• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
App Visibility Startup Bionic Comes Out Of Stealth With $17

App visibility startup Bionic comes out of stealth with $17 million in funding

You are here: Home / General Cyber Security News / App visibility startup Bionic comes out of stealth with $17 million in funding

Emerging from stealth these days, a startup started by two previous members of the Israeli Protection Force’s cybersecurity division raised $17 million in funding from traders.

Among individuals investing in Bionic: Dharmesh Thakker and René Bonvanie of Battery Ventures, Gil Raanan of Cyberstarts, former Symantec president Michael Fey, previous Goldman Sachs chief technology officer Don Duet, previous Barclays chief data officer Sameer Jain and Passave founder Ariel Maislos.

Bionic’s major solution is an automatic software intelligence platform built to reverse engineer an organization’s applications and map out the architecture, dataflows and variations in output. CEO and co-founder Idan Ninyo said the modest firm – which at this time has 20 staff members – plans to use the funding to get superior, stronger and faster by doubling its 15-man or woman engineering staff, adding additional automation, enhancement and abilities to its system even though also growing current market presence.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
F Secure Safe 2021

Protect yourself against all threads using F-Seure. F-Seure is one of the first security companies which has never been backed up by any governments. It provides you with an award-winning security plus an optimum privacy.

Get F-Secure Safe with 65% discount from a bitdefender official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


As companies have significantly moved to a DevOps design that prioritizes speedy software package shipping, Ninyo stated, it is produced a chaotic application natural environment. Bionic’s clientele and possible clientele typically have issue placing together a ballpark determine for the quantity of applications they have operating.

“We recognized in buy to untangle the scales and enable companies know how all the distinctive pieces of application and programs suit together, sooner or later you need to recognize how all those programs operate,” Ninyo explained in an job interview. “Looking at infrastructure, hunting at configurations and so on doesn’t function anymore, primarily not in the cloud, particularly not in containers in which infrastructure is quickly a commodity.”

This issue can get specially pronounced for the duration of cloud migrations as businesses bit by bit discard the handbook documentation and controls they beforehand experienced in put, primary to more confusion. A survey of 388 IT professionals located a lot less than 20 per cent thought they have the necessary info to keep an eye on their general public cloud ecosystem, 87 percent stress this deficiency of visibility is masking security threats and just about 50 % say it contributes to application general performance issues.

“The results confirm that extensive cloud visibility is crucial to preserving cloud security,” the study concluded.

Application visibility can serve many reasons, from organizing software enhancement workflows to aiding security groups get a cope with on insecure shadow IT and purposes. Ninyo stated the corporation wants to provide both equally of those shoppers and is focused largely on growing their footprint in the U.S. current market, in which Bionic believes companies are generally further more together in their electronic transformation journeys than Europe and the growth probable is bigger.

“We are aiming to be a incredibly major organization and which is wherever we need to have to improve in purchase to that we are this sort of,” said Ninyo.


Some parts of this posting are sourced from:
www.scmagazine.com

Previous Post: «Defending The Intelligent Edge From Evolving Attacks Defending the Intelligent Edge from Evolving Attacks
Next Post: The IT Pro Podcast: The power of disinformation The It Pro Podcast: The Power Of Disinformation»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Big Tech Bans Social Networking App
  • Lack of Funding Could Lead to “Lost Generation” of Cyber-Startups
  • Unveiled: SUNSPOT Malware Was Used to Inject SolarWinds Backdoor
  • ‘I’ll Teams you’: Employees assume security of links, file sharing via Microsoft comms platform
  • DarkSide decryptor unlocks systems without ransom payment – for now
  • Researchers see links between SolarWinds Sunburst malware and Russian Turla APT group
  • Millions of Social Profiles Leaked by Chinese Data-Scrapers
  • Feds will weigh whether cyber best practices were followed when assessing HIPAA fines
  • SolarWinds Hack Potentially Linked to Turla APT
  • 10 quick tips to identifying phishing emails

Copyright © TheCyberSecurity.News, All Rights Reserved.