Click here to close now.




















Welcome!

News Feed Item

Area 1 Security Raises $2.5 Million for Threat Intelligence Mission

Seed Round Brings Together Influential Security Leaders and Big Data Visionaries

MENLO PARK, CA -- (Marketwired) -- 05/05/14 -- Area 1 Security, a security startup led by three former NSA leaders, today revealed it raised $2.5 million in seed funding. Area 1 Security is the first to deliver a security solution that eliminates targeted social engineering attacks by focusing on behavioral patterns of delivery systems. The company will use the funds to further develop and scale its threat intelligence product.

Investors in Area 1 Security's seed round include a range of security heavyweights and enterprise experts including, Ted Schlein, Kleiner Perkins Caufield & Byers; Cowboy Ventures; Data Collective (DCVC); First Round Capital; Allegis Capital; RedSeal Networks CEO and former Venrock partner Ray Rothrock; and Shape Security CEO Derek Smith.

Unlike most security companies that are focused on remediation following a cyber attack, Area 1 Security's solution uniquely addresses the first phase of targeted attacks that go after users, which currently goes unguarded. Founder and CEO Oren Falkowitz developed a team of former National Security Agency (NSA) officers, who previously focused on the intersection of computer network operations and big data analytics, to give Area 1 Security a unique advantage to deconstruct attacks. The three founders met while working at the NSA and together solved some of the most challenging security and data problems. After the NSA they held various positions at technology companies and gained commercial experience that helped them further identify the need for a threat intelligence system that leverages data gathered from behavioral patterns to prevent future attacks.

"Our team has worked on the cutting edge of data analytics and cyber security, delivering threat intelligence on some of the most sophisticated, targeted and prolific actors," said Falkowitz. "With this seed round, Area 1 Security will continue to develop and perfect our disruptive technology focused to eliminate targeted, socially engineered cyber attacks."

As the sensationalism around cyber attacks and data breaches increases, so does the cost of attacks against businesses. The average time to resolve an attack is 32 days, costing an average of $1,035,769 -- which translates to $32,469 per day. As a result, executives are losing their jobs and companies are scrambling for proper and effective security solutions. In 2013 alone, the median number of days attackers were present on a victim network before they were discovered was 229 days. And a phishing campaign of only ten messages saw a better than 90 percent chance of getting a click. Attackers are attaining better and faster results at a higher rate than defenders are improving their trade, yet enterprise solutions are regulated to clean up attacks rather than prevent them.

Waiting until an attack has reached its target, and relying on unspecific, untimely, and inaccurate information, enterprises are forced to investigate threats rather than take action limiting defense options. The difference in Area 1 Security's approach is the focus on strategic campaign behavior rather than tool mechanics to recognize attacks on the horizon. This results in the company receiving highly accurate data, with low false positives, which allows enterprises to efficiently utilize resources and act to prevent the next big attack.

"Area 1 Security's technology proactively identifies both known and unknown infection vectors before they impact your business," said Derek Smith, CEO of Shape Security. "Their unique threat intelligence approach gives companies a critical window of opportunity to prevent attacks, potentially saving enterprises millions of dollars. Combining Shape Security's product to protect web applications with Area 1 Security's technology to protect employees is a more powerful and complete solution than the industry has ever had."

About Area 1 Security
Based in Menlo Park, CA, Area 1 Security is developing threat intelligence product focused on eliminating targeted, socially engineered cyber attacks. Area 1 Security was founded by CEO Oren Falkowitz, security experts from NSA and MIT, and data analytics specialists from NSA and Disney. For more information, visit www.area1security.com.

Media Contact
Megan Grasty
(415) 963-4174x26
megan(at)highwirepr(dot)com

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
SYS-CON Events announced today the Containers & Microservices Bootcamp, being held November 3-4, 2015, in conjunction with 17th Cloud Expo, @ThingsExpo, and @DevOpsSummit at the Santa Clara Convention Center in Santa Clara, CA. This is your chance to get started with the latest technology in the industry. Combined with real-world scenarios and use cases, the Containers and Microservices Bootcamp, led by Janakiram MSV, a Microsoft Regional Director, will include presentations as well as hands-on...
Cloud and datacenter migration innovator AppZero has joined the Microsoft Enterprise Cloud Alliance Program. AppZero is a fast, flexible way to move Windows Server applications from any source machine – physical or virtual – to any destination server, in any cloud or datacenter, using its patented container technology. AppZero’s container is also called a Virtual Application Appliance (VAA). To facilitate Microsoft Azure onboarding, AppZero has two purpose-built offerings: AppZero SP for Azure,...
Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers across a variety of industries. To defend against exploits like these, a company must adopt a comprehensive security defense strategy that is designed for their business. In 2015, organizations such as United Airlines, Sony...
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
Consumer IoT applications provide data about the user that just doesn’t exist in traditional PC or mobile web applications. This rich data, or “context,” enables the highly personalized consumer experiences that characterize many consumer IoT apps. This same data is also providing brands with unprecedented insight into how their connected products are being used, while, at the same time, powering highly targeted engagement and marketing opportunities. In his session at @ThingsExpo, Nathan Trel...
IBM’s Blue Box Cloud, powered by OpenStack, is now available in any of IBM’s globally integrated cloud data centers running SoftLayer infrastructure. Less than 90 days after its acquisition of Blue Box, IBM has integrated its Blue Box Cloud Dedicated private-cloud-as-a-service into its broader portfolio of OpenStack® based solutions. The announcement, made today at the OpenStack Silicon Valley event, further highlights IBM’s continued support to deliver OpenStack solutions across all cloud depl...
Red Hat is investing in Tesora, the number one contributor to OpenStack Trove Database as a Service (DBaaS) also ranked among the top 20 companies contributing to OpenStack overall. Tesora, the company bringing OpenStack Trove Database as a Service (DBaaS) to the enterprise, has announced that Red Hat and others have invested in the company as a part of Tesora's latest funding round. The funding agreement expands on the ongoing collaboration between Tesora and Red Hat, which dates back to Febr...
Everyone talks about continuous integration and continuous delivery but those are just two ends of the pipeline. In the middle of DevOps is continuous testing (CT), and many organizations are struggling to implement continuous testing effectively. After all, without continuous testing there is no delivery. And Lab-As-A-Service (LaaS) enhances the CT with dynamic on-demand self-serve test topologies. CT together with LAAS make a powerful combination that perfectly serves complex software developm...
With the proliferation of connected devices underpinning new Internet of Things systems, Brandon Schulz, Director of Luxoft IoT – Retail, will be looking at the transformation of the retail customer experience in brick and mortar stores in his session at @ThingsExpo. Questions he will address include: Will beacons drop to the wayside like QR codes, or be a proximity-based profit driver? How will the customer experience change in stores of all types when everything can be instrumented and a...
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes ab...
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ab...
WSM International, the pioneer and leader in server migration services, has announced an agreement with WHOA.com, a leader in providing secure public, private and hybrid cloud computing services. Under terms of the agreement, WSM will provide migration services to WHOA.com customers to relocate some or all of their applications, digital assets, and other computing workloads to WHOA.com enterprise-class, secure cloud infrastructure. The migration services include detailed evaluation and planning...
In today's digital world, change is the one constant. Disruptive innovations like cloud, mobility, social media, and the Internet of Things have reshaped the market and set new standards in customer expectations. To remain competitive, businesses must tap the potential of emerging technologies and markets through the rapid release of new products and services. However, the rigid and siloed structures of traditional IT platforms and processes are slowing them down – resulting in lengthy delivery ...
The Internet of Things (IoT) is about the digitization of physical assets including sensors, devices, machines, gateways, and the network. It creates possibilities for significant value creation and new revenue generating business models via data democratization and ubiquitous analytics across IoT networks. The explosion of data in all forms in IoT requires a more robust and broader lens in order to enable smarter timely actions and better outcomes. Business operations become the key driver of I...
Puppet Labs has announced the next major update to its flagship product: Puppet Enterprise 2015.2. This release includes new features providing DevOps teams with clarity, simplicity and additional management capabilities, including an all-new user interface, an interactive graph for visualizing infrastructure code, a new unified agent and broader infrastructure support.