Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybersecurity Funding

Data Security Startup Privafy Emerges From Stealth Mode

Data security solutions provider Privafy has emerged from stealth mode with $22 million in funding, which it will use to scale product development.

Data security solutions provider Privafy has emerged from stealth mode with $22 million in funding, which it will use to scale product development.

The Burlington, Ma-based company, which was founded by Verizon and NXP Semiconductors executives, provides a cloud-native SaaS application that aims to secure data as it moves across locations, clouds, mobile, and Internet of Things (IoT) devices.

Its application, Privafy says, can deliver protection by integrating the functionality of encryption systems and VPNs, firewalls, intrusion detection and prevention systems (IDS/IPS), data loss prevention (DLP), deep content inspection, and distributed denial of service (DDoS) defense technology.

Privafy claims that its SaaS solution can provide organizations protection against a wide range of cyber-attacks, such as unauthorized intrusions and access, malware, DDoS, ransomware, botnets, and more, all without affecting performance.

Customers benefit from a proprietary Absolute Encryption schema that defends against man-in-the-middle or unauthorized snooping attacks; endpoint identity protection to prevent endpoint cloning; Impervious Firewall technology; and deep content inspection for data loss prevention and malware screening.

All services can be monitored and managed from a single dashboard named PrivafyCentral. These services include Privafy’s NetEdge – targets on-premise connectivity; CloudEdge – secures public and private clouds; and AppEdge – protects iOS, Android, Windows, macOS and Linux devices.

Available today, Privafy’s SaaS solution can be deployed in enterprise environments of all sizes. The company is working with channel partners, broadband and wireless carriers, and service providers to make its offering available globally.

“Privafy was purpose-built to secure data in today’s modern world. We have democratized Internet security to protect data in a way that is easier to deploy and far more economical for any sized enterprise, regardless of where or how they work,” Guru Pai, co-founder and CEO of Privafy, commented.

Advertisement. Scroll to continue reading.

Related: Data Security Startup Cyral Emerges From Stealth Mode

Related: Email Security Firm Abnormal Security Exits Stealth Mode With $24M in Funding

Related: Network Security Firm Netography Emerges From Stealth

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.