10 more security startups to watch

18.08.2015
The emergence of cybersecurity startups has continued unabated as entrepreneurs vie for corporate customers seeking new technologies to battle ever increasing and innovative attackers.

The expertise of these new companies range from various improvements to encryption products to analyzing the wealth of security-incident data gathered from networks to gear that detects the potentially malicious wireless activity of Internet of Things devices.

Based on the continued interest in these startups from venture capital investors, these companies will continue to proliferate. Here are 10 more security startups we are watching and why.

Barkly

Headquarters: BostonFounded: 2013Funding: $17 million including seed and Series A financingLeaders: CEO Mike Duffy and CTO Jack Danahy who worked together at BBN and at IBMFun fact: The company name is supposed to remind you of a guard dog waking you to intrusions.

Why we’re following it: In the hot endpoint security space, Barkly promises a lightweight agent to gather data – lightweight in its footprint and in its CPU usage. That makes it less intrusive to end users. Given that its founders promise general availability of its first product by the end of the year and that the company has enough funding for two years, Barkly could be a player. Plus its founders have driven other successful startups, notably OpenPages and Ounce Labs, both bought by IBM.

Bastille

Headquarters: AtlantaFounded: 2014Funding:  $9 million from Bessemer Venture PartnersLeader: Founder and CEO Chris Rouland who also founded End GameFun fact: The initial idea for the company stemmed from a system Rouland devised to make pickup time more efficient at schools by mapping children to the unique radio-frequency signatures of their parents’ cars.

Why we’re following it: With the proliferation of wirelessly connected Internet of Things devices inside enterprises, security professionals lack technology to adequately monitor what they are up to or even that they are inside the network. Bastille’s monitoring of corporate airspace for such devices and analysis that reveals when they are acting maliciously is a means to gain that important intelligence and pass it along to existing security tools.

Bitglass

Headquarters: San JoseFounded: 2013Funding: $35 million in two round from Norwest Venture Partners, NEA and SingTel Innov8Leaders: Founders CEO Nat Kausik, CEO of four startups one bought by Cisco, one by CA, and CTO Anurag Kahol, a Juniper alumFun fact: The company ran an experiment to track what happens to stolen credit card data and found that once posted on the Dark Net it was opened more than 1,000 times in 12 days.

Why we’re following it: The company’s patented technology makes it safe to store corporate data in the cloud without degrading the speed at which the data can be searched, a common problem with searching encrypted files. Rather than store the data encrypted in the cloud, it stores an encrypted handle representing the data. When the data needs to be retrieved, the handle is downloaded and the full file is pulled from a database stored securely within the corporate network. This allows a high level of encryption (AES 256) as well as speedy search.

FinalCode

Headquarters: San JoseFounded: 2014Funding: Digital ArtsLeaders: CEO Gord Boyce, COO Scott Gordon (both formerly with ForeScout)Fun fact: The company is a spin-out from Japanese email and Web-filtering company Digital Arts which wanted to focus on selling the platform in the U.S. market.

Why we’re following it: FinalCode takes the work out of managing the complex key management that is necessary to encrypt documents and have decryption rights follow the documents around wherever they go. It allows flexibility for where these permissions are stored, either in its cloud or within customers’ firewalls. The platform makes using document sharing services such as Box and Dropbox secure enough to handle corporate information but doesn’t require any changes to the services themselves.

Ionic Security

Headquarters: AtlantaFounded: 2011Funding: $78.1 million from Kleiner Perkins Caufield & Byers, Meritech Capital Partners and Google VenturesLeaders: CEO Steve Abbott, with roots in Symantec, PGP and Network Associates, and CTO Adam Ghetti, named a 2015 Technology Pioneer by the World Economic ForumFun fact: The company used to be called Social Fortress.

Why we’re following it: Ionic’s service encrypts documents using symmetric-key encryption, then manages the key, taking a huge burden off its customers. In addition to securing entire documents from anyone but authorized users, it can secure parts of a document so that one group of recipients can see all of it, but others can decrypt only a designated portion. It also monitors who is actually opening up documents.

Menlo Security

Headquarters: Menlo ParkFounded: 2013Funding:   $35.5 million through Series B funding from Sutter Hill Ventures, General Catalyst, Osage University Partners and Engineering CapitalLeaders:  CEO Amir Ben-Efraim and Chief Product Officer Poornima DeBolle, both formerly with Juniper Networks Fun fact: The founders are commercializing technology licensed from University of California at Berkeley research.

Why we’re following it: Menlo Security offers a simple service that looks to be effective at stripping malware from email and Web traffic. It does this by proxying all such traffic to the company’s cloud where any code is executed in a container. Only a rendering of the content reaches the user’s browser, so it is free of any potential malware. For upstream traffic, the code in the container proxies back to the servers.

Niara

Headquarters: SunnyvaleFounded: 2013Funding:  $29.4 million from Venrock, New Enterprise Associates (NEA) and Index Ventures through two rounds.Leader:  CEO Sriram Ramachandran with executive experience at Aruba, Juniper, Netscreen and NeoterisFun fact: The name Niara means haystack in Spanish, and has no particular significance relating to what the company does.

Why we’re following it: The company makes a security-event analyzer that correlates events that could be signs of attack, assigns them severity scores and issues alerts. The upside for customers is the analyzer takes input about events from existing security platforms, enhancing their usefulness. The goal is to provide very necessary screening and prioritizing of events for human security analysts to check out rather than going through them manually – an overwhelming task. This platform could help businesses better deal with the security information they already gather without having to drastically increase hard-to-find security staff.

Red Canary

Headquarters: Denver  Founded: 2014Funding:   $2.5 million in seed funding led by Kyrus-TechLeaders:  CEO Brian Beyer, head of detection operations Keith McCammon, research and development chief Jason Garman and engineer Chris Rothe who all worked together at Kyrus and, except for Rothe, at ManTechFun fact: The company name invokes the proverbial canary in the coal mine that warns miners of poison gasses.

Why we’re following it: The company offers a service necessary to many businesses – human analysts who sort through security alerts to eliminate false-positives before alerting their customers to the danger. The cost and scarcity of qualified security analysts puts in-house staffing beyond the budgets of businesses of varying sizes. Red Canary’s focus is on analyzing security event data and it delegates gathering that data to other vendors - Bit9+CarbonBlack for endpoint sensors and threat intelligence from Threat Recon, Farsight Security and Bit9+CarbonBlack’s Threat Intelligence Cloud, in addition to its own threat intelligence.

Soha Systems

Headquarters: SunnyvaleFounded: 2013Funding:  $9.76 million in venture funding from Menlo Ventures, Andreessen Horowitz, Cervin Ventures and Moment VenturesLeaders:  CEO Haseeb Budhani (Infineta and NET) , Vice President of Engineering Hanumantha Kavuluru (MobileIron, Nortel), and Vice President of Marketing Rob Quiros (Cisco, Riverbed)Fun fact: Soha it the Arabic name for a star Arabs used to test their vision

Why we’re following it: Soha provides cloud-based security services that reduce the time, cost and expertise required when compared to buying and deploying infrastructure to accomplish the same goals. The service includes authentication, authorization, application firewalling, WAN optimization and server load balancing among multiple application instances. It has a dashboard that shows how accessible their applications are.

Vera

Headquarters: Palo AltoFounded: 2014Funding:  $14 million from Battery VenturesLeaders: CEO Ajay Arora has worked at startups acquired by Cisco, Intel and IBMFun fact: Arora says if the company were a superhero it would be Violet Parr from The Incredibles because she can generate an invisible shield.

Why we’re following it: Vera software imposes encryption on documents that follows them around until a legitimate recipient authenticates to release the decryption keys. That has security benefits, but this is also done with minimal altering of how users interact with the application whose files are being encrypted. It can be used on any device and in conjunction with other security tools. All this means that the product not only secures information, it is unobtrusively enough that it will hurdle obstacles to adoption.

(www.networkworld.com)

Tim Greene

Zur Startseite