Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/12/2019
03:30 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

This Week in Security Funding: Where the Money Went

Predictions for cybersecurity investment in 2019 are holding true with funding announcements from four startups.

Cybersecurity startups Expanse, Armis, Bitglass, and Tufin announced financial news during a busy week for industry funding, giving a peek into the technology that is top-of-mind for investors.

The security market, expected to grow 8.7% and reach $124 billion in 2019, has been rife with funding activity. Venture capital investments hit a record high of $5.3 billion in 2018, about 20% more than the $4.4 billion in 2018 and 81% higher than in 2016. Experts say this rate of investment is unsustainable; however, security firms will continue to receive funding in 2019 and beyond.

But which ones? It's tough to predict the security startups that will stick around for the long term. This week helped shed some light on which tech they think has the most potential now.

Let's start with Expanse, a Bay Area startup formerly called Qadium, which this week announced $70 million in Series C funding. The company indexes global IP addresses with the goal of providing governments and large organizations with visibility into their "global Internet attack surface." The startup has its roots in government: Co-founders Tim Junio, previously with the CIA, and Matt Kraning met at DARPA, where they first launched the security research lab Qadium that later became Expanse.

Expanse monitors activity linked to more than 400 million public IPs; customers include the US Department of Defense, Department of Energy, CVS, and PayPal. Its latest funding round was led by TPG Growth, with participation from NEA, IVP, Founders Fund, and MSD Capital. It also received investment from Peter Thiel, Arianna Huffington, Taylor Glover, and Sam Palmisano.

Enterprise Internet of Things (IoT) security firm Armis Security snagged $65 million in Series C investment and reported 700% growth in the past year. Founded in 2015, it offers an agentless IoT security tool created to help organizations view and control unmanaged IoT devices. The system monitors devices on the network and analyzes their behaviors to identify risks and potential attacks.

IoT is a growing security concern for businesses, and it seems investors think Armis can help meet their needs. Sequoia Capital led its Series C funding round with participation from Insight Venture Partners and Intermountain Ventures, as well as Bain Capital, Red Dot Capital Partners, and Tenaya Capital as return investors. Its latest round brings Armis' total funding to $112 million.

Cloud security company Bitglass secured $70 million in Series D funding from new investor Quadrille Capital and current investors Future Fund, New Enterprise Associates (NEA), Norwest, and Singtel Innov8. Its latest round brings total funding to $150.1 million since it was founded in 2013. It plans to leverage the additional funds to continue growing its position within the cloud access security broker (CASB) market.

In other financial news, Tufin Software saw its stock rise more than 30% in its first day of trading. The Israeli security company sold 7.7 million shares priced at $14 each to raise at least $107.8 million at an initial valuation of about $454 million. The money will go toward research and development, as well as adding more people to Tufin's marketing and sales teams.

Tufin, headquartered in Boston and Tel Aviv, calls itself a security policy company, focused on how businesses manage security and network infrastructure. Its security policy management platform aims to help organizations implement and enforce policies across networks.

Related Content:

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
shalinimenon
50%
50%
shalinimenon,
User Rank: Apprentice
4/30/2019 | 6:41:21 AM
Security budget
Very difficult to show the result of the money spend in security. 
shalinimenon
50%
50%
shalinimenon,
User Rank: Apprentice
4/30/2019 | 6:40:05 AM
Preparing Effective Budget
It's difficult to show the result of the money spend in security. 
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13640
PUBLISHED: 2019-07-17
In qBittorrent before 4.1.7, the function Application::runExternalProgram() located in app/application.cpp allows command injection via shell metacharacters in the torrent name parameter or current tracker parameter, as demonstrated by remote command execution via a crafted name within an RSS feed.
CVE-2019-5222
PUBLISHED: 2019-07-17
There is an information disclosure vulnerability on Secure Input of certain Huawei smartphones in Versions earlier than Tony-AL00B 9.1.0.216(C00E214R2P1). The Secure Input does not properly limit certain system privilege. An attacker tricks the user to install a malicious application and successful ...
CVE-2019-1919
PUBLISHED: 2019-07-17
A vulnerability in the Cisco FindIT Network Management Software virtual machine (VM) images could allow an unauthenticated, local attacker who has access to the VM console to log in to the device with a static account that has root privileges. The vulnerability is due to the presence of an account w...
CVE-2019-1920
PUBLISHED: 2019-07-17
A vulnerability in the 802.11r Fast Transition (FT) implementation for Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected interface. The vulnerability is due to a lack of complete error handling conditi...
CVE-2019-1923
PUBLISHED: 2019-07-17
A vulnerability in Cisco Small Business SPA500 Series IP Phones could allow a physically proximate attacker to execute arbitrary commands on the device. The vulnerability is due to improper input validation in the device configuration interface. An attacker could exploit this vulnerability by access...