Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

11/19/2020
06:55 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Telos Goes Public

Nearly a month after McAfee made its second appearance on the public market, the Virginia-based provider of security services to government and commercial organizations makes its own debut.

Telos Corp., provider of IT services to federal government agencies, military, intelligence, and large commercial organizations, today made its debut in the public market with an initial public offering of 14.97 million shares priced at $17 a share of its common stock.

The Ashburn, Va.-based company, established in 1969, will use the proceeds from the IPO for general corporate purposes, to retire debt, and to repurchase a noncontrolling interest in its Telos identity management unit, among other things.

Related Content:

The Story of McAfee: How the Security Giant Arrived at a Second IPO

The Changing Face of Threat Intelligence

New on The Edge: ISP Security: Do We Expect Too Much?

With 2019 revenues of around $160 million, Telos is among a handful of security vendors that have gone public this year. The others include McAfee, which in October raised $740 million in what was actually its second IPO; Palantir, which went public in September with a valuation of around $22 billion; and Sumo Logic, which in September raised some $325 million via an IPO that valued the company at more than $2.15 billion.

In a conversation with Dark Reading Thursday, Telos CEO John Wood described the initial investor response to the IPO as overwhelmingly positive.

"The investment marketplace really, really like our story," Wood says. "We are hugely oversubscribed, and the quality of the investors that came in blew me away."

Wood believes much of the positive sentiment is tied to the fact that 85% of Telos' revenue is recurring and that nearly 100% of its customers are referenceable and repeat buyers.

Wood is bullish about the outlook for several of the company's core technologies. One of them is Telos Ghost, a new capability the company announced last year for helping organizations avoid attacks by essentially making them invisible to adversaries.

"It's a misattribution and obfuscation solution that operates under the principal that if we can make you disappear off the attack vector, you can't be hacked," Wood says. "What is unique about Telos Ghost is that we have a series of algorithms that we wrap around IP hopping activity."

That enables IP addresses to essentially shift and change in such a manner that makes it hard for attackers to draw a bead on an organization's Internet presence. 

"You hop around the world in random ways and literally disappear off the network," Wood says.

Customers of the technology include the US intelligence community, military, and law enforcement. Wood also points to a large education platform that is using Ghost to protect school kids working out of home as an example of the broadening use cases for the technology.

Risk Management and Compliance Story
Another technology that Wood says has broad appeal is Xacta, a risk management and compliance automation technology that numerous organizations — especially within the federal government — are using to monitor for compliance with security standards like FedRAMP, NIST CSF, GLBA, and HIPAA.

Telos counts the US Department of Homeland Security and the US intelligence community among the many users of the technology, which initially was designed for on-premises use but is now cloud-enabled. According to Wood, Xacta's main selling points include its ability to monitor multiple environments — cloud, on-premises, and hybrid — at the same time.

Identity management is another big focus area. The company recently secured two 10-year, multibillion-dollar contracts for technology that allows organizations to continuously monitor and vet users activity for potential suspicious behavior. One of the contracts is with the TSA, which will use Telos to enroll users for its PreCheck program. The other contract is with the US Centers for Medicare & Medicaid services.

Wood says the decision to go public at this time was prompted by a desire to bring in some long-term investors to the company.

"This is the first time we have ever taken long-term permanent capital. We have bootstrapped our growth so far," he says. "We are going to clean out the balance sheet, put plenty of juice into the tank, and get really moving from the standpoint of revenue acceleration."

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29529
PUBLISHED: 2020-12-03
HashiCorp go-slug before 0.5.0 does not address attempts at directory traversal involving ../ and symlinks.
CVE-2020-29534
PUBLISHED: 2020-12-03
An issue was discovered in the Linux kernel before 5.9.3. io_uring takes a non-refcounted reference to the files_struct of the process that submitted a request, causing execve() to incorrectly optimize unshare_fd(), aka CID-0f2122045b94.
CVE-2020-17527
PUBLISHED: 2020-12-03
While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this woul...
CVE-2020-23736
PUBLISHED: 2020-12-03
There is a local denial of service vulnerability in DaDa accelerator 5.6.19.816,, attackers can use constructed programs to cause computer crashes (BSOD).
CVE-2020-23738
PUBLISHED: 2020-12-03
There is a local denial of service vulnerability in Advanced SystemCare 13 PRO 13.5.0.174. Attackers can use a constructed program to cause a computer crash (BSOD)