Threat Intelligence

3/7/2018
11:12 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Bandura Systems Closes $3.5 Million Seed Round

Company that pioneered Threat Intelligence Gateways for US government expands executive team, announces dual headquarters

COLUMBIA, Md. and ST. LOUIS, March 07, 2018 (GLOBE NEWSWIRE) -- Bandura Systems, which pioneered the threat intelligence gateway (TIG) in part with the U.S. Department of Defense, today announced it has closed its seed funding round. The $3.5 million financing came from Blu Ventures, Gula Tech Adventures, the Maryland Tech Development Corp. (TEDCO), Prosper Women Entrepreneurs (PWE), SixThirty, SixThirty Cyber and UMB Financial Corporation. TIGs are stand-alone threat prevention appliances that can process millions more threat indicators than traditional network security enforcement approaches. They help protect corporate networks by more effectively blocking known threats and making threat intelligence actionable.  They also complement and improve the performance of existing security solutions like firewalls and Security Information and Event Management (SIEM) software reducing the number of events that need detection and response, making employees more effective.

The funding will be used to support the growing demand for Bandura Systems PoliWall® TIG whose revenue quadrupled in 2017. Bandura is expanding its executive team, recently hiring prominent cybersecurity executive Chris Fedde as its new CEO and today also announcing Todd Weller as its Chief Strategy Officer. Fedde helped Bandura quickly close the round and is positioning the company for future growth. Weller will drive strategy and execution across corporate development, marketing, product management, and strategic alliances and partnerships. Prior to Bandura, Weller served as Vice President of Corporate Development and Marketing at Hexis Cyber Solutions, Inc. which was sold to a firewall vendor owned by Silicon Valley investors. He spent nearly two decades covering cybersecurity as a Wall Street analyst at some of the world’s most prominent financial services firms like Stifel, Nicolaus & Company, and Legg Mason.

“The cybersecurity market has been heavily focused on identifying ‘advanced’ threats, but that has put pressure on security teams to effectively and efficiently block the huge volume of known dangers,” said Fedde. “Threat Intelligence Gateways fill this role by addressing a key gap in existing security controls, which are not built to consume threat indicators on the millions of bad IPs and domains that exist. I’m excited to join Bandura, the company that pioneered TIGs, as enterprises of all sizes can begin using these Threat Intelligence Gateways.”

According to Ron Gula, head of Bandura investor Gula Tech Adventures and former CEO of Tenable Network Security, "The cybersecurity industry has done a great job producing threat intelligence, but Bandura can apply it. Bandura Systems allows organizations to be proactive in blocking these known threats to better protect their networks."  

In addition to announcing its funding and new executive appointment, Bandura is also announcing today it will have dual headquarters. Columbia, Maryland will now house Bandura’s business headquarters and Lake St. Louis, Missouri its engineering headquarters. For the exact location of Bandura’s offices, go to https://bandurasystems.com/contact.html.

About Bandura Systems
Bandura Systems pioneered the Threat Intelligence Gateway (TIG) in part with the U.S. Department of Defense. Bandura’s PoliWall™ is the most comprehensive, scalable and granular TIG platform on the market. Organizations worldwide use TIGs for the automation and control needed to operationalize hundreds of million threat indicators blocking known threats before they even reach the network firewall. Underlying Bandura’s robust technology are more than 50 issued and pending patents. To learn more about how Bandura’s PoliWall TIG reduces an organization’s attack surface, operationalizes threat intelligence and helps get more out of existing security investments, visit https://bandurasystems.com.

Media Contact
Andrew Goss
Voxus PR for Bandura Systems
[email protected]
253.444.5446

A photo accompanying this announcement is available at http://www.globenewswire.com/NewsRoom/AttachmentNg/7f66bae4-36a8-48eb-8b8a-e2f30975ad49

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
Windows 10 Security Questions Prove Easy for Attackers to Exploit
Kelly Sheridan, Staff Editor, Dark Reading,  12/5/2018
Starwood Breach Reaction Focuses on 4-Year Dwell
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/5/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-2486
PUBLISHED: 2018-12-11
SAP Marketing (UICUAN (1.20, 1.30, 1.40), SAPSCORE (1.13, 1.14)) does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
CVE-2018-2492
PUBLISHED: 2018-12-11
SAML 2.0 functionality in SAP NetWeaver AS Java, does not sufficiently validate XML documents received from an untrusted source. This is fixed in versions 7.2, 7.30, 7.31, 7.40 and 7.50.
CVE-2018-2494
PUBLISHED: 2018-12-11
Necessary authorization checks for an authenticated user, resulting in escalation of privileges, have been fixed in SAP Basis AS ABAP of SAP NetWeaver 700 to 750, from 750 onwards delivered as ABAP Platform.
CVE-2018-2497
PUBLISHED: 2018-12-11
The security audit log of SAP HANA, versions 1.0 and 2.0, does not log SELECT events if these events are part of a statement with the syntax CREATE TABLE <table_name> AS SELECT.
CVE-2018-2500
PUBLISHED: 2018-12-11
Under certain conditions SAP Mobile Secure Android client (before version 6.60.19942.0 SP28 1711) allows an attacker to access information which would otherwise be restricted.