Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
3/14/2019
01:45 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Mocana Adds New Funding

Mocana's IoT Device Security Platform Gains Wider Adoption as Alternative IT and OT Security Solutions Fall Short

SUNNYVALE, Calif., March 04, 2019 (GLOBE NEWSWIRE) -- Mocana, the leading provider of device security solutions for IoT and industrial control systems, today announced that the company completed the first close of $15 million in new financing to accelerate the development of its TrustCenter™ IoT device security platform to meet growing demand. This investment was led by Sway Ventures with existing investors Shasta Ventures and ForgePoint Capital (formerly Trident Capital Cybersecurity) also participating. With the additional funding, Mocana’s funding to date is $105 million.

Mocana is addressing a cybersecurity problem that is costing companies tens of billions of dollars per year. Hackers are bypassing traditional IT network security approaches by attacking IoT and connected industrial and enterprise devices from within private networks by using phishing emails and physical intrusions to target the most vulnerable devices. Mocana’s device security solutions complement IT network and operational technology (OT) security technologies, such as firewalls, IDS/IPS and threat detection, by enabling the endpoint devices and gateways to defend themselves using on-device cryptographic controls that are designed for mission-critical systems with limited memory and processing capabilities.

Mocana TrustCenter™ is the only solution of its kind that automates, orchestrates and manages IoT device security while meeting the highest levels of cybersecurity compliance and standards. Mocana’s system of cybersecurity can be used to protect both legacy devices that are too old to patch and new Internet-connected mission-critical devices.

Since announcing the availability of Mocana TrustCenter™, the company has seen strong demand with customers in trial and deployment to protect mission-critical, Internet-connected devices.

“With existing IT network and operational technology (OT) security measures failing to keep the hackers at bay, there has never been a more critical time to rethink security and start protecting devices from the inside out,” said William Diotte, CEO of Mocana. “Our customers require simple and secure solutions that allow them to protect both legacy devices and new devices. We are seeing strong demand for Mocana’s TrustCenter, and this new funding will help us deliver on our promise of providing protecting cities, countries and families.”

The United States Council of Economic Advisors estimates that malicious cyber activity cost the U.S. economy between $57 and $109 billion in a single year. According to the U.S. Office of the Director of National Intelligence (DNI), “Cyber threats were the most important strategic threat facing the United States. They impose costs on the United States and global economies and present risks for nearly all information, communication networks, and systems.”

This new funding will be used to add new technical capabilities into Mocana TrustCenter™ and TrustPoint™, driving further growth across Mocana’s customer base of large defense, industrial manufacturing, and IoT companies. Later this year, Mocana will be adding visibility and analytics tools into its TrustCenter™ platform that will provide a deep view into the processes running on systems and subsystems of IoT devices and industrial control devices. Additionally, the company will use the new investment to grow their sales, marketing and customer support operations as it continues to expand globally.

“It’s no secret that today’s industrial control systems and IoT devices are extremely vulnerable to cyberattacks,” said Brian Nugent, founding General Partner, Sway Ventures. “We believe Mocana’s laser focus on providing comprehensive IoT device security offers the most efficient way to defend against sophisticated attack scenarios.”

“Mocana is driving a fundamentally different approach to securing IoT from the device to the cloud,” said Rob Coneybeer, Managing Director at Shasta Ventures. “We continue to invest in Mocana because we firmly believe that their TrustCenter IoT device security management platform is a game-changing technology for the future of IoT and industrial control system security.”

Mocana’s solutions are used by some of the largest companies in the world including ABB, GE, HP, Intel, Schneider Electric, Verizon, and Xerox. Mocana’s TrustPoint™ device security software is designed for resource-constrained embedded systems and enables IoT devices to defend themselves. Mocana TrustCenter™ provides unprecedented controls, automation, and orchestration to scale the provisioning and management of security for massive-scale IoT and mission-critical IoT.

About Mocana Corporation
Founded in 2002, Mocana provides comprehensive and compliant IoT device security solutions to protect critical infrastructure. Mocana TrustCenter™ and TrustPoint™ automate and simplify the management of the IoT security lifecycle. Our proven cybersecurity software development tools simplify the integration of mission-critical security. Mocana protects more than 100 million devices and is trusted by the largest aerospace, industrial, energy, healthcare, and communications companies. www.mocana.com.

Press Contact:
Katie Pesek
Merritt Group on behalf of Mocana
[email protected]
(703) 390-1505

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.