About Us

Snapattack Raised $8M Funding To Strengthen Collaboration Among The Next Generation Of Threat Hunters

SnapAttack announced a $8 million fundraising round led by Volition Capital. SnapAttack recently announced a spinoff from Booz Allen Hamilton, and the funding was completed in conjunction with that announcement. Strategic Cyber Ventures (SCV) and Booz Allen Hamilton, which is maintaining its investment in the newly independent business, are among the investors in the round.

“Platforms that empower threat hunters and lead the cybersecurity industry to be more proactive will help turn the tide against the onslaught of attacks we’re seeing across the Federal government and commercial sectors. We believe SnapAttack can help lead the change from reactive to proactive,” said Roger Hurwitz of Volition Capital.

SnapAttack presently contains the world’s most comprehensive collection of labelled cyberattacks, allowing security companies to apply high-quality, validated analytics based on real hacker tradecraft. The platform’s user community is constantly improving and adding to analytic content, which can be confirmed, deployed, distributed, and shared right away.

SnapAttack is unlike anything else on the market since it combines offensive (red teaming) and defensive (blue teaming) tradecraft to find security flaws and strengthen advanced behavioural detections. The platform integrates SIEM, EDR/XDR, and cloud technologies and is vendor agnostic.

In today’s world, most businesses are constantly responding to incidents. SnapAttack is a proactive solution that consists of a security platform that focuses on attack emulation, detection-as-code, and the ongoing development and validation of sophisticated behavioural analytics. Organizations can use SnapAttack to give high-quality detection logic to their technology stacks, preventing assaults before they start.

“SnapAttack is poised to empower a new level of collaboration among the next generation of ethical hackers, threat hunters and security researchers providing advanced insights to stop attackers in their tracks,” said Fred Frey, CTO and founding member of the SnapAttack team.

The funding will be used to speed up platform development, allowing the company to better integrate security operations processes, manage the complete lifecycle of detection analytics, and improve reporting.

It also intends to integrate more threat intelligence and analytic content kinds into the platform in order to develop the most powerful and complete detections with the least amount of human input. To increase product adoption and build their customer base across Federal and Commercial markets, key team growth will be focused on product, engineering, and sales.

Securonix, a Cybersecurity firm, has formed a Strategic Partnership with Alonos to Invest in Global Leadership Development

Securonix, Inc., a leader in Next-Gen SIEM, declared a new investment in its team’s development through a collaboration with consulting company Alonos® to deploy the “Leadership & Executive Accelerated Development Program – L.E.A.D. Core.” Securonix is boosting the skills and knowledge of its leaders around the world with this investment, which will cover a wide range of areas within the organization, including Sales, Marketing, Product Development and Management, Customer Success, Cloud Infrastructure, Architecture, Content and Threat, Quality Assurance, and Corporate Functions.

“Securonix has reached a critical point in our growth as we expand globally at an unprecedented rate. As we scale, our CEO, Sachin Nayyar, is very committed to people growth. When you invest in people who lead other people, there’s an immediate multiplier effect. To reach our expansion goals, we are deploying high end leadership development through the L.E.A.D. Program and building the muscle that will propel us forward,” said Dilshan Ratnayake, Executive Vice President & Chief People Officer, Securonix.

Securonix developed a three-month L.E.A.D. Core Program in collaboration with Alonos’ doctoral-level leadership training practitioners to establish and refine core capabilities. Building high-performing teams, communication, feedback, and coaching, performance management, driving team commitment, delivering and measuring results, understanding leadership styles, leadership decision-making, and harnessing the power of a diverse and inclusive workforce are just a few of the topics covered.

Executives had to complete various learning modules, actively participate in group discussions, attain minimum scores on weekly knowledge examinations, and present an application-based capstone case analysis to graduate from the program’s Core level. Graduates received a validated digital micro-credential through Alonos because this required a high degree of commitment and engagement.

“Investments like these are like oxygen to an organization. If you want to multiply a company’s capabilities, leadership development is a critical component of that growth,” said Ratnayake.

Security Orchestration, Automation and Response (SOAR) – Everything you need to know

Security Orchestration, Automation and Response is a system that collects data about security threats using integrated software solutions to analyze and respond to security threats using automated machine learning to provide assistance to human analysts.

The 3 Factors of SOAR are –

Security Orchestration – It is the process of incorporating various technological solutions, both security-related and non-security-related, in order for them to work together in a way that facilitates collaboration. These different tools gather information from multiple sources into a centralized system, which increases the accuracy and makes system more secure.

Automation – This concept empowers technical tools with the help of machine learning to perform security operations task without assistance of human beings. It saves the security analyst’s time by reducing the amount of time they spend on basic, routine tasks by automating them. Security analysts can utilize their time for more creative and challenging tasks. Automation is not an option for replacement of human analysts.

Response – Once a threat is identified, ‘Security Response’ offers security analysts a single centralized overview for tracking, planning, handling, and reporting measures taken. SOAR tools cover post-incident events including case management modules. These modules aid in the communication of lessons learned and the delivery of faster proactive response time to potential attacks.

SOAR vs. SIEM – SOAR and SIEM (Security Information and Event Management) are not the same, even though they gather data from different sources, spot anomalies, and generate alerts. SOAR systems give an additional option of automation to provide automated responses to attacks, while SIEM systems only have functionality of generating alerts to security analysts of a potential incident.

Benefits of SOAR for Organizations

1) Security Teams – Staffing shortages are a frequent occurrence in an Enterprise’s Security Operations Center. It’s a delicate balancing act to ensure an organization has the requisite personnel and it is making optimum use of human resource. SOAR solves this problem by enhancing the process, applying required degree of automation and orchestration by ensuring reliable, defensive response to threats so as to protect organization’s sensitive information. This includes automating repetitive tasks and provides structured incident handling responses. It also gives company the access to industry-leading machine learning algorithms, allowing them to react even faster to security incidents as they occur.

2) SOAR’s scalability and customization – There are default integrations available with every SOAR solution, but some companies’ security applications will not support them. As a result, the SOAR solution is made customizable enough to build integrations from both sides as per customer’s needs. An effective SOAR solution is flexible and customizable enough to work on top of various security tools.

3) Vendors – Normally, companies have a single vendor solution or software to manage the security operation center. Even if company uses more vendors there are complexities involved in it. But SOAR integrates a variety of security solutions into a centralized orchestration system that can be implemented in any cloud-based system. A SOAR solution is efficient enough to implement responses of various teams like SOC (Security Operations center) and CSIRT (Computer Security Incident Response Team). Soar gives a centralized overview and control across the enterprise. This integration reduces security operations procedures by using case management, incident lifecycle and extends life of existing resources, maximizing the return on investment.

4) Data Enrichment – Data collected from a software is useful, but it is limited. SOAR tools overcome this limitation by collaborating multiple software solutions. This is a huge advantage, since data collected about security is rich and makes security system of an enterprise firm updated and robust.

Security Orchestration, Automation and Response (SOAR) is introduced by one of the leading research firm is in initial phase of development in the market. With innovation and evolving market SOAR Solutions will be adapted by many organizations.