Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
3/14/2019
01:45 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Mocana Adds New Funding

Mocana's IoT Device Security Platform Gains Wider Adoption as Alternative IT and OT Security Solutions Fall Short

SUNNYVALE, Calif., March 04, 2019 (GLOBE NEWSWIRE) -- Mocana, the leading provider of device security solutions for IoT and industrial control systems, today announced that the company completed the first close of $15 million in new financing to accelerate the development of its TrustCenter™ IoT device security platform to meet growing demand. This investment was led by Sway Ventures with existing investors Shasta Ventures and ForgePoint Capital (formerly Trident Capital Cybersecurity) also participating. With the additional funding, Mocana’s funding to date is $105 million.

Mocana is addressing a cybersecurity problem that is costing companies tens of billions of dollars per year. Hackers are bypassing traditional IT network security approaches by attacking IoT and connected industrial and enterprise devices from within private networks by using phishing emails and physical intrusions to target the most vulnerable devices. Mocana’s device security solutions complement IT network and operational technology (OT) security technologies, such as firewalls, IDS/IPS and threat detection, by enabling the endpoint devices and gateways to defend themselves using on-device cryptographic controls that are designed for mission-critical systems with limited memory and processing capabilities.

Mocana TrustCenter™ is the only solution of its kind that automates, orchestrates and manages IoT device security while meeting the highest levels of cybersecurity compliance and standards. Mocana’s system of cybersecurity can be used to protect both legacy devices that are too old to patch and new Internet-connected mission-critical devices.

Since announcing the availability of Mocana TrustCenter™, the company has seen strong demand with customers in trial and deployment to protect mission-critical, Internet-connected devices.

“With existing IT network and operational technology (OT) security measures failing to keep the hackers at bay, there has never been a more critical time to rethink security and start protecting devices from the inside out,” said William Diotte, CEO of Mocana. “Our customers require simple and secure solutions that allow them to protect both legacy devices and new devices. We are seeing strong demand for Mocana’s TrustCenter, and this new funding will help us deliver on our promise of providing protecting cities, countries and families.”

The United States Council of Economic Advisors estimates that malicious cyber activity cost the U.S. economy between $57 and $109 billion in a single year. According to the U.S. Office of the Director of National Intelligence (DNI), “Cyber threats were the most important strategic threat facing the United States. They impose costs on the United States and global economies and present risks for nearly all information, communication networks, and systems.”

This new funding will be used to add new technical capabilities into Mocana TrustCenter™ and TrustPoint™, driving further growth across Mocana’s customer base of large defense, industrial manufacturing, and IoT companies. Later this year, Mocana will be adding visibility and analytics tools into its TrustCenter™ platform that will provide a deep view into the processes running on systems and subsystems of IoT devices and industrial control devices. Additionally, the company will use the new investment to grow their sales, marketing and customer support operations as it continues to expand globally.

“It’s no secret that today’s industrial control systems and IoT devices are extremely vulnerable to cyberattacks,” said Brian Nugent, founding General Partner, Sway Ventures. “We believe Mocana’s laser focus on providing comprehensive IoT device security offers the most efficient way to defend against sophisticated attack scenarios.”

“Mocana is driving a fundamentally different approach to securing IoT from the device to the cloud,” said Rob Coneybeer, Managing Director at Shasta Ventures. “We continue to invest in Mocana because we firmly believe that their TrustCenter IoT device security management platform is a game-changing technology for the future of IoT and industrial control system security.”

Mocana’s solutions are used by some of the largest companies in the world including ABB, GE, HP, Intel, Schneider Electric, Verizon, and Xerox. Mocana’s TrustPoint™ device security software is designed for resource-constrained embedded systems and enables IoT devices to defend themselves. Mocana TrustCenter™ provides unprecedented controls, automation, and orchestration to scale the provisioning and management of security for massive-scale IoT and mission-critical IoT.

About Mocana Corporation
Founded in 2002, Mocana provides comprehensive and compliant IoT device security solutions to protect critical infrastructure. Mocana TrustCenter™ and TrustPoint™ automate and simplify the management of the IoT security lifecycle. Our proven cybersecurity software development tools simplify the integration of mission-critical security. Mocana protects more than 100 million devices and is trusted by the largest aerospace, industrial, energy, healthcare, and communications companies. www.mocana.com.

Press Contact:
Katie Pesek
Merritt Group on behalf of Mocana
[email protected]
(703) 390-1505

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13864
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
CVE-2020-13865
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
CVE-2020-11696
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
CVE-2020-11697
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
CVE-2020-13646
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.