Monday, August 18, 2014

Israeli Cyber-Security Startup GuardiCore Raises $11 Million

Cyber-security start-up GuardiCore Ltd. has raised $11 million in a series-A round. The Tel-Aviv based company develops cyber security solutions for data centers. 

The company’s product reroutes malicious traffic into a monitored server, where it provides insights into the nature of the attack.
The technology is currently being tested with potential customers. 

The investment round was led by Battery Ventures, with participation from Greylock IL , an affiliate fund of Greylock Partners, and undisclosed strategic partners. As part of the investment Battery’s Scott Tobin will be joining GuardiCore’s board. GuardiCore was founded in 2013 by Pavel Gurvich and Ariel Zeitlin, both veterans of Israel Defense Forces technology units.

Data centers are home to critical corporate data and business processes, making them a lucrative target for cyber-attacks. Traditional perimeter security is not designed to deal with today’s threats where attacker sophistication and the risk of insider attacks are growing and modern data center architectures increasingly include applications that cross security perimeters. At the same time, recent architectural changes in data centers have led to an explosion of intra-data center (“east-west”) traffic at terabit levels. State-of-the art security techniques such as IDS, IPS, sandboxing, deep packet inspection, and threat emulation cannot scale to these data traffic rates, and are therefore largely considered to be impossible to apply inside data centers. Once inside a data center, intruders are very difficult to detect and mitigate.

The GuardiCore platform helps solve this intra-data center security problem by making state-of-the-art security techniques scalable to keep pace with east-west data traffic. The company’s first platform component, called “Active Honeypot,” responds to attacks by dynamically re-routing traffic, without the attacker knowing, to a highly monitored stealth “ambush” server. This approach exposes the true intentions of an attacker, provides quick insights about the nature of the attack and eliminates it in real-time.



No comments:

Post a Comment