02:40 PM
Dark Reading
Dark Reading
Products and Releases

Shujinko Raises $2.8 Million to Address Cloud Security Compliance

Unusual Ventures, Defy, Vulcan Capital, PSL Ventures and Vas Ventures invested in the Seattle-based startup, with participation from key angels in the security and cloud space.

SEATTLE -- October 9, 2018 -- Shujinko announced today that it has raised $2.8 million to automate the construction and auditing of cloud environments, dramatically reducing the cost of building and maintaining compliance in the public cloud. Unusual Ventures, Defy, Vulcan Capital, PSL Ventures and Vas Ventures led the financing. Sujal Patel, the founder of Isilon Systems, and Andrew Peterson and Zane Lackey, the co-founders of web application security leader Signal Sciences, also participated in the round. Shujinko represents the seventh publicly announced spinout of Seattle-based startup studio Pioneer Square Labs.

Shujinko’s software-as-a-service offering provides technology-enabled businesses with effective tools to automate the construction of secure cloud environments. Enterprises are quickly migrating to the cloud, but the number of data breaches is increasing, resulting in brand damage and fines. Shujinko delivers a proactive approach to security and compliance using security-by-design to construct cloud environments.

“The current method in which IT audits are performed is antiquated and painful,” said Scott Schwan, co-founder, and CEO. “Businesses want to go fast and innovate quickly. We are here to help remove the compliance roadblocks they encounter along the way.”

The two founders, Schwan, and CTO Matt Wells have worked together for 10 years, across multiple organizations, from large Fortune 500 enterprises to young startups. Together, they have a proven track record of delivering on large scalable platforms that have processed hundreds of millions of transactions.

"Shujinko offers a forward-looking approach to security and compliance in the cloud, enabling their customers to increase the speed of innovation and delivery of business capabilities,” said Neil Sequeira, Co-Founder and Managing Director of Defy. “Shujinko’s founders Scott and Matt are a talented team with extensive experience solving complex problems for leading companies and we are excited to partner with them as they grow and scale this company."

“With the regulations and compliance demands on corporations today, the market needs Shujinko,” said John Vrionis, General Partner at Unusual Ventures. “I’m very excited to partner with these two founders who for years have lived the massive pain of building and maintaining compliance for large retailers, and who now live to solve it.”

“We are building something complex and solving important problems that no one has yet addressed in the security space,” said Wells. “We are looking for folks that want to join us on this journey.”

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
PUBLISHED: 2018-10-16
Z-BlogPHP (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.