Endpoint
11/19/2015
11:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Dojo-Labs Introduces Security of Things for All Smart Devices

SAN FRANCISCO, CA--(Nov 19, 2015) - Dojo-Labs today introduced Dojo, the first technology to monitor the behavior of each device on the network to protect and ensure the privacy of your home.

“Dojo knows when the TV is still recording your voice even if it’s off and when that data is being uploaded to the cloud,” said Yossi Atias, co-founder and CEO of Dojo-Labs. “We all lock our front doors and yet our devices are wide open. Our homes contain our most intimate data but the security of these things is an afterthought. We created Dojo as the first technology to help us safeguard our homes.”

The number of connected devices now exceeds 4 billion, according to Gartner, and is expected to surge to 6 billion in 2016. The proliferation of Wi-Fi-enabled things—from baby monitors to smart locks—makes the home vulnerable to cyber threats, of which the FBI recently issued a warning.

Introducing Dojo

Dojo prevents attacks and detects intrusions through machine learning and behavior tracking. Once connected to the home network, it adds each device and monitors their activity, alerting you only when you need to take action, and automatically blocking any attacks. Without even having to look at the data or knowing what those threats are, Dojo can block them. It grows increasingly intelligent as new attacks and devices are introduced.

The Dojo approach to security and its role in the home is incredibly unique and was designed by Gadi Amit and team at NewDealDesign.

 

·         Dojo (hardware): Dojo consists of a sleek pebble in a dock. The pebble is free to move about the house while the dock can be tucked away with the router. Light rings on the pebble glow when there is activity on your network. Dojo is easy to set up and plugs directly into your router for instant detection and protection.

·         Dojo App (mobile): You can interact with Dojo via the mobile app. A simple, intuitive messaging interface puts the control of your home network’s security and privacy back in your hands, prompting you to allow or block activity and informing you of potential cyber threats.

·         Dojo Intelligence: The cybersecurity engine detects cyber threats and abnormal behavior through machine learning and proprietary algorithms paired with Dojo-Labs’ cyber research. It collects and analyzes metadata from the entire network of devices. Through this, Dojo detects, alerts and mitigates all threats.

Dojo is available on Amazon Launchpad for the pre-order price of $99 with a 12-month service and will begin shipping in early 2016. Dojo’s suggested retail price is $199 with a 12-month service.

The Company

Dojo-Labs is a cybersecurity company founded by experts with the highest level of hacking and security-related big data analytics experience from the likes of Google, Samsung, AT&T and the Israeli Intelligence unit. Co-founders Yossi Atias and Shmulik Bachar have assembled a team of security experts and hackers based in Israel, and have spent the last year building the system and device. The company raised a seed round of $1.8 million, led by Glilot Capital Partners and with participation from private investors.

“Smart homes need security and Dojo has been designed specifically for the internet of things,” said Kobi Samboursky, co-founder and Managing Partner at Glilot Capital Partners. “Dojo-Labs is poised to define just what the security of things looks like.”

About Dojo-Labs

Dojo-Labs is dedicated to defining the security of things for the connected home. The company’s first product, Dojo, is an intelligent security device that connects to the home network and acts as the essential layer between connected devices and any threats to their security or privacy. The Dojo-Labs team is comprised of Cyber Security experts with the highest level of hacking and security-related big data analytics experience from the likes of Google, Samsung, AT&T and the Israeli Intelligence unit. Learn more at Dojo-Labs.com and connect online at Facebook.com/MeetDojo or Twitter.com/Dojo_Labs.

About Glilot Capital Partners

Glilot Capital is a seed and early stage venture fund that invests in Israel’s most extraordinary entrepreneurs. Glilot backs teams that develop sophisticated technology, particularly in the areas of Cyber Security and Enterprise software. The fund creates an environment that makes it possible to generate real, lasting value for both sides of the investment equation. Three of the fund's first four portfolio companies have been acquired by Microsoft, Marketo and Intuit. Glilot was founded in 2011 by Kobi Samboursky and Arik Kleinstein, and currently manages over $100M across its two funds.

 

 

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.