Infection Monkey Is on the Loose!

Today we are releasing the Infection Monkey, our inhouse tool for testing a data center’s resiliency to perimeter breaches and internal server infection. The Infection Monkey is a new open source security testing tool that we’ve developed at GuardiCore to test the resiliency of modern data centers to attack. Being good sports, we are sharing it with the security community. Just pick a random machine, release the Infection Monkey and see where it ends up. Use our Monkey to test whether your security systems can detect, stop and contain real threats. The monkey is benign and does not pose any risk to your network.

In our Black Hat 2016 session we will show how using the Infection Monkey for in-house penetration testing can be of great value to security teams, explain why this tool is important and present some use cases on how to use the tool in real-world security testing scenarios.

Read more

GuardiCore Unveils Infection Monkey Open Source Cyber Security Testing Tool, Presents at Black Hat 2016

Modern, Disruptive Testing Tool Now Available to Public Security Community

San Francisco, CA and Tel Aviv, Israel – GuardiCore, a leader in internal data center security and threat detection, today made its Infection Monkey testing tool freely available to the public security community at large. Designed to test the resiliency of modern data centers against cyber attacks, the Infection Monkey was developed as an open source tool by GuardiCore’s research group, led by seasoned cyber security researcher Ofri Ziv.

Read more

Deception-Based Security Gains Steam as GuardiCore Raises $20m

Organizations have historically dealt with breach attempts by trying to block the hacker as fast as possible and only stopping to investigate after the fact. But now, the security community is starting to adopt a new approach: Letting attacks play out in controlled conditions to gain a deeper understanding of the threat. The method is being popularized mainly by emerging startups like Israel’s GuardiCore Ltd., which raised $20 million in funding this morning to fuel its efforts.

GuardiCore Raises $20M; Continues Traction Protecting Enterprise Data Centers Globally

Today I am excited to share that we have secured a financing round (Series B) in the amount of $20M.  The round was led by our existing investors, 83 North and Battery Ventures, who continue to give us valuable contributions in terms of the support and guidance we need at this stage in our company’s lifecycle. We are also very happy to welcome Cisco to the table at this financing round.

Read more

GuardiCore Raises $20 Million in Series B Funding to Deliver Protection for the Enterprise Data Center

Cisco Investments Joins Existing Investors Battery Ventures and 83North to Back Next-Generation Security Platform

San Francisco, CA and Tel Aviv, Israel – GuardiCore, a leader in internal data center security and threat detection, today announced that the company has raised $20 million in Series B funding. The latest round is led by existing investors Battery Ventures and 83North (formerly Greylock IL) and joined by Cisco Investments, bringing the company’s total funding raised to date to $33 million.

Read more

Centra Celebration

East West traffic at a glance

East West traffic at a glance

The first week of July provides a great opportunity to celebrate.

At GuardiCore we like to celebrate, especially with new releases and product achievements. Several weeks ago we started deploying the latest version of our flagship product Centra, with first controlled upgrades taking place for our SaaS customers. The new Centra 2.0 release 16 is loaded with great and many enhancements, including important Reveal features. For those of you who were unable to review the upgrade or read the entire release notes, here’s a very short list:

We introduced major enhancements to Reveal to better handle large data center scale flow analysis and advanced queries (check this cool video here).

Reveal now includes numerous new filtering methods to allow you to quickly get to what matters most: Detect applications, find anomalies or make sure that only allowed connections are made between servers. Reveal data center process level flows can be filtered by applications, asset names, port numbers, ESX folders, inbound and outbound Internet connections, user-defined labels and more.

Read more