurity platform for vulnerability and attack surface management, delivering full visibility into security posture across on-premises and cloud workloads, compliance assurance, contextual prioritization of exploitable vectors, and AI-assisted remediation with collaborative workflows, automated tracking, notifications, and reporting.
  • Rationale: This competitor operates in a highly similar market segment with overlapping features.
  • Company type: Private company
  • Employees: ●●●●●
  • Total funding raised: $●●●m
  • Backers: ●●●●●●●●●●
  • Acquisitions: ●●
View full Coda Intelligence company profile →
IdentityForce Logo

IdentityForce

HQ: United States Website
  • Description: Provider of identity theft, privacy, and credit protection solutions in the United States for individuals, businesses, and government agencies, including identity theft monitoring and alerts, prevention tools (credit freezes, fraud alerts), recovery and restoration support, credit monitoring from all three major bureaus, and dark web monitoring.
  • Rationale: This competitor operates in a highly similar market segment with overlapping features.
  • Company type: Private company
  • Employees: ●●●●●
  • Total funding raised: $●●●m
  • Backers: ●●●●●●●●●●
  • Acquisitions: ●●
View full IdentityForce company profile →
Phantom Logo

Phantom

HQ: United States Website
  • Description: Provider of a purpose-built, community-powered security automation and orchestration platform that orchestrates key stages of security operations from prevention to triage and resolution, enabling enterprise security operations to be smarter, faster, and stronger.
  • Rationale: This competitor operates in a highly similar market segment with overlapping features.
  • Company type: Private company
  • Employees: ●●●●●
  • Total funding raised: $●●●m
  • Backers: ●●●●●●●●●●
  • Acquisitions: ●●
View full Phantom company profile →
Empow Logo

Empow

HQ: United States Website
  • Description: Provider of a new approach to cybersecurity that secures organizations from attacks by effectively using security tools; founded in 2014 and based in Boston, Massachusetts.
  • Rationale: This competitor operates in a highly similar market segment with overlapping features.
  • Company type: Private company
  • Employees: ●●●●●
  • Total funding raised: $●●●m
  • Backers: ●●●●●●●●●●
  • Acquisitions: ●●
View full Empow company profile →
Exaprotect Logo

Exaprotect

HQ: United States Website
  • Description: Provider of security management for enterprises and service providers with large-scale, heterogeneous infrastructures. Its products link business policies to specific network configurations to increase operational efficiency for network and security teams.
  • Rationale: This competitor operates in a highly similar market segment with overlapping features.
  • Company type: Private company
  • Employees: ●●●●●
  • Total funding raised: $●●●m
  • Backers: ●●●●●●●●●●
  • Acquisitions: ●●
View full Exaprotect company profile →
🔒

2.M&A buyers

2.1 Potential strategic acquirers in the sector

🔒
🔒
🔒
🔒 View all strategic buyers with complete profiles
Start Free Trial →

2.2 - Strategic buyer groups for Secure Computing

🔒

Buyer group 1: ████████ ████████

●● companies
Description: ████████ ████████ ████████ ████████ ████████ ████████ ████████ ████████ ████████ ████████
Key Products: ████████, ████████, ████████, ████████
🔒 View all companies in this group
Request Free Trial Now →
🔒

Buyer group 2: ████████ ████████

●● companies
Description: ████████ ████████ ████████ ████████ ████████ ████████ ████████ ████████ ████████ ████████
Key Products: ████████, ████████, ████████, ████████
🔒 View all companies in this group
Request Free Trial Now →
🔒

Buyer group 3: ████████ ████████

●● companies
Description: ████████ ████████ ████████ ████████ ████████ ████████ ████████ ████████ ████████ ████████
Key Products: ████████, ████████, ████████, ████████
🔒 View all companies in this group
Request Free Trial Now →
🔓 Unlock all detailed buyer group breakdowns with complete company profiles
Start Free Trial →

3. Investors and private equity firms

3.1 - Buyout funds investing in similar companies to Secure Computing

2.2 - Growth funds investing in similar companies to Secure Computing

🔒 View all growth equity funds with complete profiles
Start Free Trial →

4 - Top valuation comps for Secure Computing

4.2 - Public trading comparable groups for Secure Computing

🔓 Unlock all public trading comparable groups with complete valuation data
Start Free Trial →

4.3 - M&A Transactions similar to Secure Computing

Selected M&A transactions

Date Target Description Buyer(s) Relevance EV EV/Revenue EV/EBITDA
🔒 View all M&A transactions with complete deal terms
Request Free Trial Now →

Frequently Asked Questions

About Secure Computing

What does Secure Computing do?

Secure Computing is a provider of enterprise gateway security solutions in the United States; the company was acquired by McAfee in September 2008.

Who are Secure Computing's competitors?

Secure Computing's competitors and similar companies include Coda Intelligence, IdentityForce, Phantom, Empow, and Exaprotect.

Where is Secure Computing headquartered?

Secure Computing is headquartered in United States.

How many employees does Secure Computing have?

Secure Computing has 1,000 employees 🔒.

When was Secure Computing founded?

Secure Computing was founded in 2010 🔒.

What sector and industry vertical is Secure Computing in?

Secure Computing is in the Enterprise Software 🔒 sector and industry

M&A Buyers & Acquirers for Secure Computing

Who are the top strategic acquirers in Secure Computing's sector and industry

Top strategic M&A buyers and acquirers in Secure Computing's sector include ████████, ██████████, ██████, ████████, and ██████████ 🔒.

Which M&A buyer groups are most relevant for Secure Computing?

Top strategic M&A buyers groups and sectors for Secure Computing include █████████████████ , ████████████████, █████████████, ████████████, and ████████████████ 🔒.

Financial Investors investing in Secure Computing's sector and industry vertical

Which are the top PE firms investing in Secure Computing's sector and industry vertical?

Top PE firms investing in Secure Computing's sector and industry vertical include ████████, ██████████, ████████, and ██████████ 🔒.

Who are the top buyout funds acquiring in Secure Computing's sector and industry vertical?

Active PE funds and buyout funds acquiring companies in Secure Computing's sector and industry vertical include █████████, ██████████, ████████████, and ████████████ 🔒.

Who are the top growth equity funds investing in companies in Secure Computing's sector and industry vertical?

Growth funds and venture capital funds investing in companies similar to Secure Computing include █████████, ██████████, ████████████, and ████████████ 🔒.

Valuation benchmarks of companies in Secure Computing's sector and industry

Which are the key public companies that are relevant trading comps benchmarks for Secure Computing?

The key public trading comparables and valuation benchmarks for Secure Computing include █████████, ██████████, ████████████, and ████████████ 🔒.

Which are the key trading comparable groups for Secure Computing for public valuation benchmarks?

Our platform tracks detailed public trading comparable groups and valuation benchmarks for Secure Computing with complete valuation multiples, growth metrics, and profitability data. Access the full database to benchmark your company against relevant public comparables.

What are recent M&A transactions in Secure Computing's sector and industry vertical?

Our platform tracks relevant M&A transactions comparables and valuation benchmarks for Secure Computing with complete deal terms, valuation multiples, and strategic rationale. Access the full database to benchmark pricing and identify active acquirers.

What are recent capital raises and funding rounds in Secure Computing's' sector and industry vertical?

Access recent funding rounds and capital raises in Secure Computing's sector and industry vertical including growth equity, venture capital, and buyout investments. Our database includes round size, lead investors and valuations.

Ready to Find the Right Buyers?

Access complete buyer lists, valuation data, and M&A intelligence for Secure Computing

Launch login modal Launch register modal