Skip to Content
Stock Strategist Industry Reports

Phishing for Moats

Customers are hooked on cybersecurity vendors' lures.

Mentioned: , , , , , ,

Cybersecurity is at the forefront of business and government decision-makers’ minds. Why? Because several hundred data records were stolen in the time it took to read these two lines. In addition, legislation has led to significantly higher breach costs, while changes to the networking environment make cybersecurity even more complex. These trends should allow the cybersecurity market to command an abundant level of spending as customers look to secure all the data and traffic flowing between on-premises assets, a multitude of cloud-based resources, and always-connected users proliferating the quantity of data being generated.

The cybersecurity vendors we cover have formed economic moats by becoming part of the lifeblood of customers, and we believe the potential disruption associated with changing from these vendors is not worth the risk. Due to the various parts of cybersecurity required for proper security, no company provides all the solutions necessary, and there are multiple ways to develop a moat. However, most competitors fail to develop a moat, and various security subsegments are less moaty than others.

Mark Cash does not own (actual or beneficial) shares in any of the securities mentioned above. Find out about Morningstar’s editorial policies.

Transparency is how we protect the integrity of our work and keep empowering investors to achieve their goals and dreams. And we have unwavering standards for how we keep that integrity intact, from our research and data to our policies on content and your personal data.

We’d like to share more about how we work and what drives our day-to-day business.

We sell different types of products and services to both investment professionals and individual investors. These products and services are usually sold through license agreements or subscriptions. Our investment management business generates asset-based fees, which are calculated as a percentage of assets under management. We also sell both admissions and sponsorship packages for our investment conferences and advertising on our websites and newsletters.

How we use your information depends on the product and service that you use and your relationship with us. We may use it to:

  • Verify your identity, personalize the content you receive, or create and administer your account.
  • Provide specific products and services to you, such as portfolio management or data aggregation.
  • Develop and improve features of our offerings.
  • Gear advertisements and other marketing efforts towards your interests.

To learn more about how we handle and protect your data, visit our privacy center.

Maintaining independence and editorial freedom is essential to our mission of empowering investor success. We provide a platform for our authors to report on investments fairly, accurately, and from the investor’s point of view. We also respect individual opinions––they represent the unvarnished thinking of our people and exacting analysis of our research processes. Our authors can publish views that we may or may not agree with, but they show their work, distinguish facts from opinions, and make sure their analysis is clear and in no way misleading or deceptive.

To further protect the integrity of our editorial content, we keep a strict separation between our sales teams and authors to remove any pressure or influence on our analyses and research.

Read our editorial policy to learn more about our process.