Welcome!

News Feed Item

Confer Introduces World's First Cyberthreat Prevention Network and Announces $8 Million in Series A Funding

Built on an open threat-sharing platform, Confer protects servers, laptops and mobile devices from sophisticated cyberattacks

WALTHAM, Mass., Jan. 15, 2014 /PRNewswire/ -- Confer, the first company to offer endpoint security via an open, threat-based, collaborative platform, today announced the company and its service offering. Confer has developed the world's first cyberthreat prevention network that secures servers, laptops and mobile devices from cyberattacks. Built on a wirespeed, standards-based, threat-sharing platform, Confer allows companies to efficiently collect and share threat intelligence, enabling better protection while providing visibility into the behavior and intent of attackers, without requiring complex tools and deep security expertise. The company has secured $8 million in Series A funding from Matrix Partners and North Bridge Venture Partners.

(Logo:  http://photos.prnewswire.com/prnh/20140115/NE46445LOGO)

Today's enterprises face organized, financially motivated attackers, whose rapidly evolving tactics, techniques and procedures (TTPs) easily outpace traditional signature-based security solutions. In addition, shifts in the way we work—such as borderless networks, software as a service (SaaS) and bring your own device (BYOD) policies—mean that organizations must defend an ever-growing attack surface. These realities call for a new approach to protecting servers, laptops and mobile devices against cyberthreats. Confer takes a collaborative approach to cybersecurity that focuses on understanding the attacker across the entire Confer user community, rather than simply an individual attack. The analysis of attacker behavior makes clear the broader context of an attack, and that, in turn, enables better protection.

"To date, all of the industry's attempts to defend servers and endpoints have overlooked their potential as one of the richest sources for understanding the behavior of threat actors," said Tim Barrows, general partner at Matrix Partners. "Well-resourced security organizations have moved to a collaborative, threat-based model, sharing information with one another. Confer automates this threat-sharing process and allows a much broader community to benefit from this approach."

"The fact that the vast majority of companies today do not even know when they are breached, let alone when they're the subject of a concerted attack highlights the need for more comprehensive security visibility across the enterprise," said Jim Moran, general partner at North Bridge Venture Partners. "As our pilots with small organizations up to global multinationals showed, organizations will now have a simple, easy way to harness the power of big data analytics to prevent attacks before they occur and put the balance of power firmly back in the hands of the good guys."

Confer's cyberthreat prevention network is a SaaS-managed, host-based system. It prevents malware and advanced attacks via lightweight, cross-platform sensors that feed a big data analytics and sharing platform. Confer runs on Microsoft Windows, Android and Apple Macintosh-based systems, installs in less than a minute and, once installed, is managed completely from the cloud. Confer works from anywhere, continuously monitoring and protecting servers and endpoints regardless of whether they are inside or outside of the network perimeter. This strategic, threat-based approach offers users a rich, contextual understanding of attacker behavior that helps them understand who is attacking them and why.

"Attackers are efficient in designing malware that can evade traditional endpoint security controls.  Defenses need to move beyond signatures to stop specialized threats," said Charles Kolodgy, research vice president at IDC.  "Solutions like those offered by Confer, which IDC calls Specialized Threat Analysis and Protection (STAP), are emerging to fill the gap.  STAP solutions leverage a variety of techniques to collect information around behavior, communication activity, reputation, and other factors to detect the seemingly undetectable.  It's a promising approach that companies should consider to identify the unknown before it becomes a problem." 

Confer is led by co-founders CEO Mark Quinlivan, Chief Technology Officer Jeff Kraemer, and Vice President of Products Paul Morville. The $8 million venture capital investment will fund further product development and expansion of the company's marketing and sales operations.

Trials of Confer are underway at enterprises in the finance, defense, pharmaceutical and information technology industries. For more information about Confer and to learn about the company's 60-day trial offer, please visit www.confer.net or contact [email protected].

About Confer
Confer developed the world's first cyberthreat prevention network that secures servers, laptops and mobile devices from advanced cyberattacks. Built on an open, wirespeed, threat-sharing platform, Confer enables companies to secure the enterprise with an intelligence-driven, threat-based defense, without requiring complex tools and deep security expertise. For more information, visit www.confer.net.

SOURCE Confer

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
"We're focused on how to get some of the attributes that you would expect from an Amazon, Azure, Google, and doing that on-prem. We believe today that you can actually get those types of things done with certain architectures available in the market today," explained Steve Conner, VP of Sales at Cloudistics, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, and communicator. For over 30 years across five continents, he has built success with Fortune 500 corporations, vendors, governments, and as a leading research analyst and consultant.
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Archi...
"We're here to tell the world about our cloud-scale infrastructure that we have at Juniper combined with the world-class security that we put into the cloud," explained Lisa Guess, VP of Systems Engineering at Juniper Networks, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
In his session at 20th Cloud Expo, Brad Winett, Senior Technologist for DDN Storage, will present several current, end-user environments that are using object storage at scale for cloud deployments including private cloud and cloud providers. Details on the top considerations of features and functions for selecting object storage will be included. Brad will also touch on recent developments in tiering technologies that deliver single solution and an end-user view of data across files and objects...
Hardware virtualization and cloud computing allowed us to increase resource utilization and increase our flexibility to respond to business demand. Docker Containers are the next quantum leap - Are they?! Databases always represented an additional set of challenges unique to running workloads requiring a maximum of I/O, network, CPU resources combined with data locality.
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
"Cloud computing is certainly changing how people consume storage, how they use it, and what they use it for. It's also making people rethink how they architect their environment," stated Brad Winett, Senior Technologist for DDN Storage, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
"Venafi has a platform that allows you to manage, centralize and automate the complete life cycle of keys and certificates within the organization," explained Gina Osmond, Sr. Field Marketing Manager at Venafi, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Digital transformation has increased the pace of business creating a productivity divide between the technology haves and have nots. Managing financial information on spreadsheets and piecing together insight from numerous disconnected systems is no longer an option. Rapid market changes and aggressive competition are motivating business leaders to reevaluate legacy technology investments in search of modern technologies to achieve greater agility, reduced costs and organizational efficiencies. ...
For far too long technology teams have lived in siloes. Not only physical siloes, but cultural siloes pushed by competing objectives. This includes informational siloes where business users require one set of data and tech teams require different data. DevOps intends to bridge these gaps to make tech driven operations more aligned and efficient.
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.