IncFact
Company Profiles: Revenue, Growth, Competition

Federal Forcepoint Holdings Revenue, Growth & Competitor Profile

DBA FORCEPOINT, LLC
DBA FORCEPOINT FEDERAL HOLDINGS LLC
Last updated:

Company Awards

Fast Growing
Fastest Growing
Big Fish
Big Fish
Brain Power (IP)
Patent/Trademark IP
 

Company Profile & Annual Report for Federal Forcepoint Holdings

Access the complete profile.

Federal Forcepoint Holdings Fast Facts

Revenue$100 - $500 million    See Exact Annual Revenue
EmployeesOver 1,000Exact Company Size
Primary Industry541511 Custom Computer Programming & Software Development Services
Address10900 Stonelake Boulevard
Austin, TX 78759

Note: Revenues for privately held companies are statistical evaluations.


Federal Forcepoint Holdings's Annual Report & Profile shows critical firmographic facts:
  • What is the company's size? (Annual sales and employees)
  • What industry is the company in?
    • Federal Forcepoint Holdings is classified as operating in the Custom Computer Programming & Software Development Services industry, NAICS Code 541511.

Federal Forcepoint Holdings Annual Revenue and Growth Rate

Federal Forcepoint Holdings Revenue Est.
($ Million)
Growth Rate (%)# Employees
2023 $100 - $500 million

Details in Premium Report
2022
2021
2020
2019


1-Year Growth Rate:
3-Year Growth Rate (CAGR):
Premium Report

Note: Federal Forcepoint Holdings's revenues are gauged from an analysis of company filings.



Federal Forcepoint Holdings's Income Statement (based on Industry Averages)

Federal Forcepoint Holdings P&L$ Millions
Revenue (Sales) Federal Forcepoint Holdings Premium Report
Cost of Goods Sold
Gross Profit

Operating Expenses
Advertising
Salaries and wages
Other Operating Expenses
Total Operating Expenses
Operating Income
EBITDA
EBIT (Earnings Before Interest and Taxes)
Net Profit
 


Trademark Applications

Trademark applications show the products and services that Federal Forcepoint Holdings is developing and marketing. Federal Forcepoint Holdings doesn't have any recent trademark applications, indicating Federal Forcepoint Holdings is focusing on its existing business rather than expanding into new products and markets. Trademarks may include brand names, product names, logos and slogans.

Trademark Date
DYNAMIC EDGE PROTECTION
Computer hardware; downloadable computer software, namely, downloadable software for the creation of firewalls, downloadable software for security analytics, downloadable software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, downloadable software for network security, load balancing, and routing, downloadable software for web, hardware, network, computer and internet security, downloadable software for monitoring or controlling access to sites and locations on a global computer network, downloadable software that enables safe, secure and simultaneous data movement within and between computer networks, downloadable software that enables, controls and audits sharing of information across computer networks, downloadable software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and downloadable software that provides users with simultaneous access to multiple computer networks; recorded computer software, namely, recorded software for the creation of firewalls, recorded software for security analytics, recorded software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, recorded software for network security, load balancing, and routing, recorded software for web, hardware, network, computer and internet security, recorded software for monitoring or controlling access to sites and locations on a global computer network, recorded software that enables safe, secure and simultaneous data movement within and between computer networks, recorded software that enables, controls and audits sharing of information across computer networks, recorded software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and recorded software that provides users with simultaneous access to multiple computer networks; downloadable computer software for security and protection, namely, downloadable software for providing web security and protection, providing e-mail messaging security and protection, and for data loss prevention; recorded computer software for security and protection, namely, recorded software for providing web security and protection, providing e-mail messaging security and protection, and for data loss prevention; downloadable computer software for the security and protection of data, networks and communications; recorded computer software for the security and protection of data, networks and communications; electronic downloadable publications, namely, reference manuals, user guides, and product specifications in the field of cybersecurity
08/28/2020
DYNAMIC USER PROTECTION
Computer hardware; downloadable computer software, namely, downloadable software for the creation of firewalls, downloadable software for security analytics, downloadable software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, downloadable software for network security, load balancing, and routing, downloadable software for web, hardware, network, computer and internet security, downloadable software for monitoring or controlling access to sites and locations on a global computer network, downloadable software that enables safe, secure and simultaneous data movement within and between computer networks, downloadable software that enables, controls and audits sharing of information across computer networks, downloadable software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and downloadable software that provides users with simultaneous access to multiple computer networks; recorded computer software, namely, recorded software for the creation of firewalls, recorded software for security analytics, recorded software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, recorded software for network security, load balancing, and routing, recorded software for web, hardware, network, computer and internet security, recorded software for monitoring or controlling access to sites and locations on a global computer network, recorded software that enables safe, secure and simultaneous data movement within and between computer networks, recorded software that enables, controls and audits sharing of information across computer networks, recorded software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and recorded software that provides users with simultaneous access to multiple computer networks; downloadable computer software for security and protection, namely, downloadable software for providing web security and protection, providing e-mail messaging security and protection, and for data loss prevention; recorded computer software for security and protection, namely, recorded software for providing web security and protection, providing e-mail messaging security and protection, and for data loss prevention; downloadable computer software for the security and protection of data, networks and communications; recorded computer software for the security and protection of data, networks and communications; electronic downloadable publications, namely, reference manuals, user guides, and product specifications in the field of cybersecurity
08/28/2020
DYNAMIC DATA PROTECTION
Computer hardware; downloadable computer software, namely, downloadable software for the creation of firewalls, downloadable software for security analytics, downloadable software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, downloadable software for network security, load balancing, and routing, downloadable software for web, hardware, network, computer and internet security, downloadable software for monitoring and/or controlling access to sites and locations on a global computer network, downloadable software that enables safe, secure and simultaneous data movement within and between computer networks, downloadable software that enables, controls and audits sharing of information across computer networks, downloadable software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and downloadable software that provides users with simultaneous access to multiple computer networks; recorded computer software, namely, recorded software for the creation of firewalls, recorded software for security analytics, recorded software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, recorded software for network security, load balancing, and routing, recorded software for web, hardware, network, computer and internet security, recorded software for monitoring and/or controlling access to sites and locations on a global computer network, recorded software that enables safe, secure and simultaneous data movement within and between computer networks, recorded software that enables, controls and audits sharing of information across computer networks, recorded software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and recorded software that provides users with simultaneous access to multiple computer networks; downloadable computer software for security and protection, namely, downloadable software for providing web security and protection, providing e-mail messaging security and protection, and for data loss prevention; recorded computer software for security and protection, namely, recorded software for providing web security and protection, providing e-mail messaging security and protection, and for data loss prevention; downloadable computer software for the security and protection of data, networks and communications; recorded computer software for the security and protection of data, networks and communications; electronic downloadable publications, namely, reference manuals, user guides, and product specifications in the field of cybersecurity
04/08/2020

See all trademarks and details in the Full Report.


Market Share of Federal Forcepoint Holdings's Largest Competitors

A competitive analysis shows these companies are in the same general field as Federal Forcepoint Holdings, even though they may not compete head-to-head. These are the largest companies by revenue. However, they may not have the largest market share in this industry if they have diversified into other business lines. The "Competition" section of a business plan or investment memorandum would start by analyzing the information about these companies. Competitive advantage comes from offering better pricing or superior products/service.

Company HeadquartersRevenue ($ MM)
NVIDIASanta Clara, CA100 
INNOVA SOLUTIONSDuluth, GA80 
COGNIZANT TECHNOLOGY SOLUTIONS U.S.College Station, TX32 
CERNERKansas City, MO12 
CACI INTERNATIONALReston, VA9 
WIPRO LIMITEDEast Brunswick, NJ6 
SYNTELTroy, MI5 
GUSTOSan Francisco, CA4 
DELIVMenlo Park, CA4 




Nearby Competitors

These companies are similar in business line and location to Federal Forcepoint Holdings. While some companies compete with neighboring businesses for customers, other companies may compete to attract skilled employees.

Company HeadquartersRevenue ($ MM)
EPICOR SOFTWAREAustin, TX100 
COCOLEVIOAustin, TX93 
Q2 HOLDINGSAustin, TX92 
E2OPENAustin, TX62 
FEDERAL FORCEPOINT HOLDINGSAustin, TX53 
BIGCOMMERCEAustin, TX52 




Future Competition: Federal Forcepoint Holdings's Fastest Growing Competitors

These companies are in the same general field as Federal Forcepoint Holdings and are rapidly expanding. Companies may grow organically or through acquisition. In some cases apparently high growth rates may be caused by data that weren't available in previous years.

CompanyRevenue ($ MM)
Federal Forcepoint Holdings Competitors