AshLim
2021-08-25
Wow
CrowdStrike: Not Just Any Cybersecurity Company
免责声明:上述内容仅代表发帖人个人观点,不构成本平台的任何投资建议。
分享至
微信
复制链接
精彩评论
我们需要你的真知灼见来填补这片空白
打开APP,发表看法
APP内打开
发表看法
2
{"i18n":{"language":"zh_CN"},"detailType":1,"isChannel":false,"data":{"magic":2,"id":837459822,"tweetId":"837459822","gmtCreate":1629907119066,"gmtModify":1631890254526,"author":{"id":3561324941812646,"idStr":"3561324941812646","authorId":3561324941812646,"authorIdStr":"3561324941812646","name":"AshLim","avatar":"https://static.laohu8.com/default-avatar.jpg","vip":1,"userType":1,"introduction":"","boolIsFan":false,"boolIsHead":false,"crmLevel":2,"crmLevelSwitch":0,"individualDisplayBadges":[],"fanSize":1,"starInvestorFlag":false},"themes":[],"images":[],"coverImages":[],"extraTitle":"","html":"<html><head></head><body><p>Wow</p></body></html>","htmlText":"<html><head></head><body><p>Wow</p></body></html>","text":"Wow","highlighted":1,"essential":1,"paper":1,"likeSize":2,"commentSize":0,"repostSize":0,"favoriteSize":0,"link":"https://laohu8.com/post/837459822","repostId":1148011558,"repostType":4,"repost":{"id":"1148011558","kind":"news","pubTimestamp":1629902594,"share":"https://www.laohu8.com/m/news/1148011558?lang=&edition=full","pubTime":"2021-08-25 22:43","market":"us","language":"en","title":"CrowdStrike: Not Just Any Cybersecurity Company","url":"https://stock-news.laohu8.com/highlight/detail?id=1148011558","media":"Seeking Alpha","summary":"Summary\n\nCybersecurity is one of the most important aspects in the digital world, gaining more and m","content":"<p><b>Summary</b></p>\n<ul>\n <li>Cybersecurity is one of the most important aspects in the digital world, gaining more and more significance with weekly new breaches.</li>\n <li>CrowdStrike says goodbye to reactive antivirus and offers only a pro-active Indicator of Attack Solution. I explain in detail what this means.</li>\n <li>CrowdStrike is the most mature new-gen cybersecurity company leaving its competition far behind in maturity and reputation in the new-age world.</li>\n <li>CrowdStrike is expensive, but investors can profit if they maintain a long-term view.</li>\n</ul>\n<p class=\"t-img-caption\"><img src=\"https://static.tigerbbs.com/7c6aec1f150eb5e8ada2bd309de812f8\" tg-width=\"768\" tg-height=\"480\" width=\"100%\" height=\"auto\"><span>mdegrood/iStock via Getty Images</span></p>\n<p>One of my readers asked me to take a deeper look into CrowdStrike (CRWD), and luckily I've been reading a lot about them lately.</p>\n<p>Cybersecurity is one if not the most important aspects for IT departments these days. Every month or even week, we hear stories about hackers infecting companies.</p>\n<p>Here is a list of the largest hacks of 2021 (with sources):</p>\n<ol>\n <li>Kia Motors- Hacked with Ransomware - Demand ~$20m</li>\n <li>CD Project- Hacked with Ransomware - Refuse to pay the ransom - financial damage due to workers inability to access internal documents and resources -> High</li>\n <li>AXA- Hacked with Ransomware (after stopping to reimburse clients for ransomware attacks :D) - 3TB of data Stolen</li>\n <li>JBS Foods- Hacked with Ransomware - Hacker group REvil - JBS paid $11m in Bitcoin - Largest paid ransom to that date. Shutdown damage not included.</li>\n</ol>\n<p>These are just a few of the hacks that happened in 2021. The list for 2021 is long and ongoing. YoY growth in monetary damage, meaning the amount of money paid by companies and individuals to receive access to their data, is extremely high.</p>\n<p class=\"t-img-caption\"><img src=\"https://static.tigerbbs.com/70cbf321b3334784058a05e70fefbd8c\" tg-width=\"640\" tg-height=\"395\" width=\"100%\" height=\"auto\"><span>Chart by author, Data fromStatista</span></p>\n<p>Monetary damage doesn't include the economic damage by not having access to data or data being leaked to other countries or competitors.</p>\n<p>According to Cybersecurity Ventures, cybercrime is expected to induce $6 trillion in damage annually by 2021. There is a huge monetary incentive for hackers globally to continue with their ransom and malware attacks. The risk-reward balance tilts strongly towards the reward side for hackers.</p>\n<p><b>Thesis</b></p>\n<p>CrowdStrike provides security measures to stop a virus before initiating the processes required to infect the host computer and network.</p>\n<p>CrowdStrike's total addressable market - TAM - is expanding YoY with new product offerings, new breaches and hacks, home office expansion, IoT, and much more.</p>\n<p>I'm bullish on CrowdStrike over the next 5 years as its next-generation antivirus (NGAV) technology is an effective way to stop viruses from breaching networks and companies' IT infrastructures. CrowdStrike has the first-mover advantage, a mature platform, and an excellent and strong reputation throughout the industry.</p>\n<p>CrowdStrike is cloud-native, which means that it is scalable, adaptable, and gains through a network effect. Each new node and potential breach within a node helps strengthen the network by sharing information about the virus, strengthening its first-mover advantage in the market.</p>\n<p><b>How does CrowdStrike work?</b></p>\n<p>When investing in a high-growth company, I make sure to understand how its offerings differentiate from existing technologies within the industry and why they solve their customers' problems better than their competitors.</p>\n<p>First, we must understand the difference between the Indicator of Compromise - IoC - and the Indicator of Attack - IoA.</p>\n<p>An IoC is a post-infection indicator. That means that after a virus has been installed, the antivirus program scans files and documents for known virus signatures (like we do with the PCR tests and Covid-19) and then quarantines the files and deletes them.</p>\n<p>That's not what CrowdStrike specializes in.CrowdStrike focuses on IoA.</p>\n<p>IoA scans for suspicious processes that are started in the background by malicious files. Let's understand what this means.</p>\n<p>There are many types of viruses - malware, ransomware, phishing, spear-phishing... There are also endless versions of these viruses. An antivirus program will have a hard time finding each new iteration because manipulating the virus in some sort changes the file's hash (signature of the virus), making it impossible for IoCs to find the virus. But all viruses have things in common.</p>\n<p class=\"t-img-caption\"><img src=\"https://static.tigerbbs.com/b00527a719e98d68b0657b9b2cea0901\" tg-width=\"612\" tg-height=\"184\" width=\"100%\" height=\"auto\"><span>IoC vs. IoA - reactive vs. proactive - Source:CrowdStrike</span></p>\n<p>Any virus must execute processes, which results in patterns. The virus can change its face, color, size, but it must execute and run code in some distinguishable way. For example, many viruses alter Window registry keys, create new users, or start encryption processes on the host.</p>\n<p>CrowdStrike stops the virus in its tracks. Below is an example of how the Falcon Sensor executes.</p>\n<p class=\"t-img-caption\"><img src=\"https://static.tigerbbs.com/e4d02bc55a2843c84cde9d9797acd2c3\" tg-width=\"640\" tg-height=\"399\" width=\"100%\" height=\"auto\"><span>CrowdStrike Falcon in Action malware prevention based on behavior.YouTube</span></p>\n<p>The host, in this case, a virtual machine - VM - by CrowdStrike. The user clicked on a malicious file, and the virus begins to \"install\" itself. The Falcon sensor detects if something in the background is initiating processes that indicate suspicious activity and stops those processes from executing.</p>\n<p>That's the distinguishing factor for CrowdStrike.</p>\n<p>CrowdStrike's EPP is cloud-native and gains from the network effect. The more nodes connect to its platform, the more secure it becomes by training the AI model with process signatures of new viruses.</p>\n<p><img src=\"https://static.tigerbbs.com/0977994bb6cc4510cdb52337742c9734\" tg-width=\"1280\" tg-height=\"1024\" width=\"100%\" height=\"auto\"></p>\n<p>CrowdStrike combines AI with its Indicator of Attack approach and scales it up in its cloud. The cloud helps train the virus-threat model from endless endpoints.</p>\n<p>Based on statements from CrowdStrike, none of its customers has yet experienced a breach while using its sensors, and CrowdStrike is confident enough in its NGAV that it provides a $1 million warranty if a breach happens.</p>\n<p><b>Competition</b></p>\n<p>CrowdStrike's largest market is the endpoint protection platform - EPP. Within this segment, CrowdStrike is competing with many companies like Microsoft (MSFT), Trend Micro(OTCPK:TMICF)(OTCPK:TMICY), SentinelOne(NYSE:S), or McAfee(NASDAQ:MCFE).</p>\n<p class=\"t-img-caption\"><img src=\"https://static.tigerbbs.com/319e77e2cb361294371b4ff4d5074b91\" tg-width=\"570\" tg-height=\"592\" width=\"100%\" height=\"auto\"><span>Source:Gartner Magic Quadrant for Endpoint Protection Platforms</span></p>\n<p>In terms of EPP, CrowdStrike is pretty much in a league of itself.</p>\n<p>The only negative 'real' negative with CrowdStrike is that they are very secretive about their detection logic. There is no way for IT personnel to look into the Falcon sensor and the logic behind it.</p>\n<p>Other EPPs like TrendMicro or SentinelOne score highly in the quadrant but lack against CrowdStrike in scale and maturity.</p>\n<p>SentinelOne is one of CrowdStrike's closest competitors and boasts a much better technology than CrowdStrike. This is two-sided as CrowdStrike pushes back against SentinelOne, calling them 'outdated.'</p>\n<p>SentinelOne is focused on a completely AI-driven security approach. Removing the human aspect from resolving breaches to a larger extent than CrowdStrike.</p>\n<p>Nevertheless, the difference between the platforms is small.</p>\n<p>CrowdStrike is more mature than SentinelOne, and its offerings are more scalable SentinelOne's. CrowdStrike's platform is easier to use, deploy, and has a solid reputation (source1,source2,source3).</p>\n<p>IT personnel deciding on either one of these AVs wouldn't harm their company.</p>\n<p><b>Valuation</b></p>\n<p>CrowdStrike is expensive, no question about it. It's definitely not the value investment I usually cover, like KLAC,SWKS, or QRVO.</p>\n<p class=\"t-img-caption\"><img src=\"https://static.tigerbbs.com/66028ec453a5dbfa0d874e98df65d499\" tg-width=\"635\" tg-height=\"433\" width=\"100%\" height=\"auto\"><span>Data by YCharts</span></p>\n<p>CrowdStrike is trading at a 53 price to sales ratio and a forward EV to sales of 38. CrowdStrike is a fast-growing company in an expanding market.</p>\n<p class=\"t-img-caption\"><img src=\"https://static.tigerbbs.com/9e7a3f611dd2ebdec4bf08cf2aefd4ab\" tg-width=\"589\" tg-height=\"364\" width=\"100%\" height=\"auto\"><span>Chart by author, Data from CrowdStrike Quarterly reports</span></p>\n<p>The scale and maturity of CrowdStrike are clearly visible as it's the first choice among the largest companies in the world. That translates into revenue growth and customer retention rates above 100%.</p>\n<p class=\"t-img-caption\"><img src=\"https://static.tigerbbs.com/bfd887db2b9e38910791e999d8696429\" tg-width=\"640\" tg-height=\"324\" width=\"100%\" height=\"auto\"><span>Source: CrowdStrike Corporate OverviewPresentation</span></p>\n<p>That means that CrowdStrike is not only acquiring more customers but that existing customers pay more for more of CrowdStrike's services. That's a really, really good situation for an as-a-Service company.</p>\n<p>CrowdStrike's TAM is expanding YoY from multiple sources like Cloud, IoT, home office.</p>\n<p class=\"t-img-caption\"><img src=\"https://static.tigerbbs.com/438ec1c32df8f3239a04a5f93775dc19\" tg-width=\"1280\" tg-height=\"720\" width=\"100%\" height=\"auto\"><span>Source: CrowdStrike Corporate OverviewPresentation</span></p>\n<p>I find CrowdStrike's own TAM projections rather conservative. Believing the statements from large research companies like Gartner or IDC, cybersecurity expenditures of companies are likely to increase significantly (source1,source2,source).</p>\n<p>Gartner estimates the size of the cybersecurity market to be $150bn in 2021 with a 12.4% CAGR over the next 5 years. The breakdown is below.</p>\n<p class=\"t-img-caption\"><img src=\"https://static.tigerbbs.com/f2266da9e98fa9f2ed6c1f19135b2ebc\" tg-width=\"775\" tg-height=\"620\" width=\"100%\" height=\"auto\"><span>Gartner ForecastWorldwide Security</span></p>\n<p>CrowdStrike is not only profiting from an expanding market, but it's also pulling customers from competitors within the antivirus market.</p>\n<p>More and more companies switch towards IoA next-gen antivirus companies.</p>\n<p>CrowdStrike is the top choice among its competitors.</p>\n<p><b>Is the valuation justified?</b></p>\n<p>Comparing CrowdStrike with other high-growth IT companies like SentinelOne, Cloudflare (NET), or ZScaler (ZS), we find CrowdStrike between those. CrowdStrike's Gross Margin is 74%, just below ZS's 77.5% and NET's 76.78%, and well above Sentinel's 55%.</p>\n<p>CrowdStrike has strong pricing power, which translates into the best GAAP net margins. CrowdStrike is the only company that operates profitably when looking at its non-GAAP numbers.</p>\n<p>SentinelOne has to push its prices down to remain competitive and balance the immaturity of its platform.</p>\n<p>CrowdStrike has the largest market cap with $53bn and boasts a sales growth of 77% against ZS's and NET's 54% and 52%. SentinelOne has a higher sales growth rate of 100% but only 1/10th of CrowdStrike's revenue.</p>\n<p><b>Investor's Takeaway</b></p>\n<p>CrowdStrike is not just any antivirus company in a crowded cybersecurity market. It's<i>the</i>cybersecurity company in the market.</p>\n<p>CrowdStrike built a strong reputation with excellent reviews among IT experts, calling it the top-choice in cybersecurity. Gartner positions CrowdStrike above any other EPP in its magic quadrant.</p>\n<p>CrowdStrike is definitely not a value-play and requires conviction to buy and hold at these prices for the next 3-5 years.</p>\n<p>On the other hand, it wouldn't surprise me a bit if CrowdStrike can double, triple, or even quadruple its revenue over the next 3-5 years. As it's very common for high-growth companies, the share price is largely determined by the companies' sales growth in these early stages.</p>\n<p>Many sources are depicting a high correlation between sales growth and share price increase.Aswath Damodarandiscussed this topic in detail for Amazon in 2000 in thispaper.</p>\n<p>One of my Seeking Alpha colleagues,From Growth To Value, discussed this topic in his latest article aboutFiverr, including this chart.</p>\n<p>BCG showed that valuation correlates the strongest with revenue growth in the long term, especially for high-growth companies.</p>\n<p>CrowdStrike will likely experience a multiples contraction, but its revenue expansion will more than outperform that contraction, providing investors with a return on their investment.</p>","collect":0,"html":"<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=utf-8\" />\n<meta name=\"viewport\" content=\"width=device-width,initial-scale=1.0,minimum-scale=1.0,maximum-scale=1.0,user-scalable=no\"/>\n<meta name=\"format-detection\" content=\"telephone=no,email=no,address=no\" />\n<title>CrowdStrike: Not Just Any Cybersecurity Company</title>\n<style type=\"text/css\">\na,abbr,acronym,address,applet,article,aside,audio,b,big,blockquote,body,canvas,caption,center,cite,code,dd,del,details,dfn,div,dl,dt,\nem,embed,fieldset,figcaption,figure,footer,form,h1,h2,h3,h4,h5,h6,header,hgroup,html,i,iframe,img,ins,kbd,label,legend,li,mark,menu,nav,\nobject,ol,output,p,pre,q,ruby,s,samp,section,small,span,strike,strong,sub,summary,sup,table,tbody,td,tfoot,th,thead,time,tr,tt,u,ul,var,video{ font:inherit;margin:0;padding:0;vertical-align:baseline;border:0 }\nbody{ font-size:16px; line-height:1.5; color:#999; background:transparent; }\n.wrapper{ overflow:hidden;word-break:break-all;padding:10px; }\nh1,h2{ font-weight:normal; line-height:1.35; margin-bottom:.6em; }\nh3,h4,h5,h6{ line-height:1.35; margin-bottom:1em; }\nh1{ font-size:24px; }\nh2{ font-size:20px; }\nh3{ font-size:18px; }\nh4{ font-size:16px; }\nh5{ font-size:14px; }\nh6{ font-size:12px; }\np,ul,ol,blockquote,dl,table{ margin:1.2em 0; }\nul,ol{ margin-left:2em; }\nul{ list-style:disc; }\nol{ list-style:decimal; }\nli,li p{ margin:10px 0;}\nimg{ max-width:100%;display:block;margin:0 auto 1em; }\nblockquote{ color:#B5B2B1; border-left:3px solid #aaa; padding:1em; }\nstrong,b{font-weight:bold;}\nem,i{font-style:italic;}\ntable{ width:100%;border-collapse:collapse;border-spacing:1px;margin:1em 0;font-size:.9em; }\nth,td{ padding:5px;text-align:left;border:1px solid #aaa; }\nth{ font-weight:bold;background:#5d5d5d; }\n.symbol-link{font-weight:bold;}\n/* header{ border-bottom:1px solid #494756; } */\n.title{ margin:0 0 8px;line-height:1.3;color:#ddd; }\n.meta {color:#5e5c6d;font-size:13px;margin:0 0 .5em; }\na{text-decoration:none; color:#2a4b87;}\n.meta .head { display: inline-block; overflow: hidden}\n.head .h-thumb { width: 30px; height: 30px; margin: 0; padding: 0; border-radius: 50%; float: left;}\n.head .h-content { margin: 0; padding: 0 0 0 9px; float: left;}\n.head .h-name {font-size: 13px; color: #eee; margin: 0;}\n.head .h-time {font-size: 11px; color: #7E829C; margin: 0;line-height: 11px;}\n.small {font-size: 12.5px; display: inline-block; transform: scale(0.9); -webkit-transform: scale(0.9); transform-origin: left; -webkit-transform-origin: left;}\n.smaller {font-size: 12.5px; display: inline-block; transform: scale(0.8); -webkit-transform: scale(0.8); transform-origin: left; -webkit-transform-origin: left;}\n.bt-text {font-size: 12px;margin: 1.5em 0 0 0}\n.bt-text p {margin: 0}\n</style>\n</head>\n<body>\n<div class=\"wrapper\">\n<header>\n<h2 class=\"title\">\nCrowdStrike: Not Just Any Cybersecurity Company\n</h2>\n\n<h4 class=\"meta\">\n\n\n2021-08-25 22:43 GMT+8 <a href=https://seekingalpha.com/article/4451592-crowdstrike-not-just-any-cybersecurity><strong>Seeking Alpha</strong></a>\n\n\n</h4>\n\n</header>\n<article>\n<div>\n<p>Summary\n\nCybersecurity is one of the most important aspects in the digital world, gaining more and more significance with weekly new breaches.\nCrowdStrike says goodbye to reactive antivirus and offers...</p>\n\n<a href=\"https://seekingalpha.com/article/4451592-crowdstrike-not-just-any-cybersecurity\">Web Link</a>\n\n</div>\n\n\n</article>\n</div>\n</body>\n</html>\n","type":0,"thumbnail":"","relate_stocks":{"CRWD":"CrowdStrike Holdings, Inc."},"source_url":"https://seekingalpha.com/article/4451592-crowdstrike-not-just-any-cybersecurity","is_english":true,"share_image_url":"https://static.laohu8.com/e9f99090a1c2ed51c021029395664489","article_id":"1148011558","content_text":"Summary\n\nCybersecurity is one of the most important aspects in the digital world, gaining more and more significance with weekly new breaches.\nCrowdStrike says goodbye to reactive antivirus and offers only a pro-active Indicator of Attack Solution. I explain in detail what this means.\nCrowdStrike is the most mature new-gen cybersecurity company leaving its competition far behind in maturity and reputation in the new-age world.\nCrowdStrike is expensive, but investors can profit if they maintain a long-term view.\n\nmdegrood/iStock via Getty Images\nOne of my readers asked me to take a deeper look into CrowdStrike (CRWD), and luckily I've been reading a lot about them lately.\nCybersecurity is one if not the most important aspects for IT departments these days. Every month or even week, we hear stories about hackers infecting companies.\nHere is a list of the largest hacks of 2021 (with sources):\n\nKia Motors- Hacked with Ransomware - Demand ~$20m\nCD Project- Hacked with Ransomware - Refuse to pay the ransom - financial damage due to workers inability to access internal documents and resources -> High\nAXA- Hacked with Ransomware (after stopping to reimburse clients for ransomware attacks :D) - 3TB of data Stolen\nJBS Foods- Hacked with Ransomware - Hacker group REvil - JBS paid $11m in Bitcoin - Largest paid ransom to that date. Shutdown damage not included.\n\nThese are just a few of the hacks that happened in 2021. The list for 2021 is long and ongoing. YoY growth in monetary damage, meaning the amount of money paid by companies and individuals to receive access to their data, is extremely high.\nChart by author, Data fromStatista\nMonetary damage doesn't include the economic damage by not having access to data or data being leaked to other countries or competitors.\nAccording to Cybersecurity Ventures, cybercrime is expected to induce $6 trillion in damage annually by 2021. There is a huge monetary incentive for hackers globally to continue with their ransom and malware attacks. The risk-reward balance tilts strongly towards the reward side for hackers.\nThesis\nCrowdStrike provides security measures to stop a virus before initiating the processes required to infect the host computer and network.\nCrowdStrike's total addressable market - TAM - is expanding YoY with new product offerings, new breaches and hacks, home office expansion, IoT, and much more.\nI'm bullish on CrowdStrike over the next 5 years as its next-generation antivirus (NGAV) technology is an effective way to stop viruses from breaching networks and companies' IT infrastructures. CrowdStrike has the first-mover advantage, a mature platform, and an excellent and strong reputation throughout the industry.\nCrowdStrike is cloud-native, which means that it is scalable, adaptable, and gains through a network effect. Each new node and potential breach within a node helps strengthen the network by sharing information about the virus, strengthening its first-mover advantage in the market.\nHow does CrowdStrike work?\nWhen investing in a high-growth company, I make sure to understand how its offerings differentiate from existing technologies within the industry and why they solve their customers' problems better than their competitors.\nFirst, we must understand the difference between the Indicator of Compromise - IoC - and the Indicator of Attack - IoA.\nAn IoC is a post-infection indicator. That means that after a virus has been installed, the antivirus program scans files and documents for known virus signatures (like we do with the PCR tests and Covid-19) and then quarantines the files and deletes them.\nThat's not what CrowdStrike specializes in.CrowdStrike focuses on IoA.\nIoA scans for suspicious processes that are started in the background by malicious files. Let's understand what this means.\nThere are many types of viruses - malware, ransomware, phishing, spear-phishing... There are also endless versions of these viruses. An antivirus program will have a hard time finding each new iteration because manipulating the virus in some sort changes the file's hash (signature of the virus), making it impossible for IoCs to find the virus. But all viruses have things in common.\nIoC vs. IoA - reactive vs. proactive - Source:CrowdStrike\nAny virus must execute processes, which results in patterns. The virus can change its face, color, size, but it must execute and run code in some distinguishable way. For example, many viruses alter Window registry keys, create new users, or start encryption processes on the host.\nCrowdStrike stops the virus in its tracks. Below is an example of how the Falcon Sensor executes.\nCrowdStrike Falcon in Action malware prevention based on behavior.YouTube\nThe host, in this case, a virtual machine - VM - by CrowdStrike. The user clicked on a malicious file, and the virus begins to \"install\" itself. The Falcon sensor detects if something in the background is initiating processes that indicate suspicious activity and stops those processes from executing.\nThat's the distinguishing factor for CrowdStrike.\nCrowdStrike's EPP is cloud-native and gains from the network effect. The more nodes connect to its platform, the more secure it becomes by training the AI model with process signatures of new viruses.\n\nCrowdStrike combines AI with its Indicator of Attack approach and scales it up in its cloud. The cloud helps train the virus-threat model from endless endpoints.\nBased on statements from CrowdStrike, none of its customers has yet experienced a breach while using its sensors, and CrowdStrike is confident enough in its NGAV that it provides a $1 million warranty if a breach happens.\nCompetition\nCrowdStrike's largest market is the endpoint protection platform - EPP. Within this segment, CrowdStrike is competing with many companies like Microsoft (MSFT), Trend Micro(OTCPK:TMICF)(OTCPK:TMICY), SentinelOne(NYSE:S), or McAfee(NASDAQ:MCFE).\nSource:Gartner Magic Quadrant for Endpoint Protection Platforms\nIn terms of EPP, CrowdStrike is pretty much in a league of itself.\nThe only negative 'real' negative with CrowdStrike is that they are very secretive about their detection logic. There is no way for IT personnel to look into the Falcon sensor and the logic behind it.\nOther EPPs like TrendMicro or SentinelOne score highly in the quadrant but lack against CrowdStrike in scale and maturity.\nSentinelOne is one of CrowdStrike's closest competitors and boasts a much better technology than CrowdStrike. This is two-sided as CrowdStrike pushes back against SentinelOne, calling them 'outdated.'\nSentinelOne is focused on a completely AI-driven security approach. Removing the human aspect from resolving breaches to a larger extent than CrowdStrike.\nNevertheless, the difference between the platforms is small.\nCrowdStrike is more mature than SentinelOne, and its offerings are more scalable SentinelOne's. CrowdStrike's platform is easier to use, deploy, and has a solid reputation (source1,source2,source3).\nIT personnel deciding on either one of these AVs wouldn't harm their company.\nValuation\nCrowdStrike is expensive, no question about it. It's definitely not the value investment I usually cover, like KLAC,SWKS, or QRVO.\nData by YCharts\nCrowdStrike is trading at a 53 price to sales ratio and a forward EV to sales of 38. CrowdStrike is a fast-growing company in an expanding market.\nChart by author, Data from CrowdStrike Quarterly reports\nThe scale and maturity of CrowdStrike are clearly visible as it's the first choice among the largest companies in the world. That translates into revenue growth and customer retention rates above 100%.\nSource: CrowdStrike Corporate OverviewPresentation\nThat means that CrowdStrike is not only acquiring more customers but that existing customers pay more for more of CrowdStrike's services. That's a really, really good situation for an as-a-Service company.\nCrowdStrike's TAM is expanding YoY from multiple sources like Cloud, IoT, home office.\nSource: CrowdStrike Corporate OverviewPresentation\nI find CrowdStrike's own TAM projections rather conservative. Believing the statements from large research companies like Gartner or IDC, cybersecurity expenditures of companies are likely to increase significantly (source1,source2,source).\nGartner estimates the size of the cybersecurity market to be $150bn in 2021 with a 12.4% CAGR over the next 5 years. The breakdown is below.\nGartner ForecastWorldwide Security\nCrowdStrike is not only profiting from an expanding market, but it's also pulling customers from competitors within the antivirus market.\nMore and more companies switch towards IoA next-gen antivirus companies.\nCrowdStrike is the top choice among its competitors.\nIs the valuation justified?\nComparing CrowdStrike with other high-growth IT companies like SentinelOne, Cloudflare (NET), or ZScaler (ZS), we find CrowdStrike between those. CrowdStrike's Gross Margin is 74%, just below ZS's 77.5% and NET's 76.78%, and well above Sentinel's 55%.\nCrowdStrike has strong pricing power, which translates into the best GAAP net margins. CrowdStrike is the only company that operates profitably when looking at its non-GAAP numbers.\nSentinelOne has to push its prices down to remain competitive and balance the immaturity of its platform.\nCrowdStrike has the largest market cap with $53bn and boasts a sales growth of 77% against ZS's and NET's 54% and 52%. SentinelOne has a higher sales growth rate of 100% but only 1/10th of CrowdStrike's revenue.\nInvestor's Takeaway\nCrowdStrike is not just any antivirus company in a crowded cybersecurity market. It'sthecybersecurity company in the market.\nCrowdStrike built a strong reputation with excellent reviews among IT experts, calling it the top-choice in cybersecurity. Gartner positions CrowdStrike above any other EPP in its magic quadrant.\nCrowdStrike is definitely not a value-play and requires conviction to buy and hold at these prices for the next 3-5 years.\nOn the other hand, it wouldn't surprise me a bit if CrowdStrike can double, triple, or even quadruple its revenue over the next 3-5 years. As it's very common for high-growth companies, the share price is largely determined by the companies' sales growth in these early stages.\nMany sources are depicting a high correlation between sales growth and share price increase.Aswath Damodarandiscussed this topic in detail for Amazon in 2000 in thispaper.\nOne of my Seeking Alpha colleagues,From Growth To Value, discussed this topic in his latest article aboutFiverr, including this chart.\nBCG showed that valuation correlates the strongest with revenue growth in the long term, especially for high-growth companies.\nCrowdStrike will likely experience a multiples contraction, but its revenue expansion will more than outperform that contraction, providing investors with a return on their investment.","news_type":1},"isVote":1,"tweetType":1,"viewCount":369,"commentLimit":10,"likeStatus":false,"favoriteStatus":false,"reportStatus":false,"symbols":[],"verified":2,"subType":0,"readableState":1,"langContent":"EN","currentLanguage":"EN","warmUpFlag":false,"orderFlag":false,"shareable":true,"causeOfNotShareable":"","featuresForAnalytics":[],"commentAndTweetFlag":false,"andRepostAutoSelectedFlag":false,"upFlag":false,"length":3,"xxTargetLangEnum":"ORIG"},"commentList":[],"isCommentEnd":true,"isTiger":false,"isWeiXinMini":false,"url":"/m/post/837459822"}
精彩评论