SafeBreach announced on May 8 that it raised $15 million in a Series B round of funding to help advance the company’s breach and attack simulation platform technologies.
The funding round was led by Draper Nexus and included the participation of PayPal, Sequoia Capital, Deutsche Telekom Capital Partners and HPE Pathfinder. The new funding brings total funding to date for the company to $36 million, including SafeBreach’s $15 million Series A round that was announced in July 2016.
“We want to help our customers have discussions with their boards that will be data driven, out of the simulations that we run,” Guy Bejerano, CEO and co-founder of SafeBreach, told eWEEK. “We also want to help drive security strategy, improve operational efficiency and prioritization.”
SafeBreach launched its platform in January 2016, with capabilities to help organizations simulate attacks in an effort to identify potential security risks. At the core of the platform is the company’s Hackers’ Playbook, which aims to replicate the same approaches used by hackers to infiltrate networks.
SafeBreach is now also expanding its simulation platform to be aligned with the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework and US-CERT alerts. MITRE’s ATT&CK framework provides a model for hacker behaviors that organizations can use to test against for cyber-resilience.
“We’re now mapping our simulation to the MITRE framework,” Bejerano said. “It helps customers set policies and identify things they want to look at.”
Security testing and simulation can also play an important role for different security compliance requirements. Bejerano said organizations are continuously running simulations to validate security controls, which puts them in good position for different types of compliance, including Payment Card Industry Data Security Standard (PCI DSS) audits.
The European Union’s General Data Protection Regulation (GDPR) has also been a driver for SafeBreach’s business in recent months, as organizations look at ways of properly reporting their state of security preparedness.
“CISOs [chief information security officers] are being asked a lot about GDPR, and part of that is understanding the security posture,” Bejerano said.
are multiple ways that organizations can find security threats and flaws lurking within an enterprise infrastructure. An increasingly popular way is via a bug bounty program, where third-party researchers are awarded a “bounty,” or financial award, for responsibly disclosing a flaw. Bejerano said the SafeBreach approach that simulates attacks is complementary to having a bug bounty program.
“We run continuously inside of an organization without bias,” he said. “We provide an automated system that runs the full Hackers’ Playbook, which is a bit different than a penetration tester that comes for a period of time to run a process on a testing environment.”
Looking beyond just identifying areas of potential risk via an attack simulation, Bejerano said SafeBreach now also provides multiple approaches to help organizations with remediation as well. SafeBreach can plug into security orchestration platforms including Phantom and Demisto to help with remediation. Bejerano added that SafeBreach also integrates with trouble ticket systems such as ServiceNow and Jira to help support security remediation workflows.
Looking forward, Bejerano said the SafeBreach platform will continue to improve to deliver more insights from data and enhance threat prioritization capabilities.
“The main goal for us is not just to run simulations and test controls, but rather to help organizations solve gaps and understand security posture,” he said.
Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.