CloudPassage Secures $25.5 Million – Strategy For Securing Cloud Environments

CloudPassage Secures $25.5 Million – Strategy For Securing Cloud Environments

Series C Funding Round Led by Shasta Ventures Validates Need for Purpose-Built Cloud Security and Compliance Platform 

SAN FRANCISCO, CA–(Marketwired – Feb 13, 2014) – CloudPassage®, the Software Defined Security (SDSec) company, announced today that it has closed a $25.5 million Series C financing round. The round is led by Shasta Ventures and includes new investors, Meritech Capital Partners and Stephen Luczo, CEO of Seagate, with participation from existing investors, Tenaya Capital, Benchmark Capital and Musea Ventures.

cloud-passageCloudPassage’s new financing will be used to expand sales and marketing to meet increasing demand from enterprises seeking to secure their public, private and hybrid cloud environments. The round brings CloudPassage’s total capital raised to $53 million. The company is growing rapidly and closed 2013 with the addition of 50 new enterprise customers.

Security continues to be the number one barrier to cloud adoption, but legacy security tools haven’t been able to adapt to address these concerns,” said Jason Pressman, Managing Director of Shasta Ventures. “Businesses are moving to the cloud at an incredible rate with most forecasts running at 30 percent or higher compound annual growth rates, and security must keep pace. CloudPassage is the only company that is helping organizations make that transition seamlessly, while delivering the security and compliance that they demand.”

Halo®, CloudPassage’s security automation platform purpose-built for the cloud, delivers security and compliance for large-scale, distributed environments. Halo was built to be flexible, lightweight and fast to deploy and scale, regardless of the environment. Halo also integrates with leading cloud and security technologies such as VMware, Rackspace, Amazon Web Services, RightScale, Splunk and HP ArcSight, among others.

Cloud security will be a multi-billion dollar market in just a few short years, and CloudPassage has an amazing first-mover advantage,” said Stephen Luczo, CEO of Seagate. “CloudPassage has developed an innovative platform that is purpose-built for the cloud. Its rapid growth and increasing adoption among large enterprises serves as validation the company has the right approach to cloud security.”

CloudPassage currently protects more than 400 production cloud application deployments, including a number of Fortune 1000 enterprises, and automates security for more than 10,000 new cloud workload instances each month.

The combination of agility and immediate scalability make cloud infrastructure a powerful strategy that is being rapidly adopted in every industry. These same characteristics create complexity for security and compliance. Halo was built to be as scalable, automated and agile as the cloud itself,” said Carson Sweet, CEO of CloudPassage. “We’re excited to welcome our new investors as we continue to enable enterprise cloud adoption and enter the next phase of our company’s growth.”

About CloudPassage

CloudPassage is the leading Software Defined Security (SDSec) company and creator of Halo, the industry’s first and only security and compliance platform purpose-built for elastic cloud environments. Halo’s patented architecture operates seamlessly across any mix of software-defined data center, public cloud, and even hardware infrastructure. Industry-leading enterprises trust Halo to protect their cloud and software-defined datacenter environments. Headquartered in San Francisco, CA, CloudPassage is backed by Benchmark Capital, Meritech Capital Partners, Tenaya Capital, Shasta Ventures, Musea Ventures and other leading investors. For more information, please visit http://www.cloudpassage.com

CloudPassage® and Halo® are registered trademarks of CloudPassage, Inc.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…