Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybersecurity Funding

Enterprise IoT Security Firm Armis Emerges From Stealth

Armis, a Palo Alto-based company that aims to help organizations eliminate the blind spots introduced by Internet of Things (IoT) devices, emerged from stealth mode on Tuesday.

Armis, a Palo Alto-based company that aims to help organizations eliminate the blind spots introduced by Internet of Things (IoT) devices, emerged from stealth mode on Tuesday.

There is an increasing number of IoT devices in the world and a study conducted by Armis showed that businesses are unaware of 40 percent of the devices connected to their environment. This limited visibility can expose their network to malware attacks, breaches and data loss.

Armis wants to address this problem with an agentless IoT security platform that allows enterprises to see and control all the devices and networks used to access their systems.Armis

Founded in late 2015, Armis emerged from stealth with $17 million in funding from Sequoia Capital and Tenaya Capital. Other investors include Zohar Zisapel, founder and chairman of RAD Technologies, René Bonvanie, CMO of Palo Alto Networks, and Mickey Boodaei, founder of Imperva and Trusteer.

Armis has its roots in Israel, where its founders, CEO Yevgeny Dibrov and CTO Nadir Izrael, served in Unit 8200 of the Israeli Defense Forces. Dibrov was on the executive team at Adallom, a cloud security startup acquired by Microsoft in 2015. Armis is headquartered in Palo Alto, California, but also has an office in Tel Aviv.

“Enterprise security has a huge blind spot,” said Dibrov. “The recent botnet attacks like Mirai, Hajime, and Persirai show how new IoT devices are being exploited and attacked. The fact is you cannot put an agent on most of the devices in an organization today, which means we need a new approach. We built Armis to give enterprises complete visibility into all devices in their environment without requiring an agent. We can stop devices from compromising corporate assets, regardless of whether those devices are managed by IT.”

Related Reading: RedLock Emerges from Stealth With Cloud Security Platform

Related Reading: Security Intelligence Automation Startup LogicHub Emerges from Stealth

Related Reading: HPE Acquires Behavioral Analytics Startup Niara

Advertisement. Scroll to continue reading.
Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.