Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

7/6/2016
12:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Veriflow Secures Series A Funding to Drive Innovation in Preventing Change-Induced Outages and Breaches in Networks

Menlo Ventures Leads $8.2 Million Funding Round as Veriflow Takes Next Steps in Adoption of Mathematical Network Verification

SAN JOSE, CA--(Marketwired - Jul 6, 2016) -  Veriflow, the network breach and outage prevention company, today announced that it has raised $8.2 million in Series A funding, led by Menlo Ventures along with current investor New Enterprise Associates (NEA). The company will use the funding to build its sales force, hire new engineering talent and increase marketing efforts to further drive the company's technological innovation and growth as well as industry awareness of mathematical network verification.

"The feedback from customers and analysts indicates the market is ready for a new approach to network breach and outage prevention. Our use of mathematical network verification, grounded in data-plane information, gives customers a proactive approach to identifying vulnerabilities before they are exposed to catastrophic problems," said James Brear, president and CEO of Veriflow. "Veriflow provides a comprehensive view of the network that gives administrators the confidence to make changes without fear of damaging critical services and layers of defense. We've spent several years developing our innovative technology, and this funding will enable us to hire key talent, bring our product to market more quickly and expand into new markets."

Enterprises today are struggling to cope with an accelerating pace of change in network infrastructure. But since management procedures applied to these complex environments are largely manual, change is the key cause of outage incidents and leads to vulnerabilities in network infrastructure. Veriflow bulletproofs networks with sophisticated algorithms that predict all possible network-wide data flow, without waiting for that traffic to occur. This technique, inspired by the field of formal verification, pinpoints vulnerabilities in the realization of network-wide security and resilience policies - such as network segmentation, service availability, and network compliance standards like PCI and HIPAA - to avoid change-induced incidents. Through comprehensive, always-on verification, Veriflow's patented approach provides automated solutions across the multi-billion-dollar networking market to minimize the security vulnerabilities and costly disasters that can result from human factors during network changes.

"Until now, network operators have depended on several different tools to diagnose and mitigate problems occurring in their networks, which often leads to complications and oversights," said Eric Hanselman, chief analyst at 451 Research. "Veriflow's approach could provide not only a retrospective view but, more importantly, predictive capabilities for a clear and detailed understanding of complex networks. This platform has the potential to be a validating step in network automation, reducing risk in provisioning."

Veriflow exited stealth mode in April 2016 with $2.9 million in initial investor funding from New Enterprise Associates (NEA), the National Science Foundation and the U.S. Department of Defense. The company will spend the second half of 2016 developing its go-to-market strategy, participating in major tech conferences and preparing to launch its flagship product.

"Veriflow has one of the best founding teams I have seen in many years," said Scott Shenker, co-founder of Nicira and professor of computer science at the University of California - Berkeley. "Creating this technology took an unusual mix of clever algorithm design, deep understanding of the challenges facing enterprise networks and experienced execution in bringing the product to market."

The team is led by James Brear, who was previously CEO of Procera until its successful acquisition in August 2015, along with the company's founders, who include Fulbright and Alfred P. Sloan fellows and an ACM SIGCOMM Rising Star awardee.

"Veriflow has pioneered the application of mathematical network verification, which will shake up the network protection landscape," said Matt Murphy, managing director, Menlo Ventures. "Today's dynamic infrastructure requires flexibility and agility, yet networks are often opaque and locked down due to operational uncertainty. Veriflow's automated approach predicts, with deep accuracy, how and if network policies will be violated before an incident occurs. Ultimately, everyone who wants a secure and operationally sound environment should 'Veriflow' their network."

A video interview with Menlo Ventures managing director Matt Murphy and NEA general partner Pete Sonsini can be found herehttp://www.veriflow.net/investors

 

About Veriflow
Veriflow is the first networking company to use formal verification to eliminate change-induced network outages and breaches. The company was created by a team of computer science professors and Ph.D. students at the University of Illinois at Urbana-Champaign, and is backed by New Enterprise Associates (NEA), Menlo Ventures, the National Science Foundation and the U.S. Department of Defense. The company is headquartered in San Jose, California. To learn more, visit veriflow.net and follow us on Twitter @veriflowsystems.

 

 

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19037
PUBLISHED: 2019-11-21
ext4_empty_dir in fs/ext4/namei.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because ext4_read_dirblock(inode,0,DIRENT_HTREE) can be zero.
CVE-2019-19036
PUBLISHED: 2019-11-21
btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root->node) can be zero.
CVE-2019-19039
PUBLISHED: 2019-11-21
__btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program.
CVE-2019-6852
PUBLISHED: 2019-11-20
A CWE-200: Information Exposure vulnerability exists in Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions), which could cause the disclosure of FTP har...
CVE-2019-6853
PUBLISHED: 2019-11-20
A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server.