Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Elastic to Acquire build.security for Cloud Security Expansion

Search software giant Elastic NV is continuing its march into the cybersecurity business with Monday’s announcement of plans to acquire build.security, a red-hot Israeli startup that helps businesses enforce cloud security authorization policies.

Financial terms of the acquisition were not disclosed. 

Search software giant Elastic NV is continuing its march into the cybersecurity business with Monday’s announcement of plans to acquire build.security, a red-hot Israeli startup that helps businesses enforce cloud security authorization policies.

Financial terms of the acquisition were not disclosed. 

Build.security, which maintains offices in Tel Aviv, Israel and Sunnyvale, Calif., raised $6 million in early-stage venture capital funding led by YL Ventures. 

The build.security deal follows Elastic’s $243 million acquisition of Endgame and solidifies the Dutch company’s expansion of its endpoint detection and response (EDR) capabilities.

Previously known as Elasticsearch, the company sells Elastic Stack, a combination of search and logging software that lets businesses search, analyze and visualize data at scale.  

The company’s new Elastic Security arm combines SIEM threat detection features with endpoint prevention and response capabilities to provide what is being described as a “limitless” extended detection and response (XDR) platform.

[ Related: Elastic to Acquire Endpoint Security Firm Endgame for $243 Million ]

“The addition of build.security extends Limitless XDR to enable the enforcement of security actions for cloud-native environments including hosts, virtual machines, and containers orchestrated by Kubernetes,” Elastic NV said in a statement announcing the deal. 

Advertisement. Scroll to continue reading.

“By integrating the build.security technology into Elastic Security, customers will be able to continuously monitor and ensure that their cloud environments are secure in keeping with the policies they have in place, as well as continuously validate their security posture against well established standards such as the Center for Internet Security (CIS) benchmarks.”

Founded by Amit Kanfer with backing from YL Ventures and several big-name security executives, build.security sells an authorization policy management platform powered by the open source authorization engine Open Policy Agent (OPA).

The build.security platform helps developers address the challenges associated with implementing role-based access controls (RBAC) and attribute-based access controls (ABAC) in enterprise applications.

The company’s tools help to create, distribute, manage and test access policies, including user-to-application, service-to-service, employee-to-internal access, and data access policies.

[ READ: Inside the Battle to Control Enterprise Security Data Lakes ]

Once the deal closes, Elastic and build.security plan to offer the ability to manage OPA policies directly in Kibana, enforce OPA policies through the Elastic Agent, and store the results of OPA policy executions within Elasticsearch using the Elastic Common Schema (ECS). 

“The initial integration with build.security will focus on Kubernetes admission controller, enabling security and compliance at deployment time, and will continue with build-time policies scanning cloud configuration files. With this, users will be able to shift-left and enforce security for their cloud-native applications earlier in the life cycle of their applications,” Elastic said.

Related: build.security Emerges From Stealth With $6M Funding

Related: Elastic to Acquire Endpoint Security Firm Endgame for $243 Million

RelatedInside the Battle to Control Enterprise Security Data Lakes

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.