Analytics //

Security Monitoring

6/28/2016
03:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

PacketSled Secures $5M in Series A Financing

Continuous security monitoring company to aggressively accelerate sales, marketing, and execution of product roadmap

SAN DIEGO, CA - PacketSled, the company that democratizes security investigations and response by providing its customers with automated network visibility, detection, incident response and forensics in the cloud, announced today that it has completed a $5 million Series A round of financing. Keshif Ventures led the investment with participation from existing and new investors from Blu Ventures and JHS Ventures. The investment will allow PacketSled to aggressively expand its sales and marketing initiatives while continuing to grow the engineering and operations components of the business in both San Diego and Seattle.

The Series A financing builds on an exceptional year for PacketSled, which saw a rapidly growing roster of new customers, key executive appointments, and market momentum in the cybersecurity sector. PacketSled appointed industry veterans from Splunk and Rapid7 to its executive ranks, and its client roster grew to include major organizations from financial services, government, healthcare, defense and aerospace, and online services.

"PacketSled enabled us to obtain immediate visibility into a series of extremely advanced cyber attacks on our infrastructure, identifying the nature of the problem. We now use the PacketSled platform to continuously monitor our environment to keep the city, its citizens, and employees safe," said Gary Hayslip, CISO, City of San Diego.

“PacketSled is solving serious cybersecurity challenges in the enterprise, including talent shortage, security alert fatigue, and a massive communication barrier between security operations and the rest of the business,” said Taner Halicioglu, General Partner at Keshif Ventures. “Being able to show customers instantaneous security value - within minutes of using our product - is something that simply wasn’t possible until recently. PacketSled presents an extremely compelling platform for executives to get visibility into governance and compliance issues while also providing incident responders with the ability to investigate, hunt, and validate anything in their environment.”

The PacketSled platform provides ultimate visibility and context into network traffic, telling the real story of how cybersecurity threats are operating within the enterprise. At the heart of PacketSled’s solution is its IRES (Incident Response Expert System) technology, which utilizes expert systems to automate the process of threat hunting, validation, and incident response. PacketSled enables its customers to:

·         Deploy and gain visibility into their network in minutes.

·         Continuously monitor all environments for security and compliance issues.

·         Democratize and automate the art of detection and response across the market.

·         Simplify security incidents and compliance metrics in a manner that can be understood by anyone in the business.

“Customers have real problems getting the visibility and context that they need in order to make informed decisions about how to handle security incidents. By automating the hardest parts of the investigative process and visualizing the problem for customers, we’re enabling the business to understand their risk at a level that they have previously been unable to obtain,” said Matt Harrigan, PacketSled’s CEO. “This investment will enable us to make additional key hires in sales, engineering, and operations while we take on new marketing initiatives.

About PacketSled

PacketSled fuses immutable network truth,with expert knowledge to provide continuous monitoring, automated detection, and response capabilities.  PacketSled enables compliance and governance organizations to deeply understand areas that need attention, in real-time and historically. The company is privately funded, with offices in San Diego, California, and Seattle, Washington. To learn more about PacketSled, visit https://packetsled.com

About Keshif Ventures

Keshif Ventures is a San Diego based investment firm that partners with entrepreneurs to build companies that take advantage of economies of scale in cloud, big data, and analytics with verticals ranging from cybersecurity to social media, marketing, and energy

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12697
PUBLISHED: 2018-06-23
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
CVE-2018-12698
PUBLISHED: 2018-06-23
demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump.
CVE-2018-12699
PUBLISHED: 2018-06-23
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
CVE-2018-12700
PUBLISHED: 2018-06-23
A Stack Exhaustion issue was discovered in debug_write_type in debug.c in GNU Binutils 2.30 because of DEBUG_KIND_INDIRECT infinite recursion.
CVE-2018-11560
PUBLISHED: 2018-06-23
The webService binary on Insteon HD IP Camera White 2864-222 devices has a stack-based Buffer Overflow leading to Control-Flow Hijacking via a crafted usr key, as demonstrated by a long remoteIp parameter to cgi-bin/CGIProxy.fcgi on port 34100.