Threat Intelligence

3/7/2018
11:12 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Bandura Systems Closes $3.5 Million Seed Round

Company that pioneered Threat Intelligence Gateways for US government expands executive team, announces dual headquarters

COLUMBIA, Md. and ST. LOUIS, March 07, 2018 (GLOBE NEWSWIRE) -- Bandura Systems, which pioneered the threat intelligence gateway (TIG) in part with the U.S. Department of Defense, today announced it has closed its seed funding round. The $3.5 million financing came from Blu Ventures, Gula Tech Adventures, the Maryland Tech Development Corp. (TEDCO), Prosper Women Entrepreneurs (PWE), SixThirty, SixThirty Cyber and UMB Financial Corporation. TIGs are stand-alone threat prevention appliances that can process millions more threat indicators than traditional network security enforcement approaches. They help protect corporate networks by more effectively blocking known threats and making threat intelligence actionable.  They also complement and improve the performance of existing security solutions like firewalls and Security Information and Event Management (SIEM) software reducing the number of events that need detection and response, making employees more effective.

The funding will be used to support the growing demand for Bandura Systems PoliWall® TIG whose revenue quadrupled in 2017. Bandura is expanding its executive team, recently hiring prominent cybersecurity executive Chris Fedde as its new CEO and today also announcing Todd Weller as its Chief Strategy Officer. Fedde helped Bandura quickly close the round and is positioning the company for future growth. Weller will drive strategy and execution across corporate development, marketing, product management, and strategic alliances and partnerships. Prior to Bandura, Weller served as Vice President of Corporate Development and Marketing at Hexis Cyber Solutions, Inc. which was sold to a firewall vendor owned by Silicon Valley investors. He spent nearly two decades covering cybersecurity as a Wall Street analyst at some of the world’s most prominent financial services firms like Stifel, Nicolaus & Company, and Legg Mason.

“The cybersecurity market has been heavily focused on identifying ‘advanced’ threats, but that has put pressure on security teams to effectively and efficiently block the huge volume of known dangers,” said Fedde. “Threat Intelligence Gateways fill this role by addressing a key gap in existing security controls, which are not built to consume threat indicators on the millions of bad IPs and domains that exist. I’m excited to join Bandura, the company that pioneered TIGs, as enterprises of all sizes can begin using these Threat Intelligence Gateways.”

According to Ron Gula, head of Bandura investor Gula Tech Adventures and former CEO of Tenable Network Security, "The cybersecurity industry has done a great job producing threat intelligence, but Bandura can apply it. Bandura Systems allows organizations to be proactive in blocking these known threats to better protect their networks."  

In addition to announcing its funding and new executive appointment, Bandura is also announcing today it will have dual headquarters. Columbia, Maryland will now house Bandura’s business headquarters and Lake St. Louis, Missouri its engineering headquarters. For the exact location of Bandura’s offices, go to https://bandurasystems.com/contact.html.

About Bandura Systems
Bandura Systems pioneered the Threat Intelligence Gateway (TIG) in part with the U.S. Department of Defense. Bandura’s PoliWall™ is the most comprehensive, scalable and granular TIG platform on the market. Organizations worldwide use TIGs for the automation and control needed to operationalize hundreds of million threat indicators blocking known threats before they even reach the network firewall. Underlying Bandura’s robust technology are more than 50 issued and pending patents. To learn more about how Bandura’s PoliWall TIG reduces an organization’s attack surface, operationalizes threat intelligence and helps get more out of existing security investments, visit https://bandurasystems.com.

Media Contact
Andrew Goss
Voxus PR for Bandura Systems
[email protected]
253.444.5446

A photo accompanying this announcement is available at http://www.globenewswire.com/NewsRoom/AttachmentNg/7f66bae4-36a8-48eb-8b8a-e2f30975ad49

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "I'm not sure I like this top down management approach!"
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17358
PUBLISHED: 2018-09-23
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a ...
CVE-2018-17359
PUBLISHED: 2018-09-23
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.
CVE-2018-17360
PUBLISHED: 2018-09-23
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executa...
CVE-2018-17361
PUBLISHED: 2018-09-23
Multiple XSS vulnerabilities in WeaselCMS v0.3.6 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to index.php because $_SERVER['PHP_SELF'] is mishandled.
CVE-2018-17364
PUBLISHED: 2018-09-23
OTCMS 3.61 allows remote attackers to execute arbitrary PHP code via the accBackupDir parameter.