Cloud

6/20/2018
11:20 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Liongard Raises $1.25M In Funding, Plans to Bring Automation to IT Managed Service Providers

Houston, TX, June 2018 - Liongard announces that it has closed a $1.25M seed funding round, exceeding its goal of $1M. They empower their customers, IT managed service providers (MSPs), with advanced automation to protect business environments of all sizes. The funding enables Liongard to expand their market reach and bring unparalleled automation to IT operations teams who manage technology at scale. Joe Alapat, Liongard’s CEO states that, “Liongard’s goal is to enable unified visibility and automation for MSPs to manage modern IT environments that span from on-premise to the cloud. This investment lets us continue on our mission to build rich integrations to the systems and platforms that our customers manage and use.”

Founded in 2015, Liongard has solved the problem of unifying and maintaining system documentation for MSPs, who typically update system configuration details manually. The company’s product, Roar, addresses the significant lack of visibility that currently plagues IT service providers. It’s progress and impact attracted industry veterans to lead a funding round. Most notably, Richard Yoo, founder and former CEO of Rackspace, and Jared Slosberg founder ofProfitFuel (now Yodle). Other investors include Station Houston Ventures, the venture arm ofStation HoustonGestalt Cybersecurity, as well as members of the Houston Angel NetworkTiE HoustonUH Cougar Venture Fund, and private angels.

Roar delivers deep, accurate, and up-to-date documentation of IT asset details and metrics, including users, privileges, rules, expirations, and system-specific settings across cloud services, network devices, and on-premise targets. By continuously collecting the configuration data, Roar’s automation eliminates stale documentation, human errors, unnecessary manual logins and escalations between staff. Roar provides visibility into the settings and controls that MSP teams need to know in order to manage and protect their customers.

“It’s exciting to hear first-hand how customers are realizing the benefits of Liongard’s platform. This is why the Liongard team has seen its customers rapidly deploy Roar across all of their end customers,” said Station Houston Ventures General Partner John Reale. “We continue to be excited to partner with Liongard and look forward to supporting Joe, Vincent and the team as they change the game for how IT gets managed at scale.”

The platform transforms configuration data into a standardized format, which enables unification across a wide breadth of disparate sources. This helps MSP overcome talent shortages required for management of specialized systems, and avoid cybersecurity disasters due to unintended deviations from best practice configurations. MSPs can refocus on gaining efficiency and profitability in an ever expanding and complex IT landscape.

“Managing systems across hundreds of customers and countless systems requires accurate and real-time information. Liongard’s platform addresses this head on, and makes Roar a critical component of any IT service providers’ toolbox,” said investor and Rackspace founder Richard Yoo. Investor Jared Slosberg added, “In order to make progress, you need to start with a thorough understanding of your current state. Before Liongard, IT organizations simply had no good way of doing so.”

The Company has partnered with ConnectWise and is a certified and supported integration. Liongard has focused their messaging toward top performers in the channel via MSP peer groups. The data Roar collects can be pushed directly into existing documentation platforms like ConnectWise Manage, which MSPs use to efficiently handle incidents and tickets.

Liongard’s message has strongly resonated across the MSP community, resulting in engagements with leading MSPs across the nation. Matt Clines, President of ERGOS Technologies, said, “We think this may be the most impactful addition to our solution stack, as it will fill nearly all of the gaps between our ConnectWise ticket management, monitoring platforms, and documentation system.”

“We’re excited to bring Roar’s advanced automation to MSPs that are on the front lines of managing and securing IT for their customers,” said Joe Alapat, Liongard’s CEO.

“For years, IT operations, including MSPs, have been manually documenting their customer IT assets. Many have the best intentions and are successfully brute forcing the work, but most are falling behind at a rapid pace with the proliferation of modern IT,” said Liongard COO, Vincent Tran.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17317
PUBLISHED: 2018-09-21
FruityWifi (aka PatatasFritas/PatataWifi) 2.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the io_mode, ap_mode, io_action, io_in_iface, io_in_set, io_in_ip, io_in_mask, io_in_gw, io_out_iface, io_out_set, io_out_mask, io_out_gw, iface, or domain parameter to /ww...
CVE-2018-17320
PUBLISHED: 2018-09-21
An issue was discovered in UCMS 1.4.6. aaddpost.php has stored XSS via the sadmin/aindex.php minfo parameter in a sadmin_aaddpost action.
CVE-2018-17141
PUBLISHED: 2018-09-21
HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.
CVE-2018-17173
PUBLISHED: 2018-09-21
LG SuperSign CMS allows remote attackers to execute arbitrary code via the sourceUri parameter to qsr_server/device/getThumbnail.
CVE-2018-17174
PUBLISHED: 2018-09-21
A stack-based buffer overflow was discovered in the xtimor NMEA library (aka nmealib) 0.5.3. nmea_parse() in parser.c allows an attacker to trigger denial of service (even arbitrary code execution in a certain context) in a product using this library via malformed data.