Analytics

11/8/2016
11:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Thycotic Acquires Cyber Algorithms

Thycotic has acquired the network security analytics company to identify malicious privileged behavior across systems and users.

Washington, D.C. – November 8, 2016 – Thycotic, a provider of privileged account management (PAM) solutions for more than 7,500 organizations worldwide, today announced it has completed the acquisition of Virginia-based Cyber Algorithms, provider of network security analytics. Terms of the deal have not been disclosed.  Cyber Algorithms brings Thycotic some of the most intuitive and easy-to-use cyber security analytics in the market allowing security personnel to detect and thwart intrusions that would otherwise go unseen.  Cyber Algorithms' innovative methods enable customers to focus immediately on high-risk user profiles and behaviors allowing them to detect and thwart intrusions and insider threats.

"While big data analytics provide a wealth of information, knowing which data-set is important requires specialized skills most organizations don’t have," said Jonathan Cogley, CTO and founder at Thycotic. "Cyber Algorithms’ technology cuts through the clutter to quickly identify in-progress attacks and enables organizations to reduce the risk of experiencing a cyber breach." 

Cyber Algorithms is a graduate of the Mach37 Cybersecurity Accelerator, a leading startup accelerator focused on launching early-stage startups in the cybersecurity industry.

"Mach37 is an example of an incubator that helps good companies accelerate their growth," said Philip Vorobeychik of Insight Venture Partners. "Insight hopes to see other companies emerge from future programs." 

About Thycotic

Thycotic, a global leader in IT security, is the fastest growing provider of Privilege Management solutions that protect an organization’s most valuable assets from cyber-attacks and insider threats. Thycotic secures privileged account access for more than 7,500 organizations worldwide, including Fortune 500 enterprises. Thycotic’s award winning Privilege Management Security solutions minimize privileged credential risk, limits user privileges and controls applications on endpoints and servers. Thycotic was founded in 1996 with corporate headquarters in Washington, D.C. and global offices in the U.K. and Australia. For more information, please visit www.thycotic.com.

About Cyber Algorithms

Cyber Algorithms is an innovative provider of user behavior analytics solutions that dramatically reduce the time it takes to detect cyber-attacks.  Cyber Algorithms increases the productivity and effectiveness of valuable security operations teams by enabling them to cut through the noise of thousands of alerts and focus immediately on high-risk user profiles and behaviors. For more information, please visit www.cyberalgorithms.com.

About Mach37

MACH37 is the premier accelerator for information security entrepreneurs and startups. We go beyond the traditional model of typical business accelerators by bringing our innovators focused mentorship and support from our extensive network of visionaries, practitioners, and successful entrepreneurs in security. Our Spring and Fall sessions are designed to propel graduating companies into the marketplace, equipped with the skills to grow and compete for funding and market share. MACH37 was launched in 2013 by the Center for Innovative Technology, in Herndon, Virginia.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
It Takes an Average of 3 to 6 Months to Fill a Cybersecurity Job
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/12/2019
Box Mistakes Leave Enterprise Data Exposed
Dark Reading Staff 3/12/2019
How the Best DevSecOps Teams Make Risk Visible to Developers
Ericka Chickowski, Contributing Writer, Dark Reading,  3/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: LOL  Hope this one wins
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6149
PUBLISHED: 2019-03-18
An unquoted search path vulnerability was identified in Lenovo Dynamic Power Reduction Utility prior to version 2.2.2.0 that could allow a malicious user with local access to execute code with administrative privileges.
CVE-2018-15509
PUBLISHED: 2019-03-18
Five9 Agent Desktop Plus 10.0.70 has Incorrect Access Control (issue 2 of 2).
CVE-2018-20806
PUBLISHED: 2019-03-17
Phamm (aka PHP LDAP Virtual Hosting Manager) 0.6.8 allows XSS via the login page (the /public/main.php action parameter).
CVE-2019-5616
PUBLISHED: 2019-03-15
CircuitWerkes Sicon-8, a hardware device used for managing electrical devices, ships with a web-based front-end controller and implements an authentication mechanism in JavaScript that is run in the context of a user's web browser.
CVE-2018-17882
PUBLISHED: 2019-03-15
An Integer overflow vulnerability exists in the batchTransfer function of a smart contract implementation for CryptoBotsBattle (CBTB), an Ethereum token. This vulnerability could be used by an attacker to create an arbitrary amount of tokens for any user.