Click here to close now.


News Feed Item

Core Security Reports Strong First Quarter Results as Demand for Attack Intelligence Solutions Heats Up

Core Security, the leading provider of attack intelligence solutions, reported strong results for its first fiscal quarter of 2014. Building off a successful finish to 2013, the company continues to gain traction with its Attack Intelligence Platform, an enterprise solution for proactively addressing security threats, enabling customers to protect their most critical business assets from hackers by “Thinking Like an Attacker™.” Over the last six months, Core has added new senior management, strategic partnerships and international channels to address increasing worldwide demand for more proactive information security solutions at a time when significant security breaches are on the rise. To further steward the Company’s rapid growth, Core also announced the appointment of industry veterans Steve Munford and Alfred Huger to the Board of Directors.

Financial Highlights
For the first quarter of fiscal 2014, Core reported more than 90 percent growth in new product sales on a year-over-year comparison. The company’s Core Impact Professional sales grew more than 50 percent, and Core Insight Enterprise sales grew more than 300 percent as compared with the first quarter of 2013. For the first quarter of fiscal 2014, Core also achieved its spending and profitability targets. While Insight sales are increasing, renewal rates for Core Impact remain above the industry standard. The company continues to add marquee, Fortune 500 companies to its already impressive list of installed base customers and has seen increased demand for its Attack Intelligence Platform.

“We had a solid start to our fiscal 2014 with a strong Q1. The first quarter results were very good, but more importantly, we are seeing more of our customers adopt our solutions as key elements of their overall security posture,” said Mark Hatton, President and CEO of Core Security. “As we engage with our customers and prospects, we hear the requirement for a set of solutions focused on proactively addressing a company’s security vulnerability. Looking in the ‘rearview mirror’ is not acceptable with today’s sophisticated cyber-attacks. We view our customers through the lenses of the attacker, providing an integrated enterprise security solution set allowing our customers to be not only predictive, but more importantly, proactive.”

Core’s Innovative Solutions – Attack Intelligence Platform
Core strengthened its position in 2013, extending its domain expertise and launching its Attack Intelligence Platform. This extensible platform allows information security professionals to Think Like An Attacker™ by proactively addressing security threats based on real attacks that hackers use. Backed by more than 15 years of applied expertise and focus on attacker behavior, the platform combines the capabilities of Core Security Consulting Services (SCS), Core Impact Pro and Core Insight. Using Core’s patented attack path planner and engine to simulate attacks and conduct live tests, security professionals can associate known threats, vulnerabilities and attack patterns with security and network data to identify potential attack paths to critical business assets.

While traditional vulnerability management solutions often produce thousands of “high severity” vulnerabilities for the operations staff to fix, attack intelligence adjusts prioritization based on the systems that are part of these paths and the assets they put at risk. This makes the remediation process more effective, greatly narrowing down the number of vulnerabilities, freeing up both information security and operations resources.

Additions to Senior Management
As previously announced Scott Devens joined Core as Senior Vice President of Field Operations, responsible for the Company’s Sales, Marketing, Consulting and Support operations. He brings nearly three decades of global management experience to Core and will help the company continue its growth in the Predictive Security Intelligence market and increasing market adoption of Core Insight Enterprise.

In addition to Scott, the company added a marketing veteran to its senior management team. Pat Walsh joined Core as Vice President of Marketing. Pat has more than twenty years of experience in the infrastructure software industry and success in defining and building go-to-market strategies for new offerings. Most recently, he was the Chief Marketing Officer of Talend, an open source provider of enterprise integration solutions.

The company also enhanced its Sales Leadership with the additional of Mike Parise, Vice President North American Sales. Mike comes to Core with 30-plus years of sales, marketing, and business development experience with both Fortune 1000 companies and startups.

New Board Members
The company also announced that it has added two new members to its Board of Directors. Steve Munford has joined the board; he is currently the Non-Executive Chairman at Sophos. He served as Sophos’ CEO from 2006 to 2012, and during that time, led the company through a period of dramatic growth, more than tripling bookings.

Alfred Huger has also joined the Company’s Board of Directors. Mr. Huger has held technical executive roles in the computer and network security industry. He is a three-time veteran of launching successful start-up companies which were then sold into larger security companies. Huger has extensive experience with endpoint security software, cloud based services (SaaS), big data analytics platforms and managed security services. He was most recently the VP of Development at Sourcefire in charge of product delivery for their Advanced Malware Group.

Partner and International Expansion
During 2103, Core continued to build on its existing partnerships with notable accomplishments such as: joining the McAfee Security Innovation Alliance (SIA) program, achieving full integration between Core Insight Enterprise and MacAfee ePolicy orchestrator (ePo) and McAfee’s Vulnerability Manager. Core was also selected as a 5-star channel program by the CRN Partner Program Guide. The company continued to develop its channel program and focus, and built on the success of its Core Secured® Partner Program, by adding 37 new partners from the U.S., Europe and Latin America. These new and existing partners drove approximately 50 percent of Core’s 2013 global bookings.

“Indirect channels are of strategic importance to our growth plans,” said Scott Devens, Senior Vice President of Field Operations. “The selection of new partners has allowed us to materially increase our presence in Central Europe, Eastern Europe and the Middle East. We continue to see increased demand for the Company’s Impact Pro offering in these markets along with increased opportunities for our Attack Intelligence Platform.”

Other News

Industry Recognition
In February of 2014, Core Insight Enterprise was awarded 5-Star Review from SC Magazine. Core Impact Pro again received industry accolades and awards including an SC Magazine 5-Star Review with an honored “Lab Approved” designation. The company’s solutions were included in several industry analyst reports during the year, and Core was also named to the Inc. 5000 listing in 2013.

Security Research Leadership
CoreLabs security researchers continued to drive advanced research and exploit development. During the past year, CoreLabs discovered and issued two dozen vulnerability outbreak advisories. These advisories provided relevant details that allowed vendors to develop patches to remediate potential security issues within products from companies like: SAP, Microsoft, Sophos, VMWare, and several surveillance devices vendors. In parallel, CoreLabs’ team of exploit writers researched and developed hundreds of exploits. Core’s researchers have now identified more than 3,200 methods to attack various elements of a target IT infrastructure, providing customers with the means to duplicate real-world attacks and pinpoint problems within their IT infrastructure. CoreLabs experts presented at several industry events including: Black Hat, RSA, Hack.Lu, Eko Party, EUSec West, BRUCON, and AppSec LATAM, among others.

About Core Security
Core Security provides the industry’s first comprehensive Attack Intelligence Platform. With Core Security, enterprises can focus on the most likely threats to their critical business assets by modeling, simulating and testing what an actual attacker would do. Core Security helps more than 1,400 customers worldwide identify the most vulnerable areas of their IT environments to improve the effectiveness of remediation efforts and ultimately secure the business. Our patented, proven, award-winning enterprise products and solutions are backed by more than 15 years of applied expertise from Core Labs research and Core Security Consulting Services. For more information, visit

Core Security Technologies, Core Security, Core Impact, Core Insight, and Core Secured are registered trademarks of CORE SDI, Inc. in the United States and/or other countries. All other organizations referenced within this document are trademarks and/or registered trademarks of their respective companies.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Chris Van Tuin, Chief Technologist for the Western US at Red Hat, has over 20 years of experience in IT and Software. Since joining Red Hat in 2005, he has been architecting solutions for strategic customers and partners with a focus on emerging technologies including IaaS, PaaS, and DevOps. He started his career at Intel in IT and Managed Hosting followed by leadership roles in services and sales engineering at Loudcloud and Linux startups.
The cloud has reached mainstream IT. Those 18.7 million data centers out there (server closets to corporate data centers to colocation deployments) are moving to the cloud. In his session at 17th Cloud Expo, Achim Weiss, CEO & co-founder of ProfitBricks, will share how two companies – one in the U.S. and one in Germany – are achieving their goals with cloud infrastructure. More than a case study, he will share the details of how they prioritized their cloud computing infrastructure deployments ...
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, will introduce the technologies required for implementing thes...
Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of, and Fred Yatzeck, principal architect leading product development at, discussed how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at th...
Overgrown applications have given way to modular applications, driven by the need to break larger problems into smaller problems. Similarly large monolithic development processes have been forced to be broken into smaller agile development cycles. Looking at trends in software development, microservices architectures meet the same demands. Additional benefits of microservices architectures are compartmentalization and a limited impact of service failure versus a complete software malfunction....
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, al...
Data loss happens, even in the cloud. In fact, if your company has adopted a cloud application in the past three years, data loss has probably happened, whether you know it or not. In his session at 17th Cloud Expo, Bryan Forrester, Senior Vice President of Sales at eFolder, will present how common and costly cloud application data loss is and what measures you can take to protect your organization from data loss.
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
The web app is agile. The REST API is agile. The testing and planning are agile. But alas, data infrastructures certainly are not. Once an application matures, changing the shape or indexing scheme of data often forces at best a top down planning exercise and at worst includes schema changes that force downtime. The time has come for a new approach that fundamentally advances the agility of distributed data infrastructures. Come learn about a new solution to the problems faced by software organ...
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
Interested in leveraging automation technologies and a cloud architecture to make developers more productive? Learn how PaaS can benefit your organization to help you streamline your application development, allow you to use existing infrastructure and improve operational efficiencies. Begin charting your path to PaaS with OpenShift Enterprise.
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
“In the past year we've seen a lot of stabilization of WebRTC. You can now use it in production with a far greater degree of certainty. A lot of the real developments in the past year have been in things like the data channel, which will enable a whole new type of application," explained Peter Dunkley, Technical Director at Acision, in this interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at DevOps Summit, Bryan Cantrill, CTO at Joyent, will demonstrate a third path: containers on multi-tenant bare metal that maximizes performance, security, and networking connectivity.