Click here to close now.

SYS-CON MEDIA Authors: Carmen Gonzalez, Liz McMillan, Pat Romanski, Marty Puranik, Marco Meinardi

News Feed Item

Area 1 Security Raises $2.5 Million for Threat Intelligence Mission

Seed Round Brings Together Influential Security Leaders and Big Data Visionaries

MENLO PARK, CA -- (Marketwired) -- 05/05/14 -- Area 1 Security, a security startup led by three former NSA leaders, today revealed it raised $2.5 million in seed funding. Area 1 Security is the first to deliver a security solution that eliminates targeted social engineering attacks by focusing on behavioral patterns of delivery systems. The company will use the funds to further develop and scale its threat intelligence product.

Investors in Area 1 Security's seed round include a range of security heavyweights and enterprise experts including, Ted Schlein, Kleiner Perkins Caufield & Byers; Cowboy Ventures; Data Collective (DCVC); First Round Capital; Allegis Capital; RedSeal Networks CEO and former Venrock partner Ray Rothrock; and Shape Security CEO Derek Smith.

Unlike most security companies that are focused on remediation following a cyber attack, Area 1 Security's solution uniquely addresses the first phase of targeted attacks that go after users, which currently goes unguarded. Founder and CEO Oren Falkowitz developed a team of former National Security Agency (NSA) officers, who previously focused on the intersection of computer network operations and big data analytics, to give Area 1 Security a unique advantage to deconstruct attacks. The three founders met while working at the NSA and together solved some of the most challenging security and data problems. After the NSA they held various positions at technology companies and gained commercial experience that helped them further identify the need for a threat intelligence system that leverages data gathered from behavioral patterns to prevent future attacks.

"Our team has worked on the cutting edge of data analytics and cyber security, delivering threat intelligence on some of the most sophisticated, targeted and prolific actors," said Falkowitz. "With this seed round, Area 1 Security will continue to develop and perfect our disruptive technology focused to eliminate targeted, socially engineered cyber attacks."

As the sensationalism around cyber attacks and data breaches increases, so does the cost of attacks against businesses. The average time to resolve an attack is 32 days, costing an average of $1,035,769 -- which translates to $32,469 per day. As a result, executives are losing their jobs and companies are scrambling for proper and effective security solutions. In 2013 alone, the median number of days attackers were present on a victim network before they were discovered was 229 days. And a phishing campaign of only ten messages saw a better than 90 percent chance of getting a click. Attackers are attaining better and faster results at a higher rate than defenders are improving their trade, yet enterprise solutions are regulated to clean up attacks rather than prevent them.

Waiting until an attack has reached its target, and relying on unspecific, untimely, and inaccurate information, enterprises are forced to investigate threats rather than take action limiting defense options. The difference in Area 1 Security's approach is the focus on strategic campaign behavior rather than tool mechanics to recognize attacks on the horizon. This results in the company receiving highly accurate data, with low false positives, which allows enterprises to efficiently utilize resources and act to prevent the next big attack.

"Area 1 Security's technology proactively identifies both known and unknown infection vectors before they impact your business," said Derek Smith, CEO of Shape Security. "Their unique threat intelligence approach gives companies a critical window of opportunity to prevent attacks, potentially saving enterprises millions of dollars. Combining Shape Security's product to protect web applications with Area 1 Security's technology to protect employees is a more powerful and complete solution than the industry has ever had."

About Area 1 Security
Based in Menlo Park, CA, Area 1 Security is developing threat intelligence product focused on eliminating targeted, socially engineered cyber attacks. Area 1 Security was founded by CEO Oren Falkowitz, security experts from NSA and MIT, and data analytics specialists from NSA and Disney. For more information, visit www.area1security.com.

Media Contact
Megan Grasty
(415) 963-4174x26
megan(at)highwirepr(dot)com

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Docker is becoming very popular--we are seeing every major private and public cloud vendor racing to adopt it. It promises portability and interoperability, and is quickly becoming the currency of the Cloud. In his session at DevOps Summit, Bart Copeland, CEO of ActiveState, discussed why Docker is so important to the future of the cloud, but will also take a step back and show that Docker is actually only one piece of the puzzle. Copeland will outline the bigger picture of where Docker fits a...
The Workspace-as-a-Service (WaaS) market will grow to $6.4B by 2018. In his session at 16th Cloud Expo, Seth Bostock, CEO of IndependenceIT, will begin by walking the audience through the evolution of Workspace as-a-Service, where it is now vs. where it going. To look beyond the desktop we must understand exactly what WaaS is, who the users are, and where it is going in the future. IT departments, ISVs and service providers must look to workflow and automation capabilities to adapt to growing ...
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, includin...
The Internet of Things (IoT) promises to evolve the way the world does business; however, understanding how to apply it to your company can be a mystery. Most people struggle with understanding the potential business uses or tend to get caught up in the technology, resulting in solutions that fail to meet even minimum business goals. In his session at @ThingsExpo, Jesse Shiah, CEO / President / Co-Founder of AgilePoint Inc., showed what is needed to leverage the IoT to transform your business. ...
Hadoop as a Service (as offered by handful of niche vendors now) is a cloud computing solution that makes medium and large-scale data processing accessible, easy, fast and inexpensive. In his session at Big Data Expo, Kumar Ramamurthy, Vice President and Chief Technologist, EIM & Big Data, at Virtusa, will discuss how this is achieved by eliminating the operational challenges of running Hadoop, so one can focus on business growth. The fragmented Hadoop distribution world and various PaaS soluti...
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impac...
Advanced Persistent Threats (APTs) are increasing at an unprecedented rate. The threat landscape of today is drastically different than just a few years ago. Attacks are much more organized and sophisticated. They are harder to detect and even harder to anticipate. In the foreseeable future it's going to get a whole lot harder. Everything you know today will change. Keeping up with this changing landscape is already a daunting task. Your organization needs to use the latest tools, methods and ex...
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize sup...
Wearable devices have come of age. The primary applications of wearables so far have been "the Quantified Self" or the tracking of one's fitness and health status. We propose the evolution of wearables into social and emotional communication devices. Our BE(tm) sensor uses light to visualize the skin conductance response. Our sensors are very inexpensive and can be massively distributed to audiences or groups of any size, in order to gauge reactions to performances, video, or any kind of present...
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along...
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet conditions, Dyn ensures...
Business and IT leaders today need better application delivery capabilities to support critical new innovation. But how often do you hear objections to improving application delivery like, “I can harden it against attack, but not on this timeline”; “I can make it better, but it will cost more”; “I can deliver faster, but not with these specs”; or “I can stay strong on cost control, but quality will suffer”? In the new application economy, these tradeoffs are no longer acceptable. Customers will ...
Red Hat has launched the Red Hat Cloud Innovation Practice, a new global team of experts that will assist companies with more quickly on-ramping to the cloud. They will do this by providing solutions and services such as validated designs with reference architectures and agile methodology consulting, training, and support. The Red Hat Cloud Innovation Practice is born out of the integration of technology and engineering expertise gained through the company’s 2014 acquisitions of leading Ceph s...
The free version of KEMP Technologies' LoadMaster™ application load balancer is now available for unlimited use, making it easy for IT developers and open source technology users to benefit from all the features of a full commercial-grade product at no cost. It can be downloaded at FreeLoadBalancer.com. Load balancing, security and traffic optimization are all key enablers for application performance and functionality. Without these, application services will not perform as expected or have the...