Attacks/Breaches

10/13/2015
01:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cybereason Closes $59 Million Series C Round led by the SoftBank Group

SoftBank Finances the Majority of Cybereason's Largest Round to Date,Takes Cybereason to Market in Japan

Boston, MA, October 13, 2015  - Cybereason today announced the close of $59 million in Series C funding, led by a new investor, SoftBank Corp. (“SoftBank”), a subsidiary of SoftBank Group Corp. (TOKYO: 9984) along with existing investors CRV and Spark Capital. In conjunction with this investment, SoftBank will be the leading distributor of Cybereason’s cyber-security platform in the Japanese market. Per the terms of their agreement, Softbank and Cybereason will also join forces to build a joint offering that enables Japanese organizations to defend themselves against advanced persistent threats and other sophisticated cyber attacks.

 “SoftBank works to obtain cutting edge technology and outstanding business models to lead the Information Revolution. Our deployment of the Cybereason platform internally gave us firsthand knowledge of the value it provides, and led to our decision to invest. I’m confident Cybereason and SoftBank’s new product offering will bring a new level of security to Japanese organizations,” said Ken Miyauchi, President & CEO of SoftBank Corp.

 “Over the past year Cybereason has proven its ability to defend the world’s largest, most prestigious and most highly targeted enterprises against ultra-sophisticated cyber attacks,” said Lior Div, CEO and Co-founder of Cybereason.  “We built our relationship with SoftBank to mirror the success we achieved with Lockheed Martin, which also invested in and built a joint go-to-market plan with us.  This model enables us to maintain our agility and focus on innovation while leveraging the credibility, resources and experience that only industry giants bring to the table.”

 Amane Kito, Chief Information Officer of SoftBank Corp., added, “Cybereason super-charges the ability of security teams to defend against cyber threats and significantly reduce security costs. What makes Cybereason stand out above hundreds of security start-ups is its transformational approach to cyber-security, which leverages machine learning and behavioral analytics to detect and thwart even the most advanced cyber threats.”

Cybereason’s Series C funding round will further accelerate the exceptional growth it has experienced since launching its platform in February 2014, as reflected in the many awards and accolades it has received. Most recently, CRN named Cybereason an “Emerging Vendor” and one of the “10 Coolest Security Companies of 2015 (so far)”.  Earlier this year it was named “Best Emerging Technology” by SC Magazine UK, one of the 10 Most Innovative Companies at RSA Conference 2015, one of “Nine Israeli companies to watch” by Inc. Magazine, one of “12 hot security startups you need to know” by Network World and in 2014 Gartner, Inc. selected it as Cool Vendor in Application and Endpoint Security.  Additionally, Cybereason’s research arm – Cybereason Labs, has published numerous reports on attack trends, from DGA-based malware to the discovery of a new Ransomware-as-a-Service operation to the discovery of a new APT targeting Microsoft OWA, published earlier this month.

“We seek to partner with the biggest and brightest players that can offer a unique platform for market expansion and the development of new product offerings.  We are excited to work with the excellent team at SoftBank to launch an advanced security solution in Japan, a region that values great technology,” continues Div. 

About Cybereason:

Founded by members of the Israeli intelligence agency’s elite cyber security Unit 8200, the Cybereason platform mirrors the founder’s expertise in handling some of world’s most complex hacking operations. The Cybereason Detection and Response Platform leverages big data, behavioral analytics and machine learning to uncover, in real-time, complex cyber-attacks designed to evade traditional defenses. It automates the investigation process, connects isolated malicious events and visually presents a full malicious operation. The platform is available as an on premise solution or a cloud-based service. Cybereason is privately held and headquartered in Boston, MA with offices in Tel Aviv, Israel.

For more information, please visit:

Website: http://www.cybereason.com

Twitter: http://www.twitter.com/Cybereason

Facebook: http://www.facebook.com/Cybereason 

LinkedIn: http://www.linkedin.com/company/cybereason

About SoftBank:

SoftBank Corp., a subsidiary of SoftBank Group Corp. (TOKYO: 9984), provides mobile communication, fixed-line communication and Internet connection services to customers in Japan. Leveraging synergies with other companies in the SoftBank Group, SoftBank Corp. aims to transform lifestyles through ICT and expand into other business areas including IoT, robotics and energy.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Cisco Talos Summit: Network Defenders Not Serious Enough About Attacks
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2018
Meet 'Bro': The Best-Kept Secret of Network Security
Greg Bell, CEO, Corelight,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12294
PUBLISHED: 2018-06-19
WebCore/platform/graphics/texmap/TextureMapperLayer.cpp in WebKit, as used in WebKitGTK+ prior to version 2.20.2, is vulnerable to a use after free for a WebCore::TextureMapperLayer object.
CVE-2018-12519
PUBLISHED: 2018-06-19
An issue was discovered in ShopNx through 2017-11-17. The vulnerability allows a remote attacker to upload any malicious file to a Node.js application. An attacker can upload a malicious HTML file that contains a JavaScript payload to steal a user's credentials.
CVE-2018-12588
PUBLISHED: 2018-06-19
Cross-site scripting (XSS) vulnerability in templates/frontend/pages/searchResults.tpl in Public Knowledge Project (PKP) Open Monograph Press (OMP) v1.2.0 through 3.1.1-1 before 3.1.1-2 allows remote attackers to inject arbitrary web script or HTML via the catalog.noTitlesSearch parameter (aka the S...
CVE-2018-10811
PUBLISHED: 2018-06-19
strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable.
CVE-2018-10945
PUBLISHED: 2018-06-19
The mg_handle_cgi function in mongoose.c in Mongoose 6.11 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash, or NULL pointer dereference) via an HTTP request, related to the mbuf_insert function.