Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security //

Database Security

3/10/2020
10:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Clumio SaaS Continues Contributions to $10 Billion Backup Market With Services for the All Cloud Enterprise

Clumio reports new customer validation and adds a board member.

Clumio today announced company, customer and product momentum as it delivers a globally consolidated data protection service in, for and to the public cloud. Since unveiling its SaaS for enterprise backup last year, the company is protecting more than 8PB of customer data and has more than tripled its employee headcount.

Clumio enables enterprises to manage and protect their dispersed data — wherever that data resides. Companies can reap the scalability, flexibility and elasticity benefits of the cloud – without additional hardware or software for data management and protection. Clumio’s secure enterprise backup as a service is a solution that crosses environments, eliminating the need to create a different set of tools, workflows, and policies for each cloud.

Clumio, which has secured $186M in total funding to date, also welcomed new board member Chris Degnan, CRO at Snowflake Computing.

“We launched Clumio to build a data management platform in the cloud the right way. Effective, economical and compliant data protection is a major cloud barrier and enterprises are going to struggle to get over it if they don’t approach the problem differently than they did in the data center,” said Poojan Kumar, Clumio CEO and co-founder. “Clumio is aSaaS alternative that scales on demand, has predictable pricing and is simple to manage.”

The Data Protection as a Service market – which includes spend on backup and disaster recovery cloud services – is projected to reach the $10 billion mark by 2022, according to IDC. Enterprises have already moved their data warehouse, CRM and IT service management workloads to the cloud, and Clumio is doing the same for data protection. Clumio is a secure, backup as a service that consolidates the protection of an enterprise data center and any remote sites without any hardware or software to size, configure, manage or buy.

“Just as Snowflake took the data warehouse to the cloud, Clumio has recognized that data protection is another perfect use case to leverage the power of the public cloud,” said Chris Degnan, Snowflake CRO and Clumio board member. “Given Snowflake’s success creating a cloud data platform and the obvious parallels with Clumio, I look forward to sharing my experience with the entire team. I’m confident Clumio is attacking the data protection problem in the cloud in a way that will allow enterprises to successfully accelerate their cloud journeys.”

“Clumio’s secure backup as a service fits perfectly with our SaaS-first, cloud-first approach to managing and protecting data. Data in the cloud requires a different treatment when it comes to security, and Clumio has been the cloud ‘easy button’ for us,” said Thomas Dixon, ISO and director of Information Security and Infrastructure, Cal State East Bay. “Clumio bolsters our aggressive cloud initiatives, and its ability to support multiple workloads with a single service and a single set of backup policies provides always-on security to our data, wherever it resides.”

Since officially launching its flagship backup as a service product in August 2019, Clumio has raised $186M in total funding in less than two-and-a-half years since inception, including a $135M Series C round led by Sutter Hill Ventures in November 2019.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5292
PUBLISHED: 2020-03-31
Leantime before versions 2.0.15 and 2.1-beta3 has a SQL Injection vulnerability. The impact is high. Malicious users/attackers can execute arbitrary SQL queries negatively affecting the confidentiality, integrity, and availability of the site. Attackers can exfiltrate data like the users' and admini...
CVE-2020-7009
PUBLISHED: 2020-03-31
Elasticsearch versions from 6.7.0 to 6.8.7 and 7.0.0 to 7.6.1 contain a privilege escalation flaw if an attacker is able to create API keys. An attacker who is able to generate an API key can perform a series of steps that result in an API key being generated with elevated privileges.
CVE-2019-13495
PUBLISHED: 2020-03-31
In firmware version 4.50 of Zyxel XGS2210-52HP, multiple stored cross-site scripting (XSS) issues allows remote authenticated users to inject arbitrary web script via an rpSys.html Name or Location field.
CVE-2020-5291
PUBLISHED: 2020-03-31
Bubblewrap (bwrap) before version 0.4.1, if installed in setuid mode and the kernel supports unprivileged user namespaces, then the `bwrap --userns2` option can be used to make the setuid process keep running as root while being traceable. This can in turn be used to gain root permissions. Note that...
CVE-2019-14905
PUBLISHED: 2020-03-31
A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS co...