Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics //

Security Monitoring

10:30 AM
Dark Reading
Dark Reading
Products and Releases

Phantom Cyber Raises $6.5M to Automate Security Operations

TechOperators and Blackstone Lead Round to Develop the "Connective Tissue" for the Security Industry

Palo Alto, CA – September 28, 2015 – Phantom Cyber, a provider of security automation and orchestration, has raised $6.5M in Series A funding from Atlanta-based TechOperators and Blackstone (NYSE: BX), one of the world’s leading global asset managers. Blackstone made the investment after using the product for several months as an Early Experience user. Zach Nelson, CEO of NetSuite Inc. (NYSE: N), John Thompson, CEO of Virtual Instruments and former CEO of Symantec, and Rein Capital also participated in the round. With the funding, Thomas E. Noonan, former CEO of Internet Security Systems (ISS), and General Partner at TechOperators, will join the Phantom board.

Organizations have adopted dozens of security technologies over the past decade, resulting in an army of point products, each delivering discrete capabilities and its own respective console.  This piecemeal, static, and human-dependent approach is no match for today’s adversary.

Phantom streamlines security operations, solving the ‘last mile’ of the security problem and helping organizations deal with a massive shortage in security talent. The company provides a security automation and orchestration platform that integrates with an enterprise’s existing security technologies to provide a layer of “connective tissue” between them. Organizations use Phantom’s digital “Playbooks” to execute in seconds what may normally take minutes or hours to accomplish across dozens of point products used in a typical enterprise security environment.

“Phantom is a force-multiplier for our security team,” said Jay Leek, Chief Information Security Officer at Blackstone. “By leveraging the platform, we are able to automate processes such as malware investigation and containment, threat indicator hunting and deployment based on threat intelligence sources, phishing investigation, and regeneration of our environment in the event of a breach. Phantom delivers instant productivity gains, enabling us to respond faster, do more with our existing resources, and get the most out of our security investments.”

“Security teams are desperately looking for a way to simplify their jobs, and regain control of their environment,” said Thomas E. Noonan, former CEO of Internet Security Systems (ISS) and General Partner at TechOperators. “They have been searching for a Rosetta Stone to enable communication across numerous disparate systems, each of which has been purpose-built to provide specific security functions. Phantom gives organizations the ability to manage, update, and enhance their security systems in a fraction of the time it takes today, completely changing the dynamics and expectations for how secure an enterprise can be.”

 “Just as automation has improved finance, marketing, human resources, software development, and other aspects of IT, it is now time for security to benefit,” said Phantom Cyber founder and CEO, Oliver Friedrichs. “Initial demand has been tremendous and we are pleased to have the support of some of the industry’s leading minds to help us as we accelerate Phantom’s market penetration and product development.”

Phantom currently provides integration with over 30 of the industry’s leading security solutions. Phantom’s Early Experience program is immediately available to qualified organizations. For more information, visit www.phantom.us/product.

Phantom Cyber was founded by enterprise security veterans Oliver Friedrichs and Sourabh Satish.  Friedrichs previously founded and co-founded three highly successful internet security companies -  Immunet (acquired by Sourcefire), Security Focus (acquired by Symantec) and Secure Networks (acquired by McAfee). Satish was previously a distinguished engineer with Symantec, and has 156 issued and 51 pending patents.

About Phantom Cyber:

Phantom Cyber automates enterprise security operations. In the face of problematic trends including the dramatic increase and volume of attacks, severe shortages in qualified personnel, growth in the diversity and complexity of IT security environments and unforgiving consumers, investors and regulators holding management to task for breaches, Phantom Cyber arms security operations with the automation and orchestration solutions that ready them to defend their company’s business. Phantom Cyber was founded by enterprise security veterans Oliver Friedrichs and Sourabh Satish who have helped propel companies like Symantec, Sourcefire, Cisco and others to success. For more information visit www.phantom.us.

Media Contact
Zenobia Godschalk


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-13
The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
PUBLISHED: 2020-07-13
The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
PUBLISHED: 2020-07-13
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
PUBLISHED: 2020-07-13
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
PUBLISHED: 2020-07-13
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version allows unauthenticated remote attackers to start a telnetd service on the device.