Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

7/31/2019
03:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Prevailion Secures $10M Series A Investment Led By AllegisCyber

Previous Investor DataTribe Participates in Funding; Prevailion's "Time To Action" Technology Provides Breakthrough In Cyber Defense

Prevailion, a high-growth cybersecurity company transforming the way businesses approach risk discovery, evaluation and mitigation, today announced completion of its Series A funding led by AllegisCyber, a Silicon Valley and Maryland-based cybersecurity venture firm. Previous investor DataTribe, a global cyber foundry, also participated in this round. Prevailion raised its $2M seed round from DataTribe less than 12 months ago at the inaugural DataTribe Challenge.

“Prevailion’s unique technology materially changes the dynamic between defenders and attackers where time-to-action is essential to effective cyber defense. On average, cyber compromises are discovered 270 days after an initial breach, giving attackers a nine-month head-start on the defenders. Prevailion’s platform identifies breaches at the time of compromise, or even as an adversarial campaign is being prepared, with deep intelligence and zero false positives. Their technology is truly a breakthrough in cyber defense,” said Bob Ackerman, Founder and Managing Director of AllegisCyber and DataTribe co-founder.

“Prevailion’s experienced team has extensive roots from the NSA and CIA and is leading the world with their new class of cybersecurity compromise management teams. Given this expertise, their growth since inception is a testimony both to these capabilities and the markets’ demand for innovative ways to identify and counter cyber adversaries,” said Mike Janke, Prevailion board member and co-founder of DataTribe.

Funding Provides Opportunity To Create Tailored Intelligence Team, Add Senior Executives And Move To New Office In Columbia, Maryland

Prevailion is using the new funding to grow their executive ranks. In addition to investing in engineering and sales executives, Prevailion recently added an industry-leading Tailored Intelligence team that will be led by Adam Flatley, Vice President of Tailored Intelligence. Flatley will be joined by David Maynor, Senior Director of Intelligence Operations; Nate Winslow, Ph.D.,Technical Director of Intelligence Operations, and Danny Adamitis, Director of Intelligence Analysis. The Tailored Intelligence team brings a combined fifty-plus years of experience working in the academic, public, and private sectors. Their backgrounds include cybersecurity intelligence operations, penetration testing, malware reverse engineering, and model-based data analytics.

With the new funding, the company will also continue to grow their internal and external legal, policy, and operational expertise. Prevailion is promoting Elizabeth Wharton, Vice President of Strategy to Vice President of Operations and Strategy.

“I’m excited about adding AllegisCyber, a globally recognized cybersecurity investor, as a new investor and appreciate the continued support of seed investor, DataTribe. With this additional capital, and the changes in our executive ranks, we are uniquely positioned to deliver tailored intelligence that empowers risk-based decisions. Organizations with contagious ecosystems can now limit their exposure and avoid infection preemptively by using our intelligence platform,” said Karim Hijazi, Prevailion Founder and CEO.

Prevalion will also be expanding into new offices in Columbia, Maryland.

About Prevailion

Prevailion is a compromise intelligence company, transforming the way organizations approach risk mitigation and business decision-making. Through next-level tailored intelligence and a zero-touch platform, Prevailion provides a full view of confirmed evidence of compromise for customers and their partner ecosystems. To learn more about Prevailion, visit prevailion.com.

About AllegisCyber

AllegisCyber, based in Silicon Valley and Maryland, has pioneered an integrated cybersecurity investment platform spanning seed to early-growth cybersecurity companies. It’s the first venture firm focused exclusively on cybersecurity and data science and has been investing in cybersecurity for more than 15 years in the U.S and select international markets. The founder of AllegisCyber, Bob Ackerman is also the co-founder and board member of DataTribe, a global cyber foundry. The AllegisCyber team is replete with venture capital and start-up entrepreneurial veterans. The team has been described in industry press as the “Cyber’s Money Men” for its domain expertise and position. Current AllegisCyber investments include Area 1 Security, Callsign, CyberGRX, Dragos, eFileCabinet, SafeGuard Cyber, Shape Security, SIGNIFYD, Source Defense, Synack, and vArmour. For more information, please visit http://www.allegiscyber.com.

About DataTribe

DataTribe is a cybersecurity and data science startup studio that invests and co-builds next generational commercial software. The firm draws upon experienced technology and entrepreneurial teams from the world's most prestigious, high-stakes environments, including the international intelligence community and National Labs from U.S, Canada, UK and Australia. DataTribe is headquartered in Fulton, MD with offices in San Francisco, CA. For more information, please visit: http://www.datatribe.com

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...