Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

9/19/2017
11:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Capsule8 Secures $6M in Series A Funding Led by Bessemer Venture Partners

Brooklyn, Sept. 19, 2017 (GLOBE NEWSWIRE) --  Capsule8 today announced it has completed a $6 million round of funding. Bessemer Venture Partners led the Series A round with participation from strategic investors. This round brings total funding to more than $8.5 million for the next-generation security provider, which recently announced the beta version of Capsule8 Protect that is being deployed by some of the biggest companies on Wall Street and in Silicon Valley. Capsule8 will use its latest round of funding to further development of the industry’s first automated attack disruption platform for cloud-native environments and to prepare for its launch into general availability toward the end of this year.

Capsule8 also announced today that ClearSky Security Managing Director Jay Leek joined its board of directors. Leek joins Bessemer’s Bob Goodman and former RSA Chairman and Capsule8 investor Art Coviello on Capsule8’s board.  

“In less than a year, Capsule8 has made huge strides in product development and early customer traction,” said Bob Goodman, partner at Bessemer Venture Partners. “The team has a clear vision for the future of security as organizations embrace next-gen technologies like containers and microservices. At the same time, they recognize that while new technologies require a new security approach, legacy environments can’t be ignored. Capsule8 is redefining enterprise security with an innovative yet pragmatic solution for the cloud-native world.”

Progressive organizations are building and running applications to fully exploit the advantages of the cloud computing delivery model. Yet, this transformation comes at the cost of security and visibility, since infrastructure is pushed to areas that security appliances simply cannot see. This makes attack identification, forensics, and cleanup more difficult and costly than ever. In response, Capsule8 has created the industry's only automated attack disruption platform for cloud-native infrastructures that enables organizations to detect, isolate, and even shut down attacks in the instant they happen without impacting performance. Recognizing that enterprises will take time to fully move to next-generation infrastructure, the Capsule8 platform will also support legacy Linux production environments.

“The cybersecurity industry is in desperate need of updating, as the fundamental ideas and approaches that have driven this sector for the past two decades don’t sufficiently address today’s world of microservices, containers, and cloud technologies,” said Leek. “The Capsule8 team brings a rich pedigree and a highly unique approach to securely enabling digital transformation, which has already resulted in extraordinary beta uptake. We look forward to even more success and wider market adoption with Capsule8 Protect’s upcoming general release.”

“Our latest funding round is validation that the cybersecurity market is ready to leave behind the poor effectiveness and high maintenance costs of the appliance model, as they move to cloud-native approaches,” said John Viega, CEO of Capsule8. “As we prepare to enter GA with our flagship platform, we are psyched to have Bessemer, ClearSky and Art on our team.”

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-25329
PUBLISHED: 2021-03-01
The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previousl...
CVE-2021-25122
PUBLISHED: 2021-03-01
When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request...
CVE-2021-27225
PUBLISHED: 2021-03-01
In Dataiku DSS before 8.0.6, insufficient access control in the Jupyter notebooks integration allows users (who have coding permissions) to read and overwrite notebooks in projects that they are not authorized to access.
CVE-2021-27132
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
CVE-2021-25284
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.