vArmour Raises $36 Million To Protect The Data Defined Perimeter

vArmour Raises $36 Million To Protect The Data Defined Perimeter

Menlo Ventures, Columbus Nova Technology Partners and Citi Ventures Contribute Funds to Accelerate Development of Disruptive Technology, Scale to Meet Global DemandvArmour

MOUNTAIN VIEW, CA–(Source: Marketwired – Aug 20, 2014)vArmour, a stealth security company designed to protect the new data defined perimeter for enterprises, today announced it has raised $36 million in funding, including a Series B round closed in December 2013 ($15 million) led by Menlo Ventures and a Series C round closed in August 2014 ($21 million) led by Columbus Nova Technology Partners (CNTP), Citi Ventures and Work-Bench Ventures, bringing total company funding to $42 million. vArmour will use the capital to scale development and sales teams to help the enterprise protect their new data defined perimeter in today’s reality of pervasive virtualization, constant threats and advanced security breaches.

“vArmour has the escape velocity to completely disrupt the security industry,” said Mohsen Moazami, Founder and Managing Director, CNTP. “We went all in on vArmour as I’m confident that vArmour’s continued growth will deliver a solution for the enterprise that can visualize, manage and ultimately protect the data center in a way we’ve never seen before.”

Our investment in vArmour is a testament to the potential for its technology to shape the future of enterprise security for the data center,” said Arvind Purushotham, Managing Director at Citi Ventures. “As an organization that supports billions of secure transactions per day, Citi is dedicated to consumer trust and vArmour’s management team shares our vision for the importance of enterprise security.”

Three-fourths of organizations have active command-and-control communications, indicating that attackers have control of breached systems and are possibly already receiving data from them.* As massive, growing amounts of data continue to be distributed on a global scale, security controls need to move deep into the data center and be as dynamic as the applications and data they protect. There, at the data defined perimeter, vArmour provides the needed protection dynamically and securely by giving enterprises instant visibility and control of their East/West traffic flows for both old and new data centers architectures.

Advanced targeted attacks are easily bypassing traditional firewalls and signature-based prevention mechanisms. All organizations should now assume that they are in a state of continuous compromise. However, organizations have deluded themselves into believing that 100 percent prevention is possible, and they have become overly reliant on blocking-based and signature-based mechanisms for protection. As a result, most enterprises have limited capabilities to detect and respond to breaches when they inevitably occur, resulting in longer ‘dwell times’ and increased damage,” wrote Neil MacDonald and Peter Firstbrook of Gartner.** “In reality, going forward, improved prevention, detection, response and prediction capabilities are all needed to deal with all types of attacks, ‘advanced’ or not. Furthermore, these should not be viewed as siloed capabilities; rather, they should work intelligently together as an integrated, adaptive system to constitute a complete protection process for advanced threats.”

As part of the investments, Pravin Vazirani, general partner at Menlo Ventures and Mohsen Moazami, CNTP, will both join the vArmour Board of Directors. Recently, Lane Bess and Dave Stevens, both previous CEOs of Palo Alto Networks, were also announced as investors and vArmour board members, offering their combined 60 years of experience leading and growing security, data center and tech start-ups, including current roles at Brocade and Zscaler. The company, which has been in stealth-mode since its founding in January 2011, previously announced a $6 million Series A led by Highland Capital in January 2013 and is now prepared to launch later in 2014.
Our investors saw first-hand vArmour’s large scale deployments of advanced data center security technology on a global basis and they realized that we have created something extremely valuable that solves a strategic issue for the enterprise,” said Tim Eades, vArmour CEO. “Today, our board represents some of the best minds in security with Lane and Dave from Palo Alto Networks, now joined by Mohsen from CNTP and Pravin from Menlo. With our all-star team throughout the US, EMEA and APAC, we’re in the best position to bring this technology to market and forever change the rules for security in the data center.”

Those interested in learning more about the newly defined data perimeter and East/West traffic flows are invited to attend an upcoming webinar on August 20. For more information on the webinar, presented by vArmour, distinguished ESG analyst Jon Oltsik and Demetrios “Laz” Lazarikos, Blue Lava Consulting IT Security Strategist and former CISO for Sears Online, visit vArmour.com.

vArmour is continuing to grow and is aggressively hiring at all levels. For those interested in learning more, visit vArmour.com.

*Source: FireEye

**Source: Gartner, Designing an Adaptive Security Architecture for Protection From Advanced Attacks, 12 February 2014 G00259490, Neil MacDonald | Peter Firstbrook

About vArmour

Based in Mountain View, Calif., vArmour is a stealth security company focused on securing the data defined perimeter of enterprises. The company has raised $42 million in funding led by Highland Capital Partners, Menlo Ventures, Columbus Nova Technology Partners and Citi Ventures. Executives from NetScreen, Juniper Networks, Silver Tail Systems, Citrix, Riverbed and IBM lead the company, which will launch in 2014. Learn more at www.varmour.com.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
When Sci-Fi Predictions Come To Fruition

When Sci-Fi Predictions Come To Fruition

Evolution of Technologies To paraphrase science fiction author Arthur C. Clark, those who make predictions about the future are either “considered conservative now and mocked later, or mocked now and proved right when they are no longer around to enjoy the acclaim.” The one thing we can be sure about, Clark ventured, is that “[the…

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Inc (FB.O) said on Thursday it had completed a successful test flight of a solar-powered drone that it hopes will help it extend internet connectivity to every corner of the planet. Aquila, Facebook’s lightweight, high-altitude aircraft, flew at a few thousand feet for 96 minutes in Yuma, Arizona, Chief Executive Mark Zuckerberg wrote in…

When Will Women In Tech Become The Norm?

When Will Women In Tech Become The Norm?

Tech Diversity It is well known that the technology industry has been dominated by men, but it is also clear that the industry is working to change that. Diversity in the tech industry, especially where it applies to women in tech, has been a topic of discussion for years. Recently the Washington Technology Industry Association…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

Edtech and Virtual Reality – Exciting Learning Environment

Edtech and Virtual Reality – Exciting Learning Environment

Customizing Edutech Customized edtech learning solutions are becoming more commonplace as the education industry recognises their potential and begins transforming the traditional structures so as to incorporate innovative developments. From textbooks to tablets, chalkboards to virtual reality, edtech promises not only dynamic and exciting learning environments but better learning strategies and solutions. Virtual Reality and…

Which Is Better For Your Company: Cloud-Based or On-Premise ERP Deployment?

Which Is Better For Your Company: Cloud-Based or On-Premise ERP Deployment?

Cloud-Based or On-Premise ERP Deployment? You know how enterprise resource management (ERP) can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and…

Are CEO’s Missing Out On Big Data’s Big Picture?

Are CEO’s Missing Out On Big Data’s Big Picture?

Big Data’s Big Picture Big data allows marketing and production strategists to see where their efforts are succeeding and where they need some work. With big data analytics, every move you make for your company can be backed by data and analytics. While every business venture involves some level of risk, with big data, that risk…

Shaking Up The Cloud Technology Marketplace

Shaking Up The Cloud Technology Marketplace

Cloud Technology Marketplace Cloud continues its devastating rearrangement of the technology marketplace. As legacy vendors struggle to compete many deck chairs are getting moved about – some pretty spectacularly. In the meantime, the boat is still sinking. We have seen how SaaS (Software as a Service) is tearing up traditional software firms who must adapt…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Speed, flexibility, and innovation require multiple cloud services As businesses seek new paths to innovation, racing to market with new features and products, cloud services continue to grow in popularity. According to Gartner, 88% of total compute will be cloud-based by 2020, leaving just 12% on premise. Flexibility remains a key consideration, and…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Cloud Infographic – Guide To Small Business Cloud Computing

Cloud Infographic – Guide To Small Business Cloud Computing

Small Business Cloud Computing Trepidation is inherently attached to anything that involves change and especially if it involves new technologies. SMBs are incredibly vulnerable to this fear and rightfully so. The wrong security breach can incapacitate a small startup for good whereas larger enterprises can reboot their operations due to the financial stability of shareholders. Gordon Tan contributed an…

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data Future Today’s organizations should become more collaborative, virtual, adaptive, and agile in order to be successful in complex business world. They should be able to respond to changes and market needs. Many organizations found that the valuable data they possess and how they use it can make them different than others. In fact,…

How Big Data Is Influencing Web Design

How Big Data Is Influencing Web Design

How Big Data Is Influencing Web Design For all you non-techies… You’re probably wondering what big data is (I know I was….a few years back) so let’s get the definitions out of the way so we’re on the same page, okay? Big data is A LOT of data – really, it is. It is a…

The Cloud Above Our Home

The Cloud Above Our Home

Our Home – Moving All Things Into The Cloud The promise of a smart home had excited the imagination of the movie makers long ago. If you have seen any TV shows in the nineties or before, the interpretation presented itself to us as a computerized personal assistant or a robot housekeeper. It was smart,…

Are Women Discriminated Against In The Tech Sector?

Are Women Discriminated Against In The Tech Sector?

Women Discriminated Against In Tech Sector It is no secret that the tech industry is considered sexist since most women are paid less than men; there are considerably fewer women in tech jobs; and generally men get promoted above women. Yet the irony is twofold. Firstly, there is an enormous demand for employees with skills…