Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

11/3/2016
12:45 PM
Sara Peters
Sara Peters
Products and Releases
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Acalvio Technologies Secures Investment from GV

GV (formerly Google Ventures) Joins Accel Ventures, Ignition Partners, Eileses Capital and Splunk, Bringing Total Investment in the Company to $22M

Santa Clara, Calif. – November 3, 2016 – Acalvio™ Technologies, an innovator in Advanced Threat Defense, today announced that it has received an investment from GV (formerly Google Ventures). GV joins a prestigious group of investors, including Accel Ventures, Ignition Partners, Eileses Capital and Splunk. GV’s investment will accelerate deployment and adoption of Acalvio’s Deception 2.0 technology, which leverages dynamic deception and data science to deliver timely, high fidelity and cost-effective detection solutions, extending it to Internet of Everything (IoE) and cloud environments.

"Acalvio has developed highly differentiated, scalable deception technology that produces better detection and detailed attack analysis than traditional deception technology,” said Tyson Clark, Partner at GV. “As hacks and data breaches become increasingly prevalent, CISOs are taking a more holistic view of security architectures. Acalvio is well positioned in this market as companies deploy next-generation deceptive response technology as part of their core security strategies.”

Acalvio’s Deception 2.0 solution leverages its patented Fluid Deception™ technology to enable authentic and cost-effective deception at scale, which can now be delivered in a DevOps model. In addition, it allows for full engagement with threats to study attack tactics and tools. Adversary Behavior Analytics™ (ABA) enables automated response allowing IR teams to react to malicious activity in near real time. ABA Data Science algorithms leverage deception events and other data available in Enterprise security solutions (SIEM, Privileged User Management systems, etc.) to deliver valuable intelligence around adversary tools, tactics, procedures, latent vulnerabilities and more. Acalvio’s solution also includes smart blending of data and credential lures across enterprise servers and endpoints. These lures both detect data theft and redirect attacks to Fluid Deception™ for engagement.

“Distributed deception platforms are now a viable option for enhancing detection within enterprise security programs”, according to Lawrence Pingree, Gartner Research Director.[1]

"Acalvio is entering a very exciting era of cybersecurity, and we are thrilled to have GV join our current roster of amazing investors and strategic partners. GV’s investment in Acalvio validates our vision, our differentiated technology and the attractive market opportunity," said Ram Varadarajan, CEO, Acalvio. "We are very excited to be partnering GV to deliver innovative solutions and compelling value to our customers”.

 

About Acalvio

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.  The solutions are anchored on patented innovations in Deception and Data Science. This enables a DevOps approach to ATD, enabling ease of deployment, monitoring and management.  Acalvio enriches its threat intelligence by data obtained from internal and partner eco-systems, enabling customers to benefit from defense in depth, reduce false positives, and derive actionable intelligence for remediation. The Silicon Valley based company is led by an experienced team with a track record of innovation and market leadership and backed by marquee investors. For more information on Acalvio, please visit http://acalvio.com/ and follow the company on Twitter at @AcalvioTech and on LinkedIn.



[1] Gartner, Competitive Landscape: Distributed Deception Platforms, 2016, Lawrence Pingree, August 4, 2016

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: "The truth behind Stonehenge...."
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27886
PUBLISHED: 2021-03-02
rakibtg Docker Dashboard before 2021-02-28 allows command injection in backend/utilities/terminal.js via shell metacharacters in the command parameter of an API request. NOTE: this is NOT a Docker, Inc. product.
CVE-2016-8153
PUBLISHED: 2021-03-02
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none.
CVE-2016-8154
PUBLISHED: 2021-03-02
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none.
CVE-2016-8155
PUBLISHED: 2021-03-02
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none.
CVE-2016-8156
PUBLISHED: 2021-03-02
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none.