cyber_security_ETP

Cybersecurity value chain: explore our theme

Equities 4 minutes to read
Ruben Dalfovo
Ruben Dalfovo

Investment Strategist

Key takeaways

  • Rules and real-world breaches keep security spend steady.
  • Demand clusters in identity, cloud, data protection, and operations.
  • Explore our cybersecurity theme for a simple primer and a curated list of companies to research.


Why cybersecurity spend sticks

Every business runs on software. Cloud, remote work, APIs, and AI create more doors to protect. Boards face tighter rules and faster disclosure. That pushes security from “nice to have” to “must have.”

Budgets cover the basics first—who can log in, what they can reach, how data is protected—and then the tools that help teams detect and respond fast. This theme is not about one headline tool. It is a system that works together and gets updated as threats change.

Inside the cybersecurity value chain

Think of security as a chain. Signals come from users, devices, apps, and networks. Controls enforce policy at the right moment: identity checks, endpoint agents, and cloud rules. Analytics connect the dots to find problems quickly.

Response and resilience limit damage and restore normal operations. Each layer supports the others. Strong identity makes analytics smarter. Good analytics make response faster. Services keep everything current as new risks arise.

Where demand lands

Identity first. Identity decides who gets in and what they can do. Strong login, multi-factor checks, and careful control of admin accounts reduce risk at the source. Deep links to directories and clouds are key.

Cloud and workload security. Simple mistakes create cloud risk. Tools now scan for weak settings, watch permissions, and protect apps while they run. As more AI and data pipelines move to public cloud, these controls move with them.

Data security and resilience. Breaches matter because data moves. Tools find sensitive data, set rules, encrypt, and keep clean backups. The aim is simple: know where data lives and recover quickly if something goes wrong.

Security operations (SecOps). Threats are constant and talent is scarce. Teams use telemetry, analytics, and automation to spot issues sooner and fix them faster. Many add managed services to extend coverage at all hours.

How investors can approach the theme

Diversify across the value chain rather than back a single feature. Blend platforms with specialists in identity, endpoint, cloud, data, and operations. This helps reduce single-product risk and smooth cash-flow profiles across different buying cycles.

Focus on vendors with high renewal rates, clear pricing, and strong integration. Prefer products that customers expand over time with extra seats or modules. Check that delivery keeps pace with the roadmap. 

The companies in our theme and what they do

Palo Alto Networks – A broad platform across network, cloud, and operations. It helps large customers replace multiple point tools with one stack, which can lower complexity and improve visibility over time.

CrowdStrike – Endpoint protection built on lightweight agents and strong cloud analytics. Partners and service teams extend the reach, while add-on modules deepen relationships and lift recurring revenue.

Zscaler – Zero-trust access for users and apps delivered from the cloud. It routes traffic through secure gateways, which helps remote and branch workers connect safely without relying on legacy hardware.

Fortinet – Secure networking at scale, including firewalls and SD-WAN. Custom chips drive performance and cost efficiency, which matters for large distributed networks with tight budgets.

Cloudflare – A global edge network that speeds and protects internet traffic. It blocks attacks like DDoS, filters web requests, and offers zero-trust access—all delivered from data centres close to users.

Verisign – Runs core pieces of internet infrastructure, including the .com and .net registries. Its role is to keep domains reliable and secure, which makes it a stable, behind-the-scenes part of the ecosystem.

How it fits in a portfolio

Cybersecurity can be a growth sleeve that does not depend on consumer cycles. The drivers are steady: rules get tighter, software spreads, and attackers adapt. The theme also diversifies portfolios heavy in general tech, since security budgets often hold through slowdowns.

With the theme and its curated list of companies, you can research leaders and specialists across identity, endpoint, cloud, data and operations. Use it to source new ideas and diversify exposure across the value chain, rather than rely on a single product or vendor.

Key risks

Cyber is durable, but progress is rarely linear. Products can slip when integrations lag, features miss, or costs rise. Talent shortages and supply constraints can slow rollouts. Budgets can shift with macro pressure or internal reorganisations. Big platforms may bundle features and squeeze pricing for stand-alone tools.

After strong runs, valuations can reset quickly. Operations carry risk too—outages, breaches, or support gaps can hurt trust. Currency swings and thin liquidity add volatility in smaller names. To manage these risks, track regulation turning into spend, a vendor’s capacity to deliver, and customer retention through renewals.

Durable demand, simple access

Cyber risk does not pause, and neither do rules. That keeps demand steady across identity, cloud, data protection, and operations. The opportunity is broad, but it rewards discipline. Focus on products that are hard to rip out, visible recurring revenue, and proof that customers add seats and modules over time.

Watch platform consolidation, pricing power, and delivery against roadmap. Size positions sensibly and build exposure in steps rather than all at once. Our theme covers both platforms and specialists and stays anchored to fundamentals, not headlines. Simple idea, durable need: security is maintenance for the digital economy.





This material is marketing content and should not be regarded as investment advice. Trading financial instruments carries risks and historic performance is not a guarantee of future results.
The instrument(s) referenced in this content may be issued by a partner, from whom Saxo receives promotional fees, payment or retrocessions. While Saxo may receive compensation from these partnerships, all content is created with the aim of providing clients with valuable information and options..

Outrageous Predictions 2026

01 /

  • Executive Summary: Outrageous Predictions 2026

    Outrageous Predictions

    Executive Summary: Outrageous Predictions 2026

    Saxo Group

    Read Saxo's Outrageous Predictions for 2026, our latest batch of low probability, but high impact ev...
  • A Fortune 500 company names an AI model as CEO

    Outrageous Predictions

    A Fortune 500 company names an AI model as CEO

    Charu Chanana

    Chief Investment Strategist

    Can AI be trusted to take over in the boardroom? With the right algorithms and balanced human oversi...
  • Despite concerns, U.S. 2026 mid-term elections proceed smoothly

    Outrageous Predictions

    Despite concerns, U.S. 2026 mid-term elections proceed smoothly

    John J. Hardy

    Global Head of Macro Strategy

    In spite of outstanding threats to the American democratic process, the US midterms come and go cord...
  • Dollar dominance challenged by Beijing’s golden yuan

    Outrageous Predictions

    Dollar dominance challenged by Beijing’s golden yuan

    Charu Chanana

    Chief Investment Strategist

    Beijing does an end-run around the US dollar, setting up a framework for settling trade in a neutral...
  • Obesity drugs for everyone – even for pets

    Outrageous Predictions

    Obesity drugs for everyone – even for pets

    Jacob Falkencrone

    Global Head of Investment Strategy

    The availability of GLP-1 drugs in pill form makes them ubiquitous, shrinking waistlines, even for p...
  • Dumb AI triggers trillion-dollar clean-up

    Outrageous Predictions

    Dumb AI triggers trillion-dollar clean-up

    Jacob Falkencrone

    Global Head of Investment Strategy

    Agentic AI systems are deployed across all sectors, and after a solid start, mistakes trigger a tril...
  • Quantum leap Q-Day arrives early, crashing crypto and destabilizing world finance

    Outrageous Predictions

    Quantum leap Q-Day arrives early, crashing crypto and destabilizing world finance

    Neil Wilson

    Investor Content Strategist

    A quantum computer cracks today’s digital security, bringing enough chaos with it that Bitcoin crash...
  • SpaceX announces an IPO, supercharging extraterrestrial markets

    Outrageous Predictions

    SpaceX announces an IPO, supercharging extraterrestrial markets

    John J. Hardy

    Global Head of Macro Strategy

    Financial markets go into orbit, to the moon and beyond as SpaceX expands rocket launches by orders-...
  • Taylor Swift-Kelce wedding spikes global growth

    Outrageous Predictions

    Taylor Swift-Kelce wedding spikes global growth

    John J. Hardy

    Global Head of Macro Strategy

    Next year’s most anticipated wedding inspires Gen Z to drop the doomscrolling and dial up the real w...
  • China unleashes CNY 50 trillion stimulus to reflate its economy

    Outrageous Predictions

    China unleashes CNY 50 trillion stimulus to reflate its economy

    Charu Chanana

    Chief Investment Strategist

    Having created history’s most epic debt bubble, China boldly bets that fiscal stimulus to the tune o...

Content disclaimer

None of the information provided on this website constitutes an offer, solicitation, or endorsement to buy or sell any financial instrument, nor is it financial, investment, or trading advice. Saxo Bank A/S and its entities within the Saxo Bank Group provide execution-only services, with all trades and investments based on self-directed decisions. Analysis, research, and educational content is for informational purposes only and should not be considered advice nor a recommendation.

Saxo’s content may reflect the personal views of the author, which are subject to change without notice. Mentions of specific financial products are for illustrative purposes only and may serve to clarify financial literacy topics. Content classified as investment research is marketing material and does not meet legal requirements for independent research.

Before making any investment decisions, you should assess your own financial situation, needs, and objectives, and consider seeking independent professional advice. Saxo does not guarantee the accuracy or completeness of any information provided and assumes no liability for any errors, omissions, losses, or damages resulting from the use of this information.

Please refer to our full disclaimer and notification on non-independent investment research for more details.

Saxo Bank A/S (Headquarters)
Philip Heymans Alle 15
2900 Hellerup
Denmark

Contact Saxo

Select region

International
International

All trading and investing comes with risk, including but not limited to the potential to lose your entire invested amount.

Information on our international website (as selected from the globe drop-down) can be accessed worldwide and relates to Saxo Bank A/S as the parent company of the Saxo Bank Group. Any mention of the Saxo Bank Group refers to the overall organisation, including subsidiaries and branches under Saxo Bank A/S. Client agreements are made with the relevant Saxo entity based on your country of residence and are governed by the applicable laws of that entity's jurisdiction.

Apple and the Apple logo are trademarks of Apple Inc., registered in the US and other countries. App Store is a service mark of Apple Inc. Google Play and the Google Play logo are trademarks of Google LLC.