Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

09:25 AM
Dark Reading
Dark Reading
Products and Releases

ThreatQuotient Announces $10.2M in Series A Funding

Investment strengthens ThreatQuotient's ability to transform threat intelligence through innovative platform developed with analyst workflows and processes at its core.

STERLING, VA — December 2, 2015 — ThreatQuotient, a threat intelligence platform provider headquartered in Northern Virginia, today announced it has secured $10.2M in Series A funding led by New Enterprise Associates (NEA). Also participating in the round were original seed investors Blu Venture Investors and the Center for Innovative Technology (CIT). With the funding, ThreatQuotient looks to put a fresh face on threat intelligence and aggressively extend and expand their global reach.

ThreatQuotient’s innovative threat intelligence platform (TIP), ThreatQ, has already garnered a strong portfolio of Fortune 100/500, major retail, healthcare, technology and defense customers. ThreatQuotient plans to capitalize on this early success and make ThreatQ available worldwide by expanding their headquarters, increasing their global sales force, and augmenting their engineering team.

Today’s threat intelligence analysts and operators are inundated by data and spend valuable time manually importing information. ThreatQ enables threat intelligence teams to return their focus to analysis, and improve their security operations by reducing the amount of effort traditionally exerted into combining data sources. By providing a seamless integration with existing security solutions to enrich and nurture indicators, ThreatQ turns multiple data sources into operationalized intelligence. As a result of this funding, ThreatQuotient is in a unique position to transform the way organizations utilize threat intelligence and emerge as a clear leader in the threat intelligence platform market.

Harry Weller, recognized as one of America’s top venture capitalists from NEA, will join ThreatQuotient’s Board of Directors. “We are excited to align with ThreatQuotient because the founders built a solution to a problem they lived and breathed in security and operations centers. They have the history and experience we seek in our investments and a solid existing customer portfolio,” explained Mr. Weller. “In fact, we take due diligence very seriously and throughout that process ThreatQuotient’s customer references demonstrated the company’s unique approach and technology is the type of innovation we look for in an investment.”

Focusing on setting the company apart from the competition, ThreatQuotient appointed John Czupak as CEO on October 20, 2015. Czupak, who has an extensive background in global sales management and channel development in the security market, will also be a member of the Board of Directors. Previously, Czupak spent over 12 years in senior executive leadership positions at Sourcefire including serving as Sourcefire’s Senior Vice President, International & Business Development and Senior Vice President of Corporate Development. At the time of Sourcefire’s acquisition by Cisco in 2013 for $2.7 billion dollars, Czupak was also General Manager for the Advanced Malware Protection (“FireAMP”) business which under John’s leadership became one of the fastest growing product segments in the company’s history. Czupak also serves as an Advisor and Board member to a number of technology companies, including Sonatype, PFP Cybersecurity and Cybrary.

“Having had the opportunity to be part of several successful ventures with NEA, I am more than pleased that we can partner together again at ThreatQuotient. The support of NEA and our other investors further validates the innovative approach the company is taking towards reshaping the way organizations look at threat intelligence,” said Czupak. “ThreatQuotient has clearly come out of the gate swinging and is poised for tremendous growth. I welcome the opportunity to be a part of such a groundbreaking company and look forward to expanding the executive team and solidifying ThreatQuotient as a global leader in enabling organizations to correlate their threat intelligence with confidence.”

About NEA

NEA is a leading venture capital firm focused on helping entrepreneurs build transformational businesses across multiple stages, sectors and geographies. With more than $13 billion in committed capital, the firm invests in information technology and healthcare companies at all stages in a company’s lifecycle, from seed stage through IPO. NEA’s long track record of successful investing includes more than 175 portfolio company IPOs and more than 300 acquisitions. For additional information, visit: http://www.nea.com.

About ThreatQuotient

ThreatQuotient provides ThreatQ, the only Threat Intelligence Platform (TIP) that centrally manages and correlates unlimited external sources with all internal security and analytics solutions for contextual, operationalized intelligence in a single pane of glass. ThreatQ is also the first TIP to provide Indicator Nurturing, which goes beyond enrichment to help customers tailor indicators of compromise (IOCs) more specifically to their infrastructure. Headquartered in Northern Virginia, ThreatQuotient was founded by two former security operations analysts to provide organizations the ability to correlate with confidence. For more information, please visit: https://www.threatq.com/.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-20
A vulnerability of Helpcom could allow an unauthenticated attacker to execute arbitrary command. This vulnerability exists due to insufficient authentication validation.
PUBLISHED: 2021-04-20
vscode-restructuredtext before 146.0.0 contains an incorrect access control vulnerability, where a crafted project folder could execute arbitrary binaries via crafted workspace configuration.
PUBLISHED: 2021-04-20
** UNSUPPORTED WHEN ASSIGNED ** The AdTran Personal Phone Manager software is vulnerable to an authenticated stored cross-site scripting (XSS) issues. These issues impact at minimum versions 10.8.1 and below but potentially impact later versions as well since they have not previously been disclosed....
PUBLISHED: 2021-04-20
** UNSUPPORTED WHEN ASSIGNED ** The AdTran Personal Phone Manager software is vulnerable to multiple reflected cross-site scripting (XSS) issues. These issues impact at minimum versions 10.8.1 and below but potentially impact later versions as well since they have not previously been disclosed. Only...
PUBLISHED: 2021-04-20
** UNSUPPORTED WHEN ASSIGNED ** AdTran Personal Phone Manager 10.8.1 software is vulnerable to an issue that allows for exfiltration of data over DNS. This could allow for exposed AdTran Personal Phone Manager web servers to be used as DNS redirectors to tunnel arbitrary data over DNS. NOTE: The aff...