• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
App Visibility Startup Bionic Comes Out Of Stealth With $17

App visibility startup Bionic comes out of stealth with $17 million in funding

You are here: Home / General Cyber Security News / App visibility startup Bionic comes out of stealth with $17 million in funding

Rising from stealth now, a startup founded by two previous associates of the Israeli Defense Force’s cybersecurity division lifted $17 million in funding from investors.

Between those investing in Bionic: Dharmesh Thakker and René Bonvanie of Battery Ventures, Gil Raanan of Cyberstarts, former Symantec president Michael Fey, previous Goldman Sachs main technology officer Don Duet, previous Barclays main data officer Sameer Jain and Passave founder Ariel Maislos.

Bionic’s key item is an automatic software intelligence platform designed to reverse engineer an organization’s plans and map out the architecture, dataflows and alterations in creation. CEO and co-founder Idan Ninyo stated the smaller corporation – which now has 20 workers – plans to use the funding to get greater, more robust and faster by doubling its 15-person engineering team, including much more automation, growth and abilities to its platform while also increasing industry existence.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Avast Ultimate Suite 2021

Protect yourself against all threads using AVAST Ultimate Suite. AVAST Ultimate Suite protects your Windows, macOS and your Android via Avast Premium. In addition it comes with AVAST's well-known VPN service SecureLineVPN. Therefore, it will be a security and privacy in one package.

Get AVAST Ultimate Suite with 65% discount certified seller: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


As providers have increasingly moved to a DevOps design that prioritizes speedy program delivery, Ninyo claimed, it’s designed a chaotic software ecosystem. Bionic’s consumers and prospective shoppers often have problem putting alongside one another a ballpark figure for the number of apps they have jogging.

“We recognized in order to untangle the scales and permit corporations know how all the different pieces of software package and applications in good shape with each other, ultimately you will have to fully grasp how people apps perform,” Ninyo stated in an job interview. “Looking at infrastructure, looking at configurations and so on does not get the job done any more, specifically not in the cloud, especially not in containers exactly where infrastructure is out of the blue a commodity.”

This challenge can get specifically pronounced for the duration of cloud migrations as enterprises bit by bit discard the guide documentation and controls they formerly had in spot, top to additional confusion. A study of 388 IT professionals located a lot less than 20 percent believed they have the important details to watch their general public cloud surroundings, 87 % get worried this absence of visibility is masking security threats and virtually 50 percent say it contributes to software general performance issues.

“The final results confirm that complete cloud visibility is vital to protecting cloud security,” the study concluded.

Software visibility can serve a number of needs, from organizing software program enhancement workflows to serving to security teams get a manage on insecure shadow IT and apps. Ninyo explained the company wishes to provide both of all those prospects and is targeted principally on expanding their footprint in the U.S. market, in which Bionic thinks companies are typically even further alongside in their electronic transformation journeys than Europe and the expansion opportunity is better.

“We are aiming to be a really massive organization and which is the place we have to have to improve in purchase to that we are such,” reported Ninyo.


Some elements of this post are sourced from:
www.scmagazine.com

Previous Post: «Defending The Intelligent Edge From Evolving Attacks Defending the Intelligent Edge from Evolving Attacks
Next Post: The IT Pro Podcast: The power of disinformation The It Pro Podcast: The Power Of Disinformation»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Big Tech Bans Social Networking App
  • Lack of Funding Could Lead to “Lost Generation” of Cyber-Startups
  • Unveiled: SUNSPOT Malware Was Used to Inject SolarWinds Backdoor
  • ‘I’ll Teams you’: Employees assume security of links, file sharing via Microsoft comms platform
  • DarkSide decryptor unlocks systems without ransom payment – for now
  • Researchers see links between SolarWinds Sunburst malware and Russian Turla APT group
  • Millions of Social Profiles Leaked by Chinese Data-Scrapers
  • Feds will weigh whether cyber best practices were followed when assessing HIPAA fines
  • SolarWinds Hack Potentially Linked to Turla APT
  • 10 quick tips to identifying phishing emails

Copyright © TheCyberSecurity.News, All Rights Reserved.