Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Satori Cyber Emerges From Stealth With Data Protection, Governance Platform

Satori Cyber on Tuesday emerged from stealth mode with a data protection and governance platform, and $5.25 million in seed funding from YL Ventures.

Satori Cyber on Tuesday emerged from stealth mode with a data protection and governance platform, and $5.25 million in seed funding from YL Ventures.

Satori aims to provide organizations continuous visibility and granular control over data flows across their cloud and hybrid environments through a platform it has named Secure Data Access Cloud.

Satori is based in Israel and it was founded by former Imperva senior executives Eldad Chai, who serves as CEO, and Yoav Cohen, who serves as the company’s CTO.

According to Satori, its platform is easy to deploy — it only requires a host name change — and it allows security teams to determine where data is stored and how it flows within their infrastructure, find out what type of data is being accessed and moved, identify who is accessing data and determine if their access complies with security and privacy policies, and discover potential data loss and exposure risks.

Secure Data Access Cloud provides data visibility and mapping, data classification and discovery, data security, and policy monitoring and enforcement capabilities. Data security is provided through granular, field-level access controls and anomaly detection features.

“When you take into consideration the sheer volume of the data and access requests security teams contend with today, implementing proper data protection isn’t just difficult, it’s nearly impossible,” Chai said.

He added, “Until now, security teams have relied on a combination of highly segregated and restrictive data access and one-off technology-specific access controls within each data store, which has only slowed enterprises down. The Satori Cyber platform streamlines this process, accelerates data access and provides a holistic view across all organizational data flows, data stores and access, as well as granular access controls, to accelerate an organization’s data strategy without those constraints.”

Satori’s Secure Data Access Cloud platform is currently available only to qualified customers, and is expected to become generally available in the third quarter of 2020.

Related: Vulcan Cyber Emerges From Stealth With $4 Million Seed Round

Related: Cloud Visibility Firm Orca Security Emerges From Stealth Mode

Related: Hunters.AI Emerges From Stealth With $5.4M in Seed Funding

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Funding/M&A

Twenty-one cybersecurity-related M&A deals were announced in December 2022.