Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

9/10/2014
09:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

LightCyber Announces $10 Million Funding Round Led by Battery Ventures

Battery joins existing investors to scale up sales and marketing operations for company's award-winning automated breach detection and response platform

New York & Ramat Gan, Israel—September 10, 2014 – LightCyber (www.lightcyber.com), a leading provider of breach detection and response solutions, announced today that it has raised $10 million in a new funding round led by Battery Ventures with participation from existing investors Glilot Capital, which led the company’s previous round, and Marius Nacht, the founder of Check Point Software (CHKP). It also announced that Itzik Parnafes, general partner of Battery Ventures, will join LightCyber’s board of directors.

The new funds will be used to expand LightCyber sales and marketing operations in the U.S. market to meet the increasing demand from enterprise customers for its flagship automated breach detection product – LightCyber Magna. The product helps companies mitigate the damage from cybercrime through early detection of active attacks that managed to penetrate existing security controls. LightCyber was recently named a ‘Cool Vendor’ by Gartner and was a top 10 finalist for RSA® Conference’s 2014 Innovation Sandbox Most Innovative Company award. It also recently announced a strategic partnership with Check Point Software, providing joint customers with early breach detection, immediate response and advanced security protection.

“Battery Ventures is the ideal partner to join LightCyber shareholders as we expand our leadership position in the breach detection market,” said Gonen Fink, chief executive officer of LightCyber. “Battery is an experienced, global investor with deep knowledge about the enterprise space, and we are excited the firm is partnering with LightCyber to help us grow our expanding footprint in this sector. Over the past few months, we have deployed our solution in dozens of new enterprise customers around the world, responding to breaches on a daily basis, and the additional funds will allow us to further accelerate the market delivery of our breach detection platform.”

"In today's landscape of advanced, persistent threats, old-fashioned, perimeter security measures are no longer sufficient," said Battery's Parnafes. "Today, a company's security arsenal must contain technology that can identify malicious activity in the internal network with a minimum of false-positives. We were impressed by LightCyber’s vision to solve this challenge and with its world-class talent and technology that enable such a solution, and we are proud to partner with the company."

With existing security controls failing to protect against advanced threats, the cost of cybercrime in the U.S. has risen by approximately 30 percent in the past 12 months. As a result, Gartner estimates that enterprise budget allocation for rapid detection and response products will grow from 10 percent in 2014, to 60 percent by 2020. However, most of the advanced threat detection solutions identify malware or anomalies, leaving it up to organizations to determine if a breach has actually occurred, incurring significant operational cost and limited efficiency.

LightCyber Magna enables organizations to quickly and cost effectively identify and mitigate attacks on their networks. It is the first solution to combine network and endpoint analysis into a single detection engine and automatically and accurately detects active breaches, allowing organizations to effectively and efficiently remediate those breaches and secure their networks.

About Battery Ventures
Battery invests in cutting-edge, category-defining businesses in markets including software and services, Web infrastructure, e-commerce, digital media and industrial technologies. Founded in 1983, the firm backs companies at stages ranging from seed to buyout and invests globally from offices in Boston, Silicon Valley and Israel. Follow the firm on Twitter @BatteryVentures, visit our website at www.battery.com and find a full list of Battery's portfolio companies here.

About LightCyber
LightCyber is a leading provider of advanced breach detection solutions that protect organizations from targeted threats and cyber-attacks. LightCyber Magna™ is the first product to analyze both network traffic and endpoint information to understand the behavior of users, devices and applications and to detect compromised computers and stolen credentials early in the attack lifecycle, allowing users to remediate breaches and stop attacks before the damage is done. Founded in 2011 and led by world-class cyber security experts and a seasoned management team, the company's products have been successfully deployed by top-tier customers in the financial, legal, telecom, government, media and technology sectors. For more information, please visit http://www.lightcyber.com.

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DebbieCohen
50%
50%
DebbieCohen,
User Rank: Apprentice
9/17/2014 | 7:30:43 AM
Re: Breach detection System
Hi,

So being VP Marketing at LightCyber I definitely understand where your question is coming from as there does seem to be some confusion to what exactly is a "breach".

NSS BDS report compares sandboxing solutions such as Fireeye and others. These product detect malware in incoming mail or web downloads.

Some people argue that sandboxing is a prevention technology (like IPS, UTM, FW and anti-virus) and not a breach detection technology, as it tries to block *potential* infections and not actual breaches.

LightCyber detects the presence and behavior of attackers inside the network when they are already in, but much before the damage is done, regardless of the intrusion vector. In many cases malware is not even part of the process - it could be an attacker that has gained access via remote access, an insider, or a BYOD. Once the attacker is inside it takes him months to create the damage, and LightCyber can detect the breach on the first day or so, by detecting the lateral movement in the network and endpoints.

So LightCyber can detect an active breach regardless of the attack vector.

Since LightCyber covers a different part of the attack, it is not relevant to be compared against Sandboxing products.

I hope that this answers your question.

Debbie Cohen-Abravanel
VP Marketing
LightCyber
flameparis
100%
0%
flameparis,
User Rank: Apprentice
9/15/2014 | 11:00:51 AM
Breach detection System
Why Lightcyber is not in the results of NSS labs for Breach Detection System ???
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15596
PUBLISHED: 2020-08-12
The ALPS ALPINE touchpad driver before 8.2206.1717.634, as used on various Dell, HP, and Lenovo laptops, allows attackers to conduct Path Disclosure attacks via a "fake" DLL file.
CVE-2020-15868
PUBLISHED: 2020-08-12
Sonatype Nexus Repository Manager OSS/Pro before 3.26.0 has Incorrect Access Control.
CVE-2020-17362
PUBLISHED: 2020-08-12
search.php in the Nova Lite theme before 1.3.9 for WordPress allows Reflected XSS.
CVE-2020-17449
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS via the error_log file.
CVE-2020-17450
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS on the preview page.