Risk
4/28/2006
07:45 AM
50%
50%

NeoAccel Lands $4M

NeoAccel announced its Series A3 funding round of approximately $4 million led by Baring Private Equity Partners' India Fund

SAN JOSE, Calif. -- NeoAccel, a pioneering innovator of next-generation Internet security solutions, announced its Series A3 funding round of approximately $4 million led by Baring Private Equity Partners' India Fund (ING's former venture arm) and existing investors.

At next week's Interop Las Vegas 2006, NeoAccel will introduce the next generation of its flagship product, SSL VPN-Plus Enterprise Edition Version 2.0.

NeoAccel will use this latest investment to accelerate sales and marketing to become the new leader in the $3.2 billion market for Virtual Private Networks (VPNs). In realizing its goal to deliver the world's fastest VPN, NeoAccel's SSL VPN-Plus is at the forefront of performance compared with other SSL VPNs and several IPSec VPNs.

With its Series A round complete, NeoAccel will invest in sales and marketing to accelerate broad market acceptance in order to become the new leader in the rapidly growing market for Virtual Private Networks (VPN). The VPN segment has expanded to include a new class of SSL VPNs that provide secure browser-based access to all enterprise applications.

NeoAccel's low-latency, ultra-fast SSL VPN-Plus is at the forefront of the rapidly growing SSL VPN market due to the enterprise-class performance advantages derived from the company's patent-pending Intelligent Connection Acceleration ArchitectureT (ICAAT) and for the exceptional business value of a low/no-administration and highly scalable alternative to conventional IPSec VPNS. To date, NeoAccel has achieved significant results including numerous customer deployments and a variety of significant OEM and channel alliances in the U.S. and internationally. The company is operating with

a very low burn rate and expects to become profitable during the course of its next fiscal year and close its mezzanine funding round soon thereafter.

NeoAccel has progressively enrolled investment backing for its patent-pending secure access and acceleration technologies to help realize their disruptive potential in becoming the best mover in advancing SSL VPNs as IPSec replacements. The Series A3 investment follows earlier Series A2 investments from NTT Leasing and technology angel investors such as Prabhu Goel (Verilog inventor), Sabeer Bhatia (Hotmail.com founder) and a Series A1 investment from NextStar Venture, the investment company of Michel Susai, CEO of NeoAccel and founder and former Chairman and CEO of NetScaler (now CitrixR NetScaler).

"Our investment will enable NeoAccel to accelerate broad market adoption

of its SSL VPN-Plus as the only network security software platform to overcome the fundamental technology flaw in conventional SSL VPNs that hampers widespread enterprise adoption," said Subbu Subramaniam, Investment Partner for Baring Private Equity Partners India (BPEP India). "Leveraging the breakthrough innovations and experienced leadership of Michel Susai, NeoAccel has great promise to fulfill the promise of SSL VPNs to unseat IPSec VPNs as the dominant way for securing remote access to enterprise applications networks."

NeoAccel Inc.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] Assessing Cybersecurity Risk
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.