IoT
12/13/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Upstream Security Secures $9 Million Series A Funding Round

Focuses on ramping up its cloud-based cybersecurity for connected and autonomous car fleets.

HERZLIYA, Israel – Upstream Security, pioneer of the cloud-based cybersecurity platform for connected cars and autonomous vehicles, today announced the closing of $9 million in Series A funding, led by CRV (Charles River Ventures). The round included expanded investments from Israeli-based Glilot Capital Partners and Maniv Mobility. Following a $2 million seed funding round in June, the company will use the latest investment to expand its R&D program and continue building out its world-class engineering and security research teams, and open marketing and sales offices in the United States and Europe. The company is well-resourced to secure the 60 million connected cars on the road today that include commercial trucks, vans, buses and private vehicles, as well as take advantage of the imminent explosion in connected vehicles—Gartner expects there will be 250 million connected vehicles by 2020.

 "Connected and semi-autonomous cars are already a reality, so it’s a matter of ‘when’ not ‘if’ these self-driving technologies will be deployed at scale. Upstream’s engineers were the first to solve how to protect connected cars and autonomous vehicles using the cloud, crucial for near-term and future deployment of automotive cybersecurity at the fleet level," said Izhar Armony, general partner at CRV. "We believe in Upstream’s groundbreaking approach to secure connected and autonomous vehicles and in the abilities of cybersecurity veterans, Yoav Levy and Yonatan Appel, to build a rapidly growing business in this hot, emerging space."

As connected and autonomous driving technologies become mainstream, security attacks on vehicle fleets––groups of motor vehicles owned or leased by a business, government agency or other entity––are likely to increase drastically. Upstream’s cloud-based approach to automotive cybersecurity leverages artificial intelligence and machine learning that is applied to the tremendous data sets continuously produced by vehicles. This provides customers with data protection, anomaly detection and real-time analytics of cyber attacks and vehicle fleet health. By centralizing cybersecurity in the cloud instead of in-vehicle, threats are detected and prevented before they even reach a vehicle's network.

More cars are connected to the Internet today than ever before, driving hackers to develop new and more efficient ways to infiltrate and disrupt automotive software. Today’s automotive cybersecurity solutions are in-vehicle and suffer from slow production cycles, which impede their agility as well as their ability to protect against the most recent cybersecurity threats. Upstream’s unique solution offers non-intrusive protection, effectively securing cars that are already on the road today and upgradable to stand against new cybersecurity threats and vulnerabilities in the future.

“The automotive industry is going through a massive disruption. Consequently, security solutions for the car are undergoing rapid advances at an unprecedented rate. We’re using emerging technologies like AI and machine learning to carry out an evolutionary leap in cybersecurity for passenger and commercial vehicles,” said Upstream CEO and cofounder, Yoav Levy. “Riding the wave of momentum from our recent company launch and early customer wins, this new investment round further validates our technology and approach, and will fuel our commitment to be the leading force of innovation in security for connected and autonomous transportation.”

Upstream is planning to open offices in Silicon Valley in the coming months.

In addition to this news, Levy recently spoke at KPMG’s 8th annual automotive executive forum, the 2017 Los Angeles Auto Show, which announced new research in vehicle fleet security.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
2018 on Track to Be One of the Worst Ever for Data Breaches
Jai Vijayan, Freelance writer,  11/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14934
PUBLISHED: 2018-11-15
The Bluetooth subsystem on Polycom Trio devices with software before 5.5.4 has Incorrect Access Control. An attacker can connect without authentication and subsequently record audio from the device microphone.
CVE-2018-14935
PUBLISHED: 2018-11-15
The Web administration console on Polycom Trio devices with software before 5.5.4 has XSS.
CVE-2018-16619
PUBLISHED: 2018-11-15
Sonatype Nexus Repository Manager before 3.14 allows XSS.
CVE-2018-16620
PUBLISHED: 2018-11-15
Sonatype Nexus Repository Manager before 3.14 has Incorrect Access Control.
CVE-2018-16621
PUBLISHED: 2018-11-15
Sonatype Nexus Repository Manager before 3.14 allows Java Expression Language Injection.