Welcome!

News Feed Item

Confer Introduces World's First Cyberthreat Prevention Network and Announces $8 Million in Series A Funding

Built on an open threat-sharing platform, Confer protects servers, laptops and mobile devices from sophisticated cyberattacks

WALTHAM, Mass., Jan. 15, 2014 /PRNewswire/ -- Confer, the first company to offer endpoint security via an open, threat-based, collaborative platform, today announced the company and its service offering. Confer has developed the world's first cyberthreat prevention network that secures servers, laptops and mobile devices from cyberattacks. Built on a wirespeed, standards-based, threat-sharing platform, Confer allows companies to efficiently collect and share threat intelligence, enabling better protection while providing visibility into the behavior and intent of attackers, without requiring complex tools and deep security expertise. The company has secured $8 million in Series A funding from Matrix Partners and North Bridge Venture Partners.

(Logo:  http://photos.prnewswire.com/prnh/20140115/NE46445LOGO)

Today's enterprises face organized, financially motivated attackers, whose rapidly evolving tactics, techniques and procedures (TTPs) easily outpace traditional signature-based security solutions. In addition, shifts in the way we work—such as borderless networks, software as a service (SaaS) and bring your own device (BYOD) policies—mean that organizations must defend an ever-growing attack surface. These realities call for a new approach to protecting servers, laptops and mobile devices against cyberthreats. Confer takes a collaborative approach to cybersecurity that focuses on understanding the attacker across the entire Confer user community, rather than simply an individual attack. The analysis of attacker behavior makes clear the broader context of an attack, and that, in turn, enables better protection.

"To date, all of the industry's attempts to defend servers and endpoints have overlooked their potential as one of the richest sources for understanding the behavior of threat actors," said Tim Barrows, general partner at Matrix Partners. "Well-resourced security organizations have moved to a collaborative, threat-based model, sharing information with one another. Confer automates this threat-sharing process and allows a much broader community to benefit from this approach."

"The fact that the vast majority of companies today do not even know when they are breached, let alone when they're the subject of a concerted attack highlights the need for more comprehensive security visibility across the enterprise," said Jim Moran, general partner at North Bridge Venture Partners. "As our pilots with small organizations up to global multinationals showed, organizations will now have a simple, easy way to harness the power of big data analytics to prevent attacks before they occur and put the balance of power firmly back in the hands of the good guys."

Confer's cyberthreat prevention network is a SaaS-managed, host-based system. It prevents malware and advanced attacks via lightweight, cross-platform sensors that feed a big data analytics and sharing platform. Confer runs on Microsoft Windows, Android and Apple Macintosh-based systems, installs in less than a minute and, once installed, is managed completely from the cloud. Confer works from anywhere, continuously monitoring and protecting servers and endpoints regardless of whether they are inside or outside of the network perimeter. This strategic, threat-based approach offers users a rich, contextual understanding of attacker behavior that helps them understand who is attacking them and why.

"Attackers are efficient in designing malware that can evade traditional endpoint security controls.  Defenses need to move beyond signatures to stop specialized threats," said Charles Kolodgy, research vice president at IDC.  "Solutions like those offered by Confer, which IDC calls Specialized Threat Analysis and Protection (STAP), are emerging to fill the gap.  STAP solutions leverage a variety of techniques to collect information around behavior, communication activity, reputation, and other factors to detect the seemingly undetectable.  It's a promising approach that companies should consider to identify the unknown before it becomes a problem." 

Confer is led by co-founders CEO Mark Quinlivan, Chief Technology Officer Jeff Kraemer, and Vice President of Products Paul Morville. The $8 million venture capital investment will fund further product development and expansion of the company's marketing and sales operations.

Trials of Confer are underway at enterprises in the finance, defense, pharmaceutical and information technology industries. For more information about Confer and to learn about the company's 60-day trial offer, please visit www.confer.net or contact [email protected].

About Confer
Confer developed the world's first cyberthreat prevention network that secures servers, laptops and mobile devices from advanced cyberattacks. Built on an open, wirespeed, threat-sharing platform, Confer enables companies to secure the enterprise with an intelligence-driven, threat-based defense, without requiring complex tools and deep security expertise. For more information, visit www.confer.net.

SOURCE Confer

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
From 2013, NTT Communications has been providing cPaaS service, SkyWay. Its customer’s expectations for leveraging WebRTC technology are not only typical real-time communication use cases such as Web conference, remote education, but also IoT use cases such as remote camera monitoring, smart-glass, and robotic. Because of this, NTT Communications has numerous IoT business use-cases that its customers are developing on top of PaaS. WebRTC will lead IoT businesses to be more innovative and address...
21st International Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Me...
The question before companies today is not whether to become intelligent, it’s a question of how and how fast. The key is to adopt and deploy an intelligent application strategy while simultaneously preparing to scale that intelligence. In her session at 21st Cloud Expo, Sangeeta Chakraborty, Chief Customer Officer at Ayasdi, will provide a tactical framework to become a truly intelligent enterprise, including how to identify the right applications for AI, how to build a Center of Excellence to...
Most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes a lot of work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reduction in cost ...
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
DevOps at Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to w...
Vulnerability management is vital for large companies that need to secure containers across thousands of hosts, but many struggle to understand how exposed they are when they discover a new high security vulnerability. In his session at 21st Cloud Expo, John Morello, CTO of Twistlock, will address this pressing concern by introducing the concept of the “Vulnerability Risk Tree API,” which brings all the data together in a simple REST endpoint, allowing companies to easily grasp the severity of t...
Recently, WebRTC has a lot of eyes from market. The use cases of WebRTC are expanding - video chat, online education, online health care etc. Not only for human-to-human communication, but also IoT use cases such as machine to human use cases can be seen recently. One of the typical use-case is remote camera monitoring. With WebRTC, people can have interoperability and flexibility for deploying monitoring service. However, the benefit of WebRTC for IoT is not only its convenience and interopera...
Any startup has to have a clear go –to-market strategy from the beginning. Similarly, any data science project has to have a go to production strategy from its first days, so it could go beyond proof-of-concept. Machine learning and artificial intelligence in production would result in hundreds of training pipelines and machine learning models that are continuously revised by teams of data scientists and seamlessly connected with web applications for tenants and users.
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
IT organizations are moving to the cloud in hopes to approve efficiency, increase agility and save money. Migrating workloads might seem like a simple task, but what many businesses don’t realize is that application migration criteria differs across organizations, making it difficult for architects to arrive at an accurate TCO number. In his session at 21st Cloud Expo, Joe Kinsella, CTO of CloudHealth Technologies, will offer a systematic approach to understanding the TCO of a cloud application...
Connecting to major cloud service providers is becoming central to doing business. But your cloud provider’s performance is only as good as your connectivity solution. Massive Networks will place you in the driver's seat by exposing how you can extend your LAN from any location to include any cloud platform through an advanced high-performance connection that is secure and dedicated to your business-critical data. In his session at 21st Cloud Expo, Paul Mako, CEO & CIO of Massive Networks, wil...
"With Digital Experience Monitoring what used to be a simple visit to a web page has exploded into app on phones, data from social media feeds, competitive benchmarking - these are all components that are only available because of some type of digital asset," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Secure Channels, a cybersecurity firm, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Secure Channels, Inc. offers several products and solutions to its many clients, helping them protect critical data from being compromised and access to computer networks from the unauthorized. The company develops comprehensive data encryption security strategie...
An increasing number of companies are creating products that combine data with analytical capabilities. Running interactive queries on Big Data requires complex architectures to store and query data effectively, typically involving data streams, an choosing efficient file format/database and multiple independent systems that are tied together through custom-engineered pipelines. In his session at @BigDataExpo at @ThingsExpo, Tomer Levi, a senior software engineer at Intel’s Advanced Analytics ...