Cybereason, a Tel Aviv- and Boston, Massachusetts-based cybersecurity company providing endpoint prevention, detection, and response, has secured a $50 million investment from Google Cloud, VentureBeat has learned. It extends the series F round that Cybereason announced in July from $275 million to $325 million, making Cybereason one of the best-funded startups in the cybersecurity industry with over $713 million in capital. We reached out to a Google Cloud spokesperson, but they didn't respond by press time. The infusion of cash comes after Cybereason and Google Cloud entered into a strategic partnership to bring to market a platform -- Cybereason XDR powered by Chronicle -- that can ingest and analyze "petabyte-scale" telemetry from endpoints, networks, containers, apps, profiles, and cloud infrastructure. Combining technology from Cybereason, Google Cloud, and Chronicle, the platform scans more than 23 trillion security-related events per week and applies AI to help reveal, mitigate, and predict cyberattacks correlated across devices, users, apps, and cloud deployments.
Chief information security officers' (CISOs) greatest challenge going into 2022 is countering the speed and severity of cyberattacks. The latest real-time monitoring and detection technologies improve the odds of thwarting an attack but aren't foolproof. CISOs tell VentureBeat that bad actors avoid detection with first-line monitoring systems by modifying attacks on the fly. Enterprises fail to get the most value from threat monitoring, detection, and response cybersecurity strategies because they're too focused on data collection and security monitoring alone. CISOs tell VentureBeat they're capturing more telemetry (i.e., remote) data than ever, yet are short-staffed when it comes to deciphering it, which means they're often in react mode.
By the year 2021, cybercrime losses will cost upwards of $6 trillion annually. It's no surprise, then, that the cybersecurity industry is exploding as it grows to protect the networks and systems on which companies and organizations operate and store data. Because effective information security requires smarter detection, many cybersecurity companies are upping their game by using artificial intelligence to achieve that goal. A new wave of AI-powered solutions and products keep bad actors on their toes while giving IT teams much needed relief. Here are 30 companies merging artificial intelligence and cybersecurity to make the virtual world safer.
Solutions Review's listing of the top Endpoint Security vendors is an annual mashup of products that best represent current market conditions, according to the crowd. Our editors selected the top Endpoint Security products based on each solution's Authority Score, a meta-analysis of real user sentiment through the web's most trusted business software review sites and our own proprietary five-point inclusion criteria. Who are the 22 Best Endpoint Security Companies for 2020? Despite the flood of information on endpoint security capabilities and features, the core of endpoint security remains the same. Namely, these solutions help businesses prevent malware from penetrating their networks and discover dwelling threats. Next-generation endpoint security goes beyond antivirus--it fortifies new components of the decentralized digital perimeter.
We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Gaps in cybersecurity tech stacks, especially in endpoint security and patch management, are increasingly leaving enterprises vulnerable to attacks. CISOs are focusing on how to drive new digital revenue strategies while reducing risk and protecting virtual workforces amidst the various threats. From cybercriminal gangs trying to recruit AI engineers, to state-funded Advanced Persistent Threat (APT) networks capable of simultaneously launching attacks across multiple attack vectors, cybercriminals are getting smarter all the time. Studies of job ads on the dark web show that those who know how to breach web services, have AI-based hacking skills and can capture privileged access credentials are the most in-demand.