Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:50 PM
Dark Reading
Dark Reading
Products and Releases

ScaleFT Closes $2M Seed Funding, Launches Zero Trust Solution for Cloud Security

Inspired by Google's BeyondCorp architecture, ScaleFT Zero Trust Access Management protects corporate resources without VPNs

SAN FRANCISCO, July 19, 2017 (GLOBE NEWSWIRE) – ScaleFT, the “Zero Trust” security company, today announced the close of a $2 million seed funding round and the pre-release availability of the ScaleFT Access Fabric, a new component of the ScaleFT Platform that allows enterprises to emulate security practices pioneered by Google. Participating in the round were Fathom Capital, Spectrum 28, Fuel Capital and Graham Weston, the founder of Rackspace. With the release of ScaleFT Access Fabric, customers can now rely on a cloud-native access management platform that better protects company resources without the need for VPNs by making intelligent access decisions in real-time based on dynamic user and device conditions.

“We launched ScaleFT in 2015 based on the thesis that perimeter-based security methods are broken. Google’s BeyondCorp has proven that to be true. We’ve since been taking the lead in building a business, community, and ecosystem around the principles of the Zero Trust security model,” said Jason Luce, CEO and ScaleFT co-founder. “The cloud has changed everything, and enterprises need a new security paradigm to keep up with the changing threat landscape. Our Zero Trust solutions have been deployed in production at a number of companies, protecting millions of resources across AWS, Azure, GCP, and on-premises. With this new architecture, we’re disrupting a $50 billion VPN market with solutions that just work and are actually embraced by employees.”

In the wake of the 2009 Aurora nation-state attacks on its global networks, Google developed BeyondCorp, a zero trust security framework that shifts access controls from the perimeter of an enterprise to individual devices and users. The ScaleFT Platform is built on the principles of BeyondCorp and offers much higher levels of security to enterprises than traditional perimeter defenses, letting employees work securely from any location without the need for a VPN.

“Virtually every company today uses firewalls to enforce perimeter security,” wrote Rory Ward and Betsy Bayer of Google. “However, this security model is problematic because, when that perimeter is breached, an attacker has relatively easy access to a company’s privileged intranet. As companies adopt mobile and cloud technologies, the perimeter is becoming increasingly difficult to enforce.”

The global cloud services market is poised to skyrocket from $114 billion in 2016 to $236 billion by 2020, according to market research firm Forrester1. Its rapid growth is driving the market for cloud security tools, which will increase from $1 billion in 2016 to $3.5 billion in 2021. Forrester found the cloud security market will grow 28% each year from 2016 to 2021 as the cloud grows in complexity and more security is needed.

“Zero trust is a fundamentally better way of doing security. The fact that this is based on Google and how they run their own security is the best validation you can get,” said Brad Silverberg of Fuel Capital. “We believe the zero trust approach will redefine how security is done.”

ScaleFT’s Zero Trust solutions for managing access to company web apps and servers assume that no traffic within an enterprise’s network is any more trustworthy by default than traffic entering from outside the firewall. Unlike the traditional security model, ScaleFT’s Zero Trust model dispels the notion of network segmentation as the primary mechanism for granting access. Instead, all internal applications are deployed to the public Internet, but only accessible through a managed user and device-centric authentication and authorization model.

“At Rackspace, our Passport feature leverages ScaleFT to give Rackspace employees and customers secure access control to their AWS environments. This capability is a key part of our value to customers,” said Erik Carlin, Vice President, Fanatical AWS Product and Engineering at Rackspace.

Launching today as a key component of the ScaleFT Platform, the ScaleFT Access Fabric is a globally distributed, cloud native environment that enables lightning fast dynamic authentication and authorization. It integrates out of the box with an enterprise’s choice of identity governance solutions, including Active Directory, Okta, Google and more. It is ideal for organizations that want to offer employees BYOD flexibility but don’t want to deal with the cost, complexity, operating overhead and performance deprecations of enterprise VPNs.

For employees, ScaleFT makes it easy to log in to any company web app or server from any location using a single sign-on service with explicit instructions on how to correct access if ever denied (i.e., device not in inventory, operating system not current, etc…). Administrators can safely expose web resources through a fully integrated access management solution and specify controls through easy-to-understand policies. Managers can view reports of all employee login history via a dashboard and see at any moment who in the company has access to what resources.


The ScaleFT Platform offers many other immediate benefits, including:

· Much improved overall security posture;

· Entirely eliminates static credentials;

· Device to resource visibility;

· Improved personal security practices;

· Easy and secure BYOD rollout;

· Hassle-free immediate employee adoption;

· Eliminates the need for VPNs and their setup and endpoint installation problems.



Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-14
Lack of authentication in the network relays used in MEGVII Koala 2.9.1-c3s allows attackers to grant physical access to anyone by sending packet data to UDP port 5000.
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
PUBLISHED: 2020-08-14
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.