Welcome!

News Feed Item

Area 1 Security Raises $2.5 Million for Threat Intelligence Mission

Seed Round Brings Together Influential Security Leaders and Big Data Visionaries

MENLO PARK, CA -- (Marketwired) -- 05/05/14 -- Area 1 Security, a security startup led by three former NSA leaders, today revealed it raised $2.5 million in seed funding. Area 1 Security is the first to deliver a security solution that eliminates targeted social engineering attacks by focusing on behavioral patterns of delivery systems. The company will use the funds to further develop and scale its threat intelligence product.

Investors in Area 1 Security's seed round include a range of security heavyweights and enterprise experts including, Ted Schlein, Kleiner Perkins Caufield & Byers; Cowboy Ventures; Data Collective (DCVC); First Round Capital; Allegis Capital; RedSeal Networks CEO and former Venrock partner Ray Rothrock; and Shape Security CEO Derek Smith.

Unlike most security companies that are focused on remediation following a cyber attack, Area 1 Security's solution uniquely addresses the first phase of targeted attacks that go after users, which currently goes unguarded. Founder and CEO Oren Falkowitz developed a team of former National Security Agency (NSA) officers, who previously focused on the intersection of computer network operations and big data analytics, to give Area 1 Security a unique advantage to deconstruct attacks. The three founders met while working at the NSA and together solved some of the most challenging security and data problems. After the NSA they held various positions at technology companies and gained commercial experience that helped them further identify the need for a threat intelligence system that leverages data gathered from behavioral patterns to prevent future attacks.

"Our team has worked on the cutting edge of data analytics and cyber security, delivering threat intelligence on some of the most sophisticated, targeted and prolific actors," said Falkowitz. "With this seed round, Area 1 Security will continue to develop and perfect our disruptive technology focused to eliminate targeted, socially engineered cyber attacks."

As the sensationalism around cyber attacks and data breaches increases, so does the cost of attacks against businesses. The average time to resolve an attack is 32 days, costing an average of $1,035,769 -- which translates to $32,469 per day. As a result, executives are losing their jobs and companies are scrambling for proper and effective security solutions. In 2013 alone, the median number of days attackers were present on a victim network before they were discovered was 229 days. And a phishing campaign of only ten messages saw a better than 90 percent chance of getting a click. Attackers are attaining better and faster results at a higher rate than defenders are improving their trade, yet enterprise solutions are regulated to clean up attacks rather than prevent them.

Waiting until an attack has reached its target, and relying on unspecific, untimely, and inaccurate information, enterprises are forced to investigate threats rather than take action limiting defense options. The difference in Area 1 Security's approach is the focus on strategic campaign behavior rather than tool mechanics to recognize attacks on the horizon. This results in the company receiving highly accurate data, with low false positives, which allows enterprises to efficiently utilize resources and act to prevent the next big attack.

"Area 1 Security's technology proactively identifies both known and unknown infection vectors before they impact your business," said Derek Smith, CEO of Shape Security. "Their unique threat intelligence approach gives companies a critical window of opportunity to prevent attacks, potentially saving enterprises millions of dollars. Combining Shape Security's product to protect web applications with Area 1 Security's technology to protect employees is a more powerful and complete solution than the industry has ever had."

About Area 1 Security
Based in Menlo Park, CA, Area 1 Security is developing threat intelligence product focused on eliminating targeted, socially engineered cyber attacks. Area 1 Security was founded by CEO Oren Falkowitz, security experts from NSA and MIT, and data analytics specialists from NSA and Disney. For more information, visit www.area1security.com.

Media Contact
Megan Grasty
(415) 963-4174x26
megan(at)highwirepr(dot)com

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
"Cloud computing is certainly changing how people consume storage, how they use it, and what they use it for. It's also making people rethink how they architect their environment," stated Brad Winett, Senior Technologist for DDN Storage, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
FinTechs use the cloud to operate at the speed and scale of digital financial activity, but are often hindered by the complexity of managing security and compliance in the cloud. In his session at 20th Cloud Expo, Sesh Murthy, co-founder and CTO of Cloud Raxak, showed how proactive and automated cloud security enables FinTechs to leverage the cloud to achieve their business goals. Through business-driven cloud security, FinTechs can speed time-to-market, diminish risk and costs, maintain continu...
CIOs and those charged with running IT Operations are challenged to deliver secure, audited, and reliable compute environments for the applications and data for the business. Behind the scenes these tasks are often accomplished by following onerous time-consuming processes and often the management of these environments and processes will be outsourced to multiple IT service providers. In addition, the division of work is often siloed into traditional "towers" that are not well integrated for cro...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
In his session at @ThingsExpo, Dr. Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, presented the findings of a series of six detailed case studies of how large corporations are implementing IoT. The session explored how IoT has improved their economic performance, had major impacts on business models and resulted in impressive ROIs. The companies covered span manufacturing and services firms. He also explored servicification, how manufacturing firms shift from se...
"I will be talking about ChatOps and ChatOps as a way to solve some problems in the DevOps space," explained Himanshu Chhetri, CTO of Addteq, in this SYS-CON.tv interview at @DevOpsSummit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of bus...
For better or worse, DevOps has gone mainstream. All doubt was removed when IBM and HP threw up their respective DevOps microsites. Where are we on the hype cycle? It's hard to say for sure but there's a feeling we're heading for the "Peak of Inflated Expectations." What does this mean for the enterprise? Should they avoid DevOps? Definitely not. Should they be cautious though? Absolutely. The truth is that DevOps and the enterprise are at best strange bedfellows. The movement has its roots in t...
Learn how to solve the problem of keeping files in sync between multiple Docker containers. In his session at 16th Cloud Expo, Aaron Brongersma, Senior Infrastructure Engineer at Modulus, discussed using rsync, GlusterFS, EBS and Bit Torrent Sync. He broke down the tools that are needed to help create a seamless user experience. In the end, can we have an environment where we can easily move Docker containers, servers, and volumes without impacting our applications? He shared his results so yo...