Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

2/12/2018
08:50 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Infocyte Series B Funding and New CEO Fuel Expansion of Threat Hunting Platform

Capital and Seasoned Fortune 500 Executive Curtis Hutcheson to Drive Rapid Growth of the Infocyte HUNT Solution for Dedicated Threat Hunting and Compromise Assessments

SAN ANTONIO – Feb. 12, 2018 – Infocyte, the threat hunting leader, today announced the close of a $5.2 million Series B funding round and welcomed seasoned Fortune 500 technology executive Curtis Hutcheson as CEO. The round, which brings the cyber threat hunting company’s total investment to $8.6M, was led by Toba Capital with participation from existing investors LiveOak Venture Partners, and Feik Enterprises. New investment and leadership is expected to drive continued company growth and demand for its flagship dedicated threat hunting and Compromise Assessment platform, Infocyte HUNT™.

“Industry reports continue to show the damage that can be inflicted by an undetected breach in an enterprise network is actually growing rather than shrinking — and the risk extends beyond the business, to insurers and regulators. Infocyte’s unique approach to the problem enables both internal ‘hunt’ teams and independent assessors to quickly find threats hidden within a network. At Toba, we believe this is a key capability missing in the current enterprise security ecosystem, especially as regulation and accountability increase,” said Vinny Smith, founder of Toba Capital.

Threat hunting has rapidly become a hot topic for the security industry. Until now, this practice has been limited to the most sophisticated security professionals in the military and top tier financial institutions who often rely on manual and time-consuming techniques to sift through analytics and behavioral data.

Infocyte HUNT is a dedicated threat hunting platform built by former military threat hunters responsible for protecting the largest and most targeted networks in the world. It leverages military grade techniques and practices in an automated platform to simplify the hunt process, and reduce the skillset requirement for hunting malware and advanced persistent threats (APTs). When prevention and security controls fail, Infocyte HUNT significantly reduces attacker dwell time—the period between infection and discovery—to deny them the ability to persist undetected, reduce business impact, and restore trust in a network’s health.

Mark Grosvenor, CTO of global insurance broker NFP, said, “We have vetted multiple vendors and products over the years and Infocyte HUNT was the first product to truly deliver on its promise of being easy to use and deploy. It has enabled us to proactively search for malware faster and more efficiently across our entire network spanning thousands of nodes and multiple locations.”

Leading Infocyte’s market expansion of its threat hunting technology is new CEO, Curtis Hutcheson. He brings a growth-oriented leadership approach to Infocyte that he has cultivated during his 25+ year career in leading technology companies. Hutcheson was most recently General Manager for Dell Security Software (acquired by Francisco Partners), which included SonicWALL network security. Hutcheson also serves on the board of Interset.

“Infocyte continues to be a leader within the threat hunting community, especially with our proactive use of live, scalable volatile memory forensic techniques. Our intent has always been to greatly simplify the threat hunting process and empower practitioners with varying skill sets to effectively hunt without specialized expertise,” said Chris Gerritz, founder and chief product officer of Infocyte. “The additional capital and new leadership enables Infocyte to scale with the growing demand for Infocyte HUNT, as well as support our growing network of partners offering Compromise Assessments using Infocyte HUNT.”

 

About Infocyte, Inc.

Developed by former US Air Force cybersecurity officers, Infocyte’s dedicated forensics-based threat hunting platform discovers the post-compromise activity of cyber attackers and malware that have bypassed other defenses. The company’s unique approach to security reduces attacker dwell time to help organizations and independent assessors defend networks and critical information. For more information visit www.infocyte.com or follow @InfocyteInc.

 

About Toba Capital

Toba Capital is an investment firm committed to helping create incredible technology companies. Toba backs businesses capable of long-term growth and teams with the potential to fundamentally shift markets for the common good. The firm takes a high-conviction, hands-on, dollar-concentrated approach to venture investing, and is unafraid to get in the boat to help row. Toba Capital was founded in 2012 by Vinny Smith.

 

About LiveOak Venture Partners

LiveOak is a $109MM Fund based in Austin, TX and was founded by Ben Scott, Krishna Srinivasan, and Venu Shamapant (all formerly of Austin Ventures). While many of LiveOak’s investments begin in the early stages, LiveOak is a full lifecycle investor focused on technology and technology-driven service companies based in Texas. With over 16 years of successful early stage investing in Texas, the Founders of LiveOak have helped entrepreneurs create industry-leading companies, such as Spatial Wireless (acquired by Alcatel-Lucent), Navini Networks (acquired by Cisco Systems), LifeSize Technologies (acquired by Logitech) and Mavenir Systems (NYSE: MVNR), and StackEngine (Acquired by Oracle).

 

Media Contact:

Jessica Ann Morris, Public Relations                         

Phone: 781-608-0499                                                

Email: [email protected]             

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
The Flaw in Vulnerability Management: It's Time to Get Real
Jim Souders, Chief Executive Officer at Adaptiva,  8/15/2019
Tough Love: Debunking Myths about DevOps & Security
Jeff Williams, CTO, Contrast Security,  8/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5638
PUBLISHED: 2019-08-21
Rapid7 Nexpose versions 6.5.50 and prior suffer from insufficient session expiration when an administrator performs a security relevant edit on an existing, logged on user. For example, if a user's password is changed by an administrator due to an otherwise unrelated credential leak, that user accou...
CVE-2019-6177
PUBLISHED: 2019-08-21
A vulnerability reported in Lenovo Solution Center version 03.12.003, which is no longer supported, could allow log files to be written to non-standard locations, potentially leading to privilege escalation. Lenovo ended support for Lenovo Solution Center and recommended that customers migrate to Le...
CVE-2019-10687
PUBLISHED: 2019-08-21
KBPublisher 6.0.2.1 has SQL Injection via the admin/index.php?module=report entry_id[0] parameter, the admin/index.php?module=log id parameter, or an index.php?View=print&id[]= request.
CVE-2019-11601
PUBLISHED: 2019-08-21
A directory traversal vulnerability in remote access to backup & restore in earlier versions than ProSyst mBS SDK 8.2.6 and Bosch IoT Gateway Software 9.2.0 allows remote attackers to write or delete files at any location.
CVE-2019-11602
PUBLISHED: 2019-08-21
Leakage of stack traces in remote access to backup & restore in earlier versions than ProSyst mBS SDK 8.2.6 and Bosch IoT Gateway Software 9.2.0 allows remote attackers to gather information about the file system structure.