Endpoint

1/22/2018
06:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Anomali Announces $40 Million in Series D Funding, New Executive Hires

REDWOOD CITY, Calif. – January 17, 2018 – Anomali, the leading provider of threat management and collaboration solutions, announced today that it has closed an oversubscribed $40 million round of Series D funding. The round was led by Lumia Capital, a firm focused on helping technology market leaders expand globally.

Deutsche Telekom Capital Partners (DTCP), Telstra and Sozo Ventures also participated in the round along with returning investors GV, General Catalyst, IVP and Paladin Capital Group. The investment will allow Anomali to accelerate its growth in the US and globally and continue development of innovative cybersecurity solutions. The company also announced the appointment of Drew Hamer as Chief Financial Officer and Christopher Smith as Chief Revenue Officer.

“We were immediately impressed by Hugh, his leadership and vision, and the remarkable company accomplishments in this rapidly emerging area of cybersecurity,” said Martin Gedalin, Partner at Lumia Capital. “We believe there is a massive global need for enterprise threat intelligence solutions and we look forward to helping Anomali achieve its full potential.”

“Anomali delivers critical threat detection and response capabilities, working with premier organizations across all major industry verticals,” said Eric Ver Ploeg, Managing Director at DTCP in Silicon Valley. “Their strong customer base and threat exchange partnerships are clear indications of the need and value of the company’s cybersecurity, threat detection and sharing solutions.”

“We seek disruptive companies with great leaders and great solutions to address pressing cybersecurity challenges,” said Mark Sherman, Managing Director at Telstra Ventures. “Anomali adds critical attack detection and threat sharing capabilities to our portfolio, helping Telstra deliver a more complete suite of security offerings to our customers”

This latest round of funding builds upon the significant momentum of 2017. In the last year, Anomali unveiled new capabilities in its ThreatStream, Anomali Enterprise and STAXX solutions, enabling advanced threat forensics and threat sharing capabilities. The company also:

“2017 was another remarkable year for Anomali, in which we saw record customer growth and product innovation. We are thrilled to add Lumia Capital, DTCP, Telstra and Sozo Ventures to the Anomali family and are already preparing major initiatives with our newest partners,” said Hugh Njemanze, chief executive officer, Anomali. “Our latest investors ideally position us for growth in Europe, Japan and Australia.”

Anomali continues to build on this growth in 2018, welcoming new executive hires with deep experience and industry knowledge. Hamer, who will function as the new CFO, brings over 25 years of executive financial experience, most recently from ON24 and Keynote Systems, where he developed an expertise with high growth SaaS businesses. Smith, the new CRO, joins Anomali following a long career in cybersecurity sales leadership roles at ArcSight, Invincea and Instart Logic.

This announcement marks a total of $96 million total investment raised by Anomali over four rounds of funding.

The company will host its third annual threat intelligence conference, Detect ’18, in Washington, DC September 19-21, 2018.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
SEC: Companies Must Disclose More Info on Cybersecurity Attacks & Risks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  2/22/2018
Facebook Aims to Make Security More Social
Kelly Sheridan, Associate Editor, Dark Reading,  2/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "I told him all that cryptomining would crash his system."
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.