Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud Security

06:00 PM
Simon Marshall
Simon Marshall
Simon Marshall

LookingGlass Raises $26.3M to Bring Order to Chaos

New threat-intelligence-as-a-service company raises the stakes on scale in the market.

Reston, VA-based LookingGlass Cyber Solutions has just raised $26.3 million in a series D round which exemplifies the expected demand from managed service providers and governments for threat-intelligence-as-a-service (TIaaS).

The sector is seeing green shoots mature, and according to its investors -- which include New Spring Capital, Triangle Peak Partners and Eastward Capital Partners -- LookingGlass is in a prime position to exploit a marketplace that is writhing under security threats from all sides.

"Threat-intelligence-as-a-service is the response to a chaotic cybersecurity landscape and overwrought security teams with too little budget," Stewart Curley, CFO LookingGlass told SecurityNow. "We are entering a new era of cybersecurity, where we will see organizations changing the economics of cyber-attacks as part of their overall threat intelligence programs."

Curley may sound philosophical about the persistent, virulent threats that are emerging seemingly every second of every day. But it's all part of taking a more strategic approach to threat intelligence and containment than the "hair on fire" crisis-mode that hard-pressed security professionals currently find themselves operating in.

In fact, behind the strategy, there is indeed chaos. Curley paints a picture of a world in disarray: "When digital data is increasing exponentially, network perimeters are expanding with mobile devices, physical and cyber are converging with new Internet-connected IoT devices and physical business assets (the) threats are continuously morphing," he said. "Third-party partners have privileged access and information, new breaches are in the news every day, and hackers are looking to exploit any and every vulnerability."

TIaaS solutions grew out of a need to be more strategic and proactive; they can be deployed and enacted immediately without the lead time associated with other legacy approaches. LookingGlass offers an annualized service subscription that provides the opportunity for organizations to be up-and-running in days versus months of waiting for new hardware, integrating systems, and hiring sought-after security professionals.

Get real-world answers to virtualization challenges from industry leaders. Join us for the NFV & Carrier SDN event in Denver. Register now for this exclusive opportunity to learn from and network with industry experts -- communications service providers get in free!

LookingGlass is active in at least 16 discrete areas of security protection ranging from typo squatting through to virus, malware and Command and Control situations. It holds just over 40 patents, but points to its proprietary Threat Indicator Confidence (TIC) metrics as a real differentiator against competitors. The TIC offers up a clear view of network elements and ranks threats based on the organization's environment, threat landscape, and security posture. It rates sources, classification, and criticality of intelligence and ultimately see how that rolls up across the global Internet.

Other TIaaS vendors include Optiv, FireEye and Crowdstrike. "[But] there are few companies in cybersecurity that have achieved LookingGlass's scale and which boast its enviable customer list," said Christopher Bodnar, investment partner at Eastward Capital Partners. 

Douglas Dangremond is SVP of threat intelligence services, his experience coming in-house from Cyveillance, a company acquired by LookingGlass in 2015. President and CEO Chris Coleman brings a directorship in cyber security with him from Cisco, and both executives have experience in working security within the public sector. Other significant acquisitions that shored up team knowledge came from CloudShield and Kleissner & Associates.

According to Curley, LookingGlass will see profitability in the near term, in part from revenue, in part from investment using the Series D round, although he was not specific about when. To date, LookingGlass has raised $108.75 million over five rounds. Last year, LookingGlass was ranked number 90 fastest growing company in North America in Deloitte's Technology Fast 500, with annual growth over 1000%.

Related posts:

— Simon Marshall, Technology Journalist, special to Security Now

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.