Threat Intelligence

1/10/2018
12:00 AM
Dark Reading
Dark Reading
Products and Releases
100%
0%

Arctic Wolf Secures $16M in New Funding

New Funding to accelerate growth in rapidly expanding security operations center-as-a-service market.

SUNNYVALE, Calif.-Arctic Wolf Networks, a security operations center (SOC)-as-a-service company, today announced it has raised $16 million in new funding, led by Sonae Investment Management with participation from Lightspeed Venture Partners, Redpoint Ventures and Knollwood Investment Advisory. The latest infusion enables Arctic Wolf to address the soaring demand for SOC services. The new funding will fuel growth in all aspects of the business, including sales and marketing, product development and strategic alliances.

“Security operations centers are an essential element of modern cybersecurity, and every company needs one,” said Brian NeSmith, CEO and co-founder of Arctic Wolf. “We are transforming how companies look at cybersecurity from a product-centric view to one focused on proactive detection and response. The new funding allows us to invest in key areas of the business and maintain our extraordinary growth trajectory.”

Arctic Wolf provides a turnkey SOC-as-a-Service that installs in minutes and provides value from day one. The award-winning AWN CyberSOC service delivers threat detection and fewer false positives by leveraging several key innovations:

  • Concierge Security Engineer (CSE) acts as the single point of contact for a customer’s security needs. The CSE is a trusted security advisor and an extension of a customer’s internal team.
  • Hybrid AI demonstrably identifies more attacks, reduces false positives and accelerates the time between detection and responses. It merges a security engineer’s intelligence and intuition with the efficiency and productivity of artificial intelligence.
  • Custom Rule Engine (CRulE) Intentions provide unlimited flexibility to tailor our services to your exact needs. It allows the CSE to configure specific security and operational policies, updating them as needed to align with a customer’s changing business requirements.
  • Security Optimized Data Architecture (SODA)unifies the ingestion, storage, parsing and analysis of network traffic and log data. It provides the foundation for the security analytics that give our security engineers deep visibility into your security posture.

“Arctic Wolf is the leading SOC-as-a-Service company with disruptive innovations that will change the security services landscape,” said Carlos Alberto Silva, executive director at Sonae Investment Management. “They are defining the market and gaining tremendous market recognition for their visionary approach to helping companies secure their networks.”

“Arctic Wolf is solving one of the hardest problems in security, and this funding furthers investment in technology and personnel to strengthen the company’s ability to meet the growing demand for its service,” said John Vrionis, partner at Lightspeed Venture Partners. “We are excited by their market traction, and we look forward to working with them as they scale the company for growth.”

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
2019 Attacker Playbook
Ericka Chickowski, Contributing Writer, Dark Reading,  12/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
[Sponsored Content] The State of Encryption and How to Improve It
[Sponsored Content] The State of Encryption and How to Improve It
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19790
PUBLISHED: 2018-12-18
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restricti...
CVE-2018-19829
PUBLISHED: 2018-12-18
Artica Integria IMS 5.0.83 has CSRF in godmode/usuarios/lista_usuarios, resulting in the ability to delete an arbitrary user when the ID number is known.
CVE-2018-16884
PUBLISHED: 2018-12-18
A flaw was found in the Linux kernel in the NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel id and cause a use-after-free. Thus a malicious container user can cause a host kernel memory corruption and a system ...
CVE-2018-17777
PUBLISHED: 2018-12-18
An issue was discovered on D-Link DVA-5592 A1_WI_20180823 devices. If the PIN of the page "/ui/cbpc/login" is the default Parental Control PIN (0000), it is possible to bypass the login form by editing the path of the cookie "sid" generated by the page. The attacker will have acc...
CVE-2018-18921
PUBLISHED: 2018-12-18
PHP Server Monitor before 3.3.2 has CSRF, as demonstrated by a Delete action.