Attacks/Breaches

10/13/2015
01:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cybereason Closes $59 Million Series C Round led by the SoftBank Group

SoftBank Finances the Majority of Cybereason's Largest Round to Date,Takes Cybereason to Market in Japan

Boston, MA, October 13, 2015  - Cybereason today announced the close of $59 million in Series C funding, led by a new investor, SoftBank Corp. (“SoftBank”), a subsidiary of SoftBank Group Corp. (TOKYO: 9984) along with existing investors CRV and Spark Capital. In conjunction with this investment, SoftBank will be the leading distributor of Cybereason’s cyber-security platform in the Japanese market. Per the terms of their agreement, Softbank and Cybereason will also join forces to build a joint offering that enables Japanese organizations to defend themselves against advanced persistent threats and other sophisticated cyber attacks.

 “SoftBank works to obtain cutting edge technology and outstanding business models to lead the Information Revolution. Our deployment of the Cybereason platform internally gave us firsthand knowledge of the value it provides, and led to our decision to invest. I’m confident Cybereason and SoftBank’s new product offering will bring a new level of security to Japanese organizations,” said Ken Miyauchi, President & CEO of SoftBank Corp.

 “Over the past year Cybereason has proven its ability to defend the world’s largest, most prestigious and most highly targeted enterprises against ultra-sophisticated cyber attacks,” said Lior Div, CEO and Co-founder of Cybereason.  “We built our relationship with SoftBank to mirror the success we achieved with Lockheed Martin, which also invested in and built a joint go-to-market plan with us.  This model enables us to maintain our agility and focus on innovation while leveraging the credibility, resources and experience that only industry giants bring to the table.”

 Amane Kito, Chief Information Officer of SoftBank Corp., added, “Cybereason super-charges the ability of security teams to defend against cyber threats and significantly reduce security costs. What makes Cybereason stand out above hundreds of security start-ups is its transformational approach to cyber-security, which leverages machine learning and behavioral analytics to detect and thwart even the most advanced cyber threats.”

Cybereason’s Series C funding round will further accelerate the exceptional growth it has experienced since launching its platform in February 2014, as reflected in the many awards and accolades it has received. Most recently, CRN named Cybereason an “Emerging Vendor” and one of the “10 Coolest Security Companies of 2015 (so far)”.  Earlier this year it was named “Best Emerging Technology” by SC Magazine UK, one of the 10 Most Innovative Companies at RSA Conference 2015, one of “Nine Israeli companies to watch” by Inc. Magazine, one of “12 hot security startups you need to know” by Network World and in 2014 Gartner, Inc. selected it as Cool Vendor in Application and Endpoint Security.  Additionally, Cybereason’s research arm – Cybereason Labs, has published numerous reports on attack trends, from DGA-based malware to the discovery of a new Ransomware-as-a-Service operation to the discovery of a new APT targeting Microsoft OWA, published earlier this month.

“We seek to partner with the biggest and brightest players that can offer a unique platform for market expansion and the development of new product offerings.  We are excited to work with the excellent team at SoftBank to launch an advanced security solution in Japan, a region that values great technology,” continues Div. 

About Cybereason:

Founded by members of the Israeli intelligence agency’s elite cyber security Unit 8200, the Cybereason platform mirrors the founder’s expertise in handling some of world’s most complex hacking operations. The Cybereason Detection and Response Platform leverages big data, behavioral analytics and machine learning to uncover, in real-time, complex cyber-attacks designed to evade traditional defenses. It automates the investigation process, connects isolated malicious events and visually presents a full malicious operation. The platform is available as an on premise solution or a cloud-based service. Cybereason is privately held and headquartered in Boston, MA with offices in Tel Aviv, Israel.

For more information, please visit:

Website: http://www.cybereason.com

Twitter: http://www.twitter.com/Cybereason

Facebook: http://www.facebook.com/Cybereason 

LinkedIn: http://www.linkedin.com/company/cybereason

About SoftBank:

SoftBank Corp., a subsidiary of SoftBank Group Corp. (TOKYO: 9984), provides mobile communication, fixed-line communication and Internet connection services to customers in Japan. Leveraging synergies with other companies in the SoftBank Group, SoftBank Corp. aims to transform lifestyles through ICT and expand into other business areas including IoT, robotics and energy.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20168
PUBLISHED: 2018-12-17
Google gVisor before 2018-08-22 reuses a pagetable in a different level with the paging-structure cache intact, which allows attackers to cause a denial of service ("physical address not valid" panic) via a crafted application.
CVE-2018-20167
PUBLISHED: 2018-12-17
Terminology before 1.3.1 allows Remote Code Execution because popmedia is mishandled, as demonstrated by an unsafe "cat README.md" command when \e}pn is used. A popmedia control sequence can allow the malicious execution of executable file formats registered in the X desktop share MIME typ...
CVE-2018-20161
PUBLISHED: 2018-12-15
A design flaw in the BlinkForHome (aka Blink For Home) Sync Module 2.10.4 and earlier allows attackers to disable cameras via Wi-Fi, because incident clips (triggered by the motion sensor) are not saved if the attacker's traffic (such as Dot11Deauth) successfully disconnects the Sync Module from the...
CVE-2018-20159
PUBLISHED: 2018-12-15
i-doit open 1.11.2 allows Remote Code Execution because ZIP archives are mishandled. It has an upload feature that allows an authenticated user with the administrator role to upload arbitrary files to the main website directory. Exploitation involves uploading a ".php" file within a "...
CVE-2018-20157
PUBLISHED: 2018-12-15
The data import functionality in OpenRefine through 3.1 allows an XML External Entity (XXE) attack through a crafted (zip) file, allowing attackers to read arbitrary files.