Cloud

6/20/2018
11:20 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Liongard Raises $1.25M In Funding, Plans to Bring Automation to IT Managed Service Providers

Houston, TX, June 2018 - Liongard announces that it has closed a $1.25M seed funding round, exceeding its goal of $1M. They empower their customers, IT managed service providers (MSPs), with advanced automation to protect business environments of all sizes. The funding enables Liongard to expand their market reach and bring unparalleled automation to IT operations teams who manage technology at scale. Joe Alapat, Liongard’s CEO states that, “Liongard’s goal is to enable unified visibility and automation for MSPs to manage modern IT environments that span from on-premise to the cloud. This investment lets us continue on our mission to build rich integrations to the systems and platforms that our customers manage and use.”

Founded in 2015, Liongard has solved the problem of unifying and maintaining system documentation for MSPs, who typically update system configuration details manually. The company’s product, Roar, addresses the significant lack of visibility that currently plagues IT service providers. It’s progress and impact attracted industry veterans to lead a funding round. Most notably, Richard Yoo, founder and former CEO of Rackspace, and Jared Slosberg founder ofProfitFuel (now Yodle). Other investors include Station Houston Ventures, the venture arm ofStation HoustonGestalt Cybersecurity, as well as members of the Houston Angel NetworkTiE HoustonUH Cougar Venture Fund, and private angels.

Roar delivers deep, accurate, and up-to-date documentation of IT asset details and metrics, including users, privileges, rules, expirations, and system-specific settings across cloud services, network devices, and on-premise targets. By continuously collecting the configuration data, Roar’s automation eliminates stale documentation, human errors, unnecessary manual logins and escalations between staff. Roar provides visibility into the settings and controls that MSP teams need to know in order to manage and protect their customers.

“It’s exciting to hear first-hand how customers are realizing the benefits of Liongard’s platform. This is why the Liongard team has seen its customers rapidly deploy Roar across all of their end customers,” said Station Houston Ventures General Partner John Reale. “We continue to be excited to partner with Liongard and look forward to supporting Joe, Vincent and the team as they change the game for how IT gets managed at scale.”

The platform transforms configuration data into a standardized format, which enables unification across a wide breadth of disparate sources. This helps MSP overcome talent shortages required for management of specialized systems, and avoid cybersecurity disasters due to unintended deviations from best practice configurations. MSPs can refocus on gaining efficiency and profitability in an ever expanding and complex IT landscape.

“Managing systems across hundreds of customers and countless systems requires accurate and real-time information. Liongard’s platform addresses this head on, and makes Roar a critical component of any IT service providers’ toolbox,” said investor and Rackspace founder Richard Yoo. Investor Jared Slosberg added, “In order to make progress, you need to start with a thorough understanding of your current state. Before Liongard, IT organizations simply had no good way of doing so.”

The Company has partnered with ConnectWise and is a certified and supported integration. Liongard has focused their messaging toward top performers in the channel via MSP peer groups. The data Roar collects can be pushed directly into existing documentation platforms like ConnectWise Manage, which MSPs use to efficiently handle incidents and tickets.

Liongard’s message has strongly resonated across the MSP community, resulting in engagements with leading MSPs across the nation. Matt Clines, President of ERGOS Technologies, said, “We think this may be the most impactful addition to our solution stack, as it will fill nearly all of the gaps between our ConnectWise ticket management, monitoring platforms, and documentation system.”

“We’re excited to bring Roar’s advanced automation to MSPs that are on the front lines of managing and securing IT for their customers,” said Joe Alapat, Liongard’s CEO.

“For years, IT operations, including MSPs, have been manually documenting their customer IT assets. Many have the best intentions and are successfully brute forcing the work, but most are falling behind at a rapid pace with the proliferation of modern IT,” said Liongard COO, Vincent Tran.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
The Fundamental Flaw in Security Awareness Programs
Ira Winkler, CISSP, President, Secure Mentem,  7/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14492
PUBLISHED: 2018-07-21
Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an unspecified /goform URI.
CVE-2018-3770
PUBLISHED: 2018-07-20
A path traversal exists in markdown-pdf version <9.0.0 that allows a user to insert a malicious html code that can result in reading the local files.
CVE-2018-3771
PUBLISHED: 2018-07-20
An XSS in statics-server <= 0.0.9 can be used via injected iframe in the filename when statics-server displays directory index in the browser.
CVE-2018-5065
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
CVE-2018-5066
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.