Welcome!

News Feed Item

Core Security Reports Strong First Quarter Results as Demand for Attack Intelligence Solutions Heats Up

Core Security, the leading provider of attack intelligence solutions, reported strong results for its first fiscal quarter of 2014. Building off a successful finish to 2013, the company continues to gain traction with its Attack Intelligence Platform, an enterprise solution for proactively addressing security threats, enabling customers to protect their most critical business assets from hackers by “Thinking Like an Attacker™.” Over the last six months, Core has added new senior management, strategic partnerships and international channels to address increasing worldwide demand for more proactive information security solutions at a time when significant security breaches are on the rise. To further steward the Company’s rapid growth, Core also announced the appointment of industry veterans Steve Munford and Alfred Huger to the Board of Directors.

Financial Highlights
For the first quarter of fiscal 2014, Core reported more than 90 percent growth in new product sales on a year-over-year comparison. The company’s Core Impact Professional sales grew more than 50 percent, and Core Insight Enterprise sales grew more than 300 percent as compared with the first quarter of 2013. For the first quarter of fiscal 2014, Core also achieved its spending and profitability targets. While Insight sales are increasing, renewal rates for Core Impact remain above the industry standard. The company continues to add marquee, Fortune 500 companies to its already impressive list of installed base customers and has seen increased demand for its Attack Intelligence Platform.

“We had a solid start to our fiscal 2014 with a strong Q1. The first quarter results were very good, but more importantly, we are seeing more of our customers adopt our solutions as key elements of their overall security posture,” said Mark Hatton, President and CEO of Core Security. “As we engage with our customers and prospects, we hear the requirement for a set of solutions focused on proactively addressing a company’s security vulnerability. Looking in the ‘rearview mirror’ is not acceptable with today’s sophisticated cyber-attacks. We view our customers through the lenses of the attacker, providing an integrated enterprise security solution set allowing our customers to be not only predictive, but more importantly, proactive.”

Core’s Innovative Solutions – Attack Intelligence Platform
Core strengthened its position in 2013, extending its domain expertise and launching its Attack Intelligence Platform. This extensible platform allows information security professionals to Think Like An Attacker™ by proactively addressing security threats based on real attacks that hackers use. Backed by more than 15 years of applied expertise and focus on attacker behavior, the platform combines the capabilities of Core Security Consulting Services (SCS), Core Impact Pro and Core Insight. Using Core’s patented attack path planner and engine to simulate attacks and conduct live tests, security professionals can associate known threats, vulnerabilities and attack patterns with security and network data to identify potential attack paths to critical business assets.

While traditional vulnerability management solutions often produce thousands of “high severity” vulnerabilities for the operations staff to fix, attack intelligence adjusts prioritization based on the systems that are part of these paths and the assets they put at risk. This makes the remediation process more effective, greatly narrowing down the number of vulnerabilities, freeing up both information security and operations resources.

Additions to Senior Management
As previously announced Scott Devens joined Core as Senior Vice President of Field Operations, responsible for the Company’s Sales, Marketing, Consulting and Support operations. He brings nearly three decades of global management experience to Core and will help the company continue its growth in the Predictive Security Intelligence market and increasing market adoption of Core Insight Enterprise.

In addition to Scott, the company added a marketing veteran to its senior management team. Pat Walsh joined Core as Vice President of Marketing. Pat has more than twenty years of experience in the infrastructure software industry and success in defining and building go-to-market strategies for new offerings. Most recently, he was the Chief Marketing Officer of Talend, an open source provider of enterprise integration solutions.

The company also enhanced its Sales Leadership with the additional of Mike Parise, Vice President North American Sales. Mike comes to Core with 30-plus years of sales, marketing, and business development experience with both Fortune 1000 companies and startups.

New Board Members
The company also announced that it has added two new members to its Board of Directors. Steve Munford has joined the board; he is currently the Non-Executive Chairman at Sophos. He served as Sophos’ CEO from 2006 to 2012, and during that time, led the company through a period of dramatic growth, more than tripling bookings.

Alfred Huger has also joined the Company’s Board of Directors. Mr. Huger has held technical executive roles in the computer and network security industry. He is a three-time veteran of launching successful start-up companies which were then sold into larger security companies. Huger has extensive experience with endpoint security software, cloud based services (SaaS), big data analytics platforms and managed security services. He was most recently the VP of Development at Sourcefire in charge of product delivery for their Advanced Malware Group.

Partner and International Expansion
During 2103, Core continued to build on its existing partnerships with notable accomplishments such as: joining the McAfee Security Innovation Alliance (SIA) program, achieving full integration between Core Insight Enterprise and MacAfee ePolicy orchestrator (ePo) and McAfee’s Vulnerability Manager. Core was also selected as a 5-star channel program by the CRN Partner Program Guide. The company continued to develop its channel program and focus, and built on the success of its Core Secured® Partner Program, by adding 37 new partners from the U.S., Europe and Latin America. These new and existing partners drove approximately 50 percent of Core’s 2013 global bookings.

“Indirect channels are of strategic importance to our growth plans,” said Scott Devens, Senior Vice President of Field Operations. “The selection of new partners has allowed us to materially increase our presence in Central Europe, Eastern Europe and the Middle East. We continue to see increased demand for the Company’s Impact Pro offering in these markets along with increased opportunities for our Attack Intelligence Platform.”

Other News

Industry Recognition
In February of 2014, Core Insight Enterprise was awarded 5-Star Review from SC Magazine. Core Impact Pro again received industry accolades and awards including an SC Magazine 5-Star Review with an honored “Lab Approved” designation. The company’s solutions were included in several industry analyst reports during the year, and Core was also named to the Inc. 5000 listing in 2013.

Security Research Leadership
CoreLabs security researchers continued to drive advanced research and exploit development. During the past year, CoreLabs discovered and issued two dozen vulnerability outbreak advisories. These advisories provided relevant details that allowed vendors to develop patches to remediate potential security issues within products from companies like: SAP, Microsoft, Sophos, VMWare, and several surveillance devices vendors. In parallel, CoreLabs’ team of exploit writers researched and developed hundreds of exploits. Core’s researchers have now identified more than 3,200 methods to attack various elements of a target IT infrastructure, providing customers with the means to duplicate real-world attacks and pinpoint problems within their IT infrastructure. CoreLabs experts presented at several industry events including: Black Hat, RSA, Hack.Lu, Eko Party, EUSec West, BRUCON, and AppSec LATAM, among others.

About Core Security
Core Security provides the industry’s first comprehensive Attack Intelligence Platform. With Core Security, enterprises can focus on the most likely threats to their critical business assets by modeling, simulating and testing what an actual attacker would do. Core Security helps more than 1,400 customers worldwide identify the most vulnerable areas of their IT environments to improve the effectiveness of remediation efforts and ultimately secure the business. Our patented, proven, award-winning enterprise products and solutions are backed by more than 15 years of applied expertise from Core Labs research and Core Security Consulting Services. For more information, visit www.coresecurity.com.

Core Security Technologies, Core Security, Core Impact, Core Insight, and Core Secured are registered trademarks of CORE SDI, Inc. in the United States and/or other countries. All other organizations referenced within this document are trademarks and/or registered trademarks of their respective companies.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
The use of containers by developers -- and now increasingly IT operators -- has grown from infatuation to deep and abiding love. But as with any long-term affair, the honeymoon soon leads to needing to live well together ... and maybe even getting some relationship help along the way. And so it goes with container orchestration and automation solutions, which are rapidly emerging as the means to maintain the bliss between rapid container adoption and broad container use among multiple cloud host...
Blockchain is a shared, secure record of exchange that establishes trust, accountability and transparency across business networks. Supported by the Linux Foundation's open source, open-standards based Hyperledger Project, Blockchain has the potential to improve regulatory compliance, reduce cost as well as advance trade. Are you curious about how Blockchain is built for business? In her session at 21st Cloud Expo, René Bostic, Technical VP of the IBM Cloud Unit in North America, discussed the b...
Blockchain. A day doesn’t seem to go by without seeing articles and discussions about the technology. According to PwC executive Seamus Cushley, approximately $1.4B has been invested in blockchain just last year. In Gartner’s recent hype cycle for emerging technologies, blockchain is approaching the peak. It is considered by Gartner as one of the ‘Key platform-enabling technologies to track.’ While there is a lot of ‘hype vs reality’ discussions going on, there is no arguing that blockchain is b...
Imagine if you will, a retail floor so densely packed with sensors that they can pick up the movements of insects scurrying across a store aisle. Or a component of a piece of factory equipment so well-instrumented that its digital twin provides resolution down to the micrometer.
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
ChatOps is an emerging topic that has led to the wide availability of integrations between group chat and various other tools/platforms. Currently, HipChat is an extremely powerful collaboration platform due to the various ChatOps integrations that are available. However, DevOps automation can involve orchestration and complex workflows. In his session at @DevOpsSummit at 20th Cloud Expo, Himanshu Chhetri, CTO at Addteq, will cover practical examples and use cases such as self-provisioning infra...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory? In her Day 2 Keynote at @DevOpsSummit at 21st Cloud Expo, Aruna Ravichandran, VP, DevOps Solutions Marketing, CA Technologies, was jo...
"Since we launched LinuxONE we learned a lot from our customers. More than anything what they responded to were some very unique security capabilities that we have," explained Mark Figley, Director of LinuxONE Offerings at IBM, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
The cloud era has reached the stage where it is no longer a question of whether a company should migrate, but when. Enterprises have embraced the outsourcing of where their various applications are stored and who manages them, saving significant investment along the way. Plus, the cloud has become a defining competitive edge. Companies that fail to successfully adapt risk failure. The media, of course, continues to extol the virtues of the cloud, including how easy it is to get there. Migrating...
Nordstrom is transforming the way that they do business and the cloud is the key to enabling speed and hyper personalized customer experiences. In his session at 21st Cloud Expo, Ken Schow, VP of Engineering at Nordstrom, discussed some of the key learnings and common pitfalls of large enterprises moving to the cloud. This includes strategies around choosing a cloud provider(s), architecture, and lessons learned. In addition, he covered some of the best practices for structured team migration an...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and B...
No hype cycles or predictions of a gazillion things here. IoT is here. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, an Associate Partner of Analytics, IoT & Cybersecurity at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He also discussed the evaluation of communication standards and IoT messaging protocols, data...