Cyber security co Aorato raises $10m

foreign currency

Aorato's solution profiles, learns, and predicts entities' behaviors enabling context aware real-time decision making against cyber attacks.

Cyber security start-up Aorato Ltd. has raised $10 million from Accel Partners, Eric Schmidt's Innovation Endeavors , and Glilot Capital Partners , and private investors Mickey Boodaei, a co-founder of Imperva Inc. (NYSE: IMPV) and Trusteer, and Rakesh Loonkar, another Trusteer co-founder.

Aorato was founded by CEO Idan Plotnik, VP R&D Michael Dolinsky, and VP professional services Ohad Plotnik, all of whom served in the IDF cyber security unit, and have a decade of experience in the field. The company says that its product is "the first context-aware, behavior-based Directory Services Application Firewall (DAF). The company's solution profiles, then not only learns, but also predicts entities' behaviors enabling context aware real-time decision making."

"The timing could not be more appropriate to launch Aorato into the cyber security market. 2013 showed the world the risks of advanced threats in parallel to the implications of insiders' access to sensitive corporate data. Both proved the need for a technology like Aorato to make a difference within the enterprise security posture," said Plotnik.

Aorato's approach is to focus on Microsoft's active directory services activities by observing the network traffic between active directory servers and the active network users and devices. The technology uses the interactions identified in this traffic to create its trademarked Organizational Security Graph (OSG), a model of the observed relationships over time. Aorato monitors active directory traffic, comparing activities against the OSG model looking for anomalies that could represent attack behavior or security policy violations, such as clear text/simple passwords, active directory protocol violations, or deleted/disabled users /computers activities. The DAF alerts on suspicious activities inserting them into an attack timeline, providing security experts with the means to identify the steps in the attack chain from the seemingly harmless individual events.

Published by Globes [online], Israel business news - www.globes-online.com - on January 21, 2014

© Copyright of Globes Publisher Itonut (1983) Ltd. 2014

5 Comments
View comments in rows
Update by email about comments talkback
POST
Comments
Your name
Please insert your name
Content
Hyperlink in a new window Hyperlink Right Left underline italic bold Bulleted List Ordered List Face1 Face2 Face3 Face4 Face5 Face6
Your comment

Thanks
You comment was recieved and soon will be published.
In posting comments, I agree to abide by the Terms of Use
Globes encourages lively and frank debate, but posts that the editors consider merely abusive or otherwise inappropriate will be removed. Report inappropriate content
Thank you for posting your comment, which will be reviewed for publication.
Loading Comments...load
Load more comments
foreign currency
foreign currency
Twitter Facebook Linkedin RSS Newsletters גלובס