Blackpoint Cyber company logo

The profile is currenly unclaimed by the seller. All information is provided by CB Insights.

blackpointcyber.com

Founded Year

2014

Stage

Series C | Alive

Total Raised

$24.25M

Last Raised

$10M | 2 mos ago

About Blackpoint Cyber

Blackpoint Cyber develops cyber security products and secure enterprise collaboration systems. The company specializes in enterprise cyber defense product development. Blackpoint Cyber was founded in 2014 and is based in Ellicott City, Maryland.

Blackpoint Cyber Headquarter Location

6031 University Blvd. Suite 230

Ellicott City, Maryland, 21043,

United States

410-203-1604

ESPs containing Blackpoint Cyber

The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.

EXECUTION STRENGTHMARKET STRENGTHLEADERHIGHFLIEROUTPERFORMERCHALLENGER
Consumer & Retail / Cybersecurity

Companies in this market are outsourced security providers that typically rely on log monitoring, behavioral analysis, security analytics, threat detection, forensics, and incident response solutions to monitor and protect their retail clients’ IT environments.

Blackpoint Cyber named as Challenger among 9 other companies, including BlueVoyant, Arctic Wolf Networks, and Red Canary.

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Expert Collections containing Blackpoint Cyber

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Blackpoint Cyber is included in 1 Expert Collection, including Cybersecurity.

C

Cybersecurity

5,091 items

Blackpoint Cyber Patents

Blackpoint Cyber has filed 5 patents.

The 3 most popular patent topics include:

  • Computer network security
  • Computer networking
  • Network management
patents chart

Application Date

Grant Date

Title

Related Topics

Status

6/16/2017

8/21/2018

Computer network security, Network protocols, Network management, Computer networking, Networking hardware

Grant

Application Date

6/16/2017

Grant Date

8/21/2018

Title

Related Topics

Computer network security, Network protocols, Network management, Computer networking, Networking hardware

Status

Grant

Latest Blackpoint Cyber News

Microsoft ‘Follina’ Office Vulnerability: How To Prevent It

Jun 1, 2022

Here are the steps Microsoft and MSP security stalwarts Huntress, ThreatLocker, Sophos and Blackpoint Cyber are recommending to MSPs to prevent the Follina zero-day vulnerability from wreaking havoc. By Steven Burke, Jay Fitzgerald  June 01, 2022, 12:11 PM EDT MSPs Rush To Close ‘Follina’ Office Vulnerability MSPs are moving quickly to implement steps to prevent the Microsoft Office zero-day vulnerability referred to as Follina from being exploited by cybercriminals. US itek, a Buffalo, N.Y.-based MSP, for example, is implementing a ringfencing update from security software provider ThreatLocker that blocks access to the Microsoft Diagnostics Tool (MSDT), which can be exploited by attackers. “ThreatLocker is keeping its MSPs ahead of the curve by providing a template to secure new vulnerabilities like Follina within hours of those zero-day vulnerabilities being disclosed,” said Stinner. “Ringfencing and whitelisting have changed the game for us. We no longer have to spend hundreds of hours making changes and updates to every system that we manage to prevent a zero-day vulnerability. With ThreatLocker we have a framework that makes it easy to protect our customers.” US itek has made ThreatLocker a mandatory requirement for customers, said Stinner. “We have ThreatLocker on every computer we manage so when there is a new exploit we just implement the new policy,” he said. CNWR, a Toledo, Ohio, MSP, has moved swiftly to remove the Microsoft Diagnostics Tool with Kelvin Tegelaar’s Powershell snippet, said CNWR President Jason Slagle. He expects a Microsoft patch for the vulnerability to be released quickly which his team will implement. News of the zero-day vulnerability in Microsoft Office first surfaced over the weekend, when Japanese security vender Nao Sec warned of the threat in a tweet. Interesting maldoc was submitted from Belarus. It uses Word's external link to load the HTML and then uses the "ms-msdt" scheme to execute PowerShell code. https://t.co/hTdAfHOUx3 pic.twitter.com/rVSb02ZTwt Among others, Huntress over the holiday weekend issued a “rapid response,” warning that there was no patch yet for the vulnerability and urging people to be “extra vigilant when opening up any attachments, particularly Word documents.” By Monday, Microsoft confirmed the problem in a blog post , warning of potential dangers, offering extra guidance and urging MSPs and IT administrators to disable Microsoft Diagnostics Tool (MSDT) URL protocol. In addition, Microsoft advised customers with Microsoft Defender Antivirus to turn-on cloud-delivered protection and automatic sample submission. Kyle Hanslovan, the CEO of MSP threat researcher Huntress, says he considers ‘Follina,’ as the Microsoft zero-day vulnerability is now being called, a serious enough threat to immediately implement a suggested temporary fix and to warn employees not to open suspicious email attachments. “This is going to allow hackers to get into your computer more easily if you open a document from somebody untrusted,” he said in an interview with CRN. “Even worse, they’re sometimes using people’s legitimate emails that they’ve already hacked to send an email that looks more trusted. That makes it even harder to identify.” Microsoft’s Security Response Center, for its part, confirmed that the “remote code execution vulnerability” exists when MSDT is called using the URL protocol from an application such as Microsoft Word. “An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application,” said Microsoft. “The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights.” Here are the steps Microsoft, Huntress and ThreatLocker recommend MSPs take to prevent Follina from being exploited by cybercriminals.

Blackpoint Cyber Web Traffic

Rank
Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

Blackpoint Cyber Rank

  • When was Blackpoint Cyber founded?

    Blackpoint Cyber was founded in 2014.

  • Where is Blackpoint Cyber's headquarters?

    Blackpoint Cyber's headquarters is located at 6031 University Blvd., Ellicott City.

  • What is Blackpoint Cyber's latest funding round?

    Blackpoint Cyber's latest funding round is Series C.

  • How much did Blackpoint Cyber raise?

    Blackpoint Cyber raised a total of $24.25M.

  • Who are the investors of Blackpoint Cyber?

    Investors of Blackpoint Cyber include WP Global Partners, Paycheck Protection Program, Maryland Venture Fund, Telcom Ventures, Adelphi Capital and 3 more.

  • Who are Blackpoint Cyber's competitors?

    Competitors of Blackpoint Cyber include Todyl.

You May Also Like

Perimeter 81 Logo
Perimeter 81

Perimeter 81 provides Security Service Edge (SSE) and Zero Trust Network Access (ZTNA) solutions. Its platform offers instant deployment, unified management, and 360-degree visibility services. It serves customers operating across a wide range of industries, including healthcare and financial. It was founded in 2018 and is based in Tel Aviv, Israel.

Todyl Logo
Todyl

Todyl offers cybersecurity solutions through a global network cloud platform.

P
Perch Security

Perch Security is a Tampa, FL-based information security company that offers a community defense platform that allows small and midsize businesses to consume and automate whatever intelligence sources they choose – all without purchasing expensive security tools or increasing staff.On November 5, 2020 Perch Security was acquired by ConnectWise at a valuation of $80M.

R
Rapid Fire Tools

Rapid Fire Tools develops and sells IT software tools. Network Detective, the company's flagship product, is a non-intrusive IT assessment tool that acquires network data about computers, devices, users, applications and configurations without the need to install probes or agents.

SentinelOne Logo
SentinelOne

SentinelOne (NYSE: S) delivers autonomous endpoint protection through a single agent that prevents, detects, responds, and hunts attacks across all major vectors. Designed for ease of use, the S1 platform saves customers time by applying AI to automatically eliminate threats in real-time for both on-premise and cloud environments and provides full visibility across networks directly from the endpoint.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.