Lastline
   HOME

TheInfoList



OR:

Lastline, Inc. is an American
cyber security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
company and breach detection platform provider based in
Redwood City, California Redwood City is a city on the San Francisco Peninsula in Northern California's Bay Area, approximately south of San Francisco, and northwest of San Jose. Redwood City's history spans its earliest inhabitation by the Ohlone people to being a ...
. The company offers network-based security breach detection and other security services that combat
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depri ...
used by
advanced persistent threat An advanced persistent threat (APT) is a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the term may ...
(APT) groups for businesses, government organizations and other security service providers. Lastline has offices in
North America North America is a continent in the Northern Hemisphere and almost entirely within the Western Hemisphere. It is bordered to the north by the Arctic Ocean, to the east by the Atlantic Ocean, to the southeast by South America and the Car ...
,
Europe Europe is a large peninsula conventionally considered a continent in its own right because of its great physical size and the weight of its history and traditions. Europe is also considered a Continent#Subcontinents, subcontinent of Eurasia ...
, and
Asia Asia (, ) is one of the world's most notable geographical regions, which is either considered a continent in its own right or a subcontinent of Eurasia, which shares the continental landmass of Afro-Eurasia with Africa. Asia covers an area ...
.


History

Lastline was founded in 2011 by
University of California, Santa Barbara The University of California, Santa Barbara (UC Santa Barbara or UCSB) is a Public university, public Land-grant university, land-grant research university in Santa Barbara County, California, Santa Barbara, California with 23,196 undergraduate ...
and
Northeastern University Northeastern University (NU) is a private university, private research university with its main campus in Boston. Established in 1898, the university offers undergraduate and graduate programs on its main campus as well as satellite campuses in ...
researchers Engin Kirda, Christopher Kruegel and Giovanni Vigna.Lennon, Mik
Lastline Raises $10 Million to Help Combat Targeted Attacks
''SecurityWeek''. March 4, 2015
In 2014, WatchGuard Technologies, Inc. joined the Lastline Defense Program to combat advanced malware targeting businesses by providing primary functionality for APT blocking, available on their unified threat management (UTM) and next generation firewall (NGFW) products. WatchGuard utilizes Lastline's next generation cloud-based sandbox, powered by full-system emulation, which inspects objects for unknown malware crafted to evade detection. Lastline was featured at the 2014
RSA Conference The RSA Conference is a series of IT security conferences. Approximately 45,000 people attend one of the conferences each year. It was founded in 1991 as a small cryptography conference. RSA conferences take place in the United States, Europe, Asia ...
in San Francisco. That same year, Giovanni Vigna, CTO at Lastline, appeared at the Cyber Security Expo in a keynote presentation that analyzed evasive malware techniques.
Juniper Networks Juniper Networks, Inc. is an American multinational corporation headquartered in Sunnyvale, California. The company develops and markets networking products, including routers, switches, network management software, network security products, ...
began integrating with Lastline to expand the capability of its Spotlight Secure platform in 2014. In February 2015, Lastline announced a partnership and technology integration with
Carbon Black Carbon black (subtypes are acetylene black, channel black, furnace black, lamp black and thermal black) is a material produced by the incomplete combustion of coal and coal tar, vegetable matter, or petroleum products, including fuel oil, fluid ...
in an effort to facilitate automated and comprehensive end-to-end endpoint and network security for email, web, files and mobile applications.


Funding

In 2013, Lastline raised $10 million in funding led by
venture capital Venture capital (often abbreviated as VC) is a form of private equity financing that is provided by venture capital firms or funds to startups, early-stage, and emerging companies that have been deemed to have high growth potential or which ha ...
firms
Redpoint Ventures Redpoint Ventures is an American venture capital firm focused on investments in seed, early and growth-stage companies. History The firm was founded in 1999 and is headquartered in Menlo Park, California, with offices in San Francisco, Los Ange ...
and E.ventures, now known as
Headline The headline or heading is the text indicating the content or nature of the article below it, typically by providing a form of brief summary of its contents. The large type ''front page headline'' did not come into use until the late 19th centur ...
Redpoint Ventures led the
Series B A venture round is a type of funding round used for venture capital financing, by which startup companies obtain investment, generally from venture capitalists and other institutional investors. The availability of venture funding is among the ...
round with a $9 million investment, while existing investor E.ventures provided the remainder. In 2014, Lastline raised $10 million from new investors Dell Ventures and Presidio Ventures, as well as existing investors Redpoint Ventures and E.ventures. With the new round of funding, Lastline will continue to focus on serving its growing global enterprise customer base as well as new and existing partnerships to improve
information security Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorize ...
and threat intelligence worldwide. This round of funding adds to the $13.7 million raised in earlier rounds to bring total funding raised to nearly $24 million since the company's founding in 2011. On June 4, 2020 Lastline announced that they entered into a definitive agreement to be acquired by
VMware VMware, Inc. is an American cloud computing and virtualization technology company with headquarters in Palo Alto, California. VMware was the first commercially successful company to virtualize the x86 architecture. VMware's desktop software ru ...
. The acquisition was expected to be finalized by July 31, 2020.


Offerings

* Lastline Breach Detection Platform provides businesses with automated detection of active data breaches. * Lastline Knowledge Base (LLKB) allows for access of information regarding historical data breach events, related IP addresses, and indicators of compromise (IOCs) for malware linked to an advanced threat incident.


Lastline Labs

From May 2013 to May 2014, Lastline researchers studied hundreds of thousands of malware samples, testing new malware against 47 vendors’ AV signatures featured in
VirusTotal VirusTotal is a website created by the Spanish security company Hispasec Sistemas. Launched in June 2004, it was acquired by Google in September 2012. The company's ownership switched in January 2018 to Chronicle, a subsidiary of Google. Viru ...
to determine which caught the malware samples, and how quickly. They found that, on any given day, at least half of the AV scanners it tested failed to detect new malware and after two months, a third of the scanners were still not detecting it.Dunn, John E
Antivirus software can't keep up with new malware, Lastline Labs analysis finds
''tech world''. March 4, 2015


See also

*
Artificial Intelligence Artificial intelligence (AI) is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machines, as opposed to intelligence displayed by animals and humans. Example tasks in which this is done include speech re ...
*
Computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
*
Countermeasure (computer) In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so ...
*
IT risk Information technology risk, IT risk, IT-related risk, or cyber risk is any risk related to information technology. While information has long been appreciated as a valuable and important asset, the rise of the knowledge economy and the Digital Re ...
*
Machine learning Machine learning (ML) is a field of inquiry devoted to understanding and building methods that 'learn', that is, methods that leverage data to improve performance on some set of tasks. It is seen as a part of artificial intelligence. Machine ...
*
Malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depri ...
*
Network Behavior Anomaly Detection #REDIRECT Network behavior anomaly detection {{Rcatshell, {{R from move{{R from alternative capitalisation ...
*
Threat (computer) In computer security, a threat is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application. A threat can be either a negative " intentional" event (i.e. hacking: ...


References


External links

* {{DEFAULTSORT:Lastline Computer security software companies Computer security companies specializing in botnets Computer forensics Computer security companies Operating system security