Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

12/17/2019
10:55 AM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Data Security Startup Satori Cyber Launches with $5.25M Seed Round

Satori Cyber aims to help businesses better protect and govern their information with its Secure Data Access Cloud.

The importance of data is a boon and challenge to today's organizations, which rely on it to remain competitive but struggle to protect it. Providing employees with access to data that spans cloud stores and data warehouses can introduce security, privacy, and compliance risks.

Satori Cyber is a new startup emerging from stealth with $5.25 million in seed funding primarily led by YL Ventures. It aims to help businesses protect data as more teams, partners, and customers demand access. Its inaugural product is the Secure Data Access Cloud, a platform to give businesses capabilities they need to understand how data flows and who can access it.

Co-founder and CEO Eldad Chai met co-founder and CTO Yoav Cohen nine years ago, when the two were employees at Incapsula. When Incapsula was sold to Imperva in 2014, the duo continued to build security products as part of Imperva's executive team. When the company was later sold to Thoma Bravo in late 2018, they started thinking about where they'd go next.

"We like to look at major business trends of the time and try to enable businesses to achieve those," Chai says. "What we've seen in the past year is how companies have become more data-driven." They noticed new cloud technologies and regulations create "a lot of friction" in achieving that goal and wanted to improve the process.

There are two types of strategies businesses take when trying to address data protection and governance, Chai continues. One is segregation, or breaking data into smaller chunks per use case. "The downside of that is it's running a lot of infrastructure," he notes. "It's expensive and it slows down innovation because there's no one place to access data."

The second way is trying to piece together various controls on an existing platform in an attempt to achieve a greater level of visibility and control. "That's cumbersome and costly in terms of time," Chai says, and results in fragile implementation with a lot of manual overhead.

Satori's Secure Data Access Cloud is "a proxy service that sits between consumers of data and data stores," Cohen explains. The cloud-native platform sits in front of data stores and inspects both queries and results to build a map of how data flows across the environment and applies privacy policies, considering a person's identity, data being accessed, and behavioral activity. It supports both software-as-a-service and customer-hosted deployment options, he adds.

"The platform sees every data transaction in the environment," Cohen continues. "So it can identify whether it's personally identifiable information, PCI, [and] data types of that sort to make sure sensitive information is not being exposed to people who shouldn't be exposed to it."

Satori is primarily interested in data generated by applications and consumer data. It targets midsize to large data-driven enterprises with large amounts of regulated data and high demand for internal access and analysis, Chai says. This could include major SaaS platforms, financial technology companies, and large retailers, all of which have online revenue-generating services for consumers, collect the data, and employ internal teams to analyze it.

Cohen says what sets Satori's product apart from others is it doesn't tie to any specific data store platform organizations are using today. "The solution is unopinionated about your existing architecture," he explains. "It can be deployed regardless of how you decide to architect or organize your data infrastructure."

"We're not asking companies to change the way they interact and use data," Chai adds. "Companies have their own way of doing things … if companies want to change data platforms, they can do that." What they have found, he adds, is it's more effective to aim to provide visibility regardless of the data storage organizations already use.

Both Chai and Cohen are based in Tel Aviv, where they plan to build its engineering team, and its go-to-market will be the United States. The company is starting with a team of ten, they say, and plans to recruit more as the product continues to progress.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Disarming Disinformation"

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
HackerOne Drops Mobile Voting App Vendor Voatz
Dark Reading Staff 3/30/2020
Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
Curtis Franklin Jr., Senior Editor at Dark Reading,  3/31/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5300
PUBLISHED: 2020-04-06
In Hydra (an OAuth2 Server and OpenID Certifiedâ„¢ OpenID Connect Provider written in Go), before version 1.4.0+oryOS.17, when using client authentication method 'private_key_jwt' [1], OpenId specification says the following about assertion `jti`: "A unique identifier for the t...
CVE-2019-19699
PUBLISHED: 2020-04-06
There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration, leading to system compromise via apache crontab misconfiguration, This allows the apache user to modify an executable file executed by root at 22:30 every day. To e...
CVE-2020-11102
PUBLISHED: 2020-04-06
hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.
CVE-2020-11507
PUBLISHED: 2020-04-06
An Untrusted Search Path vulnerability in Malwarebytes AdwCleaner 8.0.3 could cause arbitrary code execution with SYSTEM privileges when a malicious DLL library is loaded.
CVE-2020-11544
PUBLISHED: 2020-04-06
An issue was discovered in Project Worlds Official Car Rental System 1. It allows the admin user to run commands on the server with their account because the upload section on the file-manager page contains an arbitrary file upload vulnerability via add_cars.php. There are no upload restrictions for...