SUBSCRIBE TO TMCnet
TMCnet - World's Largest Communications and Technology Community

CHANNEL BY TOPICS


QUICK LINKS




Wheelings & Dealings: Enterprise Security Startup ThreatStream Receives $4M in Series A Funding

TMCnet Feature

February 24, 2014

Wheelings & Dealings: Enterprise Security Startup ThreatStream Receives $4M in Series A Funding

Share
Tweet
By Michael Guta
TMCnet Contributing Writer

While digital technologies and the Internet have introduced many new opportunities and solutions for improving levels of efficiency and productivity, they have also opened enterprises to increasingly more dangerous threats from around the world. According to preliminary investigations of the Target (News - Alert) security breach that took place during the Christmas holiday season of 2013, a Russian teenager may have been responsible for compromising the financial information of 40 million customers of the national retailer. This event and others like it highlight the need to look at enterprise security threats with new perspectives and provide solutions capable of preventing massive losses of valuable data.


ThreatStream, an enterprise security startup that provides real-time awareness of the external threat landscape, has received $4 million in Series A funding from Google Ventures, Paladin Capital Group, Cloudera CEO Tom Reilly, and ArcSight (News - Alert) founder Hugh Njemanze.

The company has been building a reputation for providing reliable security solutions and generating revenue during its early stage of development.

Threat Stream runs in the cloud and it is a SaaS (News - Alert) provider of cyber threat intelligence that aggregates millions of threat indicators focusing on mining, normalization, integration and validation of threat data. By addressing this portion of enterprise threat, it allows organizations to use their own security solutions to be ready for what is about to take place. If the companies know what is about to happen, the security solutions they have in place are more than capable to stop the attacks.

The traditional way of securing networks can be seen as building moats around a castle and waiting for the attacks to take place. While this defensive tactic has served castles well in the past, networks have many points of entry in which they can be exploited. The Threat Stream solution looks at the entire Internet environment with an open API that validates and scores threats so it can be used by enterprise risk and threat management platforms into actionable intelligence.

This allows organizations to analyze whether there is a correlation between the threats and an actual attack so more effective and proactive data protection decisions can be made.

New security solutions in today's cloud driven environment have to take into consideration the computing capability hackers are able to harness in order to overcome security systems. That is why the resources they use have to be identified and to take countermeasures to stop the attacks before they actually take place.




Edited by Alisen Downey


View all articles


Comments powered by Disqus








Technology Marketing Corporation

2 Trap Falls Road Suite 106, Shelton, CT 06484 USA
Ph: +1-203-852-6800, 800-243-6002

General comments: [email protected].
Comments about this site: [email protected].

STAY CURRENT YOUR WAY

© 2024 Technology Marketing Corporation. All rights reserved | Privacy Policy