Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

11/19/2020
06:55 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Telos Goes Public

Nearly a month after McAfee made its second appearance on the public market, the Virginia-based provider of security services to government and commercial organizations makes its own debut.

Telos Corp., provider of IT services to federal government agencies, military, intelligence, and large commercial organizations, today made its debut in the public market with an initial public offering of 14.97 million shares priced at $17 a share of its common stock.

The Ashburn, Va.-based company, established in 1969, will use the proceeds from the IPO for general corporate purposes, to retire debt, and to repurchase a noncontrolling interest in its Telos identity management unit, among other things.

Related Content:

The Story of McAfee: How the Security Giant Arrived at a Second IPO

The Changing Face of Threat Intelligence

New on The Edge: ISP Security: Do We Expect Too Much?

With 2019 revenues of around $160 million, Telos is among a handful of security vendors that have gone public this year. The others include McAfee, which in October raised $740 million in what was actually its second IPO; Palantir, which went public in September with a valuation of around $22 billion; and Sumo Logic, which in September raised some $325 million via an IPO that valued the company at more than $2.15 billion.

In a conversation with Dark Reading Thursday, Telos CEO John Wood described the initial investor response to the IPO as overwhelmingly positive.

"The investment marketplace really, really like our story," Wood says. "We are hugely oversubscribed, and the quality of the investors that came in blew me away."

Wood believes much of the positive sentiment is tied to the fact that 85% of Telos' revenue is recurring and that nearly 100% of its customers are referenceable and repeat buyers.

Wood is bullish about the outlook for several of the company's core technologies. One of them is Telos Ghost, a new capability the company announced last year for helping organizations avoid attacks by essentially making them invisible to adversaries.

"It's a misattribution and obfuscation solution that operates under the principal that if we can make you disappear off the attack vector, you can't be hacked," Wood says. "What is unique about Telos Ghost is that we have a series of algorithms that we wrap around IP hopping activity."

That enables IP addresses to essentially shift and change in such a manner that makes it hard for attackers to draw a bead on an organization's Internet presence. 

"You hop around the world in random ways and literally disappear off the network," Wood says.

Customers of the technology include the US intelligence community, military, and law enforcement. Wood also points to a large education platform that is using Ghost to protect school kids working out of home as an example of the broadening use cases for the technology.

Risk Management and Compliance Story
Another technology that Wood says has broad appeal is Xacta, a risk management and compliance automation technology that numerous organizations — especially within the federal government — are using to monitor for compliance with security standards like FedRAMP, NIST CSF, GLBA, and HIPAA.

Telos counts the US Department of Homeland Security and the US intelligence community among the many users of the technology, which initially was designed for on-premises use but is now cloud-enabled. According to Wood, Xacta's main selling points include its ability to monitor multiple environments — cloud, on-premises, and hybrid — at the same time.

Identity management is another big focus area. The company recently secured two 10-year, multibillion-dollar contracts for technology that allows organizations to continuously monitor and vet users activity for potential suspicious behavior. One of the contracts is with the TSA, which will use Telos to enroll users for its PreCheck program. The other contract is with the US Centers for Medicare & Medicaid services.

Wood says the decision to go public at this time was prompted by a desire to bring in some long-term investors to the company.

"This is the first time we have ever taken long-term permanent capital. We have bootstrapped our growth so far," he says. "We are going to clean out the balance sheet, put plenty of juice into the tank, and get really moving from the standpoint of revenue acceleration."

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29378
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. It is possible to elevate the privilege of a CLI user (to full administrative access) by using the password [email protected]#y$z%x6x7q8c9z) for the e...
CVE-2020-29379
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D4L V1.01.49 and V1600D-MINI V1.01.48 OLT devices. During the process of updating the firmware, the update script starts a telnetd -l /bin/sh process that does not require authentication for TELNET access.
CVE-2020-29380
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. TELNET is offered by default but SSH is not always available. An attacker can intercept passwords sent in cleartext and conduct a man-in-...
CVE-2020-29381
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. Command injection can occur in "upload tftp syslog" and "upload tftp configuration" in the CLI via a crafted filename...
CVE-2020-29382
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. A hardcoded RSA private key (specific to V1600D, V1600G1, and V1600G2) is contained in the firmware images.