It’s very possible this Steifel information might be incorrect. There’s a give and take argument between him and people in his thread.
The only mention I ever saw of $FEYE . . . before Steifel brought it up in his OP. . . was the WSJ article in a long thread I authored with several sourced news sites concerning this hack. I believe someone else here on this board reference my post about it on METAR.
More specifically, from my thread, the WSJ article, now archive so you can read the whole thing if you’re not a subscriber:
https://archive.is/ciW37
A SolarWinds spokesman said the company is working with FireEye Inc., a major U.S.-based cybersecurity firm, and the intelligence community and law enforcement on an investigation.
The hackers were sophisticated and operated in a slow and deliberate fashion, using their foothold in victims’ networks to poke and prod computer systems and eventually to steal information, investigators say. FireEye, which was one of the victims of the incident, said last week the hackers stole a suite of hacking software that it employed to test the security of its customers.
Thus, when I read Steifel’s OP, I took the WSJ article confirmed that $SWI had indeed been a client of $FEYE. A few people arguing with Steifel, without any documentation, are saying it’s the other way around.
As a big holder of zero cost shares of $CRWD acquired through my trading this year (3 or 4 winning trades on $CRWD where I took the profits in the form of the underlying), I want to know if $SWI is or isn’t switching to $CRWD as Steifel said originally. I want to be factually correct when telling the $CRWD story to others. So, when, or if, I discover more information about this ongoing argument, I’ll pass it on here.
Meanwhile, $CRWD is now my second largest position of zero cost shares. So, you can bet I want to know which story is correct. Either way, cyber-security sounds like a growth trend to me and my growing $CRWD stake. Cyber-security awareness is now front-page news and reminds me of pre-COVID/post-COVID awareness and sped-up WFH adaptations. Whatever the smallest TAM estimate was just a couple of weeks ago for the cyber-security sector had to be raised considerably in analysts’ minds after this fiasco at SolarWinds with their password of “solarwinds123.”