vArmour Raises $36 Million To Protect The Data Defined Perimeter

vArmour Raises $36 Million To Protect The Data Defined Perimeter

Menlo Ventures, Columbus Nova Technology Partners and Citi Ventures Contribute Funds to Accelerate Development of Disruptive Technology, Scale to Meet Global DemandvArmour

MOUNTAIN VIEW, CA–(Source: Marketwired – Aug 20, 2014)vArmour, a stealth security company designed to protect the new data defined perimeter for enterprises, today announced it has raised $36 million in funding, including a Series B round closed in December 2013 ($15 million) led by Menlo Ventures and a Series C round closed in August 2014 ($21 million) led by Columbus Nova Technology Partners (CNTP), Citi Ventures and Work-Bench Ventures, bringing total company funding to $42 million. vArmour will use the capital to scale development and sales teams to help the enterprise protect their new data defined perimeter in today’s reality of pervasive virtualization, constant threats and advanced security breaches.

“vArmour has the escape velocity to completely disrupt the security industry,” said Mohsen Moazami, Founder and Managing Director, CNTP. “We went all in on vArmour as I’m confident that vArmour’s continued growth will deliver a solution for the enterprise that can visualize, manage and ultimately protect the data center in a way we’ve never seen before.”

Our investment in vArmour is a testament to the potential for its technology to shape the future of enterprise security for the data center,” said Arvind Purushotham, Managing Director at Citi Ventures. “As an organization that supports billions of secure transactions per day, Citi is dedicated to consumer trust and vArmour’s management team shares our vision for the importance of enterprise security.”

Three-fourths of organizations have active command-and-control communications, indicating that attackers have control of breached systems and are possibly already receiving data from them.* As massive, growing amounts of data continue to be distributed on a global scale, security controls need to move deep into the data center and be as dynamic as the applications and data they protect. There, at the data defined perimeter, vArmour provides the needed protection dynamically and securely by giving enterprises instant visibility and control of their East/West traffic flows for both old and new data centers architectures.

Advanced targeted attacks are easily bypassing traditional firewalls and signature-based prevention mechanisms. All organizations should now assume that they are in a state of continuous compromise. However, organizations have deluded themselves into believing that 100 percent prevention is possible, and they have become overly reliant on blocking-based and signature-based mechanisms for protection. As a result, most enterprises have limited capabilities to detect and respond to breaches when they inevitably occur, resulting in longer ‘dwell times’ and increased damage,” wrote Neil MacDonald and Peter Firstbrook of Gartner.** “In reality, going forward, improved prevention, detection, response and prediction capabilities are all needed to deal with all types of attacks, ‘advanced’ or not. Furthermore, these should not be viewed as siloed capabilities; rather, they should work intelligently together as an integrated, adaptive system to constitute a complete protection process for advanced threats.”

As part of the investments, Pravin Vazirani, general partner at Menlo Ventures and Mohsen Moazami, CNTP, will both join the vArmour Board of Directors. Recently, Lane Bess and Dave Stevens, both previous CEOs of Palo Alto Networks, were also announced as investors and vArmour board members, offering their combined 60 years of experience leading and growing security, data center and tech start-ups, including current roles at Brocade and Zscaler. The company, which has been in stealth-mode since its founding in January 2011, previously announced a $6 million Series A led by Highland Capital in January 2013 and is now prepared to launch later in 2014.
Our investors saw first-hand vArmour’s large scale deployments of advanced data center security technology on a global basis and they realized that we have created something extremely valuable that solves a strategic issue for the enterprise,” said Tim Eades, vArmour CEO. “Today, our board represents some of the best minds in security with Lane and Dave from Palo Alto Networks, now joined by Mohsen from CNTP and Pravin from Menlo. With our all-star team throughout the US, EMEA and APAC, we’re in the best position to bring this technology to market and forever change the rules for security in the data center.”

Those interested in learning more about the newly defined data perimeter and East/West traffic flows are invited to attend an upcoming webinar on August 20. For more information on the webinar, presented by vArmour, distinguished ESG analyst Jon Oltsik and Demetrios “Laz” Lazarikos, Blue Lava Consulting IT Security Strategist and former CISO for Sears Online, visit vArmour.com.

vArmour is continuing to grow and is aggressively hiring at all levels. For those interested in learning more, visit vArmour.com.

*Source: FireEye

**Source: Gartner, Designing an Adaptive Security Architecture for Protection From Advanced Attacks, 12 February 2014 G00259490, Neil MacDonald | Peter Firstbrook

About vArmour

Based in Mountain View, Calif., vArmour is a stealth security company focused on securing the data defined perimeter of enterprises. The company has raised $42 million in funding led by Highland Capital Partners, Menlo Ventures, Columbus Nova Technology Partners and Citi Ventures. Executives from NetScreen, Juniper Networks, Silver Tail Systems, Citrix, Riverbed and IBM lead the company, which will launch in 2014. Learn more at www.varmour.com.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Building a Data Security Strategy – More Important Than Ever

Building a Data Security Strategy – More Important Than Ever

Data Security Strategy Article sponsored by SAS Software and Big Data Forum Security and privacy have been an integral concern of the IT industry since its very inception, but as it expands through web-based, mobile, and cloud-based applications, access to data is magnified as are the threats of illicit penetration. As enterprises manage vast quantities…

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Top-Ranked Cloud Billing Company Enables Greater Speed and Frictionless Billing for Unparalleled Customer Experience San Francisco, CA – August 23, 2016 – Aria Systems, which helps enterprises grow subscription and usage-based revenue, today announced that Pitney Bowes has selected Aria’s cloud-based monetization platform as the key billing and monetization component of their new Commerce Cloud…

The Golden Age of Wearable Technology

The Golden Age of Wearable Technology

The Golden Age One of the biggest fads in the technology sector right now is wearable tech. From Smartwatches that let you check your emails, chat with friends and search the web, to fitness accessories that monitor your heart rate and your sleep patterns, this is truly the Golden Age of wearable technology. But some…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Are CEO’s Missing Out On Big Data’s Big Picture?

Are CEO’s Missing Out On Big Data’s Big Picture?

Big Data’s Big Picture Big data allows marketing and production strategists to see where their efforts are succeeding and where they need some work. With big data analytics, every move you make for your company can be backed by data and analytics. While every business venture involves some level of risk, with big data, that risk…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Cloud Infographic – Big Data Predictions By 2023

Cloud Infographic – Big Data Predictions By 2023

Big Data Predictions By 2023 Everything we do online from social networking to e-commerce purchases, chatting, and even simple browsing yields tons of data that certain organizations collect and poll together with other partner organizations. The results are massive volumes of data, hence the name “Big Data”. This includes personal and behavioral profiles that are stored, managed, and…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services Business Intelligence (BI) services have recently seen an explosion of innovation and choices for business owners and entrepreneurs. So many choices, in fact, that many companies aren’t sure which business intelligence company to use. To help offer you a solution, we’ve compiled a list of 12 Business Intelligence companies…

15 Cloud Data Performance Monitoring Companies

15 Cloud Data Performance Monitoring Companies

Cloud Data Performance Monitoring Companies (Updated: Originally Published Feb 9th, 2015) We have decided to put together a small list of some of our favorite cloud performance monitoring services. In this day and age it is extremely important to stay on top of critical issues as they arise. These services will accompany you in monitoring…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…

5 Surprising Ways Cloud Computing Is Changing Education

5 Surprising Ways Cloud Computing Is Changing Education

Cloud Computing Education The benefits of cloud computing are being recognized in businesses and institutions across the board, with almost 90 percent of organizations currently using some kind of cloud-based application. The immediate benefits of cloud computing are obvious: cloud-based applications reduce infrastructure and IT costs, increase accessibility, enable collaboration, and allow organizations more flexibility…