|By Marketwired .||
|May 5, 2014 07:00 AM EDT||
MENLO PARK, CA -- (Marketwired) -- 05/05/14 -- Area 1 Security, a security startup led by three former NSA leaders, today revealed it raised $2.5 million in seed funding. Area 1 Security is the first to deliver a security solution that eliminates targeted social engineering attacks by focusing on behavioral patterns of delivery systems. The company will use the funds to further develop and scale its threat intelligence product.
Investors in Area 1 Security's seed round include a range of security heavyweights and enterprise experts including, Ted Schlein, Kleiner Perkins Caufield & Byers; Cowboy Ventures; Data Collective (DCVC); First Round Capital; Allegis Capital; RedSeal Networks CEO and former Venrock partner Ray Rothrock; and Shape Security CEO Derek Smith.
Unlike most security companies that are focused on remediation following a cyber attack, Area 1 Security's solution uniquely addresses the first phase of targeted attacks that go after users, which currently goes unguarded. Founder and CEO Oren Falkowitz developed a team of former National Security Agency (NSA) officers, who previously focused on the intersection of computer network operations and big data analytics, to give Area 1 Security a unique advantage to deconstruct attacks. The three founders met while working at the NSA and together solved some of the most challenging security and data problems. After the NSA they held various positions at technology companies and gained commercial experience that helped them further identify the need for a threat intelligence system that leverages data gathered from behavioral patterns to prevent future attacks.
"Our team has worked on the cutting edge of data analytics and cyber security, delivering threat intelligence on some of the most sophisticated, targeted and prolific actors," said Falkowitz. "With this seed round, Area 1 Security will continue to develop and perfect our disruptive technology focused to eliminate targeted, socially engineered cyber attacks."
As the sensationalism around cyber attacks and data breaches increases, so does the cost of attacks against businesses. The average time to resolve an attack is 32 days, costing an average of $1,035,769 -- which translates to $32,469 per day. As a result, executives are losing their jobs and companies are scrambling for proper and effective security solutions. In 2013 alone, the median number of days attackers were present on a victim network before they were discovered was 229 days. And a phishing campaign of only ten messages saw a better than 90 percent chance of getting a click. Attackers are attaining better and faster results at a higher rate than defenders are improving their trade, yet enterprise solutions are regulated to clean up attacks rather than prevent them.
Waiting until an attack has reached its target, and relying on unspecific, untimely, and inaccurate information, enterprises are forced to investigate threats rather than take action limiting defense options. The difference in Area 1 Security's approach is the focus on strategic campaign behavior rather than tool mechanics to recognize attacks on the horizon. This results in the company receiving highly accurate data, with low false positives, which allows enterprises to efficiently utilize resources and act to prevent the next big attack.
"Area 1 Security's technology proactively identifies both known and unknown infection vectors before they impact your business," said Derek Smith, CEO of Shape Security. "Their unique threat intelligence approach gives companies a critical window of opportunity to prevent attacks, potentially saving enterprises millions of dollars. Combining Shape Security's product to protect web applications with Area 1 Security's technology to protect employees is a more powerful and complete solution than the industry has ever had."
About Area 1 Security
Based in Menlo Park, CA, Area 1 Security is developing threat intelligence product focused on eliminating targeted, socially engineered cyber attacks. Area 1 Security was founded by CEO Oren Falkowitz, security experts from NSA and MIT, and data analytics specialists from NSA and Disney. For more information, visit www.area1security.com.
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Feb. 26, 2017 05:00 AM EST Reads: 4,830
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet and...
Feb. 26, 2017 03:45 AM EST Reads: 8,490
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
Feb. 26, 2017 03:15 AM EST Reads: 2,016
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Feb. 26, 2017 03:00 AM EST Reads: 2,752
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 26, 2017 02:30 AM EST Reads: 13,718
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...
Feb. 26, 2017 02:30 AM EST Reads: 2,335
Feb. 26, 2017 02:00 AM EST Reads: 4,775
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Feb. 26, 2017 01:45 AM EST Reads: 6,216
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations might...
Feb. 26, 2017 01:30 AM EST Reads: 5,219
Zerto exhibited at SYS-CON's 18th International Cloud Expo®, which took place at the Javits Center in New York City, NY, in June 2016. Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing innovative, simple, reliable and scalable business continuity software solutions. Through the Zerto Cloud Continuity Platform™, organizations can seamlessly move and protect virtualized workloads between public, private and hybrid clouds. The company’s flagship product, Zerto Virtual...
Feb. 26, 2017 01:15 AM EST Reads: 1,742
Some people worry that OpenStack is more flash then substance; however, for many customers this could not be farther from the truth. No other technology equalizes the playing field between vendors while giving your internal teams better access than ever to infrastructure when they need it. In his session at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, will talk through some real-world OpenStack deployments and look into the ways this can benefit customers of all sizes....
Feb. 26, 2017 12:00 AM EST Reads: 1,497
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Feb. 25, 2017 10:45 PM EST Reads: 8,593
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Feb. 25, 2017 10:30 PM EST Reads: 1,871
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackIQ...
Feb. 25, 2017 09:45 PM EST Reads: 9,327
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
Feb. 25, 2017 09:00 PM EST Reads: 9,134