Analytics
5/16/2014
01:45 PM
50%
50%

OpenDNS Receives $35M Investment in Enterprise Security Vision

OpenDNS received a $35 million boost recently to build out its capabilities as it walks along its roadmap for cloud-based enterprise security and big data analytics.

The investment, which comes from a collection of venture capitalists and networking giant Cisco Systems, will help the company build out its roadmap in three areas: intelligence, threat visibility, and integrating with enterprise workflows, tools, and systems to create a healthy security ecosystem.

"We want to identify more threats, so that means collect and analyze more data, do more research, and find more bad stuff," says David Ulevitch, CEO of OpenDNS. "We want to see more threats, which means having broader coverage across more devices, see more traffic, do deeper packet inspection, and have the ability to block even more threats, regardless of port, protocol, or application."

Combined with its ability to identify advanced security threats and its delivery model, the company is growing "like crazy," Ulevitch says. "And now we have $35 million to make that all happen even faster."

That $35 million comes from a number of sources such as Sequoia Capital, which was already invested in OpenDNS, and new investors like Northgate Capital.  Another is Cisco Systems, which, according to Gartner analyst Lawrence Orans, has clear synergies with OpenDNS when it comes to analytics.

"[OpenDNS] uses its large pool of DNS queries… to detect attack patterns as they develop in the early stages," says Orans. "Cisco is making a push into big-data analytics. Earlier this year, it announced Cognitive Threat Analytics, based on its acquisition of [Cognitive Security] last year. CTA analyzes web logs to establish patterns, for example, activity by geography. It's clear that Cisco is promoting cloud-based analytics, and its investment in OpenDNS will give it access to technology that is complementary to what it already owns."

For its part, Cisco told Dark Reading the company wants to be a part of changes in the security market that could be meaningful to Cisco customers.

"Cloud-delivered security services are expected to increase over the next several years as a way for customers to protect their users and environments," a Cisco spokesperson told us. "In addition, we want to invest in the companies and technology that align with Cisco’s strategy to deliver intelligent cyber security for the real world."

Currently, OpenDNS says it has 50 million daily active users of its services in addition to more than 10,000 enterprise customers using its security solutions. Its portfolio is centered on its Umbrella security service and a predictive threat intelligence platform known as Security Graph. Due to its position in the network and use of big-data analytics and machine learning, the company says that each second its technology processes more than a million Internet events to discover and predict when and where on the Internet new attacks are being staged.

One of the biggest takeaways of the deal, says Forrester Research analyst Rick Holland, is that it is an investment in how security will be done in the future.

"The days of on-premises security appliances are numbered, and cloud-based security is the only way to scale as more and more users are moving outside the perimeter protection of premises-based appliances," he says. "Less macro, but something I like as well -- OpenDNS Security Graph. OpenDNS does a great job of visualizing their DNS data in a meaningful way. It is great for incident response. It is one of the few examples of big data that actually is useful to enterprises." 

"OpenDNS is the future of enterprise security, protecting workers the way they work today," Stefan Dyckerhoff, managing director of Sutter Hill Ventures and former senior executive at both Cisco and Juniper Networks, said in a statement. "We are proud to be an investor in the company and believe in the team and its mission."

Brian Prince is a freelance writer for a number of IT security-focused publications. Prior to becoming a freelance reporter, he worked at eWEEK for five years covering not only security, but also a variety of other subjects in the tech industry. Before that, he worked as a ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Charlie Babcock
50%
50%
Charlie Babcock,
User Rank: Moderator
5/16/2014 | 9:29:53 PM
In the right place at the right time
OpenDNS is in the right place at the right time. The latest $35 million brings to $53 million the total investment in the company. The controls it can impose over URLs accessed fits perfectly into the growth of mobile computing and mobile security concerns,
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.