Sqrrl

Last updated
Sqrrl
Company typeSubsidiary
IndustryCybersecurity, Network security
Founded2012
Headquarters Cambridge, Massachusetts
Parent Amazon
Website https://www.sqrrl.com (defunct)

Sqrrl Data, Inc. is an American company founded in 2012 that markets software for big data analytics and cyber security. The company has roots in the United States Intelligence Community and National Security Agency. [1] Sqrrl was involved in the creation of, and actively contributes to Apache Accumulo and other related Apache projects. [2] Sqrrl’s primary product is its threat hunting platform, designed for active detection of advanced persistent threats.

Contents

In January 2018, Sqrrl was acquired by Amazon.

History

Most of Sqrrl’s founders previously worked for the National Security Agency; CEO and Co-Founder Oren Falkowitz, formerly of the United States Cyber Command and Co-Founder Ely Kahn, former director of US cybersecurity policy. [3] [4] Sqrrl's platform relies on the open-source Apache Accumulo technology. Accumulo began development in 2008 and went open source in 2011; Sqrrl was founded in the summer of 2012 to use Accumulo for cybersecurity. [5] Sqrrl was founded in Washington, D.C., but quickly moved to Cambridge, Massachusetts. [6]

In August 2012, Sqrrl announced a $2 million seed round led by Accomplice (formerly Atlas Venture) and Matrix Partners. [7]

In October 2013, Sqrrl received $5.2 million in funding led by Accomplice and Matrix Partners. [8]

In February 2015, Sqrrl raised another $7.1 million funding for its linked data analysis toolkit. [9]

On January 24, 2018, it was reported that Sqrrl had been acquired by Amazon and would become a part of Amazon Web Services. [10]

Threat hunting platform

An example of Sqrrl's visual behavior graph, displaying user and entity activity on a network. Sqrrl Behavior Graph.png
An example of Sqrrl's visual behavior graph, displaying user and entity activity on a network.

Sqrrl’s main product is a visual cyber threat hunting platform which combines technology such as link analysis and user behavior analytics. [11] User, entity, asset, and event data are combined into a behavior graph which users navigate to respond to security incidents as well as search for undetected threats. [12] Sqrrl integrates into Security Information and Event Management (SIEM) systems, such as IBM's QRadar. [13] The platform also integrates machine learning and risk-scoring.

Awards

Sqrrl was mentioned in cyber security industry marketing, [14] such as SC Mag’s Top Innovator award in 2015 and 2016 [15] [16] and a 2017 Cybersecurity Excellence Award in a new "Threat Hunting" category. [17]

See also

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security, cybersecurity, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

<span class="mw-page-title-main">Trend Micro</span> Japanese multinational cyber security company

Trend Micro Inc. is an American-Japanese cyber security software company. The company has globally dispersed R&D in 16 locations across every continent excluding Antarctica. The company develops enterprise security software for servers, containers, & cloud computing environments, networks, and end points. Its cloud and virtualization security products provide automated security for customers of VMware, Amazon AWS, Microsoft Azure, and Google Cloud Platform.

Fortinet, Inc. is a cybersecurity company with headquarters in Sunnyvale, California. The company develops and sells security solutions like firewalls, endpoint security and intrusion detection systems. Fortinet has offices located all over the world.

<span class="mw-page-title-main">UST (company)</span> American technology company

UST, formerly known as UST GLOBAL, is a provider of digital technology and transformation, information technology and services, headquartered in Aliso Viejo, California, United States. Stephen Ross founded UST in 1998 in Laguna Hills. The company has offices in the Americas, EMEA, APAC, and India.

<span class="mw-page-title-main">Narus Inc.</span> U.S. technology company

Narus Inc. was a software company and vendor of big data analytics for cybersecurity.

Computer security software or cybersecurity software is any computer program designed to influence information security. This is often taken in the context of defending computer systems or data, yet can incorporate programs designed specifically for subverting computer systems due to their significant overlap, and the adage that the best defense is a good offense.

<span class="mw-page-title-main">Splunk</span> American technology company

Splunk Inc. is an American software company based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generated data via a web-style interface. Its software helps capture, index and correlate real-time data in a searchable repository, from which it can generate graphs, reports, alerts, dashboards and visualizations.

ExtraHop is a cybersecurity company providing AI-based network intelligence that stops advanced threats across cloud, hybrid, and distributed environments.

Recorded Future is a privately held cybersecurity company founded in 2009, with headquarters in Somerville, Massachusetts.

<span class="mw-page-title-main">Bill Conner</span> American businessman

F. William Conner is an American business executive. Conner has worked across a variety of high-tech industries, specializing in corporate turnaround, cybersecurity, data and infrastructure.

Apache Accumulo is a highly scalable sorted, distributed key-value store based on Google's Bigtable. It is a system built on top of Apache Hadoop, Apache ZooKeeper, and Apache Thrift. Written in Java, Accumulo has cell-level access labels and server-side programming mechanisms. According to DB-Engines ranking, Accumulo is the third most popular NoSQL wide column store behind Apache Cassandra and HBase and the 67th most popular database engine of any type (complete) as of 2018.

<span class="mw-page-title-main">Palo Alto Networks</span> American technology company

Palo Alto Networks, Inc. is an American multinational cybersecurity company with headquarters in Santa Clara, California. The core product is a platform that includes advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security. The company serves over 70,000 organizations in over 150 countries, including 85 of the Fortune 100. It is home to the Unit 42 threat research team and hosts the Ignite cybersecurity conference. It is a partner organization of the World Economic Forum.

<span class="mw-page-title-main">DB Networks</span>

DB Networks is a privately held Information Security company founded in the United States The company is headquartered in San Diego, California, and its regional offices are located in Palo Alto, California and Seattle, Washington.

A Master of Science in Cyber Security is a type of postgraduate academic master's degree awarded by universities in many countries. This degree is typically studied for in cyber security. What is offered by many institutions is actually called a Master in Strategic Cyber Operations and Information Management (SCOIM) which is commonly understood to be a Master in Cybersecurity. This degree is offered by at least some universities in their Professional Studies program so that it can be accomplished while students are employed - in other words it allows for "distance learning" or online attendance. Requirements for the Professional Studies program include: 3.0 or better undergrad GPA, professional recommendations letters and an essay.

Cyber threat intelligence (CTI) is knowledge, skills and experience-based information concerning the occurrence and assessment of both cyber and physical threats and threat actors that is intended to help mitigate potential attacks and harmful events occurring in cyberspace. Cyber threat intelligence sources include open source intelligence, social media intelligence, human Intelligence, technical intelligence, device log files, forensically acquired data or intelligence from the internet traffic and data derived for the deep and dark web.

BlueTalon, Inc. was a private enterprise software company that provides data-centric security, user access control, data masking, and auditing solutions for complex, hybrid data environments. BlueTalon was founded in 2013 by Pratik Verma and is headquartered in Redwood City, California.

Nyotron is an information-security company. It was established in 2009 by brothers Nir and Ofer Gaist. Nir Gaist is the CTO, and Sagit Manor became the CEO in 2017. The company is based in Santa Clara, CA, with an R&D office in Herzliya, Israel.

Cynet is a cyber-security company. It converges essential cyber security technologies that help enterprises to identify security loopholes, and threat intelligence, and manage endpoint security. It was founded in 2015 in Tel-Aviv, Israel, and is headquartered in Boston, United States.

ActivTrak is an American company that produces workforce analytics and productivity software. The company was founded in 2009 by Birch Grove Software and is headquartered in Austin, Texas.

Internet security awareness or Cyber security awareness refers to how much end-users know about the cyber security threats their networks face, the risks they introduce and mitigating security best practices to guide their behavior. End users are considered the weakest link and the primary vulnerability within a network. Since end-users are a major vulnerability, technical means to improve security are not enough. Organizations could also seek to reduce the risk of the human element. This could be accomplished by providing security best practice guidance for end users' awareness of cyber security. Employees could be taught about common threats and how to avoid or mitigate them.

References

  1. "Born in the NSA, former spies are starting companies of their own". Venturebeat. May 2014.
  2. Williams, Alex (20 August 2012). "Sqrrl Raises $2 Million For Secure, Scalable Big Data Technology Originally Developed At NSA". TechCrunch. Retrieved 22 August 2012.
  3. Kolakowski, Nick (20 August 2012). "Sqrrl Wants to Make Database Technology Extra Secure". Slashdot. Archived from the original on 1 December 2012. Retrieved 22 August 2012.
  4. "Management - Sqrrl". Sqrrl. Archived from the original on 2017-06-24. Retrieved 2017-03-06.
  5. "Company Overview - Sqrrl". Sqrrl. Archived from the original on 2017-03-07. Retrieved 2017-03-06.
  6. "Meet Sqrrl: The Company Commercializing the NSA's Surveillance Software". Cambridge Community Television. Retrieved 2017-03-06.
  7. Kirsner, Scott (20 August 2012). "New database startup Sqrrl raises $2 million, relocates from D.C. to Cambridge". Boston Globe. Retrieved 22 August 2012.
  8. Perez, Sarah (21 October 2013). "Sqrrl Raises $5.2M To Provide Deeper Granularity For NSA-Born Database Technology". Techcrunch.
  9. Vanain, Jonathan (18 February 2015). "NSA-linked Sqrrl eyes cyber security and lands $7M in funding". GigaOm.
  10. Miller, Ron (January 24, 2018). "AWS beefs up threat detection with Sqrrl acquisition". TechCrunch. Archived from the original on February 12, 2019. Retrieved April 21, 2019.
  11. "User and Entity Behavior Analytics (UEBA) - Sqrrl". Sqrrl. Archived from the original on 2017-03-07. Retrieved 2017-03-06.
  12. Breeden, John. "Review: Threat hunting turns the tables on attackers". Network World. Archived from the original on December 20, 2016. Retrieved 2017-03-06.
  13. "Sqrrl". www.ibm.com. 2009-10-20. Retrieved 2017-03-06.
  14. "Awards - Sqrrl". Sqrrl. Archived from the original on 2017-03-07. Retrieved 2017-03-06.
  15. "Sqrrl is Recognized as a Security "Industry Innovator" by SC Magazine". StreetInsider.com. Retrieved 2017-03-06.
  16. Sqrrl. "SC Magazine Selects Sqrrl as Top Innovator in Next-Gen Security Analytics". GlobeNewswire News Room. Retrieved 2017-03-06.
  17. "Sqrrl Threat Hunting Platform - Cybersecurity Excellence Awards". cybersecurity-excellence-awards.com. 17 November 2016. Retrieved 2017-03-06.