Cloud Startup: Illumio – The Cloud Security Startup

Cloud Startup: Illumio – The Cloud Security Startup

Illumio – The Cloud Security Startup That Is Sure To Make Some Noise

illumio

Whispers are flying around the web of a cloud security startup with all the right building blocks. That startup is none other than Illumio from Santa Clara, which was launched in January of this year. Considering the immense growth and popularity of cloud usage and storage, it is no wonder why so many search for a cloud service with high functionality, as well as top of the line security. That may be why so many are intrigued about what’s to come from Illumio, the startup that is revealing so little about their specific endeavors and company goals. This, of course, will eventually be revealed once the company comes out of stealth mode. Though, when that is supposed to take place is anyone’s guess.

What is known is that its foundation is solid; with much expertise behind its creation. The team, along with other cloud experts, is hoping that Illumio can indeed reduce, if not eliminate, the many security challenges of cloud utilization and storage.

So, who makes up the Illumio team? It has been told that the foundation of Illumio is strong. From their founders to their VC backup, Illumio has the brilliance to do amazing things with both cloud technology and the security expertise to uphold it. Illumio founders Andrew Rubin, PJ Kirner and Alan Stokol have years of experience with companies such as Cymtec Systems, Juniper and Hewlett-Packard. The three are joined by experts Alan Cohen, now Illumio’s lead commercial officer and Ben Verghese, Illumio’s engineering VP, along with a handful or two of other experts in the field of cloud and security technology.

Illumio is backed by big time VC’s including Juniper’s own, Junos Innovation Fund, and Andreessen Horowitz; who is well known for their assistance with startups such as GitHub, Groupon, FourSquare, Instagram, Lookout and many more. Thus far, since their launch in January, Illumio has reeled in over $42 million in funding through two funding events: one in January, bringing in $8 million and the other in September, which gathered over $34 million. Obviously until this startup is released from silence we will not exactly where the monies are being utilized.

It is unclear as to whether the company’s focus will be solely on cloud security or whether it will encompass cloud services with high end security intertwined; Illumio’s website give us clues such as “Virtualization,” “Cloud,” and “Security,” however, those are the only hints we have to go on at the moment. Stay tuned for more information about this promising, sturdy founding startup that is Illumio.

By Glenn Blake

About Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.

Find out more
View All Articles

Sorry, comments are closed for this post.

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Data Protection and Session Fixation Attacks

Data Protection and Session Fixation Attacks

Keeping the man out of the middle: preventing session fixation attacks In a nutshell, session fixation is a type of man in the middle attack where an attacker is able to pretend to be a victim using a session variable. For instance, let’s say you have an application that uses sessions to validate the user.…

E-Commerce Advances For Savvy Marketers

E-Commerce Advances For Savvy Marketers

Digital Marketing Platforms Advertising and marketing techniques have progressed rapidly in the last decade with both channel focus and the direction of content shifting considerably due primarily to advances in cloud technology. Gartner’s Magic Quadrant for Digital Commerce 2016 singles out a few ecommerce providers who are topping their sector in both ability to execute…

The Lighter Side Of The Cloud – Energy Battle

The Lighter Side Of The Cloud – Energy Battle

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via@cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Cloud Computing Myths That SMBs Should Know

Cloud Computing Myths That SMBs Should Know

Cloud Computing and SMBs Cloud Computing is the hottest issue among IT intellects of Small and Medium Businesses (SMBs). Like any other computer-orientated technology, Cloud Computing has some misconceptions and myths that often kick-start arguments among the two opposing groups: Cloud Supporters and Cloud Opponents. Both of these groups have their own ideology and reasons…

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors A recent BI Intelligence report claimed that the Internet of Things (IoT) is on its way to becoming the largest device market in the world. Quite naturally, such exponential growth of the IoT market has prompted a number of high-profile corporate investors and smart money VCs to bet highly…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Chances are if you’re working for a startup or smaller company, you don’t have a robust IT department. You’d be lucky to even have a couple IT specialists. It’s not that smaller companies are ignoring the value and importance of IT, but with limited resources, they can’t afford to focus on anything…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…