SEARCH FINANCIAL SERVICES INFRASTRUCTURE SECURITY SCIENCE INTERVIEWS

 

     

JASK Gets Rolling with a $12M Round

June 28, 2017

JASK emergeg from stealth with $12 million in Series A funding. The round was led by Dell Technologies Capital along with TenEleven Ventures. Existing investors Battery Ventures and Vertical Venture Partners also contributed. Deepak JeevanKumar, managing director at Dell Technologies Capital; and, Mark Hatfield, managing partner at TenEleven Ventures, will join JASK's board. The funding allows JASK to expand its data science teams, accelerate product development, and focus on machine learning (ML) and artificial intelligence (AI) research. Founded by cybersecurity veterans Greg Martin and Damian Miller, JASK uses machine learning technology to improve the agility and effectiveness of security operations teams, effectively operating as an AI-enabled analyst.

Humans are the best defense against cyberattacks today. However, there is a shortage of candidates to fill cybersecurity roles. Due to the lack of trained cybersecurity professionals, many organizations spend too much of their time on common malware infections, leaving organizations vulnerable to the targeted threats that matter most. JASK leverages advanced AI to deliver end-to-end network monitoring -- surfacing and triaging the most relevant attacks, while providing a clear picture of the attack surface. JASK enables organizations and their security analysts to spend their limited resources on only the most dangerous threats.

"JASK is dedicated to eliminating the inefficiencies within security operations by equipping security analysts with artificial intelligence," said Greg Martin, co-founder and CEO of JASK. "We are excited to have both Dell Technologies Capital and TenEleven Ventures lead our Series A round; they have identified cybersecurity as a pressing concern and understand the necessity of machine learning technology and AI in driving innovation. This funding allows us to execute on our vision to modernize security operations, and deliver new levels of agility and capability to security teams."

Security operations needs innovation because the gap between attacker capability and what traditional technologies can detect continues to grow for three reasons. First, organizations are becoming more distributed, which stretches and changes the network border. Second, new technologies -- mobile computing, internet-connected smart devices, etc. -- provide hackers with an increasing number of attack surfaces. Finally, hackers continue to develop new forms of attacks at an unrelenting pace. JASK helps close the gap between people and technology by allowing security operations teams to increase the speed with which they can identify and defend against cyberattacks.

"Without AI and machine learning, cybersecurity will continue to be a difficult problem to solve," said Deepak JeevanKumar, managing director at Dell Technologies Capital. "JASK shares that vision, and its experienced leadership team is dedicated to pushing the boundaries of cybersecurity innovation. I look forward to working with the company and team as they progress and enable security analysts to become more effective."

Security operations teams can deploy JASK's cloud platform in just hours and realize immediate results. The platform offers increased clarity about organizations' risks and their implications. By employing machine learning and AI that evolve and automate defenses over time, JASK's platform allows security operations to act with increasing sophistication the longer JASK is in place.

"Modern cyberattacks have evolved rapidly over the years, and security technologies have failed to keep up with the pace of change," said Mark Hatfield, managing partner at TenEleven Ventures. "I'm excited to join JASK because I believe Greg Martin and his team understand the cybersecurity landscape and today's prevalent threats. Defending against today's hackers requires investments in machine learning technology and artificial intelligence. We believe JASK is offering a compelling approach to modernizing enterprise security operations."

Terms of Use | Copyright 2002 - 2017 CONSTITUENTWORKS SM  CORPORATION. All rights reserved. | Privacy Statement