Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

7/19/2017
12:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ScaleFT Closes $2M Seed Funding, Launches Zero Trust Solution for Cloud Security

Inspired by Google's BeyondCorp architecture, ScaleFT Zero Trust Access Management protects corporate resources without VPNs

SAN FRANCISCO, July 19, 2017 (GLOBE NEWSWIRE) – ScaleFT, the “Zero Trust” security company, today announced the close of a $2 million seed funding round and the pre-release availability of the ScaleFT Access Fabric, a new component of the ScaleFT Platform that allows enterprises to emulate security practices pioneered by Google. Participating in the round were Fathom Capital, Spectrum 28, Fuel Capital and Graham Weston, the founder of Rackspace. With the release of ScaleFT Access Fabric, customers can now rely on a cloud-native access management platform that better protects company resources without the need for VPNs by making intelligent access decisions in real-time based on dynamic user and device conditions.

“We launched ScaleFT in 2015 based on the thesis that perimeter-based security methods are broken. Google’s BeyondCorp has proven that to be true. We’ve since been taking the lead in building a business, community, and ecosystem around the principles of the Zero Trust security model,” said Jason Luce, CEO and ScaleFT co-founder. “The cloud has changed everything, and enterprises need a new security paradigm to keep up with the changing threat landscape. Our Zero Trust solutions have been deployed in production at a number of companies, protecting millions of resources across AWS, Azure, GCP, and on-premises. With this new architecture, we’re disrupting a $50 billion VPN market with solutions that just work and are actually embraced by employees.”

In the wake of the 2009 Aurora nation-state attacks on its global networks, Google developed BeyondCorp, a zero trust security framework that shifts access controls from the perimeter of an enterprise to individual devices and users. The ScaleFT Platform is built on the principles of BeyondCorp and offers much higher levels of security to enterprises than traditional perimeter defenses, letting employees work securely from any location without the need for a VPN.

“Virtually every company today uses firewalls to enforce perimeter security,” wrote Rory Ward and Betsy Bayer of Google. “However, this security model is problematic because, when that perimeter is breached, an attacker has relatively easy access to a company’s privileged intranet. As companies adopt mobile and cloud technologies, the perimeter is becoming increasingly difficult to enforce.”

The global cloud services market is poised to skyrocket from $114 billion in 2016 to $236 billion by 2020, according to market research firm Forrester1. Its rapid growth is driving the market for cloud security tools, which will increase from $1 billion in 2016 to $3.5 billion in 2021. Forrester found the cloud security market will grow 28% each year from 2016 to 2021 as the cloud grows in complexity and more security is needed.

“Zero trust is a fundamentally better way of doing security. The fact that this is based on Google and how they run their own security is the best validation you can get,” said Brad Silverberg of Fuel Capital. “We believe the zero trust approach will redefine how security is done.”

ScaleFT’s Zero Trust solutions for managing access to company web apps and servers assume that no traffic within an enterprise’s network is any more trustworthy by default than traffic entering from outside the firewall. Unlike the traditional security model, ScaleFT’s Zero Trust model dispels the notion of network segmentation as the primary mechanism for granting access. Instead, all internal applications are deployed to the public Internet, but only accessible through a managed user and device-centric authentication and authorization model.

“At Rackspace, our Passport feature leverages ScaleFT to give Rackspace employees and customers secure access control to their AWS environments. This capability is a key part of our value to customers,” said Erik Carlin, Vice President, Fanatical AWS Product and Engineering at Rackspace.

Launching today as a key component of the ScaleFT Platform, the ScaleFT Access Fabric is a globally distributed, cloud native environment that enables lightning fast dynamic authentication and authorization. It integrates out of the box with an enterprise’s choice of identity governance solutions, including Active Directory, Okta, Google and more. It is ideal for organizations that want to offer employees BYOD flexibility but don’t want to deal with the cost, complexity, operating overhead and performance deprecations of enterprise VPNs.

For employees, ScaleFT makes it easy to log in to any company web app or server from any location using a single sign-on service with explicit instructions on how to correct access if ever denied (i.e., device not in inventory, operating system not current, etc…). Administrators can safely expose web resources through a fully integrated access management solution and specify controls through easy-to-understand policies. Managers can view reports of all employee login history via a dashboard and see at any moment who in the company has access to what resources.

Benefits:

The ScaleFT Platform offers many other immediate benefits, including:

· Much improved overall security posture;

· Entirely eliminates static credentials;

· Device to resource visibility;

· Improved personal security practices;

· Easy and secure BYOD rollout;

· Hassle-free immediate employee adoption;

· Eliminates the need for VPNs and their setup and endpoint installation problems.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Preventing PTSD and Burnout for Cybersecurity Professionals
Craig Hinkley, CEO, WhiteHat Security,  9/16/2019
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
MITRE Releases 2019 List of Top 25 Software Weaknesses
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16531
PUBLISHED: 2019-09-20
LayerBB before 1.1.4 has multiple CSRF issues, as demonstrated by changing the System Settings via admin/general.php.
CVE-2019-9717
PUBLISHED: 2019-09-19
In Libav 12.3, a denial of service in the subtitle decoder allows attackers to hog the CPU via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c has a complex format argument to sscanf.
CVE-2019-9719
PUBLISHED: 2019-09-19
A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf.
CVE-2019-9720
PUBLISHED: 2019-09-19
A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf.
CVE-2019-16525
PUBLISHED: 2019-09-19
An XSS issue was discovered in the checklist plugin before 1.1.9 for WordPress. The fill parameter is not correctly filtered in the checklist-icon.php file, and it is possible to inject JavaScript code.