Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

7/9/2019
10:38 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Internet Isolation Vendor Menlo Security Raises $75 Million in Series D Funding

Company Focused on Complete Protection for Enterprise and Government Agencies from Malware and Phishing Attacks

PALO ALTO, CA – July 9, 2019 - Menlo Security, a leader in cloud security, today announced $75 million in Series D funding, led by clients advised by JP Morgan Asset Management.  Existing investors also participated in the round, including General Catalyst, Sutter Hill Ventures, Osage University Partners, American Express Ventures, HSBC, JP Morgan Chase and Engineering Capital.  In addition, Jonathan Ross, portfolio manager and managing director at JP Morgan Asset Management, will join the company’s board.

“Menlo Security’s innovative security solution protects against threats and attacks that bypass many advanced security products used by companies today,” said Jonathan Ross, portfolio manager and managing director at JP Morgan Asset Management. “Menlo Security’s solution delivers a Zero-Trust Internet by keeping all email and web content off of end user computers and devices, thereby seeking to eliminate malware attacks from these prominent threat vectors.”

Zero-Trust Internet is a default deny approach that is fundamentally different from the way cybersecurity products work.  Today’s products categorize Internet content and websites as being malicious or safe, and this approach is known to fail.  Internet Isolation enables a Zero-Trust Internet and takes the guesswork out of security by assuming all Internet content and websites are malicious.

Menlo Security’s Internet Isolation technology separates an enterprise network from the public web, while still allowing employees to access the Internet seamlessly.  The solution removes the viewing of email attachments and web browsing from the desktop and moves it to the cloud.  By isolating Internet content in the cloud with a Zero-Trust approach, users are protected from malware, ransomware and phishing attacks that bypass legacy defenses, thereby eliminating the most prolific sources of breaches. 

“Menlo Security’s global cloud is protecting millions of end users, isolating over 500 million websites per day,” said Amir Ben-Efraim, CEO of Menlo Security.  “While our customers have deployed the most advanced security products, we see a constant stream of phishing and malware attacks evading their defenses.   Menlo Security stops these attacks, validating Internet Isolation as being essential to modern security architectures.”

Internet Isolation eliminates threats from email and web attacks.  For example, over a recent six-month period, Menlo Security Internet Isolation protected a Global 2000 enterprise against thousands of phishing and malware attacks that were not detected by the company’s other security defenses.  Specifically, the customer had experienced these attacks:

  • 1,089 emailed phishing links evaded other security defenses and were delivered and clicked by employees
  • 8,541 known malicious websites were not blocked by other security defenses and were visited by employees

 

Although these attacks successfully bypassed the customer’s other defenses, Menlo Security’s Isolation Secure Web Gateway prevented malware installation, theft of end-user credentials and the exfiltration of corporate data.

The growth in cybersecurity budgets far outpaces overall IT budgets[1], and according to a 2019 BCG report[2], some leading banks and technology companies have annual cybersecurity budgets that exceed half-a-billion dollars.  Despite the billions being spent, in 2018 Verizon reported 41,686 security incidents and 2,013 confirmed breaches.  A large percent of those data breaches involved phishing and were malware-enabled.  Adding to the problem, C-suite executives were 12 times more likely to be the victim of an email attack (Verizon 2019 DBIR). 

“Menlo Security has established themselves as a leading player in the threat Isolation space with a robust solution and a differentiated approach that is unique in the industry,” said Dana Eli-Lorch, Managing Director at American Express Ventures.  “We are delighted to continue and support Menlo Security as they grow, helping corporations eradicate malware and enhance their cybersecurity.”

Menlo Security’s customers include some of the largest enterprises and government agencies.  The company currently isolates more than 500 million websites per day.  Among the company’s customers are seven of the 10 largest banks, four of the five largest credit-card issuers and some of the largest energy and transportation companies in the world.  The US Department of Defense’s IT combat support agency, known as the Defense Information Systems Agency (DISA), is also a customer.  

The Series D funding announced today will be used to expand Menlo Security’s global sales team to meet the growing industry demand for Internet Isolation.

To learn more about Menlo Security’s offerings, visit: https://www.menlosecurity.com/products-overview.

About Menlo Security

Menlo Security protects organizations from cyber attacks by eliminating the threat of malware from the web, documents and email. Its cloud-based Isolation Secure Web Gateway scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end user-experience. The company was named a Visionary in the Gartner Magic Quadrant for the Secure Web Gateway.  Menlo Security is trusted by major global businesses, including Fortune 500 companies and financial services institutions, and backed by General Catalyst, Sutter Hill Ventures, Engineering Capital, Osage University Partners, American Express Ventures, Ericsson Ventures, HSBC and JP Morgan Chase. Menlo Security is headquartered in Palo Alto, California. For more information, visithttps://www.menlosecurity.com or @menlosecurity.

 

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13643
PUBLISHED: 2019-07-18
Stored XSS in EspoCRM before 5.6.4 allows remote attackers to execute malicious JavaScript and inject arbitrary source code into the target pages. The attack begins by storing a new stream message containing an XSS payload. The stored payload can then be triggered by clicking a malicious link on the...
CVE-2019-13644
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.1 is vulnerable to stored XSS due to lack of filtration of user-supplied data in a budget name. The JavaScript code is contained in a transaction, and is executed on the tags/show/$tag_number$ tag summary page.
CVE-2019-13645
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file names. The JavaScript code is executed during attachments/edit/$file_id$ attachment editing.
CVE-2019-13646
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.3 is vulnerable to reflected XSS due to lack of filtration of user-supplied data in a search query.
CVE-2019-13647
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file content. The JavaScript code is executed during attachments/view/$file_id$ attachment viewing.