Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

8/28/2018
09:50 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Lacework Closes $24 Million Series B Financing with Sutter Hill Ventures

Mountain View, Calif. – August 28, 2018 -  Lacework®, the industry’s first solution to bring automation, speed and scale to cloud security, today announced the closing of an $24 million Series B funding round led by Sutter Hill Ventures. Lacework will leverage these funds to facilitate immediate growth in global sales and marketing capabilities and accelerate adoption and deployment of its game-changing security solution which empowers organizations with automated, end-to-end security and compliance for public clouds. Additional investors participating in this funding round include Liberty Global Ventures, Spike Ventures and the Web Investment Network (WIN), and AME Cloud Ventures, bringing Lacework’s total funding to date to $32.7 million.

 Security remains a constant roadblock for many organizations wanting to innovate quickly within public clouds. ESG Global reports on the obvious opportunity for cloud security innovations: “Traditional, network-centric security solutions built for static environments are showing their limitations in the ephemeral constructs of public cloud computing. The mismatch generally results in outright failure — 32 percent of enterprises have abandoned traditional security technologies because they couldn’t be used effectively for cloud security.”

Lacework is transforming the security industry by addressing the unique demands of the cloud: speed, scale and automation. With the Lacework Cloud Security Platform, security teams can minimize security risks, detect threats and close compliance gaps without slowing down the pace of innovation.

“Public clouds have become the de-facto platforms where businesses innovate at speed. Our vision at Lacework is to become the de-facto security platform that enables these organizations to build cloud services fast and remain safe,” said Stefan Dyckerhoff, President and CEO, Lacework. “With more than 20 customers in production, Lacework is a proven solution that delivers effective cloud protection at scale and with the speed required for high-velocity public clouds. Fast-growth companies with large footprints in public clouds have achieved continuous compliance and end-to-end security across highly dynamic development and production environments. It’s time to combine automation, machine learning and analytics with human expertise to deliver security at scale.”

Lacework was recently named a Cool Vendor in the May 2018 report, Cool Vendors in Cloud Security,[1] by Gartner, Inc. The Lacework Cloud Security Platform uses machine learning to analyze the billions of events generated by modern clouds, baseline the normal behavior of each cloud deployment, and automate the detection and scoring of risks across the cloud’s multiple attack surfaces. The result is continuous, end-to-end and more effective security for cloud environments. For more information on Lacework and the Lacework Cloud Security Platform, please visit www.lacework.com.

Gartner Disclaimer

Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Lacework

Lacework is the industry’s first solution to bring automation, speed, and scale to cloud security enabling enterprises to safely innovate fast in the cloud. Unlike conventional security tools built for static datacenters, Lacework is designed to self-adapt to the cloud ever-changing configuration and workloads. Just like DevOps automates code deployment, Lacework automates cloud security, empowering IT to continuously keep cloud environments secure and compliant. Based in Mountain View, California, Lacework is a privately held company funded by Sutter Hill Ventures. Find out more at www.lacework.com.

 

Media Contact
Jacqueline Meyler

Lumina Communications on behalf of Lacework

(669) 234-9775

[email protected]

 



[1] Gartner Cool Vendors in Cloud Securityby Jay Heiser, Neil MacDonald, Lawrence Orans, Steve Riley, May 7, 2018.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
The Flaw in Vulnerability Management: It's Time to Get Real
Jim Souders, Chief Executive Officer at Adaptiva,  8/15/2019
5 Ways to Improve the Patching Process
Kacy Zurkus, Contributing Writer,  8/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5638
PUBLISHED: 2019-08-21
Rapid7 Nexpose versions 6.5.50 and prior suffer from insufficient session expiration when an administrator performs a security relevant edit on an existing, logged on user. For example, if a user's password is changed by an administrator due to an otherwise unrelated credential leak, that user accou...
CVE-2019-6177
PUBLISHED: 2019-08-21
A vulnerability reported in Lenovo Solution Center version 03.12.003, which is no longer supported, could allow log files to be written to non-standard locations, potentially leading to privilege escalation. Lenovo ended support for Lenovo Solution Center and recommended that customers migrate to Le...
CVE-2019-10687
PUBLISHED: 2019-08-21
KBPublisher 6.0.2.1 has SQL Injection via the admin/index.php?module=report entry_id[0] parameter, the admin/index.php?module=log id parameter, or an index.php?View=print&id[]= request.
CVE-2019-11601
PUBLISHED: 2019-08-21
A directory traversal vulnerability in remote access to backup & restore in earlier versions than ProSyst mBS SDK 8.2.6 and Bosch IoT Gateway Software 9.2.0 allows remote attackers to write or delete files at any location.
CVE-2019-11602
PUBLISHED: 2019-08-21
Leakage of stack traces in remote access to backup & restore in earlier versions than ProSyst mBS SDK 8.2.6 and Bosch IoT Gateway Software 9.2.0 allows remote attackers to gather information about the file system structure.