Subscribe to the InfoTech eNewsletter

infoTECH Feature

August 07, 2014

Wheelings & Dealings: Vectra Networks Receives $25 Million in Series C Funding

A prominent business that detects real-time cyber threats received an oversubscribed amount of funding this week from its financial backers.

Vectra Networks announced its earning of $25 million in Series C financing from a long list of supporters. Accel Partners (News - Alert) led the round, and prior, investors Khosla Ventures, IA Ventures, and AME Cloud Ventures all continued to participate another time through. This round also included new backers Intel (News - Alert) Capital and Juniper Networks.

The security company also announced an addition to its Board of Directors: Eric Wolford, partner at Accel Partners, has joined the Vectra Board.

The funding it received in this round, Vectra reported, will go toward enhancing the ability of enterprises to fend of cyber threats without having to massively scale their operations to combat growing numbers of attacks. Wolford, the newest member of the Vectra Board, commented on this exact point and summarized the overall need for companies to actively defend themselves from electronic threats.

"The increasing volume, creativity and effectiveness of online threats makes cyber security a Board-level IT priority for CEOs and CIOs," Wolford said. "As a result, innovators like Vectra Networks are driving massive disruption in enterprise security by using data science to give IT the upper hand against cyber attacks without having to scale out staffing."

Vectra brands its security product as simple to use but effective across a number of devices and systems. Its software can be used straight out of the box and requires only a few basic instructions to begin analyzing a user's system and protecting it from threats. It can work on all operating systems and identify attacks on all applications and devices.

It works inside the confines of a user's system and continuously monitors all applications and devices for changes while it monitors and adapts to the behavior patterns of users on the system. Furthermore, it keeps a record of everything it learns, and from that log, it can prioritize which threats are the most potentially harmful to a network. This can allow the security software to prevent attacks when they first occur and help remove attacks that have slipped by system defenses such as firewalls. By continuously monitoring the overall network, it supplements traditional defenses to help prioritize resources and provide a more complete picture of unhealthy elements within entire systems.

Edited by Adam Brandt

Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter

infoTECH Whitepapers