Application Security

12/29/2014
08:00 PM
Connect Directly
Twitter
Twitter
RSS
E-Mail

20 Startups To Watch In 2015

Check our list of security startups sure to start (or continue) making waves in the coming year.
20 of 21

vArmour
vArmour 
Founded: 2011 
What it does: 'Data-defined' perimeter security 
Latest funding: $21 million in Series C, August 2014 
Noteworthy player: Tim Eades (CEO) 
vArmour is another player meant to help the borderless enterprise with what it calls 'data-defined' perimeter security. Like others in this space, it hopes to provide better visibility and control of data no matter where it resides.
(Image: www.varmour.com)

vArmour

Founded: 2011

What it does: "Data-defined" perimeter security

Latest funding: $21 million in Series C, August 2014

Noteworthy player: Tim Eades (CEO)

vArmour is another player meant to help the borderless enterprise with what it calls "data-defined" perimeter security. Like others in this space, it hopes to provide better visibility and control of data no matter where it resides.

(Image: www.varmour.com)

20 of 21
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
SophieBOU
50%
50%
SophieBOU,
User Rank: Apprentice
1/14/2015 | 6:50:08 PM
Re: "Interesting" - perhaps. Startups?
The vast majority of startups don't "make it" within 3 years. Uber has been everyone's example of an especially successful startups until runins with regulation recently, so I'll use them as an example. They were founded in early 2009 and only got big last year, 5 years later. 

There's been much debate, but I'm most convinced by proponents of looking at whether any startup is truly doing something new and with limited resources (tech penchant not required).
GilesR588
50%
50%
GilesR588,
User Rank: Apprentice
1/14/2015 | 5:22:57 PM
3 words to address the world
what3words 

 

what3words is a giant grid of 57 trillion 3m x 3m squares that covers the entire globe.

 

Each square has been been given a 3 word address,  allowing people to find more accurately and communicate more quickly, any location on earth.

 

Poor addressing affects 75% of the world, over 135 counties. It is frustrating and costly in developed nations but life threatening and limits growth in developing ones. 
dnadir
50%
50%
dnadir,
User Rank: Apprentice
1/2/2015 | 4:54:57 PM
"Interesting" - perhaps. Startups?
I wish we had an agreed definition for "startups". Some of these companies are perhaps interesting, or "early stage" and some are what I'd consider successful leaders in a nascent space, but IMHO a "startup" is a new company with seed or perhaps new series A funding. A company 3+ years old with multiple rounds that is still small or a "startup" just sounds like they are struggling to me. 
varunopen
50%
50%
varunopen,
User Rank: Apprentice
1/2/2015 | 6:34:02 AM
Re: Vector Prevalence
very nice list of start ups
will.munroe
50%
50%
will.munroe,
User Rank: Apprentice
1/1/2015 | 9:15:57 AM
Re: Vector Prevalence
Ryan

There is no doubt Crowd Strike is a great product and it was a SINET winner.  They were next to Interset at the event.  As for application security - that is a crowded and fairly mature space, and Cloud Security is the opposite, nacent but it will have its day.  Most Forune 1000 security folks are slow to adopt the cloud while most security companies offer some form of cloud based solution.  My expirience with endpoints is that they are hard to manage for the security teams - often owned by another part of the CIO's team and already paralyzed by agents......

The hope is that by adding intelligence to the security equation we can get smarter at finding the threats we need to focus on - that is the goal of many of these companies and of the behavioral analytics players.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
12/31/2014 | 12:18:23 PM
Vector Prevalence
I am surprised that application security and cloud security are not more prevalent. I speculate that by 2016, cloud security will be everywhere due to the rapidly evolving landscape.

I have seen Crowd Strike's product first hand and can attest to it being a robust product. Real time threat mitigation from an endpoint perspective. I will be interested to get more acquainted with some of the other tool sets referenced in the article.
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Tips for the Aftermath of a Cyberattack
Kelly Sheridan, Staff Editor, Dark Reading,  4/17/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-0218
PUBLISHED: 2019-04-22
A vulnerability was discovered wherein a specially crafted URL could enable reflected XSS via JavaScript in the pony mail interface.
CVE-2019-11383
PUBLISHED: 2019-04-22
An issue was discovered in the Medha WiFi FTP Server application 1.8.3 for Android. An attacker can read the username/password of a valid user via /data/data/com.medhaapps.wififtpserver/shared_prefs/com.medhaapps.wififtpserver_preferences.xml
CVE-2019-11459
PUBLISHED: 2019-04-22
The tiff_document_render() and tiff_document_get_thumbnail() functions in the TIFF document backend in GNOME Evince through 3.32.0 did not handle errors from TIFFReadRGBAImageOriented(), leading to uninitialized memory use when processing certain TIFF image files.
CVE-2019-11460
PUBLISHED: 2019-04-22
An issue was discovered in GNOME gnome-desktop 3.26, 3.28, and 3.30 prior to 3.30.2.2, and 3.32 prior to 3.32.1.1. A compromised thumbnailer may escape the bubblewrap sandbox used to confine thumbnailers by using the TIOCSTI ioctl to push characters into the input buffer of the thumbnailer's control...
CVE-2019-8452
PUBLISHED: 2019-04-22
A hard-link created from log file archive of Check Point ZoneAlarm up to 15.4.062 or Check Point Endpoint Security client for Windows before E80.96 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains t...