Cybersecurity_article

Smart tech, smarter security: a cybersecurity guide for investors

Ruben Dalfovo
Ruben Dalfovo

Investment Strategist

Key points:

  • Long runway: AI, cloud, and new rules keep cybersecurity a durable theme
  • Watch: recurring revenue growth, customer retention, and add-on adoption
  • Main risks: execution missteps, hyperscaler bundles squeezing pricing, and rich valuations

Introduction to cybersecurity

Cybersecurity protects a company’s data, systems, and people from break-ins, leaks, and shutdowns. Think locks, cameras, and guards for the digital office. The goal is simple: keep the right people in, keep the wrong people out, and keep the business running.

Most attacks start simple. Phishing emails trick staff into sharing passwords. Ransomware locks files and demands payment. Stolen credentials let attackers “walk in” as real users. Software bugs and bad vendor updates can also break things at scale.

Defence is layered. Identify what matters, limit access, verify every request, watch activity, and recover fast if something fails. Backups, updates, monitoring, and staff training sit alongside smarter tools that assume “trust no one” by default.

Why AI makes security spend jump


Generative AI tools create and move a lot of sensitive information across more apps and clouds. That forces companies to lock down identities, data, and workloads—and it raises leak and break-in risk. Budgets are shifting into three clear areas:

  • Identity and Access Management (IAM): ID checks and door keys. It confirms who you are and what you can open. Think logins, multi-factor, and “least privilege” so people only see what they need.

  • Secure Access Service Edge (SASE): safe roads to apps. It routes connections through cloud security checks instead of old VPNs and office firewalls. It assumes “trust no one” by default.

  • Workload protection: locks on the servers that run your software in the cloud. It scans code, watches activity, and stops attacks while apps are running.

Key drivers

Cybersecurity is the safety layer for AI and cloud. As sensitive data spreads, the cost of failure rises and rules tighten. Boards now treat resilience as core operations, not IT hygiene. Below are three key drivers shaping budgets and vendor choices over the upcoming years:

Non-discretionary budget. Security is a “must-have” budget, not a “nice-to-have.” Vendors sell subscriptions, measured by seats and features attached. Switching is painful, so revenue can be sticky—until a major outage or new rule reshapes buyer choices.

Rules force action. The EU AI Act makes breaking the rules expensive: fines can reach EUR 35 million or 7% of global revenue for serious violations. Firms must:

  • record who opened what and when (logs),

  • control where data can go (blocks and limits),

  • produce proof for auditors (reports).

Resilience moved to the boardroom. In July 2024, a bad software update from a major security vendor crashed many Windows PCs worldwide. That outage showed how one supplier can take down operations. Boards now ask: Do we have backups? Can we roll back updates? Are we too dependent on one vendor? This pushes spending on resilience and vendor risk checks.

The runway is long. Bloomberg Intelligence expects cybersecurity and adjacent annual recurring revenue (ARR) to reach about USD 233 billion by 2033—roughly 14% CAGR. Demand looks structural and sticky as AI spreads, rules tighten, and cloud expands. The catch: expectations are high. Outages, hyperscaler bundling, and tougher audits can sting.

Saxo Cybersecurity theme basket: performance and composition as of September 15 2025

Screens_cyber
Screenscyber2jpg

Four cybersecurity leaders

Many vendors fall into two groups: platforms that bundle several tools, and specialists that focus on one area. Below we cover a broad platform (Palo Alto Networks), one platform-leaning specialist—CrowdStrike (endpoint + cloud workload), and two specialists—Okta (identity), and Zscaler (secure access).

Palo Alto Networks (PANW) — platform + secure access
Palo Alto sells a broad platform that covers networks, internet access, endpoints, and cloud security. Most sales are subscriptions, with “land and expand” across many products. Strengths: breadth and cross-selling into a large customer base. Risks: tough competition in secure access, migration complexity, and price pressure from bundled cloud deals.

CrowdStrike (CRWD) — endpoint + cloud workload
CrowdStrike protects laptops, servers, and cloud apps with a single lightweight agent on each system that monitors activity in real time and reports to Falcon—its cloud platform—where threats are detected and blocked. Revenue is subscription-based and grows as customers add more modules. Strengths: strong detection, fast updates, and rising use in cloud workloads. Risks: premium pricing and the 2024 outage reminder that one bad update can hurt trust.

Okta (OKTA) — identity at the center
Okta verifies who you are and what you can open across your work apps. It earns recurring revenue per user and by adding security features like multi-factor checks and governance. Strengths: neutral identity layer that works across clouds and vendors. Risks: stiff Microsoft competition and past security incidents that raise scrutiny.

Zscaler (ZS) — zero-trust network edge
Zscaler replaces old virtual private networks with a cloud service that connects users to apps only after checks—“trust no one” by default. Subscriptions drive revenue, with add-ons for data protection and operations. Strengths: built-for-cloud design and a large global network. Risks: long enterprise sales cycles and rising competition from bigger platform vendors.

These cybersecurity leaders have performed well and often trade at premium valuations, reflecting strong growth prospects and sticky subscriptions. Platforms give simpler, steadier exposure—one bill, integrated tools, and bundle pricing that cuts overlap. Specialists fit only when their product is clearly best-in-class or needed across multiple clouds (‘depth advantage’). Depth can win deals, but platform bundling and buyer consolidation can cap seat growth and make returns more volatile.

Challenges and risks

AI adds more apps, more data copies, and more places to break. Remote work multiplies devices and home networks. Net result: more doors to guard and more chances to slip. People remain the weak link. Stolen passwords and phishing do most of the damage, and small access mistakes—no multi-factor authentication (MFA), old admin accounts, broken single sign-on (SSO)—turn small slips into big breaches.

Rules raise the bar and lift costs. The EU AI Act pushes firms to log access, control data flows, and prove compliance. Cloud giants bundle security inside AWS, Azure, and Google deals. That can cut overlapping tools, but it increases lock-in—eroding pure-play pricing power—while leaving multicloud blind spots. Independent vendors still win when they go deeper or work cleanly across platforms.

Valuation is a risk: many cyber stocks trade at high multiples, leaving little room for error—small misses, softer guidance, or outages can compress multiples fast.

Investor playbook

  • Follow recurring revenue, net retention, and add-on adoption; prefer durable growth to billings swings.
  • Check platform coverage: favour platforms that cover identity, secure access, and workload protection; add specialists where depth matters.
  • Watch pricing power versus hyperscaler bundles; track discounting and gross margins.
  • Mind valuation: phase entries and size positions so a miss or outage won’t derail the portfolio.

Conclusion

Cybersecurity is where AI meets day-to-day operations. As data spreads, firms must control identity, access, and cloud workloads—or pay the price. That keeps spend durable and steers budgets toward platforms. Specialists fit only when their product is clearly best-in-class. The main drivers are AI adoption and regulation; the main risks are hyperscaler bundling that undermines pricing power, rich valuations, and execution hits from outages or breaches. For more inspiration, take a look at our Cybersecurity investment theme.  



This material is marketing content and should not be regarded as investment advice. Trading financial instruments carries risks and historic performance is not a guarantee of future results.
The instrument(s) referenced in this content may be issued by a partner, from whom Saxo receives promotional fees, payment or retrocessions. While Saxo may receive compensation from these partnerships, all content is created with the aim of providing clients with valuable information and options.

Les informations contenues sur ce site web vous sont fournies par Saxo Bank (Suisse) SA («Saxo Bank») à des fins éducatives et informatives uniquement. Ces informations ne doivent pas être considérées comme une offre ou une recommandation d'effectuer une transaction ou de recourir à un service particulier, et leur contenu ne doit pas être interprété comme un conseil de toute autre nature, par exemple de nature fiscale ou juridique.

Les transactions sur titres comportent des risques. Les pertes peuvent dépasser les dépôts sur les produits de marge. Vous devez comprendre le fonctionnement de nos produits et les risques qui y sont associés. En outre, vous devriez évaluer si vous pouvez vous permettre de prendre un risque élevé de perdre votre argent.

Saxo Bank ne garantit pas l'exactitude, l'exhaustivité ou l'utilité des informations fournies et n'est pas responsable des erreurs, omissions, pertes ou dommages résultant de l'utilisation de ces informations.

Le contenu de ce site web représente du matériel de marketing et n'est pas le résultat d'une analyse ou d'une recherche financière. Il n'a donc pas été préparé conformément aux directives visant à promouvoir l'indépendance de la recherche financière/en investissement et n'est soumis à aucune interdiction de négociation avant la diffusion de la recherche financière/en investissement.

Saxo Bank (Suisse) SA
The Circle 38
CH-8058
Zürich-Flughafen
Suisse

Nous contacter

Select region

Suisse
Suisse

Le trading d’instruments financiers comporte des risques. Les pertes peuvent dépasser les dépôts sur les produits de marge. Vous devez comprendre comment fonctionnent nos produits et quels types de risques ils comportent. De plus, vous devez savoir si vous pouvez vous permettre de prendre un risque élevé de perdre votre argent. Pour vous aider à comprendre les risques impliqués, nous avons compilé une divulgation des risques ainsi qu'un ensemble de documents d'informations clés (Key Information Documents ou KID) qui décrivent les risques et opportunités associés à chaque produit. Les KID sont accessibles sur la plateforme de trading. Veuillez noter que le prospectus complet est disponible gratuitement auprès de Saxo Bank (Suisse) SA ou directement auprès de l'émetteur.

Ce site web est accessible dans le monde entier. Cependant, les informations sur le site web se réfèrent à Saxo Bank (Suisse) SA. Tous les clients traitent directement avec Saxo Bank (Suisse) SA. et tous les accords clients sont conclus avec Saxo Bank (Suisse) SA et sont donc soumis au droit suisse.

Le contenu de ce site web constitue du matériel de marketing et n'a été signalé ou transmis à aucune autorité réglementaire.

Si vous contactez Saxo Bank (Suisse) SA ou visitez ce site web, vous reconnaissez et acceptez que toutes les données que vous transmettez, recueillez ou enregistrez via ce site web, par téléphone ou par tout autre moyen de communication (par ex. e-mail), à Saxo Bank (Suisse) SA peuvent être transmises à d'autres sociétés ou tiers du groupe Saxo Bank en Suisse et à l'étranger et peuvent être enregistrées ou autrement traitées par eux ou Saxo Bank (Suisse) SA. Vous libérez Saxo Bank (Suisse) SA de ses obligations au titre du secret bancaire suisse et du secret des négociants en valeurs mobilières et, dans la mesure permise par la loi, des autres lois et obligations concernant la confidentialité dans le cadre des divulgations de données du client. Saxo Bank (Suisse) SA a pris des mesures techniques et organisationnelles de pointe pour protéger lesdites données contre tout traitement ou transmission non autorisés et appliquera des mesures de sécurité appropriées pour garantir une protection adéquate desdites données.

Apple, iPad et iPhone sont des marques déposées d'Apple Inc., enregistrées aux États-Unis et dans d'autres pays. App Store est une marque de service d'Apple Inc.