Modern distributed systems have more complexity, components and data than ever before. Too many companies rely on inefficient and insecure middleware to connect their growing number of applications and microservices. Legacy solutions are falling…Read More
We are excited to announce our latest data security investment into Cyberhaven’s Series B. In a world that has been frustrated by their data loss prevention (DLP) options for years, Cyberhaven is finally providing a viable and robust solution.
The biggest frustration with DLP today is the time it takes to deploy, configure, maintain, and monitor providers. This can involve months to years of tuning out false positives to some reasonable level, difficulty deploying agents across the environment, and after that setup work, having to hire and convince staff to investigate each generated alert – a tedious process.
Because of this painful shared history, CISOs light up when they see Cyberhaven. Finally, a solution that is easy to deploy, doesn’t require someone on your team to become a Regex expert, and offers a simple interface to quickly investigate potential data leakage. Cyberhaven calls this new category: Data Detection and Response (DDR).
Forgepoint is excited to partner with the team that is re-defining this category in data security: Howard Ting, Vova Kuznetsov, Cristian Zamfir, Radu Banabic, Matt Duchesne and Allyson Yamashita. Kudos for taking leading edge analytics and packaging it into an easy-to-use solution!
This Series B investment is led by seasoned data & security investors like Redpoint, Wing, Costanoa, Vertex and Forgepoint. We’re excited to work together to back Cyberhaven as it becomes the leader in data security and protection with their data lineage capabilities.
You may also enjoy:
Kathryn Shih is an Entrepreneur in Residence at Forgepoint. Learn more about her background here. Kathryn, your background is unique. You started your career as a software engineer, pivoted to product management, and are now an expert in generative…Read More
Issue: Cybercriminals increasingly target and compromise identities, but detection and response capabilities are behind the curve. Imagine: a cybercriminal installs a browser infostealer on a company engineer’s laptop to access 2FA-backed…Read More