Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

8/28/2018
09:50 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Lacework Closes $24 Million Series B Financing with Sutter Hill Ventures

Mountain View, Calif. – August 28, 2018 -  Lacework®, the industry’s first solution to bring automation, speed and scale to cloud security, today announced the closing of an $24 million Series B funding round led by Sutter Hill Ventures. Lacework will leverage these funds to facilitate immediate growth in global sales and marketing capabilities and accelerate adoption and deployment of its game-changing security solution which empowers organizations with automated, end-to-end security and compliance for public clouds. Additional investors participating in this funding round include Liberty Global Ventures, Spike Ventures and the Web Investment Network (WIN), and AME Cloud Ventures, bringing Lacework’s total funding to date to $32.7 million.

 Security remains a constant roadblock for many organizations wanting to innovate quickly within public clouds. ESG Global reports on the obvious opportunity for cloud security innovations: “Traditional, network-centric security solutions built for static environments are showing their limitations in the ephemeral constructs of public cloud computing. The mismatch generally results in outright failure — 32 percent of enterprises have abandoned traditional security technologies because they couldn’t be used effectively for cloud security.”

Lacework is transforming the security industry by addressing the unique demands of the cloud: speed, scale and automation. With the Lacework Cloud Security Platform, security teams can minimize security risks, detect threats and close compliance gaps without slowing down the pace of innovation.

“Public clouds have become the de-facto platforms where businesses innovate at speed. Our vision at Lacework is to become the de-facto security platform that enables these organizations to build cloud services fast and remain safe,” said Stefan Dyckerhoff, President and CEO, Lacework. “With more than 20 customers in production, Lacework is a proven solution that delivers effective cloud protection at scale and with the speed required for high-velocity public clouds. Fast-growth companies with large footprints in public clouds have achieved continuous compliance and end-to-end security across highly dynamic development and production environments. It’s time to combine automation, machine learning and analytics with human expertise to deliver security at scale.”

Lacework was recently named a Cool Vendor in the May 2018 report, Cool Vendors in Cloud Security,[1] by Gartner, Inc. The Lacework Cloud Security Platform uses machine learning to analyze the billions of events generated by modern clouds, baseline the normal behavior of each cloud deployment, and automate the detection and scoring of risks across the cloud’s multiple attack surfaces. The result is continuous, end-to-end and more effective security for cloud environments. For more information on Lacework and the Lacework Cloud Security Platform, please visit www.lacework.com.

Gartner Disclaimer

Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Lacework

Lacework is the industry’s first solution to bring automation, speed, and scale to cloud security enabling enterprises to safely innovate fast in the cloud. Unlike conventional security tools built for static datacenters, Lacework is designed to self-adapt to the cloud ever-changing configuration and workloads. Just like DevOps automates code deployment, Lacework automates cloud security, empowering IT to continuously keep cloud environments secure and compliant. Based in Mountain View, California, Lacework is a privately held company funded by Sutter Hill Ventures. Find out more at www.lacework.com.

 

Media Contact
Jacqueline Meyler

Lumina Communications on behalf of Lacework

(669) 234-9775

[email protected]

 



[1] Gartner Cool Vendors in Cloud Securityby Jay Heiser, Neil MacDonald, Lawrence Orans, Steve Riley, May 7, 2018.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Brian Monkman, Executive Director at NetSecOPEN,  7/19/2019
RDP Bug Takes New Approach to Host Compromise
Kelly Sheridan, Staff Editor, Dark Reading,  7/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-14248
PUBLISHED: 2019-07-24
In libnasm.a in Netwide Assembler (NASM) 2.14.xx, asm/pragma.c allows a NULL pointer dereference in process_pragma, search_pragma_list, and nasm_set_limit when "%pragma limit" is mishandled.
CVE-2019-14249
PUBLISHED: 2019-07-24
dwarf_elf_load_headers.c in libdwarf before 2019-07-05 allows attackers to cause a denial of service (division by zero) via an ELF file with a zero-size section group (SHT_GROUP), as demonstrated by dwarfdump.
CVE-2019-14250
PUBLISHED: 2019-07-24
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.
CVE-2019-14247
PUBLISHED: 2019-07-24
The scan() function in mad.c in mpg321 0.3.2 allows remote attackers to trigger an out-of-bounds write via a zero bitrate in an MP3 file.
CVE-2019-2873
PUBLISHED: 2019-07-23
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox...