Cloud

8/28/2018
09:50 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Lacework Closes $24 Million Series B Financing with Sutter Hill Ventures

Mountain View, Calif. – August 28, 2018 -  Lacework®, the industry’s first solution to bring automation, speed and scale to cloud security, today announced the closing of an $24 million Series B funding round led by Sutter Hill Ventures. Lacework will leverage these funds to facilitate immediate growth in global sales and marketing capabilities and accelerate adoption and deployment of its game-changing security solution which empowers organizations with automated, end-to-end security and compliance for public clouds. Additional investors participating in this funding round include Liberty Global Ventures, Spike Ventures and the Web Investment Network (WIN), and AME Cloud Ventures, bringing Lacework’s total funding to date to $32.7 million.

 Security remains a constant roadblock for many organizations wanting to innovate quickly within public clouds. ESG Global reports on the obvious opportunity for cloud security innovations: “Traditional, network-centric security solutions built for static environments are showing their limitations in the ephemeral constructs of public cloud computing. The mismatch generally results in outright failure — 32 percent of enterprises have abandoned traditional security technologies because they couldn’t be used effectively for cloud security.”

Lacework is transforming the security industry by addressing the unique demands of the cloud: speed, scale and automation. With the Lacework Cloud Security Platform, security teams can minimize security risks, detect threats and close compliance gaps without slowing down the pace of innovation.

“Public clouds have become the de-facto platforms where businesses innovate at speed. Our vision at Lacework is to become the de-facto security platform that enables these organizations to build cloud services fast and remain safe,” said Stefan Dyckerhoff, President and CEO, Lacework. “With more than 20 customers in production, Lacework is a proven solution that delivers effective cloud protection at scale and with the speed required for high-velocity public clouds. Fast-growth companies with large footprints in public clouds have achieved continuous compliance and end-to-end security across highly dynamic development and production environments. It’s time to combine automation, machine learning and analytics with human expertise to deliver security at scale.”

Lacework was recently named a Cool Vendor in the May 2018 report, Cool Vendors in Cloud Security,[1] by Gartner, Inc. The Lacework Cloud Security Platform uses machine learning to analyze the billions of events generated by modern clouds, baseline the normal behavior of each cloud deployment, and automate the detection and scoring of risks across the cloud’s multiple attack surfaces. The result is continuous, end-to-end and more effective security for cloud environments. For more information on Lacework and the Lacework Cloud Security Platform, please visit www.lacework.com.

Gartner Disclaimer

Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Lacework

Lacework is the industry’s first solution to bring automation, speed, and scale to cloud security enabling enterprises to safely innovate fast in the cloud. Unlike conventional security tools built for static datacenters, Lacework is designed to self-adapt to the cloud ever-changing configuration and workloads. Just like DevOps automates code deployment, Lacework automates cloud security, empowering IT to continuously keep cloud environments secure and compliant. Based in Mountain View, California, Lacework is a privately held company funded by Sutter Hill Ventures. Find out more at www.lacework.com.

 

Media Contact
Jacqueline Meyler

Lumina Communications on behalf of Lacework

(669) 234-9775

[email protected]

 



[1] Gartner Cool Vendors in Cloud Securityby Jay Heiser, Neil MacDonald, Lawrence Orans, Steve Riley, May 7, 2018.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8980
PUBLISHED: 2019-02-21
A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.
CVE-2019-8979
PUBLISHED: 2019-02-21
Koseven through 3.3.9, and Kohana through 3.3.6, has SQL Injection when the order_by() parameter can be controlled.
CVE-2013-7469
PUBLISHED: 2019-02-21
Seafile through 6.2.11 always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
CVE-2018-20146
PUBLISHED: 2019-02-21
An issue was discovered in Liquidware ProfileUnity before 6.8.0 with Liquidware FlexApp before 6.8.0. A local user could obtain administrator rights, as demonstrated by use of PowerShell.
CVE-2019-5727
PUBLISHED: 2019-02-21
Splunk Web in Splunk Enterprise 6.5.x before 6.5.5, 6.4.x before 6.4.9, 6.3.x before 6.3.12, 6.2.x before 6.2.14, 6.1.x before 6.1.14, and 6.0.x before 6.0.15 and Splunk Light before 6.6.0 has Persistent XSS, aka SPL-138827.