Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybersecurity Funding

Data Protection Firm Vera Secures $17 Million

Vera, a Palo Alto, Calif.-based data protection startup, has closed a $17 million Series B funding round led by Sutter Hill Ventures, bringing the total amount raised by the company to more than $31 million.

Vera, a Palo Alto, Calif.-based data protection startup, has closed a $17 million Series B funding round led by Sutter Hill Ventures, bringing the total amount raised by the company to more than $31 million.

The company explains that its Information Rights Management-as-a-Service platform (IRMaaS) can encrypt, secure and track any type of digital information wherever it travels – across all users, devices, applications, and platforms in real-time.

Using Vera’s technology, customers can set up user or company managed polices to protect data, and track, revoke, watermark, or block copying of data.

According to the company, the new funding will be used to expand its sales and marketing capabilities and accelerate research and product development.

Vera LogoSince launching in April 2015, the company says it has brought on customers that have resulted in more than a quarter million users being protected by its technology.

The company has also established partnerships with other technology firms, such as Dropbox, Okta, and Centrify, and has integrations with Box, VMware, and Microsoft.

Existing investors Battery Ventures, Clear Venture Partners, and Amplify Partners also participated in the Series B round.

As part of the financing, Stefan Dyckerhoff, Managing Director at Sutter Hill Ventures will join the Vera board of directors.

“Vera is bridging a critical security gap by changing the way enterprises think about securing their data and we’re excited to be part of this opportunity,” Dyckerhoff said in a statement.

Advertisement. Scroll to continue reading.
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.