Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

7/1/2015
08:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Distil Networks Announces $21M in Funding Led By Bessemer Venture Partners

New funding to fuel growth and innovation of bot detection and mitigation technology

San Francisco, CA – June 30, 2015 Distil Networks, Inc., the global leader in bot detection and mitigation, today announced that it has closed a $21 million round of Series B financing. New investor Bessemer Venture Partners (BVP) led this round, with participation from current investors Foundry, TechStars, ff Venture Capital, Idea Fund and Correlation Ventures. David Cowan, partner at BVP and co-founder of VeriSign, Good Technology and Defense.net, will join Distil's board of directors. Funding will be used to expand sales, marketing, and engineering. Distil’s total funding is $38 million to date.

In a world where only 41 percent of web traffic originates from humans, Distil offers the first easy and accurate way to defend websites against malicious bots used for web scraping, brute force attacks, competitive data mining, account hijacking, unauthorized vulnerability scans, spam, man-in-the-middle attacks and click fraud – all without impacting users. Distil’s unique approach monitors every single Web request and builds a signature, or fingerprint, of every incoming connection, allowing the company to accurately detect, flag and block that unique fingerprint for all other sites under Distil’s protection. Having blocked more than 50 billion bad bots to date, Distil has the largest known database of malicious bots.

“Malicious bots have become increasingly more pervasive, sophisticated and detrimental to companies around the world, and Distil is the only solution that is purpose built to identify and stop 99.99 percent of bad bots without affecting users,” said Distil Networks CEO and Co-founder Rami Essaid. “This latest round of funding combined with the momentum we've experienced since bringing our product to market further validates the need for a superior level of protection against malicious bots from attacking a company’s Web infrastructure.”

"Distil's cloud service now has the largest database of known bots, and gets smarter every minute," said David Cowan, a BVP partner and Distil board member. "By blocking bot traffic, Distil cuts off entire classes of automated fraud and cyber attacks." 

Over the last year, Distil has achieved several key milestones, including:

●      Grew  revenue by more than 400 percent year-over-year.

●      Secured dozens of  Fortune 500 customers, as well as innovative brands such as Glassdoor, CrunchBase, FindTheBest.com and Wayfair.

●      Opened a third office and doubled its workforce, including key hires from Microsoft, IBM, and Cisco.

●      Gartner recognized Distil Networks as a Representative Vendor in their Market Guide for Online Fraud Detection.

According to Gartner, Fraudsters are “spreading their attacks over thousands of IP addresses — many of which are purposefully chosen to originate in locations that appear legitimate (for example, in the same geographic area that a target victim lives in).” Furthermore, “They are also slowing down their scripted attacks to move at the pace of an average human.”

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cybersecurity Industry: It's Time to Stop the Victim Blame Game
Jessica Smith, Senior Vice President, The Crypsis Group,  2/25/2020
Google Adds More Security Features Via Chronicle Division
Robert Lemos, Contributing Writer,  2/25/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9431
PUBLISHED: 2020-02-27
In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the LTE RRC dissector could leak memory. This was addressed in epan/dissectors/packet-lte-rrc.c by adjusting certain append operations.
CVE-2020-9432
PUBLISHED: 2020-02-27
openssl_x509_check_host in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
CVE-2020-9433
PUBLISHED: 2020-02-27
openssl_x509_check_email in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
CVE-2020-9434
PUBLISHED: 2020-02-27
openssl_x509_check_ip_asc in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
CVE-2020-6383
PUBLISHED: 2020-02-27
Type confusion in V8 in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.