Have been you unable to attend Rework 2022? Take a look at the entire summit classes in our on-demand library now! Watch right here.
Securing information within the cloud isn’t simple. Most organizations are utilizing so many decentralized purposes and providers that they lack visibility over the kind of info they’re producing, which not solely makes it tough to safe important information, but in addition leaves the door open to compliance violations.
In response to cloud information safety supplier Theom, which right this moment introduced it has closed a $16.4 million seed funding spherical, the elemental cause for these challenges are that enterprises are counting on defending cloud infrastructure quite than the underlying information.
Theom’s answer discovers and protects information saved in cloud shops, APIs, and message queues, to determine weak property and shield information each at relaxation and in transit.
It’s an strategy that permits enterprises to leverage safety intelligence for information at relaxation and in movement, whereas sustaining an correct stock of all information saved inside cloud, SaaS shops, APIs, and message queues, whether or not its PII, PHI or monetary information.
MetaBeat will carry collectively thought leaders to offer steerage on how metaverse expertise will remodel the best way all industries talk and do enterprise on October 4 in San Francisco, CA.
Register Right here
The challenges round securing the cloud
Cloud safety has emerged as a constant ache level for enterprises, significantly as adoption continues to extend. Over the previous 12 months alone, 45% of companies reported experiencing a cloud-based data breach or failed audit, in comparison with 35% in 2021.
“Cloud information breaches have remained an unsolved drawback as a result of present safety controls are blind to the info they’re trying to guard, specializing in defending the infrastructure and purposes and never the info,” stated cofounder and CEO of Theom, Navindra Yadav.
The core subject is information visibility. “Many organizations have little or no concept of the place their delicate information is being saved of their cloud environments. They don’t have a transparent image of what the dangers are to that information and which to prioritize,” Yadav stated.
Theom gives a novel strategy to securing information within the cloud and SaaS information shops that focuses on defending information property. It has the flexibleness to adapt as infrastructure and environments change, in contrast to different cloud safety controls that may’t comply with information that will get copied, moved or shared within the cloud.
A have a look at the cloud safety market
The announcement comes because the cloud security market continues to develop, which researchers valued at $33 billion in 2022, and anticipate will attain $106 billion in 2029.
With extra information transferring to the cloud, enterprises want a way more subtle strategy to securing information in transit and at relaxation.
Theom is competing in opposition to quite a few different suppliers attempting to deal with the problem of securing cloud-based information, together with Palo Alto Networks Prisma Cloud, which makes use of identity-based microsegmentation to extend visibility over how apps talk, and supply hosts and containers with cryptographically signed workload identities.
Final month, Palo Alto Networks introduced elevating $1.6 billion in revenue within the fiscal fourth quarter of 2022.
One other competitor is Checkpoint, which gives a cloud-native utility safety platform (CNAPP) answer to search for safety dangers in configurations and community visitors. It routinely detects intrusion makes an attempt with the assistance of risk intelligence. Checkpoint reportedly raised $2.1 billion in complete revenue throughout 2021.
In response to Yadav, the important thing differentiator between Theom and different present approaches is that the opposite choices deal with securing cloud infrastructure and purposes, whereas Theom takes a data-centric strategy.
Meaning classifying information and id dangers based mostly on how it’s saved and accessed. It’s an strategy that gives customers with entry to information classification inside their very own environments.