Cloud

7/5/2017
02:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cloud Security Vendor, ShieldX, Emerges From Stealth

Recognized as a Gartner 'Cool Vendor' in 2017, SheildX emerges with a new cloud security product: APEIRO.

San Jose, CA, June 20, 2017—After 15 months of intensive product development, ShieldX Networks, Inc. (ShieldX) today emerged from stealth with a new cloud security product, APEIRO. The company has quickly accumulated a solid list of accomplishments including recognition by Gartner as a 2017 “Cool Vendor” in Cloud Security, enterprise deployments, integration with popular cloud environments, strong technology partnerships and 18 patents filed. With APEIRO, enterprises can rapidly add cloud security on demand, protect assets, maintain compliance and stick to budget.

Many organizations want to leverage cloud infrastructures for agility, flexibility and cost-savings benefits. But while the technologies required to support cloud deployments have advanced quickly, security technologies for the cloud have lagged—forcing organizations to make undesirable tradeoffs between cost, performance and risk.

“At ShieldX, we completely reimagined and invented a new model for comprehensive, network-based security using the latest innovations in application and infrastructure technology,” said Dr. Ratinder Paul Singh Ahuja, CEO and Founder of ShieldX. “With APEIRO, cloud security is no longer a roadblock to business growth, cost management and innovation goals.”

ShieldX is led by a team of serial entrepreneurs and technologists with in-depth expertise in cloud computing, network security and software-defined architectures. The team’s collective experience includes leadership and technology roles at McAfee, Symantec, Cisco, Intel, NetApp and VMware. The company completed a $9 million Series A financing round led by Bain Capital Ventures with participation from Aspect Ventures in November 2015.

“Organizations continue to explore the potential of cloud security technologies to help improve security operations, tackle fraud and safeguard networks. Leaders need to fully engage with the latest technology trends if they are to realize policies that enable digital business opportunities while coping with hostile events,” according to Gartner Research vice presidents Jay Heiser, Greg Young et al., who authored the 2017 Cool Vendors in Cloud Security Report.

 

Micro-Segmentation Isn’t Enough. The Power of APEIRO.

APEIRO is a powerful software cloud security solution that was purpose-built with best-practice cloud principles, technologies and economics in mind. Unprecedented network protection is delivered using the next generation of micro-segmentation that provides full security controls, as well as visibility, automation and coordination across multiple cloud environments. As a result, a breach in one area of the network will not compromise other areas.

Learn why micro-segmentation is not enough to secure the cloud at https://www.shieldx.com/2017/06/micro-segmentation-alone-not-enough/.

“APEIRO can offer broad security controls that scale as businesses grow,” said Jon Oltsik, senior principal analyst, Enterprise Strategy Group (ESG). “ESG Lab validated that the product can be deployed in 15 minutes and is capable of detecting external and lateral threats in more than a terabit of traffic, automatically spinning services up and down as needed.” Read the full ESG Lab review of APEIRO at: https://www.shieldx.com/esg-lab-report/.

With APEIRO, organizations can be confident that their cloud infrastructure is protected at all times, against all existing and emerging threats to their network. The product is certified VMware-Ready®, OpenStack Compatible ® and now ready to use with Amazon Elastic Compute Cloud (Amazon EC2).

“We chose ShieldX as our cloud security partner because our customers want to leverage the power and cost saving benefits of cloud innovation without compromising security,” said Joe Jozen, Vice President of CN Company, Tokyo Electron Device Limited (TED). “The Tokyo 2020 Olympics are a perfect example of how the partnership between TED and ShieldX will be critical to enabling the secure storage and transfer of information while protecting against cyber threats to provide a safe, enjoyable and connected experience for attendees.”

 

About ShieldX

ShieldX is redefining cloud security to better protect organizations against cyber threats—regardless of where sensitive data resides or how it moves across public, private or multi-cloud environments. Organizations are using APEIRO to scale security and micro-segmentation on demand, support business innovation, meet compliance requirements and protect against the latest cyberattacks. Based in San Jose, CA, ShieldX was founded in 2015 and is privately funded. Contact us at ShieldX.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17317
PUBLISHED: 2018-09-21
FruityWifi (aka PatatasFritas/PatataWifi) 2.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the io_mode, ap_mode, io_action, io_in_iface, io_in_set, io_in_ip, io_in_mask, io_in_gw, io_out_iface, io_out_set, io_out_mask, io_out_gw, iface, or domain parameter to /ww...
CVE-2018-17320
PUBLISHED: 2018-09-21
An issue was discovered in UCMS 1.4.6. aaddpost.php has stored XSS via the sadmin/aindex.php minfo parameter in a sadmin_aaddpost action.
CVE-2018-17141
PUBLISHED: 2018-09-21
HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.
CVE-2018-17173
PUBLISHED: 2018-09-21
LG SuperSign CMS allows remote attackers to execute arbitrary code via the sourceUri parameter to qsr_server/device/getThumbnail.
CVE-2018-17174
PUBLISHED: 2018-09-21
A stack-based buffer overflow was discovered in the xtimor NMEA library (aka nmealib) 0.5.3. nmea_parse() in parser.c allows an attacker to trigger denial of service (even arbitrary code execution in a certain context) in a product using this library via malformed data.