Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Data Security Company Symmetry Systems Emerges From Stealth

Symmetry Systems, a provider of data store and object security (DSOS) solutions, emerged from stealth mode on Tuesday with $3 million in seed funding from ForgePoint Capital and Prefix Capital.

Symmetry Systems, a provider of data store and object security (DSOS) solutions, emerged from stealth mode on Tuesday with $3 million in seed funding from ForgePoint Capital and Prefix Capital.

Symmetry Systems was founded by Mohit Tiwari, a former cybersecurity professor at the University of Texas, and Casen Hunger, one of Tiwari’s former students. The company is the result of data security research they conducted over the past decade.Symmetry Systems

The company’s flagship solution, Symmetry DataGuard, is designed to provide visibility and unified access control over data assets in MySQL, PostgreSQL, MongoDB and AWS S3 storage. It can help security and infrastructure teams by providing them auditing and compliance reports, security alerts for potentially malicious activity and breaches, and IAM and security policies.

Symmetry Systems says its solution was fine-tuned based on feedback from over 50 security practitioners, and it has already been tested by tech, healthcare, manufacturing and fintech organizations.

“Data security is a side-effect of infrastructure and application security — small mistakes there lead to large breaches or ransomware attacks,” Tiwari, who is the company’s CEO, told SecurityWeek. “The difficult thing about data security is that a solution will need to look into data objects and across data stores to learn how user and service identities use data — and then tie it to an organization’s security and compliance targets. DataGuard learns attributes about the data (PII/PCI/PHI, stale, its owners and users, etc…) and uses this visibility to drive compliance, detection-response and guide infrastructure and data-store specific defenses.”

“Security engineers struggle with ground truth visibility into data protection; current solutions provide visibility into network and endpoint-devices but data stores are a blind spot. DataGuard is deployed inside our customer’s private cloud or on premise servers, so we, the developers of Symmetry Systems, don’t have access to customers’ data. They can collaborate with our customers through a separate locked down machine (bastion host) via sanitized DataGuard outputs,” Tiwari added, noting that DataGuard can also be offered as a service hosted by Symmetry itself.

The company says it plans on using the money raised in the seed round to boost product development and customer support.

Related: Data Security Startup Privafy Emerges From Stealth Mode

Related: Data Security Startup Cyral Emerges From Stealth Mode

Advertisement. Scroll to continue reading.

Related: Satori Cyber Emerges From Stealth With Data Protection, Governance Platform

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.