Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

3/2/2017
06:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Symantec Launches Venture Capital Arm

CEO Greg Clark says new Symantec Ventures could provide an 'onramp for M&A' opportunities for the security vendor.

Symantec today announced that it has formed a cybersecurity venture capital arm that will serve as an incubator for new startups.

The new Symantec Ventures aims to accelerate the startup process for entrepreneurs with funding and access to Symantec's own enterprise Cyber Defense Platform and consumer Digital Safety Platform, as well as its threat intelligence data.

Symantec Ventures also would give Symantec access to possible acquisition prospects.

In an interview with Dark Reading, Symantec CEO Greg Clark explained the benefits for his company. "As we get to know early-stage management teams and ideas, it will be a great onramp for talking M&A. It will definitely be an advantage in that area," he says.

Clark says Symantec's previous investment in enterprise mobile app security vendor Appthority represents an initial model for a Symantec Ventures partner. Symantec and Appthority have not publicly disclosed just how much Symantec has invested in the firm, which also has funding from three traditional venture capital firmsl.

Paul Stich, Appthority CEO, says his firm shares mobile app data with Symantec, and Symantec in turn shares its threat intelligence information. "We call it more of a collaboration, kind of a two-way" relationship, he says, noting that the door is always open for M&A deals.

Symantec's Clark says his company is looking for new and emerging technologies to add to its portfolio, such as analytics and artificial intelligence. "I think analytics and AI will unlock the real, next-generation of cyber defense. We know there is information in our large dataset that if you ask the right questions, it can shed light on cyber problems in ways we currently can't imagine," Clark says. "We really like companies who work on those analytic algorithms."

"This gets Symantec more in line and closer to the innovation community in the [Silicon] Valley and the startup community in the Valley," says Jon Oltsik, senior principal analyst at the Enterprise Strategy Group. It could ultimately help the security firm round out some missing elements of its product portfolio, such security management and operations and incident response, he says.

"They don't have a SIEM. They don't have an IR platform," for instance, Oltsik notes.

Garage Startups

Clark sees Symantec as "uniquely positioned" to assist startups via its incubator arm with its threat intelligence and security products, and its position as a major security company. "We're a good advisor to an entrepreneur," he says. "I started two companies from the garage. I know that that means" and entails," Clark says.

Symantec aims to cut the infrastructure costs and accelerate development for startups by providing its product platforms to the fledgling firms. "We want to shorten their time to market, so they're not wasting money on infrastructure," he says.

That doesn't mean startups funded by Symantec Ventures are required to integrate their technologies with Symantec's products, however. "It's definitely an advantage to work in our platform, but it's not a requirement," Clark says.

Clark says Symantec is encouraging open platforms. "We are a big believer in best of breed. We believe our customers need open platforms that can allow innovation and new ideas, especially since bad guys change their methods quite often," he says.

"If you've got an idea, we've also got some money," he says.

Greg Clark, CEO of Symantec
Greg Clark, CEO of Symantec

 

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment:   It's a PEN test of our cloud security.
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7964
PUBLISHED: 2020-01-24
An issue was discovered in Mirumee Saleor 2.x before 2.9.1. Incorrect access control in the checkoutCustomerAttach mutations allows attackers to attach their checkouts to any user ID and consequently leak user data (e.g., name, address, and previous orders of any other customer).
CVE-2020-5224
PUBLISHED: 2020-01-24
In Django User Sessions (django-user-sessions) before 1.7.1, the views provided allow users to terminate specific sessions. The session key is used to identify sessions, and thus included in the rendered HTML. In itself this is not a problem. However if the website has an XSS vulnerability, the sess...
CVE-2020-7052
PUBLISHED: 2020-01-24
CODESYS Control V3, Gateway V3, and HMI V3 before 3.5.15.30 allow uncontrolled memory allocation which can result in a remote denial of service condition.
CVE-2014-4172
PUBLISHED: 2020-01-24
A URL parameter injection vulnerability was found in the back-channel ticket validation step of the CAS protocol in Jasig Java CAS Client before 3.3.2, .NET CAS Client before 1.0.2, and phpCAS before 1.3.3 that allow remote attackers to inject arbitrary web script or HTML via the (1) service paramet...
CVE-2013-1597
PUBLISHED: 2020-01-24
A Directory Traversal vulnerability exists in Vivotek PT7135 IP Cameras 0300a and 0400a via a specially crafted GET request, which could let a malicious user obtain user credentials.