Threat Intelligence

11:12 AM
Dark Reading
Dark Reading
Products and Releases

Bandura Systems Closes $3.5 Million Seed Round

Company that pioneered Threat Intelligence Gateways for US government expands executive team, announces dual headquarters

COLUMBIA, Md. and ST. LOUIS, March 07, 2018 (GLOBE NEWSWIRE) -- Bandura Systems, which pioneered the threat intelligence gateway (TIG) in part with the U.S. Department of Defense, today announced it has closed its seed funding round. The $3.5 million financing came from Blu Ventures, Gula Tech Adventures, the Maryland Tech Development Corp. (TEDCO), Prosper Women Entrepreneurs (PWE), SixThirty, SixThirty Cyber and UMB Financial Corporation. TIGs are stand-alone threat prevention appliances that can process millions more threat indicators than traditional network security enforcement approaches. They help protect corporate networks by more effectively blocking known threats and making threat intelligence actionable.  They also complement and improve the performance of existing security solutions like firewalls and Security Information and Event Management (SIEM) software reducing the number of events that need detection and response, making employees more effective.

The funding will be used to support the growing demand for Bandura Systems PoliWall® TIG whose revenue quadrupled in 2017. Bandura is expanding its executive team, recently hiring prominent cybersecurity executive Chris Fedde as its new CEO and today also announcing Todd Weller as its Chief Strategy Officer. Fedde helped Bandura quickly close the round and is positioning the company for future growth. Weller will drive strategy and execution across corporate development, marketing, product management, and strategic alliances and partnerships. Prior to Bandura, Weller served as Vice President of Corporate Development and Marketing at Hexis Cyber Solutions, Inc. which was sold to a firewall vendor owned by Silicon Valley investors. He spent nearly two decades covering cybersecurity as a Wall Street analyst at some of the world’s most prominent financial services firms like Stifel, Nicolaus & Company, and Legg Mason.

“The cybersecurity market has been heavily focused on identifying ‘advanced’ threats, but that has put pressure on security teams to effectively and efficiently block the huge volume of known dangers,” said Fedde. “Threat Intelligence Gateways fill this role by addressing a key gap in existing security controls, which are not built to consume threat indicators on the millions of bad IPs and domains that exist. I’m excited to join Bandura, the company that pioneered TIGs, as enterprises of all sizes can begin using these Threat Intelligence Gateways.”

According to Ron Gula, head of Bandura investor Gula Tech Adventures and former CEO of Tenable Network Security, "The cybersecurity industry has done a great job producing threat intelligence, but Bandura can apply it. Bandura Systems allows organizations to be proactive in blocking these known threats to better protect their networks."  

In addition to announcing its funding and new executive appointment, Bandura is also announcing today it will have dual headquarters. Columbia, Maryland will now house Bandura’s business headquarters and Lake St. Louis, Missouri its engineering headquarters. For the exact location of Bandura’s offices, go to

About Bandura Systems
Bandura Systems pioneered the Threat Intelligence Gateway (TIG) in part with the U.S. Department of Defense. Bandura’s PoliWall™ is the most comprehensive, scalable and granular TIG platform on the market. Organizations worldwide use TIGs for the automation and control needed to operationalize hundreds of million threat indicators blocking known threats before they even reach the network firewall. Underlying Bandura’s robust technology are more than 50 issued and pending patents. To learn more about how Bandura’s PoliWall TIG reduces an organization’s attack surface, operationalizes threat intelligence and helps get more out of existing security investments, visit

Media Contact
Andrew Goss
Voxus PR for Bandura Systems
[email protected]

A photo accompanying this announcement is available at

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
The Case for Integrating Physical Security & Cybersecurity
Paul Kurtz, CEO & Cofounder, TruSTAR Technology,  3/20/2018
A Look at Cybercrime's Banal Nature
Curtis Franklin Jr., Senior Editor at Dark Reading,  3/20/2018
City of Atlanta Hit with Ransomware Attack
Dark Reading Staff 3/23/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.