Welcome!

News Feed Item

Cybersecurity Experts From Elite Israeli-Intel Launch Cybereason

Cybereason Inc. today emerges from stealth mode with the launch of an innovative technology platform to proactively detect and terminate Malops™ — malicious operations perpetrated by sophisticated hackers carrying out cybercrimes within enterprises. The Cybereason Platform delivers protection from Malops by automatically detecting the hacker’s actions and intentions through continuous monitoring of systems across the enterprise. This empowers CISOs and security analysts to proactively identify and eradicate Malops in real time. See the “How Hacking Operations Work” video at https://vimeo.com/85874023.

Founded by elite members of the Israeli intelligence agency, the company has built the Cybereason Platform from its deep knowledge and first-hand expertise in cracking and reverse engineering the world’s most complex hacking operations. Cybereason has raised $4.6 million in Series A funding from Charles River Ventures (CRV) to execute its go-to-market strategy.

“CRV has a history of backing industry-defining companies. The Cybereason team brings a unique approach and fresh insights to a market that today doesn’t have effective solutions and where the damage is measured in many billions of dollars. Cybereason is positioned to lead the industry in addressing cyberattacks in the most effective way, and in doing so, define a new market,” said Izhar Armony, partner at Charles River Ventures.

A New Approach to Cybersecurity

Concentrating resources and spend on adversaries or malware has been ineffective. Tracking actions and intent is critical to uncovering cyberattacks in real time, before damage. Cybereason has defined a new approach by detecting Malops that comprise distinct phases within hacking operations with intermediate goals. This approach fills the gap between penetration and damage by continuously monitoring the IT infrastructure, visually describing the Malops in context and enabling security analysts to stop the hacking operation. For more details, see the Malop market brief at www.cybereason.com/press/malop_market_brief.pdf.

“Part of the answer to the seemingly insurmountable problem of how to identify attacks without signature-based mechanisms lies in pervasive monitoring to identify meaningful deviations from normal behavior to infer malicious intent. If you assume systems will be compromised with advanced targeted threats, then information security efforts need to shift to detailed, pervasive and context-aware monitoring to detect these threats,” wrote Neil MacDonald, vice president, distinguished analyst and Gartner fellow emeritus at Gartner Inc. in his report, Prevention is Futile in 2020: Protect Information Via Pervasive Monitoring and Collective Intelligence.1

Cybereason Founding Team and Expertise

“As a result of the forensic expertise of the Cybereason team, this software’s ability to detect and intuitively display malicious activity without relying on predetermined signatures is by far one of the most exciting recent advancements I’ve seen in the information security space,” said Vanessa Pegueros, deputy CISO at DocuSign.

The Cybereason founding team brings a unique and powerful set of skills and a different way of thinking about cybercrime based on years of analyzing and executing against hacker operations and bringing enterprise security products to market. Lior Div, co-founder and chief executive officer, received the Medal of Honor from the head of the Intelligence Corps for his work. He is an expert in the fields of hacking operations, forensics, reverse engineering and malware analysis, cryptography and evasion. Yonatan Striem-Amit, co-founder and chief technology officer, is a recognized security expert in machine learning, big data analytics and visualization technologies. Yossi Naar, co-founder and chief vision officer, is an accomplished software architect with extensive experience designing security platforms for the defense industry as well as big data platforms for search engine marketing.

Cybereason Platform

Cybereason’s platform discerns anomalies and distinguishes between the benign and the pernicious. The system collects specific information and combines analysis of big data algorithms along with proprietary knowledge enriched with external databases and intelligence. With powerful visual reconstruction of cyberattacks, Cybereason allows the experienced and novice users to understand the context of the attack and react quickly and effectively.

“As the frequency and sophistication of attacks facing organizations increases, relying on incident response teams to understand and prevent them from spreading in early phases can be futile; an automated technology approach like Cybereason’s is better suited to help in the early detection of the most insidious attacks, especially as they are first spreading across endpoints and the network,” said René Bonvanie, CMO at Palo Alto Networks.

The Cybereason Platform has been deployed in several early access sites in the United States and Israel, successfully identifying the most advanced and targeted attacks, such as Flame, Doqu and Stuxnet; reconstructing their impact, spread and behavior; and enabling the shutdown of Malops.

“Cybereason addresses advanced targeted attacks at multiple levels,” said Jon Oltsik, senior principal analyst at Enterprise Strategy Group. “Cybereason combines its experience, security, visualization and automation expertise with big data security analytics to help customers detect and respond to hacking operations. This increases the efficiency of highly skilled security analysts and enables less-experienced security analysts to triage Malop response.”

About Cybereason Inc.

Cybereason delivers a proprietary technology platform that automatically uncovers malicious operations (Malops™) and reconstructs them as a clear image of a cyberattack in context. This enables enterprises to discover sophisticated targeted threats at a very early stage, disrupt them at the stem and significantly reduce the costs and damages caused by such attacks. Cybereason is headquartered in Cambridge, MA with offices in Tel Aviv, Israel. For more information, please visit www.cybereason.com, www.twitter.com/Cybereason, www.facebook.com/Cybereason, and www.linkedin.com/company/Cybereason.

Cybereason, Malop and Malops are trademarks of Cybereason Inc. All other brand names and product names are trademarks or registered trademarks of their respective companies.

Tags: Cybereason, Malop, cybersecurity, cybercrime, cyberattacks, malicious operations, hacker, reverse engineering, infosec, security, enterprise security, malware, incident response, advanced persistent threat, APT, CISO, CSO, security analyst, big data, analytics, visualization, Malops, hacking, cyber security, cracking, Charles River Ventures, Gartner, DocuSign, Palo Alto Networks, Enterprise Strategy Group

1 Gartner, Prevention Is Futile in 2020: Protect Information Via Pervasive Monitoring and Collective Intelligence, Neil MacDonald, May 30, 2013

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet and...
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations might...
Zerto exhibited at SYS-CON's 18th International Cloud Expo®, which took place at the Javits Center in New York City, NY, in June 2016. Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing innovative, simple, reliable and scalable business continuity software solutions. Through the Zerto Cloud Continuity Platform™, organizations can seamlessly move and protect virtualized workloads between public, private and hybrid clouds. The company’s flagship product, Zerto Virtual...
Some people worry that OpenStack is more flash then substance; however, for many customers this could not be farther from the truth. No other technology equalizes the playing field between vendors while giving your internal teams better access than ever to infrastructure when they need it. In his session at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, will talk through some real-world OpenStack deployments and look into the ways this can benefit customers of all sizes....
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackIQ...
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...