News Feed Item

Vorstack Announces $5.2 Million Funding Round

Funds Used to Scale Automation and Control Platform for Enterprise Collaboration

LOS ALTOS, CA -- (Marketwired) -- 04/29/14 -- Vorstack, the provider of a new breed of enterprise security products, announced a $5.2 million round of funding today. The financing round, led by Glenn McGonnigle and Tom Noonan of TechOperators, includes participation by security leader EMC Ventures as well as funding from previous Vorstack investor Aligned Partners.

Enterprises report that it costs upwards of $3,000,000 to defend against a $1500 attack. Vorstack offers information security professionals dramatic improvements in the time and cost it takes to identify and remediate salient threats. By using secure threat collaboration coupled with sophisticated automatic threat analysis, Vorstack's platform speeds discovery time and reduces the risk of cybersecurity threats.

"The cyber criminals are coordinating their attacks using the latest technologies," said Joe Eandi, CEO of Vorstack. "Enterprises are using Vorstack to effectively coordinate defenses by overcoming the automation, regulatory and business process hurdles that prevented effective collaboration in the past."

"With the recent security nightmare of the Heartbleed situation, and all of the recent data breaches in which millions of people have had their credentials stolen, I am happy to see a company like Vorstack emerging who is focused on automating the analysis of threat and fraud intelligence and enabling collaboration across industries," said Jon Oltsik, senior analyst, Enterprise Strategy Group. "The more security information that can be automatically absorbed and shared by a company's IT department, the better they will be at staying one step ahead of the bad guys and protecting their assets."

"Companies across all industries are beginning to understand the need to collaborate in their defense against cyber-threats," said Glenn McGonnigle, General Partner of TechOperators and new Vorstack board member. "We believe Vorstack's real time analysis and analytics enabling companies to automate and secure effective and private collaboration is game changing for cyber-security."

About Vorstack
Vorstack provides a coordinated defense against a coordinated offense for enterprise cyber-security. The Vorstack automation and collaboration platform dramatically reduces the time it takes enterprises to identify and remediate security threats. Vorstack enables secure and anonymous collaboration and ensures control and protection of shared information. Vorstack reduces discovery time, remediation time, and overall risk to cyber-threats. For more information, visit www.vorstack.com.

About TechOperators
An early-stage venture capital firm, TechOperators was founded on the premise that proven operators make the best partners for technology entrepreneurs. Based in Atlanta, Georgia, the firm is led by an expert team of partners with decades of hard-fought operating success and experience founding, building and running world-class venture backed software companies. For more information visit www.techoperators.com.

About Aligned Partners
Aligned Partners is an early-stage venture fund focused on highly capital-efficient companies in the enterprise mobile and cloud computing sectors. Founded by experienced investors with deep venture and operating backgrounds, Aligned Partners helps its portfolio companies achieve tight product-market fit, clear value propositions, rapid growth, and strong company-investor alignment. Aligned Partners is based in Menlo Park, California.

Media Contact
Rich Mullikin, APR
Mobile: +1 925 354 7444
Email: Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
The Open Connectivity Foundation (OCF), sponsor of the IoTivity open source project, and AllSeen Alliance, which provides the AllJoyn® open source IoT framework, today announced that the two organizations’ boards have approved a merger under the OCF name and bylaws. This merger will advance interoperability between connected devices from both groups, enabling the full operating potential of IoT and representing a significant step towards a connected ecosystem.
Kubernetes, Docker and containers are changing the world, and how companies are deploying their software and running their infrastructure. With the shift in how applications are built and deployed, new challenges must be solved. In his session at @DevOpsSummit at19th Cloud Expo, Sebastian Scheele, co-founder of Loodse, will discuss the implications of containerized applications/infrastructures and their impact on the enterprise. In a real world example based on Kubernetes, he will show how to ...
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...
Enterprises have been using both Big Data and virtualization for years. Until recently, however, most enterprises have not combined the two. Big Data's demands for higher levels of performance, the ability to control quality-of-service (QoS), and the ability to adhere to SLAs have kept it on bare metal, apart from the modern data center cloud. With recent technology innovations, we've seen the advantages of bare metal erode to such a degree that the enhanced flexibility and reduced costs that cl...
SYS-CON Events announced today that Embotics, the cloud automation company, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Embotics is the cloud automation company for IT organizations and service providers that need to improve provisioning or enable self-service capabilities. With a relentless focus on delivering a premier user experience and unmatched customer support, Embotics is the fas...
SYS-CON Events announced today that Cloudbric, a leading website security provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Cloudbric is an elite full service website protection solution specifically designed for IT novices, entrepreneurs, and small and medium businesses. First launched in 2015, Cloudbric is based on the enterprise level Web Application Firewall by Penta Security Sys...
Intelligent machines are here. Robots, self-driving cars, drones, bots and many IoT devices are becoming smarter with Machine Learning. In her session at @ThingsExpo, Sudha Jamthe, CEO of IoTDisruptions.com, will discuss the next wave of business disruption at the junction of IoT and AI, impacting many industries and set to change our lives, work and world as we know it.
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
Governments around the world are adopting Safe Harbor privacy provisions to protect customer data from leaving sovereign territories. Increasingly, global companies are required to create new instances of their server clusters in multiple countries to keep abreast of these new Safe Harbor laws. Is it worth it? In his session at 19th Cloud Expo, Adam Rogers, Managing Director of Anexia, Inc., will discuss how to keep your data legal and still stay in business.
In his session at 19th Cloud Expo, Nick Son, Vice President of Cyber Risk & Public Sector at Coalfire, will discuss the latest information on the FedRAMP Program. Topics will cover: FedRAMP Readiness Assessment Report (RAR). This new process is designed to streamline and accelerate the FedRAMP process from the traditional timeline by initially focusing on technical capability instead of documentation preparedness. FedRAMP for High-impact level systems. Early in 2016 FedRAMP officially publishe...
SYS-CON Events announced today that Impiger Technologies will exhibit in Booth #109 at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Impiger Technologies is a world-class, enterprise software product engineering company specializing in Mobile Application Development, Cloud Applications, Microsoft Technology Solutions, Web Technology and Telecom Services. Impiger Technologies helps enterprises improve busi...
Qosmos, the market leader for IP traffic classification and network intelligence technology, has announced that it will launch the Launch L7 Viewer at CloudExpo | @ThingsExpo Silicon Valley, being held November 1 – 3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The L7 Viewer is a traffic analysis tool that provides complete visibility of all network traffic that crosses a virtualized infrastructure, up to Layer 7. It facilitates and accelerates common IT tasks such as VM migra...
In the 21st century, security on the Internet has become one of the most important issues. We hear more and more about cyber-attacks on the websites of large corporations, banks and even small businesses. When online we’re concerned not only for our own safety but also our privacy. We have to know that hackers usually start their preparation by investigating the private information of admins – the habits, interests, visited websites and so on. On the other hand, our own security is in danger bec...
As companies adopt the cloud-to-streamline workflow, deployment hasn’t been very seamless because of IT concerns surrounding security risks. The cloud offers many benefits, but protecting and securing information can be tricky across multiple cloud providers and remains IT’s overall responsibility. In his session at 19th Cloud Expo, Simon Bain, CEO of SearchYourCloud, will address security compliance issues associated with cloud applications and how document-level encryption is critical for sup...