Investing analysis of the software companies that power next generation digital businesses

Snowflake Cybersecurity Workload

As I am parsing the many product announcements coming out of Snowflake Summit, the new Cybersecurity Workload is worth calling out independently. It was first introduced a little over a week ago. This workload’s purpose is to help customer organizations detect and respond to threats by leveraging the Data Cloud for their security analytics. During Summit, the Snowflake team hosted a separate Cybersecurity track which included 15 sessions and presentations from a number of customers. This level of engagement likely explains why Snowflake pre-announced the availability of Cybersecurity workloads, versus bundling it with the other product announcements this week. As an aside, I am planning to publish coverage of the rest of Summit shortly.

First – does this announcement mean that Snowflake is now a security company? They aren’t in the conventional sense, but that’s what I think makes this product move so interesting. Every existing security analytics service is built on top of a large scale data processing platform. Some security analytics providers, like Splunk, Datadog and New Relic, built their own data processing engines from scratch 10 or more years ago. Elastic leverages the open source project Elasticsearch for security analytics, which they also maintain. Even the endpoint vendors have been adding data processing engines to supplement their XDR capabilities. Crowdstrike acquired Humio and integrated it into the Falcon platform. Sentinel One made a similar acquisition with Scalyr.

As Snowflake is already a high scale data platform for generalized analytics, they are moving into the security space in a different way. They are allowing customers to power their internal security monitoring practices using Snowflake as the data collection, processing and analysis platform. To supplement these efforts, Snowflake has lined up several third-party companies who will collect and process the data on the customer’s behalf, adding their own security analysis and threat detection. I think the Cybersecurity Workload offering would appeal to Snowflake customers on two levels.

In-house Security Practice

First, some companies prefer to to build their own in-house security practices which leverage employee security experts for threat hunting. In this case, these teams want access to raw log data to craft their own queries and to code algorithms that identify threats. They can work with the DevOps team to get log data from server and network infrastructure sources loaded into their Snowflake instance. They can also combine this data with signals from other enterprise applications, like the HR or ITSM systems.

This approach was highlighted by a new customer for the Cybersecurity Workload, Figma. Figma is a SaaS-based collaborative product design tool. It allows teams to interactively mock-up user interfaces for web and mobile apps. Figma is using the Cybersecurity Workload to combine all the information sources available for security context, both internal and some third party data. This is work they might otherwise use Splunk or Elastic to perform.

Modern security practitioners are faced with dozens – if not hundreds – of security information sources to integrate and make sense of. SaaS login records, change management trails, and cybersecurity products all produce large amounts of information that needs to be understood in order to identify and prevent attacks — and that doesn’t even include the data your own company generates! At Figma, we tackle this complexity by using Snowflake as our core repository of security knowledge, combining third party and internal data. This approach has unlocked powerful correlation and alerting abilities across all of the data sources we ingest, allowing us to protect our product and infrastructure better than ever before.

STaff Security Engineer, Figma

Leveraging Security Partners

Other customers may prefer to let third-party vendors power the security analysis layer. These Snowflake partners have built connected applications on top of the Snowflake Data Cloud. They connect to the end customer’s infrastructure devices (servers, network, databases other endpoints) to source log data. Then, they process the source data and store it in the customer’s Snowflake instance. This approach allows the third-party vendors to perform the security analytics, visualization, threat detection and response on the customer’s behalf, reducing their need to hire security experts. For cybersecurity analytics, Snowflake has lined up several partners, like Hunters, Panther Labs and Securonix, through their Powered By program.

Snowflake Blog Post, June 2022

During Summit, two of Dropbox’s Senior Security Engineers discussed how they are making use of the Cybersecurity Workload, with partner Panther Labs providing the security analytics. In this case, Snowflake provides the data repository and underlying compute engine. For a company an expansive as Dropbox, Snowflake’s scale in data processing is needed to handle their large data volumes. Presumably, Snowflake realizes cost efficiencies on their data platform that other SIEM providers are challenged to achieve.

Traditional SIEM architectures were largely unable to scale with the amount of security data that Dropbox needed to collect and utilize for monitoring, threat detection, and security investigations. Without enough data ingested in a legacy SIEM, the quality of alert signal decreases, leading to more false positives, and large data sets cause performance issues that impact queries and time to detect. Dropbox leaned on a solution using cloud-native SIEM Panther combined with a security data lake architecture from Snowflake to scale threat detection and response with next-gen features such as detections-as-code.

Senior Security Engineer, Dropbox

Snowflake announced a number of existing customers who are taking advantage of the new Cybersecurity Workload offering, including CSAA Insurance Group, DoorDash, Dropbox, Figma, Guild, Capital One and TripActions. These customers get the benefit of re-use of their data, some of which is already being collected and stored in Snowflake as part of their generalized analytics practice. By piping additional log data to their Snowflake instance and activating the Cybersecurity Workload, these customers can leverage the data they already have and keep it all in one location. This creates efficiencies and cost savings. It also prevents duplicating data collection and storage for security analytics, by using a stand-alone service with another vendor.

Snowflake Summit, June 2022

With the release of the Cybersecurity Workload, customers get the following benefits:

  • Access to the power and elasticity of Snowflake’s platform to natively handle structured, semi-structured, and unstructured logs.
  • Efficiently store years of high-volume data, search with scalable on-demand compute resources and gain insights using universal languages like SQL and Python.
  • Organizations can unify their security data with enterprise data in a single source of truth, enabling contextual data from HR systems or IT asset inventories to inform detections and investigations.
  • Unified visibility across their security posture, eliminating data silos without prohibitive data ingest or retention costs.
  • Beyond threat detection and response, the Cybersecurity workload supports other use cases including security compliance, cloud security, identity and access, vulnerability management.

Investor Take-aways

From a strategy and investment thesis perspective, I think there are several advantages to Snowflake’s approach. Fundamentally, it allows Snowflake to expand its reach into new types of data intensive workloads. However, it is doing that through a smart balance of leveraging their strengths in large scale data processing without having to make the investment in building an internal security threat hunting practice.

Some advantages include:

  • Cost and scale. Because Snowflake already processes enormous volumes of data for their other analytics functions, they can likely perform security analytics at a lower cost than other cloud-based SIEM providers.
  • Reduces copies of data. Stand-alone SIEMs are effectively collecting and maintaining a separate copy of a company’s data for security analytics. This poses overhead in maintaining data collection agents, network traffic, potential security risks and extra cost.
  • Access to more signals. Threat hunters can combine infrastructure logs with data from other internal systems like HR or ITSM. Those may not be available to a separate SIEM.
  • Let the experts be experts. By partnering with other companies for the security expertise, Snowflake focuses on their strengths in data processing.
  • Access to third-party data in the Marketplace. Customers can subscribe to data feeds in the Snowflake Marketplace that can enhance their threat detection. Ingesting these feeds is simple through Snowflake data sharing.
  • Revenue from Powered By partners. When Cybersecurity partners handle the security analytics, Snowflake still generates revenue from their use of storage and compute on the Data Cloud. During the Investor Session as part of Summit, Snowflake’s CFO revealed that 9% of their $1M+ customers are members of the Powered by program. This will continue to be large driver of revenue.

On the flip side, I don’t expect this to dislodge the pure play security companies, like Crowdstrike or Palo Alto Networks. Snowflake will likely capture spend from companies building their own internal security operations practice versus outsourcing everything to the full-service security companies. Also, the Cybersecurity Workload primarily targets existing or potential Snowflake customers. If the customer’s data is on BigQuery or another data cloud, the offering is less relevant.

It will be interesting to see how this product develops. I am encouraged by the initial traction with some highlighted customers. Personally, I can see the advantages of moving heavy security analytics workloads over to Snowflake simply to reduce cost and duplication of data. If the Powered By partners take off, they will generate significant consumption of Snowflake resources as well. I think that could become a large contributor to future revenue for Snowflake, as they get to place multiple bets on emerging players in security protection.

Along those lines, Cybersecurity Workload partner Securonix presented during the product keynote at Summit. The CEO discussed the company, the value proposition and their partnership with Snowflake. Here are a few of the relevant points:

  • Securonix is already a large company, with 1,000 employees and over 1,000 customers. They recently raised $1B in a funding round.
  • They are a three time Gartner Magic Quadrant Leader in SIEM.
  • Shared that companies are replacing Splunk, Elastic and Exabeam with Securonix due to lower cost of ownership. By running on Snowflake, the CEO claimed that customers typically save 50-70% of costs versus competitive offerings.
  • Values running on Snowflake’s infrastructure because it reduces data replication, provides a larger data set, adds new customer champions besides the CISO (namely the CTO and CDO) and aligns well with developers.
  • He feel that this kind of bundling represents the future of cybersecurity.
Gartner Magic Quadrant for SIEM, June 2021

Regarding the Gartner MQ, the latest report was published in June 2021. Securonix achieved the highest score for Completeness of Vision and is above Splunk and Elastic on the scale of Ability to Execute. I think this success is indicative of the potential for the Cybersecurity Workload and underscores the future value of the Powered By program to emerge as a major revenue contributor for Snowflake going forward.

NOTE: This article does not represent investment advice and is solely the author’s opinion for managing his own investment portfolio. Readers are expected to perform their own due diligence before making investment decisions. Please see the Disclaimer for more detail.

2 Comments

  1. Michael Orwin

    Thanks for the article. Is Snowflake Cybersecurity Workload likely to be included in the partnership with AWS, and would it need an additional agreement and some kind of integration with AWS software?

    • poffringa

      Hi. Yes, the Cybersecurity Workload is tied to wherever the customer is running their Snowflake instance. So, it would be portable to AWS, without any additional contract or agreement with AWS. To collect the signal data from the customer’s infrastructure, they would need to deploy log forwarding agents onto their servers on the cloud (in AWS or other). These agents would either be provided by the customer (using open source) or provided by the Powered By cybersecurity partner.