Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybersecurity Funding

Gravwell Emerges From Stealth With Data Fusion Platform for Security Teams

Enterprise data fusion and analytics company Gravwell on Wednesday emerged from stealth mode with $3 million in seed funding from Next Frontier Capital, Gula Tech Adventures, Kickstart Fund, and Revolution’s Rise of the Rest.

Enterprise data fusion and analytics company Gravwell on Wednesday emerged from stealth mode with $3 million in seed funding from Next Frontier Capital, Gula Tech Adventures, Kickstart Fund, and Revolution’s Rise of the Rest.

Gravwell has developed a platform that is designed to enable security teams to investigate, collaborate, and analyze data from any source. The platform is advertised as being very useful for threat hunting.

The Coeur d’Alene, Idaho-based company says that unlike other solutions, which limit the amount of data that can be collected and analyzed, the Gravwell platform offers unlimited data ingestion, unlimited environments, unlimited data retention, and unlimited endpoints “at a cost that doesn’t break your budget.”

Gravwell has three pricing plans: Pro Edition (starting at $500/month), Enterprise Edition (starting at $24,000/year) and Enterprise Extended (starting at $48,000/year). The company claims that its enterprise plans offer analytics capabilities for which some organizations currently pay two or three times as much.

Gravwell says its platform enables organizations to search petabytes of data in seconds, with its largest deployment analyzing more than 100 terabytes of data per day. The company says its platform’s live dashboards provide real-time insight, and enable customers not only to look at their data, but also “play” with it, without having to worry about breaking something.

Enterprise data fusion company Gravwell emerges from stealth mode

“We are incredibly proud of the value that we deliver for our customers,” said Gravwell CEO Corey Thuen. “There are very few tools that actually scale past 40 terabytes per day, and no one is collecting all the data they want. On our platform, they will never have to make a decision about which data to use or lose, it is ALL their data.”

Related: Data Security Startup Code-X Emerges From Stealth With $5 Million in Funding

Advertisement. Scroll to continue reading.

Related: Neosec Emerges From Stealth With $20.7 Million in Funding

Related: MSSP SolCyber Emerges From Stealth With $20 Million Series A Funding

Related: SaaS Security Company Grip Security Emerges From Stealth

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.

Register

Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.