iSIGHT Partners, Inc., a provider of cyber threat intelligence services, announced on Monday that it has closed a $30 million Series C funding round with Bessemer Venture Partners.
The Dallas, Texas-based company said that it would use the new funding to further extend its global intelligence capacity, enhance its ThreatScape intelligence products, develop new integration partnerships and continue to ramp up its sales and marketing efforts.
iSIGHT, which helps security teams respond faster to cyber threats and proactively defend against attacks, currently has over 200 employees in 16 countries.
“The blistering array of cyber attacks in 2014 was a clear wake up call to corporate boards,” said iSIGHT Partners CEO John Watters. “With criminals attacking POS systems, sophisticated cyber espionage campaigns and hacktivists materially impacting key industries, there is no doubt that enterprise security teams will use advanced threat intelligence to regain the advantage.”
The company said that it experienced significant growth in 2014 and finished the year with record revenues and very strong client acquisition across numerous vertical and geographic segments.
According to the company, it is currently working with twenty integration partners that are leveraging its intelligence to enhance security products such as SIEM, firewalls and security gateways to incident response, governance, risk, and compliance (GRC) and Threat Intelligence Platforms.
“With nations, terrorists, criminals and hacktivists routinely launching sophisticated, military-grade cyber attacks, enterprises are saddled with obsolete security products that defend against the common cold rather than targeted, lethal campaigns,” said BVP Partner David Cowan.
In May 2014, the company uncovered a wide-spanning cyber espionage operation conducted by Iranian threat actors who used more than a dozen fake personas on popular social networking sites to target victims. ion
In October, iSIGHT revealed that a threat group (“Sandworm Team”) allegedly linked with the Russian government had been leveraging a Microsoft Windows zero-day vulnerability to target NATO, the European Union, and various private energy and telecommunications organizations in Europe.