Lastline

Last updated
Lastline, Inc.
Company typePrivate
Founded2011
FoundersEngin Kirda
Christopher Kruegel
Giovanni Vigna
Headquarters,
Area served
United States, Canada, Europe, Middle East
Key people
John DiLullo (CEO)
Products Network security products
Website Lastline.com

Lastline, Inc. is an American cyber security company and breach detection platform provider based in Redwood City, California. [1] [2] The company offers network-based security breach detection and other security services that combat malware used by advanced persistent threat (APT) groups for businesses, government organizations and other security service providers. [3] Lastline has offices in North America, Europe, and Asia. [4]

Contents

History

Lastline was founded in 2011 by University of California, Santa Barbara and Northeastern University researchers Engin Kirda, Christopher Kruegel and Giovanni Vigna. [5] In 2014, WatchGuard Technologies, Inc. joined the Lastline Defense Program to combat advanced malware targeting businesses by providing primary functionality for APT blocking, available on their unified threat management (UTM) and next generation firewall (NGFW) products. [6] WatchGuard utilizes Lastline's next generation cloud-based sandbox, powered by full-system emulation, which inspects objects for unknown malware crafted to evade detection. [7]

Lastline was featured at the 2014 RSA Conference in San Francisco. [8] That same year, Giovanni Vigna, CTO at Lastline, appeared at the Cyber Security Expo in a keynote presentation that analyzed evasive malware techniques. [9]

Juniper Networks began integrating with Lastline to expand the capability of its Spotlight Secure platform in 2014. [10] [11] In February 2015, Lastline announced a partnership and technology integration with Carbon Black in an effort to facilitate automated and comprehensive end-to-end endpoint and network security for email, web, files and mobile applications. [12] [13]

Funding

In 2013, Lastline raised $10 million in funding led by venture capital firms Redpoint Ventures and E.ventures, now known as Headline [14] Redpoint Ventures led the Series B round with a $9 million investment, while existing investor E.ventures provided the remainder. [15]

In 2014, Lastline raised $10 million from new investors Dell Ventures and Presidio Ventures, as well as existing investors Redpoint Ventures and E.ventures. [16] With the new round of funding, Lastline will continue to focus on serving its growing global enterprise customer base as well as new and existing partnerships to improve information security and threat intelligence worldwide. [17] This round of funding adds to the $13.7 million raised in earlier rounds to bring total funding raised to nearly $24 million since the company's founding in 2011. [18]

On June 4, 2020 Lastline announced that they entered into a definitive agreement to be acquired by VMware. The acquisition was expected to be finalized by July 31, 2020. [19] [20]

After the acquisation of VMware by Broadcom, Lastline is now part of Broadcom.

Lastline Labs

From May 2013 to May 2014, Lastline researchers studied hundreds of thousands of malware samples, testing new malware against 47 vendors’ AV signatures featured in VirusTotal to determine which caught the malware samples, and how quickly. [21] They found that, on any given day, at least half of the AV scanners it tested failed to detect new malware and after two months, a third of the scanners were still not detecting it. [22] [23]

See also

Related Research Articles

Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types.

<span class="mw-page-title-main">Antivirus software</span> Computer software to defend against malicious computer viruses

Antivirus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

<span class="mw-page-title-main">Trend Micro</span> Japanese multinational cyber security company

Trend Micro Inc. is an American-Japanese cyber security software company. The company has globally dispersed R&D in 16 locations across every continent excluding Antarctica. The company develops enterprise security software for servers, containers, & cloud computing environments, networks, and end points. Its cloud and virtualization security products provide automated security for customers of VMware, Amazon AWS, Microsoft Azure, and Google Cloud Platform.

<span class="mw-page-title-main">ESET</span> Slovak internet security company

ESET, s.r.o., is a software company specializing in cybersecurity. ESET's security products are made in Europe and provide security software in over 200 countries and territories worldwide. Its software is localized into more than 30 languages.

<span class="mw-page-title-main">Sourcefire</span> American computer security company

Sourcefire, Inc was a technology company that developed network security hardware and software. The company's Firepower network security appliances were based on Snort, an open-source intrusion detection system (IDS). Sourcefire was acquired by Cisco for $2.7 billion in July 2013.

Network behavior anomaly detection (NBAD) is a security technique that provides network security threat detection. It is a complementary technology to systems that detect security threats based on packet signatures.

<span class="mw-page-title-main">Symantec Endpoint Protection</span> Computer security software

Symantec Endpoint Protection, developed by Broadcom Inc., is a security software suite that consists of anti-malware, intrusion prevention and firewall features for server and desktop computers.

A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. A supply chain attack can happen in software or hardware. Cybercriminals typically tamper with the manufacturing or distribution of a product by installing malware or hardware-based spying components. Symantec's 2019 Internet Security Threat Report states that supply chain attacks increased by 78 percent in 2018.

Trellix is a privately held cybersecurity company that was founded in 2022. It has been involved in the detection and prevention of major cybersecurity attacks. It provides hardware, software, and services to investigate cybersecurity attacks, protect against malicious software, and analyze IT security risks.

<span class="mw-page-title-main">Malwarebytes</span> Internet security company

Malwarebytes Inc. is an American Internet security company that specializes in protecting home computers, smartphones, and companies from malware and other threats. It has offices in Santa Clara, California; Clearwater, Florida; Tallinn, Estonia; Bastia Umbra, Italy; and Cork, Ireland.

<span class="mw-page-title-main">Kaspersky Lab</span> Russian multinational cybersecurity and anti-virus provider

Kaspersky Lab is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia, and operated by a holding company in the United Kingdom. It was founded in 1997 by Eugene Kaspersky, Natalya Kaspersky and Alexey De-Monderik. Kaspersky Lab develops and sells antivirus, internet security, password management, endpoint security, and other cybersecurity products and services.

An advanced persistent threat (APT) is a stealthy threat actor, typically a state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the term may also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals.

<span class="mw-page-title-main">Endgame, Inc.</span> American security consulting firms

Endgame provides a cyber operations platform supporting the detection, exploitation, and mitigation of cyber-threats. Endgame was started by executives from ISS.

<span class="mw-page-title-main">Palo Alto Networks</span> American technology company

Palo Alto Networks, Inc. is an American multinational cybersecurity company with headquarters in Santa Clara, California. The core product is a platform that includes advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security. The company serves over 70,000 organizations in over 150 countries, including 85 of the Fortune 100. It is home to the Unit 42 threat research team and hosts the Ignite cybersecurity conference. It is a partner organization of the World Economic Forum.

<span class="mw-page-title-main">Seculert</span> Israeli cloud-based cyber security technology

Seculert was a cloud-based cyber security technology company based in Petah Tikva, Israel. The company's technology was designed to detect breaches and advanced persistent threats (APTs), attacking networks. Seculert's business was based on malware research and the ability to uncover malware that has gone undetected by other traditional measures.

Cyren Inc. was a cloud-based Internet security technology company that created security services and threat intelligence to businesses. It offered a range of services including web security, DNS security, anti-spam solutions, phishing detection, ransomware protection, URL filtering, malware detection, and botnet attack prevention. Cyren also provided endpoint protection for mobile devices and Internet of Things (IoT) gateways. Major clients included Microsoft, Google, Check Point, Dell, T-Mobile, and Intel. The company announced its closure in February 2023.

<span class="mw-page-title-main">Illusive Networks</span>

Illusive Networks is a cybersecurity firm headquartered in Tel Aviv, Israel and New York. The company produces technology that stops cyber attackers from moving laterally inside networks by finding and eliminating errant credentials and connections, planting deceptive information about given network's resources, emulating devices, and deploying high interactivity decoys. Network administrators are alerted when cyber attackers use security deceptions in an attempt to exploit the network. Illusive Networks is the first company launched by the Tel Aviv-based incubator, Team8. In June 2015, Illusive Networks received $5 million in Series A funding from Team8. To date, it has raised over $54M.

Cyber threat hunting is a proactive cyber defence activity. It is "the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions." This is in contrast to traditional threat management measures, such as firewalls, intrusion detection systems (IDS), malware sandbox and SIEM systems, which typically involve an investigation of evidence-based data after there has been a warning of a potential threat.

Cylance Inc. is an American software firm based in Irvine, California, that develops antivirus programs and other kinds of computer software that prevents viruses and malware.

<span class="mw-page-title-main">Anomali</span> American cybersecurity company

Anomali Inc. is an American cybersecurity company that develops and provides threat intelligence products. In 2023, the company moved into providing security analytics powered by artificial intelligence (AI).

References

  1. Yokwicz, Will Watching the (Digital) Detectives Rout Out Cyber Fraudsters Inc. March 4, 2015
  2. Goldman, Jeff Data Breach Roundup: January 2014 Archived 2015-03-17 at the Wayback Machine eSecurity Planet. March 4, 2015
  3. Simonelli, Luca The Lastline of APT defence [ permanent dead link ]IT Security Guru. March 4, 2015
  4. Blue Coat Launches Encrypted Traffic Management Ready Certification Program Archived 2015-03-05 at the Wayback Machine CNN Money. March 5, 2015
  5. Lennon, Mike Lastline Raises $10 Million to Help Combat Targeted Attacks Archived 2014-02-09 at the Wayback Machine SecurityWeek. March 4, 2015
  6. Ohlhorst, Frank WatchGuard Brings Advanced Persistent Threat Protection (APT) to the Masses Enterprise Networking Planet. March 4, 2015
  7. Lastline Announces WatchGuard Technologies Joins Company’s Defense Program to Deliver APT Protection Capabilities Business Wire. March 4, 2015
  8. Solomon, Howard RSA Conference roundup: Fortinet, HP announce security products IT World Canada. March 4, 2015
  9. Fisher, Paul Chasing and detecting evasive malware IT Pro Portal. March 4, 2015
  10. Bradley, Tony Juniper expands threat intelligence for more effective network defense CSO. March 4, 2015
  11. Kerner, Sean Michael Juniper Brings Increased Security Intelligence to SRX Gateway Enterprise Networking Planet. March 5, 2015
  12. Lastline Partners with Bit9 + Carbon Black to Deliver Comprehensive Network and Endpoint Breach Protection Yahoo! Finance. March 4, 2015
  13. Westervelt, Robert Growing List Of Security Partners Trigger Bit9 Carbon Black Growth CRN. March 5, 2015
  14. Lastline Obtains $10,000,000 New Financing Round Xconomy. March 4, 2015
  15. Denne, Scott Lastline Secures $10M for Behavior-Based Cybersecurity Archived 2016-03-04 at the Wayback Machine Dow Jones. March 4, 2015
  16. The Daily Startup: Jaunt Raises $27.8 Million For Virtual Reality Tech Wall Street Journal. March 4, 2015
  17. Drake, Sarah Malware detector Lastline raises $10M from Dell, Presidio Silicon Valley Business Journal. March 4, 2015
  18. Lastline Secures $10 Million Funding Round Venture Beat. March 4, 2015
  19. security, John DiLulloJohn DiLullo has nearly 30 years of demonstrated success in enterprise; networking; cloud; AI; Sales, Plus Go-to-Market Expertise Spanning; marketing; Success, Customer; Support, Technical; domestically, operations His career includes extensive time (2020-06-04). "Lastline to be Acquired by VMware". Lastline. Retrieved 2020-06-17.{{cite web}}: CS1 maint: numeric names: authors list (link)
  20. "VMware acquires network security firm Lastline, said to lay off 40% of staff". TechCrunch. 4 June 2020. Retrieved 2020-09-17.
  21. Engin, Kirda Most Antivirus Software Is Lousy At Detecting Advanced Malware Forbes. March 4, 2015
  22. Robinson, Brian Is antivirus now useless? GCN. March 4, 2015
  23. Dunn, John E. Antivirus software can't keep up with new malware, Lastline Labs analysis finds Archived 2016-03-04 at the Wayback Machine tech world. March 4, 2015