Agari Data company logo

The profile is currenly unclaimed by the seller. All information is provided by CB Insights.

agari.com

Founded Year

2009

Stage

Acquired | Acquired

Total Raised

$86.5M

About Agari Data

Agari protects brands and people from phishing and socially-engineered attacks. Using applied data science and a diverse set of signals, Agari protects the workforce from inbound business email compromise, supply chain fraud, spear phishing, and account takeover-based attacks, reducing business risk and restoring trust to the inbox. Agari also prevents spoofing of outbound email from the enterprise to customers, increasing deliverability and preserving brand integrity.On May 13th, 2021, Agari was acquired by HelpSystems. The terms of the transaction were not disclosed.

Agari Data Headquarter Location

950 Tower Lane

Foster City, California, 94404,

United States

650-627-7667

ESPs containing Agari Data

The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.

EXECUTION STRENGTHMARKET STRENGTHLEADERHIGHFLIEROUTPERFORMERCHALLENGER
Healthcare / Cybersecurity

In this market, companies reduce the risk associated with the cybersecurity X-factor — human behavior — by providing cyber training solutions, insider risk detection, phishing defense, and employee risk mapping.

Agari Data named as Leader among 8 other companies, including Proofpoint, IRONSCALES, and Abnormal Security.

EXECUTION STRENGTHMARKET STRENGTHLEADERHIGHFLIEROUTPERFORMERCHALLENGER
Consumer & Retail / Cybersecurity

In this market, companies reduce the risk associated with the cybersecurity X-factor — employee behavior — by providing cyber training solutions, insider risk detection, phishing defense, and employee risk mapping.

Agari Data named as Leader among 8 other companies, including Proofpoint, IRONSCALES, and Rangeforce.

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Research containing Agari Data

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned Agari Data in 3 CB Insights research briefs, most recently on Sep 24, 2020.

Expert Collections containing Agari Data

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Agari Data is included in 4 Expert Collections, including AI 100.

A

AI 100

100 items

A

Artificial Intelligence

8,718 items

This collection includes startups selling AI SaaS, using AI algorithms to develop their core products, and those developing hardware to support AI workloads.

C

Cybersecurity

5,067 items

D

Digital Health

13,030 items

Technologies, platforms, and systems that engage consumers for lifestyle, wellness, or health-related purposes; capture, store, or transmit health data; and/or support life science and clinical operations. (DiME, DTA, HealthXL, & NODE.Health)

Agari Data Patents

Agari Data has filed 19 patents.

The 3 most popular patent topics include:

  • Spamming
  • Email
  • Computer network security
patents chart

Application Date

Grant Date

Title

Related Topics

Status

5/30/2018

8/24/2021

Financial risk modeling, Optimization algorithms and methods, Spamming, Fraud, Email

Grant

Application Date

5/30/2018

Grant Date

8/24/2021

Title

Related Topics

Financial risk modeling, Optimization algorithms and methods, Spamming, Fraud, Email

Status

Grant

Latest Agari Data News

Your corporate email isn’t as safe as you think

Feb 21, 2020

Global losses from business email compromises increased 100% from May 2018 to July 2019, according to the FBI, which recorded 166,349 incidents from June 2016 to July 2019 and US$26.2bil (RM109.81bil) in losses during that period. — AZMAN GHANI/The Star The discovery of an alleged international ring of fraudsters started with a one-line email. In April 2019, a company accountant received an email that appeared to be from the chief executive officer. "Joanna, Can you mail out a check to to a Vendor today? Barbara,” the email said. The email had some hallmarks of a scam that is becoming increasingly common. But it also had a few unique attributes that intrigued cybersecurity experts at the company’s email security provider, Agari Data Inc. Using a fake email account posing as the company accountant, Agari sent back a reply. "Hi Barbara, Yes, of course. Please send me the details for the payment and I will take care of it ASAP. Joanna,” the reply said. Over the next several months, Agari said it was able to unravel what’s known as a business email compromise operation. Agari dubbed the group sending the emails Exaggerated Lion, and said its members were based in Nigeria, Ghana and Kenya. Between April and August 2019, Exaggerated Lion targeted more than 3,000 people at nearly 2,100 companies, all of them in the US, according to an Agari report published Feb 20. Similar email attacks are growing problem in the US, according to the latest Federal Bureau of Investigation report, but one that doesn’t get the headlines of state-sponsored hacks or ransomware attacks. Global losses from business email compromises increased 100% from May 2018 to July 2019, according to the FBI, which recorded 166,349 incidents from June 2016 to July 2019 and US$26.2bil (RM109.81bil) in losses during that period. In one of its simplest forms, a business email compromise operator will send an email posing as the chief executive officer to an accounts payable department with an urgent request to transfer funds or fulfill a fake invoice. In another example, payroll representatives will receive an email appearing to be from an employee requesting to update their direct deposit information – often to a prepaid card account. Companies often realise something is amiss only when it’s too late to recover the transferred funds. "We think of business email compromise as any attack which claims to be someone you know and trust and is attempting some kind of theft,” said Patrick Peterson, Agari’s founder and chief executive officer, in an online video. "This has been far too successful.” Leveraging its position as an email security provider, Agari can sometimes see email scams that target its customers as they happen. In some cases, the company intervenes to communicate with the fraudster, posing as a clueless employee in order to draw out more details. That’s what happened with Exaggerated Lion, when the operation sent the email to the company, which Agari declined to name, last April. In the months that followed, Agari said it engaged with Exaggerated Lion more than 200 times, and discovered the identity of 28 "mules” used to ferry payments between victims and the group itself. Mules are primarily recruited by Exaggerated Lion under the pretense of romance and likely unaware they are participating in a criminal enterprise, the company said. "These romance-victims-turned-money-mules are told they are helping their romantic partner recover a large inheritance that is tied up with lawyers and is being distributed slowly over time,” according to Agari. In one exchange with a mule included in Agari’s report, a member of Exaggerated Lion wrote, "Okay honey please put the cash in big envelope and seal it before taking to FedEx.” The unnamed mule responded, "Honey, that’s a lot of money to send cash that’s a heck of a liability it could be lost anywhere.” Exaggerated Lion’s representative then wrote, "It can’t honey. As long as you insure it. And I’ve received more than that through cash mailing when my dad was still alive.” Agari declined to say how it obtained the digital conversations. As the fake relationship progresses, mules are asked to launder increasingly larger sums of money, according to Agari. Once an unsuspecting business parts with its cash, through a paper cheque or wire transfer, Exaggerated Lion’s mules have a variety of ways to get the money back to them. Once a physical cheque is cashed, the money can be delivered to Exaggerated Lion via traditional money transfer, Bitcoin, or gift cards, according to Agari. Agari said it turned its information on the mules over to financial partners and law enforcement. Exaggerated Lion began operating in 2014 by running cheque scams on Craigslist and has since become more sophisticated, according to the report. One scam the group allegedly operated for years involved recruiting people to wrap their car with marketing decals for a beverage company in exchange for a fixed amount of money every week. Participants, who responded to an online ad or email, would be sent a fake cheque, which included the first month’s pay and money for a specialist to place advertisements on the car. Respondents were then instructed to keep the first month’s pay and wire the money to the "specialist”, who was really a money mule or a member of Exaggerated Lion, according to Agari. What makes Exaggerated Lion unique in the world of business email compromise is its preference for physical cheques, a payment method the group had "experience and comfort with”, according to Agari. Paper cheques may be helpful in evading systems designed to detect fraudulent wire transfers. Exaggerated Lion requests these cheques to be sent as fast as possible, through an overnight mail service, according to exchanges contained in the Agari report. But when a victim is hesitant about sending a cheque, Exaggerated Lion is quick to suggest a bank account to wire money to, according to the report. Exaggerated Lion also used fake invoices, created using a free invoice generator, and W-9s, publicly available on the Internal Revenue Service website, "to inject a sense of authenticity in their attacks,” according to Agari. The group also used Google’s enterprise email service to send more emails, the security company said. "Google doesn’t start charging for G Suite until after the first month,” Agari said in its report. "This means Exaggerated Lion can create a new G Suite account, add compromised credit card information as a payment method, and effectively have at least a 30-day free trial on each domain they set up.” If the credit card doesn’t work, the group "can simply move on to another account”, Agari wrote. With a Google Enterprise account, Exaggerated Lion can send 2,000 emails a day, four times more than a regular gmail account. Google declined to comment. Among the mules identified by Agari was 63-year-old Reuben Alvarez Sr., of Beaumont, Texas, who was arrested in October 2019 and accused of laundering more than US$100,000 (RM419,160), nearly US$70,000 (RM293,412) of which came from the United Methodist Church, according to a probable cause affidavit from the Jefferson County Sheriff’s Office. The rest came from small-to-medium-sized businesses, such as an insurance company in Ohio and golf courses in Alabama, who were all victims of a business email compromise scam, according to the affidavit. Agari said its researchers discovered 14 messages where Exaggerated Lion directed its targets to send money to Alvarez’s bank accounts. Alvarez’s case is pending and he hasn’t yet entered a plea, according to the district attorney’s office. Neither Alvarez nor his attorney could be located for comment. In an interview with a detective, Alvarez said the money he received came from a woman he believed to be named "Peggy Smith”, who lived in Washington State. Alvarez said he knew Smith from chatting online for three or four years but had never met her in person. Alvarez told the detective that he assumed the money came as part of Smith’s inheritance payments after her parents died. But Alvarez said he knew his activities constituted a crime, according to the affidavit. When the detective drove Alvarez home, he handed over a package he had received the day before: it contained a US$25,647 (RM107,501) cheque from a Tennessee health care company. – Bloomberg We're sorry, this article is unavailable at the moment. If you wish to read this article, kindly contact our Customer Service team at 1-300-88-7827. Thank you for your patience - we're bringing you a new and improved experience soon!

Agari Data Web Traffic

Rank
Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

Agari Data Rank

  • When was Agari Data founded?

    Agari Data was founded in 2009.

  • Where is Agari Data's headquarters?

    Agari Data's headquarters is located at 950 Tower Lane, Foster City.

  • What is Agari Data's latest funding round?

    Agari Data's latest funding round is Acquired.

  • How much did Agari Data raise?

    Agari Data raised a total of $86.5M.

  • Who are the investors of Agari Data?

    Investors of Agari Data include HelpSystems, Battery Ventures, Alloy Ventures, First Round Capital, Greylock Partners and 6 more.

  • Who are Agari Data's competitors?

    Competitors of Agari Data include Vade, IRONSCALES, PhishLabs, Kenna Security, INKY and 8 more.

You May Also Like

Valimail Logo
Valimail

Valimail delivers fully automated email authentication as a cloud service, bringing easy, accessible, and trusted messaging to all organizations. Valimail, using its patented technology, delivers it in fast time. Additionally, email authentication strengthens existing SEGs, adding a highly effective layer of protection, reducing the overall threat surface.

Cofense Logo
Cofense

Cofense provides threat management for organizations concerned about human susceptibility to advanced targeted attacks. Cofense's intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. The company's open approach ensures that Cofense integrates easily into the security technology stack, demonstrating measurable results to help inform an organization's security decision making process.

IRONSCALES Logo
IRONSCALES

IRONSCALES enables organizations to mitigate the risk associated with the technological, operational and human challenges inherent to phishing attacks. The company's multi-layered and automated approach to prevent, detect, and respond to phishing emails combines micro-learning phishing simulation and awareness training (IronSchool), with mailbox-level phishing detection (IronSights), automated incident response (IronTraps) and real-time automated intelligence sharing (Federation) technologies.

INKY Logo
INKY

INKY is a cloud-based email security platform designed to be far more than just artificially intelligent. INKY recognizes logos, brand colors, and email signatures. It understands email, searches for signs of fraud, and can spot impostors by a pixel.

GreatHorn Logo
GreatHorn

GreatHorn provides a cloud-based email security threat detection and response platform that safeguards organizations before, during, and after an email attack.

Tessian Logo
Tessian

Tessian is an email security platform that uses machine learning to make sure sensitive or confidential data cannot be sent to the wrong individual. The solution scans historical email data to understand conventional usage patterns and behaviors in companies' email systems. By leveraging machine learning, the platform spots anomalies and give users a chance to correct problems before sending without requiring administration or end user behavior change.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.