02:40 PM
Dark Reading
Dark Reading
Products and Releases

Shujinko Raises $2.8 Million to Address Cloud Security Compliance

Unusual Ventures, Defy, Vulcan Capital, PSL Ventures and Vas Ventures invested in the Seattle-based startup, with participation from key angels in the security and cloud space.

SEATTLE -- October 9, 2018 -- Shujinko announced today that it has raised $2.8 million to automate the construction and auditing of cloud environments, dramatically reducing the cost of building and maintaining compliance in the public cloud. Unusual Ventures, Defy, Vulcan Capital, PSL Ventures and Vas Ventures led the financing. Sujal Patel, the founder of Isilon Systems, and Andrew Peterson and Zane Lackey, the co-founders of web application security leader Signal Sciences, also participated in the round. Shujinko represents the seventh publicly announced spinout of Seattle-based startup studio Pioneer Square Labs.

Shujinko’s software-as-a-service offering provides technology-enabled businesses with effective tools to automate the construction of secure cloud environments. Enterprises are quickly migrating to the cloud, but the number of data breaches is increasing, resulting in brand damage and fines. Shujinko delivers a proactive approach to security and compliance using security-by-design to construct cloud environments.

“The current method in which IT audits are performed is antiquated and painful,” said Scott Schwan, co-founder, and CEO. “Businesses want to go fast and innovate quickly. We are here to help remove the compliance roadblocks they encounter along the way.”

The two founders, Schwan, and CTO Matt Wells have worked together for 10 years, across multiple organizations, from large Fortune 500 enterprises to young startups. Together, they have a proven track record of delivering on large scalable platforms that have processed hundreds of millions of transactions.

"Shujinko offers a forward-looking approach to security and compliance in the cloud, enabling their customers to increase the speed of innovation and delivery of business capabilities,” said Neil Sequeira, Co-Founder and Managing Director of Defy. “Shujinko’s founders Scott and Matt are a talented team with extensive experience solving complex problems for leading companies and we are excited to partner with them as they grow and scale this company."

“With the regulations and compliance demands on corporations today, the market needs Shujinko,” said John Vrionis, General Partner at Unusual Ventures. “I’m very excited to partner with these two founders who for years have lived the massive pain of building and maintaining compliance for large retailers, and who now live to solve it.”

“We are building something complex and solving important problems that no one has yet addressed in the security space,” said Wells. “We are looking for folks that want to join us on this journey.”

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2018-12-14
In Geutebrueck GmbH E2 Camera Series versions prior to the DDNS configuration (in the Network Configuration panel) is vulnerable to an OS system command injection as root.
PUBLISHED: 2018-12-14
In WordPress versions before 5.0.1, authors could modify metadata to bypass intended restrictions on deleting files.
PUBLISHED: 2018-12-14
In WordPress versions before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata.
PUBLISHED: 2018-12-14
In WordPress versions before 5.0.1, when the Apache HTTP Server is used, authors could upload crafted files that bypass intended MIME type restrictions, leading to XSS.
PUBLISHED: 2018-12-14
In WordPress versions before 5.0.1, crafted URLs could trigger XSS for certain use cases involving plugins.