Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:00 AM
Dark Reading
Dark Reading
Products and Releases

LightCyber Announces $10 Million Funding Round Led by Battery Ventures

Battery joins existing investors to scale up sales and marketing operations for company's award-winning automated breach detection and response platform

New York & Ramat Gan, Israel—September 10, 2014 – LightCyber (www.lightcyber.com), a leading provider of breach detection and response solutions, announced today that it has raised $10 million in a new funding round led by Battery Ventures with participation from existing investors Glilot Capital, which led the company’s previous round, and Marius Nacht, the founder of Check Point Software (CHKP). It also announced that Itzik Parnafes, general partner of Battery Ventures, will join LightCyber’s board of directors.

The new funds will be used to expand LightCyber sales and marketing operations in the U.S. market to meet the increasing demand from enterprise customers for its flagship automated breach detection product – LightCyber Magna. The product helps companies mitigate the damage from cybercrime through early detection of active attacks that managed to penetrate existing security controls. LightCyber was recently named a ‘Cool Vendor’ by Gartner and was a top 10 finalist for RSA® Conference’s 2014 Innovation Sandbox Most Innovative Company award. It also recently announced a strategic partnership with Check Point Software, providing joint customers with early breach detection, immediate response and advanced security protection.

“Battery Ventures is the ideal partner to join LightCyber shareholders as we expand our leadership position in the breach detection market,” said Gonen Fink, chief executive officer of LightCyber. “Battery is an experienced, global investor with deep knowledge about the enterprise space, and we are excited the firm is partnering with LightCyber to help us grow our expanding footprint in this sector. Over the past few months, we have deployed our solution in dozens of new enterprise customers around the world, responding to breaches on a daily basis, and the additional funds will allow us to further accelerate the market delivery of our breach detection platform.”

"In today's landscape of advanced, persistent threats, old-fashioned, perimeter security measures are no longer sufficient," said Battery's Parnafes. "Today, a company's security arsenal must contain technology that can identify malicious activity in the internal network with a minimum of false-positives. We were impressed by LightCyber’s vision to solve this challenge and with its world-class talent and technology that enable such a solution, and we are proud to partner with the company."

With existing security controls failing to protect against advanced threats, the cost of cybercrime in the U.S. has risen by approximately 30 percent in the past 12 months. As a result, Gartner estimates that enterprise budget allocation for rapid detection and response products will grow from 10 percent in 2014, to 60 percent by 2020. However, most of the advanced threat detection solutions identify malware or anomalies, leaving it up to organizations to determine if a breach has actually occurred, incurring significant operational cost and limited efficiency.

LightCyber Magna enables organizations to quickly and cost effectively identify and mitigate attacks on their networks. It is the first solution to combine network and endpoint analysis into a single detection engine and automatically and accurately detects active breaches, allowing organizations to effectively and efficiently remediate those breaches and secure their networks.

About Battery Ventures
Battery invests in cutting-edge, category-defining businesses in markets including software and services, Web infrastructure, e-commerce, digital media and industrial technologies. Founded in 1983, the firm backs companies at stages ranging from seed to buyout and invests globally from offices in Boston, Silicon Valley and Israel. Follow the firm on Twitter @BatteryVentures, visit our website at www.battery.com and find a full list of Battery's portfolio companies here.

About LightCyber
LightCyber is a leading provider of advanced breach detection solutions that protect organizations from targeted threats and cyber-attacks. LightCyber Magna™ is the first product to analyze both network traffic and endpoint information to understand the behavior of users, devices and applications and to detect compromised computers and stolen credentials early in the attack lifecycle, allowing users to remediate breaches and stop attacks before the damage is done. Founded in 2011 and led by world-class cyber security experts and a seasoned management team, the company's products have been successfully deployed by top-tier customers in the financial, legal, telecom, government, media and technology sectors. For more information, please visit http://www.lightcyber.com.


Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
9/17/2014 | 7:30:43 AM
Re: Breach detection System

So being VP Marketing at LightCyber I definitely understand where your question is coming from as there does seem to be some confusion to what exactly is a "breach".

NSS BDS report compares sandboxing solutions such as Fireeye and others. These product detect malware in incoming mail or web downloads.

Some people argue that sandboxing is a prevention technology (like IPS, UTM, FW and anti-virus) and not a breach detection technology, as it tries to block *potential* infections and not actual breaches.

LightCyber detects the presence and behavior of attackers inside the network when they are already in, but much before the damage is done, regardless of the intrusion vector. In many cases malware is not even part of the process - it could be an attacker that has gained access via remote access, an insider, or a BYOD. Once the attacker is inside it takes him months to create the damage, and LightCyber can detect the breach on the first day or so, by detecting the lateral movement in the network and endpoints.

So LightCyber can detect an active breach regardless of the attack vector.

Since LightCyber covers a different part of the attack, it is not relevant to be compared against Sandboxing products.

I hope that this answers your question.

Debbie Cohen-Abravanel
VP Marketing
User Rank: Apprentice
9/15/2014 | 11:00:51 AM
Breach detection System
Why Lightcyber is not in the results of NSS labs for Breach Detection System ???
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
IoT Vulnerability Disclosure Platform Launched
Dark Reading Staff 10/19/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-10-22
Parse Server (npm package parse-server) broadcasts events to all clients without checking if the session token is valid. This allows clients with expired sessions to still receive subscription objects. It is not possible to create subscription objects with invalid session tokens. The issue is not pa...
PUBLISHED: 2020-10-22
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
PUBLISHED: 2020-10-22
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
PUBLISHED: 2020-10-22
An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.
PUBLISHED: 2020-10-22
An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.