Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
3/14/2019
01:45 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Mocana Adds New Funding

Mocana's IoT Device Security Platform Gains Wider Adoption as Alternative IT and OT Security Solutions Fall Short

SUNNYVALE, Calif., March 04, 2019 (GLOBE NEWSWIRE) -- Mocana, the leading provider of device security solutions for IoT and industrial control systems, today announced that the company completed the first close of $15 million in new financing to accelerate the development of its TrustCenter™ IoT device security platform to meet growing demand. This investment was led by Sway Ventures with existing investors Shasta Ventures and ForgePoint Capital (formerly Trident Capital Cybersecurity) also participating. With the additional funding, Mocana’s funding to date is $105 million.

Mocana is addressing a cybersecurity problem that is costing companies tens of billions of dollars per year. Hackers are bypassing traditional IT network security approaches by attacking IoT and connected industrial and enterprise devices from within private networks by using phishing emails and physical intrusions to target the most vulnerable devices. Mocana’s device security solutions complement IT network and operational technology (OT) security technologies, such as firewalls, IDS/IPS and threat detection, by enabling the endpoint devices and gateways to defend themselves using on-device cryptographic controls that are designed for mission-critical systems with limited memory and processing capabilities.

Mocana TrustCenter™ is the only solution of its kind that automates, orchestrates and manages IoT device security while meeting the highest levels of cybersecurity compliance and standards. Mocana’s system of cybersecurity can be used to protect both legacy devices that are too old to patch and new Internet-connected mission-critical devices.

Since announcing the availability of Mocana TrustCenter™, the company has seen strong demand with customers in trial and deployment to protect mission-critical, Internet-connected devices.

“With existing IT network and operational technology (OT) security measures failing to keep the hackers at bay, there has never been a more critical time to rethink security and start protecting devices from the inside out,” said William Diotte, CEO of Mocana. “Our customers require simple and secure solutions that allow them to protect both legacy devices and new devices. We are seeing strong demand for Mocana’s TrustCenter, and this new funding will help us deliver on our promise of providing protecting cities, countries and families.”

The United States Council of Economic Advisors estimates that malicious cyber activity cost the U.S. economy between $57 and $109 billion in a single year. According to the U.S. Office of the Director of National Intelligence (DNI), “Cyber threats were the most important strategic threat facing the United States. They impose costs on the United States and global economies and present risks for nearly all information, communication networks, and systems.”

This new funding will be used to add new technical capabilities into Mocana TrustCenter™ and TrustPoint™, driving further growth across Mocana’s customer base of large defense, industrial manufacturing, and IoT companies. Later this year, Mocana will be adding visibility and analytics tools into its TrustCenter™ platform that will provide a deep view into the processes running on systems and subsystems of IoT devices and industrial control devices. Additionally, the company will use the new investment to grow their sales, marketing and customer support operations as it continues to expand globally.

“It’s no secret that today’s industrial control systems and IoT devices are extremely vulnerable to cyberattacks,” said Brian Nugent, founding General Partner, Sway Ventures. “We believe Mocana’s laser focus on providing comprehensive IoT device security offers the most efficient way to defend against sophisticated attack scenarios.”

“Mocana is driving a fundamentally different approach to securing IoT from the device to the cloud,” said Rob Coneybeer, Managing Director at Shasta Ventures. “We continue to invest in Mocana because we firmly believe that their TrustCenter IoT device security management platform is a game-changing technology for the future of IoT and industrial control system security.”

Mocana’s solutions are used by some of the largest companies in the world including ABB, GE, HP, Intel, Schneider Electric, Verizon, and Xerox. Mocana’s TrustPoint™ device security software is designed for resource-constrained embedded systems and enables IoT devices to defend themselves. Mocana TrustCenter™ provides unprecedented controls, automation, and orchestration to scale the provisioning and management of security for massive-scale IoT and mission-critical IoT.

About Mocana Corporation
Founded in 2002, Mocana provides comprehensive and compliant IoT device security solutions to protect critical infrastructure. Mocana TrustCenter™ and TrustPoint™ automate and simplify the management of the IoT security lifecycle. Our proven cybersecurity software development tools simplify the integration of mission-critical security. Mocana protects more than 100 million devices and is trusted by the largest aerospace, industrial, energy, healthcare, and communications companies. www.mocana.com.

Press Contact:
Katie Pesek
Merritt Group on behalf of Mocana
[email protected]
(703) 390-1505

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Attackers Infiltrate the Supply Chain & What to Do About It
Shay Nahari, Head of Red-Team Services at CyberArk,  7/16/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Brian Monkman, Executive Director at NetSecOPEN,  7/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12551
PUBLISHED: 2019-07-22
In SweetScape 010 Editor 9.0.1, improper validation of arguments in the internal implementation of the Memcpy function (provided by the scripting engine) allows an attacker to overwrite arbitrary memory, which could lead to code execution.
CVE-2019-12552
PUBLISHED: 2019-07-22
In SweetScape 010 Editor 9.0.1, an integer overflow during the initialization of variables could allow an attacker to cause a denial of service.
CVE-2019-3414
PUBLISHED: 2019-07-22
All versions up to V1.19.20.02 of ZTE OTCP product are impacted by XSS vulnerability. Due to XSS, when an attacker invokes the security management to obtain the resources of the specified operation code owned by a user, the malicious script code could be transmitted in the parameter. If the front en...
CVE-2019-10102
PUBLISHED: 2019-07-22
tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". Th...
CVE-2019-10102
PUBLISHED: 2019-07-22
aubio 0.4.8 and earlier is affected by: null pointer. The impact is: crash. The component is: filterbank. The attack vector is: pass invalid arguments to new_aubio_filterbank. The fixed version is: after commit eda95c9c22b4f0b466ae94c4708765eaae6e709e.