Endpoint

11/19/2015
11:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Dojo-Labs Introduces Security of Things for All Smart Devices

SAN FRANCISCO, CA--(Nov 19, 2015) - Dojo-Labs today introduced Dojo, the first technology to monitor the behavior of each device on the network to protect and ensure the privacy of your home.

“Dojo knows when the TV is still recording your voice even if it’s off and when that data is being uploaded to the cloud,” said Yossi Atias, co-founder and CEO of Dojo-Labs. “We all lock our front doors and yet our devices are wide open. Our homes contain our most intimate data but the security of these things is an afterthought. We created Dojo as the first technology to help us safeguard our homes.”

The number of connected devices now exceeds 4 billion, according to Gartner, and is expected to surge to 6 billion in 2016. The proliferation of Wi-Fi-enabled things—from baby monitors to smart locks—makes the home vulnerable to cyber threats, of which the FBI recently issued a warning.

Introducing Dojo

Dojo prevents attacks and detects intrusions through machine learning and behavior tracking. Once connected to the home network, it adds each device and monitors their activity, alerting you only when you need to take action, and automatically blocking any attacks. Without even having to look at the data or knowing what those threats are, Dojo can block them. It grows increasingly intelligent as new attacks and devices are introduced.

The Dojo approach to security and its role in the home is incredibly unique and was designed by Gadi Amit and team at NewDealDesign.

 

·         Dojo (hardware): Dojo consists of a sleek pebble in a dock. The pebble is free to move about the house while the dock can be tucked away with the router. Light rings on the pebble glow when there is activity on your network. Dojo is easy to set up and plugs directly into your router for instant detection and protection.

·         Dojo App (mobile): You can interact with Dojo via the mobile app. A simple, intuitive messaging interface puts the control of your home network’s security and privacy back in your hands, prompting you to allow or block activity and informing you of potential cyber threats.

·         Dojo Intelligence: The cybersecurity engine detects cyber threats and abnormal behavior through machine learning and proprietary algorithms paired with Dojo-Labs’ cyber research. It collects and analyzes metadata from the entire network of devices. Through this, Dojo detects, alerts and mitigates all threats.

Dojo is available on Amazon Launchpad for the pre-order price of $99 with a 12-month service and will begin shipping in early 2016. Dojo’s suggested retail price is $199 with a 12-month service.

The Company

Dojo-Labs is a cybersecurity company founded by experts with the highest level of hacking and security-related big data analytics experience from the likes of Google, Samsung, AT&T and the Israeli Intelligence unit. Co-founders Yossi Atias and Shmulik Bachar have assembled a team of security experts and hackers based in Israel, and have spent the last year building the system and device. The company raised a seed round of $1.8 million, led by Glilot Capital Partners and with participation from private investors.

“Smart homes need security and Dojo has been designed specifically for the internet of things,” said Kobi Samboursky, co-founder and Managing Partner at Glilot Capital Partners. “Dojo-Labs is poised to define just what the security of things looks like.”

About Dojo-Labs

Dojo-Labs is dedicated to defining the security of things for the connected home. The company’s first product, Dojo, is an intelligent security device that connects to the home network and acts as the essential layer between connected devices and any threats to their security or privacy. The Dojo-Labs team is comprised of Cyber Security experts with the highest level of hacking and security-related big data analytics experience from the likes of Google, Samsung, AT&T and the Israeli Intelligence unit. Learn more at Dojo-Labs.com and connect online at Facebook.com/MeetDojo or Twitter.com/Dojo_Labs.

About Glilot Capital Partners

Glilot Capital is a seed and early stage venture fund that invests in Israel’s most extraordinary entrepreneurs. Glilot backs teams that develop sophisticated technology, particularly in the areas of Cyber Security and Enterprise software. The fund creates an environment that makes it possible to generate real, lasting value for both sides of the investment equation. Three of the fund's first four portfolio companies have been acquired by Microsoft, Marketo and Intuit. Glilot was founded in 2011 by Kobi Samboursky and Arik Kleinstein, and currently manages over $100M across its two funds.

 

 

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Printers: The Weak Link in Enterprise Security
Kelly Sheridan, Associate Editor, Dark Reading,  10/16/2017
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLink,  10/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.