Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

12/17/2019
10:55 AM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Data Security Startup Satori Cyber Launches with $5.25M Seed Round

Satori Cyber aims to help businesses better protect and govern their information with its Secure Data Access Cloud.

The importance of data is a boon and challenge to today's organizations, which rely on it to remain competitive but struggle to protect it. Providing employees with access to data that spans cloud stores and data warehouses can introduce security, privacy, and compliance risks.

Satori Cyber is a new startup emerging from stealth with $5.25 million in seed funding primarily led by YL Ventures. It aims to help businesses protect data as more teams, partners, and customers demand access. Its inaugural product is the Secure Data Access Cloud, a platform to give businesses capabilities they need to understand how data flows and who can access it.

Co-founder and CEO Eldad Chai met co-founder and CTO Yoav Cohen nine years ago, when the two were employees at Incapsula. When Incapsula was sold to Imperva in 2014, the duo continued to build security products as part of Imperva's executive team. When the company was later sold to Thoma Bravo in late 2018, they started thinking about where they'd go next.

"We like to look at major business trends of the time and try to enable businesses to achieve those," Chai says. "What we've seen in the past year is how companies have become more data-driven." They noticed new cloud technologies and regulations create "a lot of friction" in achieving that goal and wanted to improve the process.

There are two types of strategies businesses take when trying to address data protection and governance, Chai continues. One is segregation, or breaking data into smaller chunks per use case. "The downside of that is it's running a lot of infrastructure," he notes. "It's expensive and it slows down innovation because there's no one place to access data."

The second way is trying to piece together various controls on an existing platform in an attempt to achieve a greater level of visibility and control. "That's cumbersome and costly in terms of time," Chai says, and results in fragile implementation with a lot of manual overhead.

Satori's Secure Data Access Cloud is "a proxy service that sits between consumers of data and data stores," Cohen explains. The cloud-native platform sits in front of data stores and inspects both queries and results to build a map of how data flows across the environment and applies privacy policies, considering a person's identity, data being accessed, and behavioral activity. It supports both software-as-a-service and customer-hosted deployment options, he adds.

"The platform sees every data transaction in the environment," Cohen continues. "So it can identify whether it's personally identifiable information, PCI, [and] data types of that sort to make sure sensitive information is not being exposed to people who shouldn't be exposed to it."

Satori is primarily interested in data generated by applications and consumer data. It targets midsize to large data-driven enterprises with large amounts of regulated data and high demand for internal access and analysis, Chai says. This could include major SaaS platforms, financial technology companies, and large retailers, all of which have online revenue-generating services for consumers, collect the data, and employ internal teams to analyze it.

Cohen says what sets Satori's product apart from others is it doesn't tie to any specific data store platform organizations are using today. "The solution is unopinionated about your existing architecture," he explains. "It can be deployed regardless of how you decide to architect or organize your data infrastructure."

"We're not asking companies to change the way they interact and use data," Chai adds. "Companies have their own way of doing things … if companies want to change data platforms, they can do that." What they have found, he adds, is it's more effective to aim to provide visibility regardless of the data storage organizations already use.

Both Chai and Cohen are based in Tel Aviv, where they plan to build its engineering team, and its go-to-market will be the United States. The company is starting with a team of ten, they say, and plans to recruit more as the product continues to progress.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Disarming Disinformation"

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Stop Defending Everything
Kevin Kurzawa, Senior Information Security Auditor,  2/12/2020
Small Business Security: 5 Tips on How and Where to Start
Mike Puglia, Chief Strategy Officer at Kaseya,  2/13/2020
Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems
Jai Vijayan, Contributing Writer,  2/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8996
PUBLISHED: 2020-02-16
AnyShare Cloud 6.0.9 allows authenticated directory traversal to read files, as demonstrated by the interface/downloadwithpath/downloadfile/?filepath=/etc/passwd URI.
CVE-2020-8997
PUBLISHED: 2020-02-16
Abbott FreeStyle Libre 14-day before February 2020 and FreeStyle Libre 2 before February 2020 allow remote attackers to enable write access via a specific NFC unlock command.
CVE-2020-7050
PUBLISHED: 2020-02-15
Codologic Codoforum through 4.8.4 allows a DOM-based XSS. While creating a new topic as a normal user, it is possible to add a poll that is automatically loaded in the DOM once the thread/topic is opened. Because session cookies lack the HttpOnly flag, it is possible to steal authentication cookies ...
CVE-2019-13965
PUBLISHED: 2020-02-14
Because of a lack of sanitization around error messages, multiple Reflective XSS issues exist in iTop through 2.6.0 via the param_file parameter to webservices/export.php, webservices/cron.php, or env-production/itop-backup/backup.php. By default, any XSS sent to the administrator can be transformed...
CVE-2019-13966
PUBLISHED: 2020-02-14
In iTop through 2.6.0, an XSS payload can be delivered in certain fields (such as icon) of the XML file used to build the dashboard. This is similar to CVE-2015-6544 (which is only about the dashboard title).