Threat Intelligence

8/4/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Nyotron Raises $21 Million Funding Round

Appoints Former McAfee Executive Peter Stewart to Chief Executive Officer

Santa Clara, Calif. and Herzliya, Israel - Nyotron announced today that it has closed a new $21 million financing round led by US-based investors and including all existing investors. The financing was oversubscribed and positions the company to increase worldwide sales and marketing activities and expand its current offerings of Nyotron’s endpoint cyber security solution.

Nyotron also announced the appointment of Peter Stewart to chief executive officer. Stewart, who also is participating in this round, has held several executive positions at McAfee and is the former CEO of TraceSecurity. Nir Gaist, founder of Nyotron and creator of the flagship product PARANOID, will serve as chief technology officer, leading Nyotron's product roadmap.

Nyotron provides a new cyber defense technology for endpoints. Nyotron aims to stop attacks, whether known before or never before experienced, including ransomware, advanced persistent threats, and other malicious attacks. Nyotron is installed at a major US law enforcement agency, as well as El Al Airlines, and the Israeli military.

Recent cyberattacks, such as WannaCry and NotPetya, have demonstrated that the technologies deployed to protect the data of enterprises worldwide are failing to stop attacks. Not only have the attacks become more sophisticated, the sheer volume of attacks demands a new approach to endpoint solutions. Nyotron's PARANOID protection does not depend on the type of threat or the attack vector.

"Nyotron offers a completely different approach to protect enterprises from ‘unknown unknown’ attacks. This patented technology will drive our growth and continued customer traction," said Pete Stewart, CEO of Nyotron. "I am honored to serve in this role, and I look forward to working closely with Nir and the Board of Directors to establish Nyotron as the new standard for endpoint security."

"I am very happy to see Nyotron advance to this next phase of growth, and I am excited to work with Pete and Doug on our exciting future," said Nir Gaist, founder and CTO of Nyotron.

The financing was led by DGB Investments, the technology holding company owned by Douglas and Sandra Bergeron. Existing investors include Mitvah Shamir, Gil Agmon, and Shmuel Harlap, the largest private investor in Mobileye.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
The Fundamental Flaw in Security Awareness Programs
Ira Winkler, CISSP, President, Secure Mentem,  7/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14492
PUBLISHED: 2018-07-21
Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an unspecified /goform URI.
CVE-2018-3770
PUBLISHED: 2018-07-20
A path traversal exists in markdown-pdf version <9.0.0 that allows a user to insert a malicious html code that can result in reading the local files.
CVE-2018-3771
PUBLISHED: 2018-07-20
An XSS in statics-server <= 0.0.9 can be used via injected iframe in the filename when statics-server displays directory index in the browser.
CVE-2018-5065
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
CVE-2018-5066
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.