Endpoint
1/20/2017
12:01 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Strategic Cyber Ventures Invests $3M in ID DataWeb

New funding will allow dynamic identity verification firm to further innovate its technology and expand growth and sales in new markets

Washington, DC — January 20, 2017 - Strategic Cyber Ventures, the industry’s first cyber-led growth fund, today announced it has made a $3 million investment in DC-based ID DataWeb, a provider of cloud broker services for identity security.  This new funding round brings the company’s total funding to-date to $5 million and Tom Kellermann, CEO of Strategic Cyber Ventures, will join ID DataWeb’s Board.

ID DataWeb was founded in 2011 and is headquartered in Northern Virginia. ID DataWeb’s Attribute eXchange Network (AXN) provides dynamic identity verification services globally, supporting customers in 35 countries with plans to grow to sixty by the end of 2017.  Using a variety of methods and attribute services, ID DataWeb’s customers are able to improve online identity security and privacy using the Attribute Exchange Network.  The AXN cloud broker service provides agility, scalability and cost efficiencies to enable real-time identity proofing, multifactor authentication and enhanced privacy for constituents within and between industry ecosystems.

“Credential theft has become a pandemic. Authentication has long been the Achilles heel of cybersecurity. Our investment in ID DataWeb advances American cybersecurity because its technology solves the world’s digital identity security problem. Dynamic identity verification is the future of the Web 4.0. This investment ensures the safety of American digital identities,” said Tom Kellermann, CEO of Strategic Cyber Ventures.

This new funding will be used to support ID DataWeb’s growing engineering and technology development teams, support future platform offerings and expand the sales team in new markets.  It will also be used to expand sales and marketing efforts and hire additional talent in 2017. Strategic Cyber Ventures has made two other investments in E8 Security and TrapX Security, since launching in April of 2016.

“Identity is recognized as the new defense perimeter for online transactions. Our partnership with Strategic Cyber Ventures will be instrumental in enhancing security, privacy, convenience and savings for customers of ID DataWeb’s cloud broker services,” said David Coxe, CEO of ID  DataWeb.

 

About Strategic Cyber Ventures

Headquartered in Washington, D.C. and founded in February 2016 by a team of knowledgeable cyber operators, Strategic Cyber Ventures (SCV) invests in cybersecurity companies that disrupt advanced cyber adversaries and revolutionize the cyber product marketplace. The team at SCV has very deep roots in both U.S. government and the domestic and international business communities. SCV’s mission is to advance cybersecurity through expert investment in synergistic teams and technologies that can solve the world’s security problems. If you’d like to learn more about SCV, please visit: https://scvgroup.net

 

About ID DataWeb

ID DataWeb is a trusted identity verification cloud-service which improves user privacy, security and user experience. This service is being used by several key industry segments including; Department of Defense, Financial, Technology, Healthcare and Entertainment.  ID DataWeb (IDW) uses standards-based personal security and proven identity verification processes combined with a unique business model to create an identity ecosystem that improves online trust and supports revenue growth across ecosystem constituents. The company's Attribute eXchange Network (AXN) is an online Internet-scale gateway for Relying Parties (RPs) to efficiently and affordably access user-asserted, permissioned and verified online identity credentials and attributes from third-party providers (Attribute Providers (APs) and/or Identity Providers (IdPs). The IDW AXN business model stimulates market participation through a mechanism for efficiently servicing and monetizing existing and new business online markets that are currently underserved by the online identity ecosystem. To learn more, please visit: http://iddataweb.com

 

###

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.