Vulnerabilities / Threats //

Vulnerability Management

5/11/2016
11:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Pwnie Express Announces $12.9 Million in Series B Funding

Ascent Venture Partners leads funding round with participation from MassMutual Ventures to accelerate growth for IoT and BYOD cyber security leader

Boston, MA — May 11, 2016 — Pwnie Express, the leading provider of device threat detection, today announced a $12.9 million Series B round of funding, led by Ascent Venture Partners with investments from MassMutual Ventures LLC and existing investors .406 Ventures, Fairhaven Capital and the Vermont Center for Emerging Technologies (VCET). This new investment will enable Pwnie Express to meet strong demand for its platform and accelerate its aggressive growth strategy.

“As BYOD and the Internet of Things become an integral part of business IT, there is a huge need to protect businesses from the threats created by all these new devices,” said Matt Fates, General Partner at Ascent Venture Partners. “Pwnie Express is uniquely positioned to deliver the device detection, identification and threat assessment platform required to secure business-critical data and infrastructure.” In addition to Ascent leading the new round of financing, Matt Fates will join Pwnie Express’s board of directors.

Pwnie Express is the market leader in addressing the threat landscape related to BYOD, IoT and rogue devices in the enterprise. Pwnie’s SaaS platform is unique in its ability to detect, identify, assess and respond to device threats, providing security professionals unprecedented visibility and control over the devices in and around their networks.

“I am thrilled to have Ascent and MassMutual Ventures as new investors, as well as the continued support from .406 Ventures, Fairhaven Capital and VCET. Having the financial and strategic support of these leading security investors further validates both our market opportunity and growing momentum as a company,” said Paul Paget, CEO of Pwnie Express. “We have assembled a very talented team and this investment puts us in a unique position to meet the growing demand for our platform driven by the dramatic shift in the device demographics of the enterprise.”

“We are excited to join the Pwnie Express team as they lead the way in addressing emerging threats related to the wireless workplace,” said Mark Goodman, Managing Director of MassMutual Ventures, the corporate venture capital arm of Massachusetts Mutual Life Insurance Company. “Cybersecurity plays an integral role in MassMutual’s overall corporate mission of helping people secure their future and protect the ones they love.”

The company has seen strong adoption of its SaaS device threat detection platform, Pulse, which it released last year. Over 100 customers from a wide range of industries, including financial services, healthcare, government, energy, manufacturing and retail, have deployed Pwnie Express across their enterprise. Pwnie Express will use this latest round of capital to accelerate this momentum and build out its sales, marketing and engineering teams.

About Pwnie Express:

Pwnie Express provides the industry’s only solution for continuous detection, identification and classification of wireless, wired and Bluetooth devices putting organizations at risk. Connected devices in the enterprise represent one of the fastest growing threats, unaddressed by existing security solutions. The Pwnie Express SaaS platform, Pulse, provides complete device coverage, including employee owned (BYOx), rogue and company-owned devices across the entire enterprise, including remote sites. To learn more about Pwnie Express visit www.pwnieexpress.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
Why Hackers Are in Such High Demand, and How They're Affecting Business Culture
Jaime Blasco, Vice President and Chief Scientist at AlienVault,  12/14/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Santa: "How about a unicorn coming out of a monitor instead?"
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.