Analytics

8/14/2018
11:25 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Exabeam Raises $50 Million in Series D, Targets SIEM Market

Funding round led by Lightspeed Venture Partners; two years of growth at Exabeam highlights demand for an alternative to failing legacy SIEM solutions.

SAN MATEO, Calif., August 14, 2018 – Exabeam, the next-gen security information and event management company, today announced that it has closed $50 million in Series D funding. The round, backed entirely by existing investors, was led by Lightspeed Venture Partners and supported by Aspect Ventures, Cisco Investments, Icon Ventures, Norwest Venture Partners and cybersecurity investor Shlomo Kramer. The funds will be used to grow the company’s cloud portfolio, as well as sales and channels to expedite global expansion.

The complexities in securing modern digital businesses, along with the increase in sophistication of malicious threats and cybercrime, are fueling growth in the security information and event management (SIEM) market, which is expected to hit $4.54 billion in 2019.* Historically dominated by a handful of providers, in recent years, the market has shifted to platforms that can support the massive data volumes generated by cloud applications and mobile device use.

Exabeam is carving out a growing piece of the market, with 250 percent market growth in 2017, coming off 300 percent growth in 2016. The company is on track to more than double its market size in 2018. Fueling this success is the growing industry recognition for Exabeam’s Security Intelligence Platform (SIP); it was named the 2018 Gartner Peer Insights Customers’ Choice for its SIEM software, and recently won an SC Awards Europe 2018 for Best SIEM.

Customers are choosing Exabeam for its superior threat identification and response capabilities compared to legacy SIEMs. Equally appealing is its flat, predictable pricing model, which allows organizations to store all of their logs, unlike the archaic “by-the-byte” pricing model that forces budget-conscious customers to limit the amount of data covered by the SIEM—creating blind spots that sacrifice the security of the entire organization.

Exabeam’s SIP delivers where legacy vendors have failed. Built on open source, big data technology, including Elasticsearch and Hadoop, it provides unlimited secure data collection, indexing and search but without volume-based pricing. Advanced machine learning capabilities provide rapid insights into all events, including attacks and vulnerabilities so subtle and precise that humans simply cannot see them. The comprehensive platform contains many other customizable features spanning incident response and threat hunting, giving companies the freedom to scale and select only the security management solutions that fit their business needs.

“As a longtime investor in the cybersecurity space, I’ve always been excited about Exabeam’s approach and potential to deliver the next generation of security tech,” said Theresia Gouw, co-founder of Aspect Ventures, and a leading investor in cybersecurity. “It’s clear from the large increase in replacement wins with customers like ADP, Hulu, Safeway, Union Bank that Exabeam is consistently delivering industry-leading technology to the most demanding enterprises and government organizations in the world.”

“Our investors have an amazing track record of investing in companies that truly are disruptive and typically become category leaders,” said Exabeam CEO Nir Polak. “Their experience with high-growth companies like MuleSoft, Nutanix, Zscaler, ForeScout – is invaluable to us in the advice and guidance they pass along to our executive team. The new funding will allow us to invest heavily in our new cloud solutions and reach even more enterprises around the world. We are on track to overtake Splunk and be the next SIEM market leader.”

For more information on Exabeam’s SIEM platform, please visit https://www.exabeam.com/product/

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How the US Chooses Which Zero-Day Vulnerabilities to Stockpile
Ricardo Arroyo, Senior Technical Product Manager, Watchguard Technologies,  1/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3906
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 contains hardcoded credentials in the WCF service on port 9003. An authenticated remote attacker can use these credentials to access the badge system database and modify its contents.
CVE-2019-3907
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores user credentials and other sensitive information with a known weak encryption method (MD5 hash of a salt and password).
CVE-2019-3908
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores backup files as encrypted zip files. The password to the zip is hard-coded and unchangeable. An attacker with access to these backups can decrypt them and obtain sensitive data.
CVE-2019-3909
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 database uses default credentials. Users are unable to change the credentials without vendor intervention.
CVE-2019-3910
PUBLISHED: 2019-01-18
Crestron AM-100 before firmware version 1.6.0.2 contains an authentication bypass in the web interface's return.cgi script. Unauthenticated remote users can use the bypass to access some administrator functionality such as configuring update sources and rebooting the device.