Analytics

6/28/2018
10:51 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

JASK Announces $25M Series B Financing Led by Kleiner Perkins

Investment Will Accelerate Adoption of the JASK Autonomous Security Operations Center Platform; Kleiner Perkins' Ted Schlein to Join Board

SAN FRANCISCO and AUSTIN, Texas – June 28, 2018 – JASK, the provider of the industry’s first Autonomous Security Operations Center (ASOC) platform, today announced that it raised $25M in Series B funding. Led by Kleiner Perkins with participation from early investors, including Battery Ventures, Dell Technologies Capital, TenEleven Ventures and Vertical Venture Partners, the round brings JASK’s total funding to $39M. The company will continue its focus on platform development, increase hiring in all departments and expand global sales channels.

JASK also announced that Kleiner Perkins General Partner, Ted Schlein, joined the company’s board of directors. Schlein was the original investor in ArcSight, in addition to other industry disruptors that include Carbon Black and Mandiant. By leading JASK’s Series B investment, Schlein reunites with JASK co-founders Greg Martin and Damian Miller, who led the security operations practice at ArcSight through its acquisition by HP. 

“With one of the most experienced teams in security operations, JASK understood that the biggest challenge to cybersecurity is human talent. There are not enough people skilled in attacker methods to quickly discern a real threat from a low-risk compromise,” said Ted Schlein, General Partner at Kleiner Perkins and one of the pre-eminent investors in cybersecurity. “Through advanced AI and machine learning, JASK frees security analysts from onerous data review to focus on investigating and responding to the most critical threats, improving efficiency and reducing organizational risk exposure.”

JASK’s mission is to modernize security operations by delivering an asset-independent, open platform that provides prioritized threat information with an autonomous workflow of what, where, why and how SOC analysts should take action. The JASK ASOC platform automates much of the work of a tier one security analyst by correlating and analyzing vast amounts of data and summarizing the important information via JASK Insights™, streamlined notifications that indicate a combination of events or activities that should be investigated. JASK Insights contain all of the information in one actionable interface to help speed investigation and response times.

“Over the past 20 years, the challenge of sifting through the deluge of alerts has been like finding the needle in a haystack,” said Greg Martin, CEO and co-founder of JASK. “SOC teams now deal with a stack of needles and need to find the sharpest one. Technology can no longer hinder them, but rather support their workflows and improve their efficiency. Our Series B funding and partnership with Ted and Kleiner Perkins will help us accelerate our mission to deliver this technology.”

JASK’s leadership team brings together decades of experience solving real-world SOC issues from ArcSight, Carbon Black, Cylance, Netflix, Cloudera and the U.S. counter intelligence community. Applying that experience and understanding of how SOC teams operate drives the team to leverage automation where possible to streamline analyst workflows and improve human efficiency. Using AI and machine learning, the JASK ASOC platform is built for broader and smarter data ingestion to reduce the costs and bandwidth demands of outdated SIEM data storage models, while adding important context from all attack vectors, users, devices, networks, applications and third-party integrations. 

Founded in 2015, JASK has dual headquarters in San Francisco and Austin, Texas. For more information visit www.jask.com or follow JASK on Twitter (@jasklabs) and LinkedIn.

About Kleiner Perkins

Kleiner Perkins partners with the brightest entrepreneurs to turn disruptive ideas into world-changing businesses. With $10 billion raised through 20 venture funds and four growth funds, the firm has invested in over 850 companies including pioneers such as Google, App Dynamics, Amazon, Flexus Biosciences, Nest, Waze, Twitter, JD.com and Square. Kleiner Perkins offers entrepreneurs years of operating experience, puts them at the center of an influential network, and accelerates their companies from success to significance. For more information, visit http://www.kpcb.com and follow us @kpcb.

About JASK

JASK is modernizing security operations to reduce organizational risk and improve human efficiency. Through technology consolidation, enhanced AI and machine learning, the JASK Autonomous Security Operations Center (ASOC) platform automates the correlation and analysis of threat alerts, helping SOC analysts focus on the highest-priority threats, streamlining investigations and delivering faster response times. www.jask.com

Hannah Whitrow

Account Director

[email protected]

M: +44 7760 806070

 

---------------

 

Privacy Policy

RealWire’s privacy policy and GDPR policy are available on our website.

 

News Receiver Options – Changing Preferences

Receivers members area – the receivers members area allows you to amend your news category options and preferences, and access your own personal RSS feed of relevant news. Log in now or request log in details.

 

Unsubscribe

Should you wish to unsubscribe from RealWire’s distribution, please click here. We would very much value your feedback on why you wish to be removed in order for us to continue to improve and develop our service.

 

If you would still like to receive news from us, just not as much or on different topics, please contact Zoe at [email protected] or on +44 (0)1522 883640, and we can help to amend your news preferences.

 

PRFilter

PRFilter is a relevance engine that filters press releases for users based on a personal profile of their interests created from their publication's RSS news feed. 

 

Releases marked with [PRFilter] in the subject line of RealWire release emails indicate PRFilter determined the release passed an individual’s relevance threshold. 

 

This service is no longer available to new users.

 

Disclaimer:

Whilst RealWire Limited endeavour to ensure the accuracy of the information contained in this Release, RealWire Limited cannot accept any liability for:-

 

• the inaccuracy or otherwise of any information contained in this Release; or

• any loss liability or expense which may be suffered by any party in consequence of acting or omitting to act as a result of any information contained in or omitted from this Release; or

• any loss or suffering which may be caused by or to any party either as a result of the information contained in this Release or such information contained in this Release being inaccurate or otherwise misleading. 

 

In the event that any information contained in this Release is inaccurate or misleading then please contact RealWire.

 

RealWire:

The registered address of RealWire is:

Realwire Limited, Unit 1, Exchange Close, North Hykeham, Lincoln, LN6 3TR.

Realwire Limited is a company registered in England and Wales: 4026690

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
5 Reasons Why Threat Intelligence Doesn't Work
Jonathan Zhang, CEO/Founder of WhoisXML API and TIP,  11/7/2018
Why Password Management and Security Strategies Fall Short
Steve Zurier, Freelance Writer,  11/7/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-2491
PUBLISHED: 2018-11-13
When opening a deep link URL in SAP Fiori Client with log level set to "Debug", the client application logs the URL to the log file. If this URL contains malicious JavaScript code it can eventually run inside the built-in log viewer of the application in case user opens the viewer and taps...
CVE-2018-2473
PUBLISHED: 2018-11-13
SAP BusinessObjects Business Intelligence Platform Server, versions 4.1 and 4.2, when using Web Intelligence Richclient 3 tiers mode gateway allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.
CVE-2018-2476
PUBLISHED: 2018-11-13
Due to insufficient URL Validation in forums in SAP NetWeaver versions 7.30, 7.31, 7.40, an attacker can redirect users to a malicious site.
CVE-2018-2477
PUBLISHED: 2018-11-13
Knowledge Management (XMLForms) in SAP NetWeaver, versions 7.30, 7.31, 7.40 and 7.50 does not sufficiently validate an XML document accepted from an untrusted source.
CVE-2018-2478
PUBLISHED: 2018-11-13
An attacker can use specially crafted inputs to execute commands on the host of a TREX / BWA installation, SAP Basis, versions: 7.0 to 7.02, 7.10 to 7.11, 7.30, 7.31, 7.40 and 7.50 to 7.53. Not all commands are possible, only those that can be executed by the <sid>adm user. The commands execut...