Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security //

Database Security

3/10/2020
10:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Clumio SaaS Continues Contributions to $10 Billion Backup Market With Services for the All Cloud Enterprise

Clumio reports new customer validation and adds a board member.

Clumio today announced company, customer and product momentum as it delivers a globally consolidated data protection service in, for and to the public cloud. Since unveiling its SaaS for enterprise backup last year, the company is protecting more than 8PB of customer data and has more than tripled its employee headcount.

Clumio enables enterprises to manage and protect their dispersed data — wherever that data resides. Companies can reap the scalability, flexibility and elasticity benefits of the cloud – without additional hardware or software for data management and protection. Clumio’s secure enterprise backup as a service is a solution that crosses environments, eliminating the need to create a different set of tools, workflows, and policies for each cloud.

Clumio, which has secured $186M in total funding to date, also welcomed new board member Chris Degnan, CRO at Snowflake Computing.

“We launched Clumio to build a data management platform in the cloud the right way. Effective, economical and compliant data protection is a major cloud barrier and enterprises are going to struggle to get over it if they don’t approach the problem differently than they did in the data center,” said Poojan Kumar, Clumio CEO and co-founder. “Clumio is aSaaS alternative that scales on demand, has predictable pricing and is simple to manage.”

The Data Protection as a Service market – which includes spend on backup and disaster recovery cloud services – is projected to reach the $10 billion mark by 2022, according to IDC. Enterprises have already moved their data warehouse, CRM and IT service management workloads to the cloud, and Clumio is doing the same for data protection. Clumio is a secure, backup as a service that consolidates the protection of an enterprise data center and any remote sites without any hardware or software to size, configure, manage or buy.

“Just as Snowflake took the data warehouse to the cloud, Clumio has recognized that data protection is another perfect use case to leverage the power of the public cloud,” said Chris Degnan, Snowflake CRO and Clumio board member. “Given Snowflake’s success creating a cloud data platform and the obvious parallels with Clumio, I look forward to sharing my experience with the entire team. I’m confident Clumio is attacking the data protection problem in the cloud in a way that will allow enterprises to successfully accelerate their cloud journeys.”

“Clumio’s secure backup as a service fits perfectly with our SaaS-first, cloud-first approach to managing and protecting data. Data in the cloud requires a different treatment when it comes to security, and Clumio has been the cloud ‘easy button’ for us,” said Thomas Dixon, ISO and director of Information Security and Infrastructure, Cal State East Bay. “Clumio bolsters our aggressive cloud initiatives, and its ability to support multiple workloads with a single service and a single set of backup policies provides always-on security to our data, wherever it resides.”

Since officially launching its flagship backup as a service product in August 2019, Clumio has raised $186M in total funding in less than two-and-a-half years since inception, including a $135M Series C round led by Sutter Hill Ventures in November 2019.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/22/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Is Zero Trust the Best Answer to the COVID-19 Lockdown?
Dan Blum, Cybersecurity & Risk Management Strategist,  5/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12393
PUBLISHED: 2020-05-26
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execut...
CVE-2020-12394
PUBLISHED: 2020-05-26
A logic flaw in our location bar implementation could have allowed a local attacker to spoof the current location by selecting a different origin and removing focus from the input element. This vulnerability affects Firefox < 76.
CVE-2020-12395
PUBLISHED: 2020-05-26
Mozilla developers and community members reported memory safety bugs present in Firefox 75 and Firefox ESR 68.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Fi...
CVE-2020-12396
PUBLISHED: 2020-05-26
Mozilla developers and community members reported memory safety bugs present in Firefox 75. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 76.
CVE-2020-10719
PUBLISHED: 2020-05-26
A flaw was found in Undertow in versions before 2.1.1.Final, regarding the processing of invalid HTTP requests with large chunk sizes. This flaw allows an attacker to take advantage of HTTP request smuggling.