Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

9/10/2014
09:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

LightCyber Announces $10 Million Funding Round Led by Battery Ventures

Battery joins existing investors to scale up sales and marketing operations for company's award-winning automated breach detection and response platform

New York & Ramat Gan, Israel—September 10, 2014 – LightCyber (www.lightcyber.com), a leading provider of breach detection and response solutions, announced today that it has raised $10 million in a new funding round led by Battery Ventures with participation from existing investors Glilot Capital, which led the company’s previous round, and Marius Nacht, the founder of Check Point Software (CHKP). It also announced that Itzik Parnafes, general partner of Battery Ventures, will join LightCyber’s board of directors.

The new funds will be used to expand LightCyber sales and marketing operations in the U.S. market to meet the increasing demand from enterprise customers for its flagship automated breach detection product – LightCyber Magna. The product helps companies mitigate the damage from cybercrime through early detection of active attacks that managed to penetrate existing security controls. LightCyber was recently named a ‘Cool Vendor’ by Gartner and was a top 10 finalist for RSA® Conference’s 2014 Innovation Sandbox Most Innovative Company award. It also recently announced a strategic partnership with Check Point Software, providing joint customers with early breach detection, immediate response and advanced security protection.

“Battery Ventures is the ideal partner to join LightCyber shareholders as we expand our leadership position in the breach detection market,” said Gonen Fink, chief executive officer of LightCyber. “Battery is an experienced, global investor with deep knowledge about the enterprise space, and we are excited the firm is partnering with LightCyber to help us grow our expanding footprint in this sector. Over the past few months, we have deployed our solution in dozens of new enterprise customers around the world, responding to breaches on a daily basis, and the additional funds will allow us to further accelerate the market delivery of our breach detection platform.”

"In today's landscape of advanced, persistent threats, old-fashioned, perimeter security measures are no longer sufficient," said Battery's Parnafes. "Today, a company's security arsenal must contain technology that can identify malicious activity in the internal network with a minimum of false-positives. We were impressed by LightCyber’s vision to solve this challenge and with its world-class talent and technology that enable such a solution, and we are proud to partner with the company."

With existing security controls failing to protect against advanced threats, the cost of cybercrime in the U.S. has risen by approximately 30 percent in the past 12 months. As a result, Gartner estimates that enterprise budget allocation for rapid detection and response products will grow from 10 percent in 2014, to 60 percent by 2020. However, most of the advanced threat detection solutions identify malware or anomalies, leaving it up to organizations to determine if a breach has actually occurred, incurring significant operational cost and limited efficiency.

LightCyber Magna enables organizations to quickly and cost effectively identify and mitigate attacks on their networks. It is the first solution to combine network and endpoint analysis into a single detection engine and automatically and accurately detects active breaches, allowing organizations to effectively and efficiently remediate those breaches and secure their networks.

About Battery Ventures
Battery invests in cutting-edge, category-defining businesses in markets including software and services, Web infrastructure, e-commerce, digital media and industrial technologies. Founded in 1983, the firm backs companies at stages ranging from seed to buyout and invests globally from offices in Boston, Silicon Valley and Israel. Follow the firm on Twitter @BatteryVentures, visit our website at www.battery.com and find a full list of Battery's portfolio companies here.

About LightCyber
LightCyber is a leading provider of advanced breach detection solutions that protect organizations from targeted threats and cyber-attacks. LightCyber Magna™ is the first product to analyze both network traffic and endpoint information to understand the behavior of users, devices and applications and to detect compromised computers and stolen credentials early in the attack lifecycle, allowing users to remediate breaches and stop attacks before the damage is done. Founded in 2011 and led by world-class cyber security experts and a seasoned management team, the company's products have been successfully deployed by top-tier customers in the financial, legal, telecom, government, media and technology sectors. For more information, please visit http://www.lightcyber.com.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DebbieCohen
50%
50%
DebbieCohen,
User Rank: Apprentice
9/17/2014 | 7:30:43 AM
Re: Breach detection System
Hi,

So being VP Marketing at LightCyber I definitely understand where your question is coming from as there does seem to be some confusion to what exactly is a "breach".

NSS BDS report compares sandboxing solutions such as Fireeye and others. These product detect malware in incoming mail or web downloads.

Some people argue that sandboxing is a prevention technology (like IPS, UTM, FW and anti-virus) and not a breach detection technology, as it tries to block *potential* infections and not actual breaches.

LightCyber detects the presence and behavior of attackers inside the network when they are already in, but much before the damage is done, regardless of the intrusion vector. In many cases malware is not even part of the process - it could be an attacker that has gained access via remote access, an insider, or a BYOD. Once the attacker is inside it takes him months to create the damage, and LightCyber can detect the breach on the first day or so, by detecting the lateral movement in the network and endpoints.

So LightCyber can detect an active breach regardless of the attack vector.

Since LightCyber covers a different part of the attack, it is not relevant to be compared against Sandboxing products.

I hope that this answers your question.

Debbie Cohen-Abravanel
VP Marketing
LightCyber
flameparis
100%
0%
flameparis,
User Rank: Apprentice
9/15/2014 | 11:00:51 AM
Breach detection System
Why Lightcyber is not in the results of NSS labs for Breach Detection System ???
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6852
PUBLISHED: 2019-11-20
A CWE-200: Information Exposure vulnerability exists in Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions), which could cause the disclosure of FTP har...
CVE-2019-6853
PUBLISHED: 2019-11-20
A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server.
CVE-2013-2092
PUBLISHED: 2019-11-20
Cross-site Scripting (XSS) in Dolibarr ERP/CRM 3.3.1 allows remote attackers to inject arbitrary web script or HTML in functions.lib.php.
CVE-2013-2093
PUBLISHED: 2019-11-20
Dolibarr ERP/CRM 3.3.1 does not properly validate user input in viewimage.php and barcode.lib.php which allows remote attackers to execute arbitrary commands.
CVE-2015-3166
PUBLISHED: 2019-11-20
The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as d...