Search company, investor...

Eucalyptus Systems

Founded Year



Acquired | Acquired

Total Raised


About Eucalyptus Systems

Eucalyptus Systems provides IT organizations and technology businesses with a widely deployed cloud software platform for on-premise Infrastructure as a Service (IaaS). Eucalyptus is built as an open source cloud product and is suited for enterprise-class private cloud or hybrid cloud computing. As the architect of the on-premise cloud category, Eucalyptus is enabling cloud starts each year. Eucalyptus customers are achieving the benefits of agility, elasticity, and scale for highly demanding development and test, scalable web services, and big data applications. The platform supports industry-standard Amazon Web Services (AWS) cloud APIs, and all major virtualization platforms.

Headquarters Location

6755 Hollister Ave suite 200

Goleta, California, 93117,

United States


Missing: Eucalyptus Systems's Product Demo & Case Studies

Promote your product offering to tech buyers.

Reach 1000s of buyers who use CB Insights to identify vendors, demo products, and make purchasing decisions.

Missing: Eucalyptus Systems's Product & Differentiators

Don’t let your products get skipped. Buyers use our vendor rankings to shortlist companies and drive requests for proposals (RFPs).

Latest Eucalyptus Systems News

Mickos on Security: Tech Is the Problem, People Are the Solution

Mar 31, 2016

Former MySQL Marten Mickos, now CEO of security vendor HackerOne, admits to a security debt that open-source must now pay. Marten Mickos first made a name for himself as the CEO of a pair of successful open-source vendors—MySQL and Eucalyptus Systems, both of which have been acquired. Now he's the CEO of security vendor HackerOne, and at the Linux Foundation Collaboration Summit keynote on March 29, Mickos publicly apologized for the early security shortcomings of open-source companies, including his own. "I'm here to repay some old security debts because back in the 1990s when Linus [Torvalds] started with Linux, he didn't think about security, and when MySQL started in 1995, we didn't think about security," Mickos (pictured) said. "We just built an easy-to-use, fast, robust database because on the Internet you only had fun things that were not that serious. "The Internet today is very serious and so too is the need for security in all forms of software development, including open source. As such, Mickos said he feels that it's his responsibility to help clean up the state of software security. While software has been shown to have weaknesses, Mickos argued that security technology itself is not the solution. "The security industry is fundamentally flawed," Mickos said. "The world is spending $80 billion a year buying all kinds of hardware and software products that solve some part of security, but still don't provide enough protection. " HackerOne, which Mickos joined in November 2015, is in the bug bounty business, running vulnerability disclosure programs for vendors that reward security researchers for reporting flaws. "For a decade or two, the general thinking has been that humans are weak and have all kinds of flaws and the solution is more technology—just throw more firewalls on your system and it will work," he said. "Now finally we realize that maybe it's the other way around: Tech is the problem and humans are the solution. "In Mickos' view, technology is good at finding well-defined problems, but that's the challenge with modern security—it's not well-defined. He noted that today it's very difficult to know where new bugs will be found, and he believes the best way of finding interesting flaws is with humans.As it turns out, there are humans all over the planet, and by crowdsourcing the collective capability, which is something that open source does well, many problems can be solved, Mickos said. The idea of exposing bugs in the open is one that Mickos strongly believes in, just as he believes in open source. "In the traditional security space you keep your flaws secret, you keep your problems secret, and that's completely wrong," he said.The idea of keeping security open is actually an old idea that needs to be remembered, Mickos said. He noted that Kerckhoffs's principle, which was defined in 1883 by August Kerckhoffs on cryptography, advocates that the design of a system not require secrecy. That said, Mickos said that while the implementation of a system should be open, the keys should remain secret. "It is in openness where security truly happens," he said.By being open and letting people look at code to find flaws, more flaws can be fixed than any one individual or company could do on its own. Mickos noted that by using the stochastic power of crowdsourcing, the ill-defined problems of security will find solutions.From a vendor response perspective, Mickos said speed is of the essence, both for responding to vulnerabilities disclosures and for patching exploits. "An easy way to destroy security is to be slow," he said.Overall, Mickos emphasized that that open-source community, in particular, has a security debt it now needs to pay to fix some of the errors of the past, largely due to the simple fact that security wasn't always a primary focus. In the modern world, he said, security needs to be part of the development process and carry through the software life cycle. "Back in 1990s, we were like open-source hippies—everything was fun and everything was allowed," Mickos said. "Now we need to be responsible open-source citizens and build security into the whole framework of software development. "Sean Michael Kerner is a senior editor at eWEEK and Follow him on Twitter @TechJournalist.

Eucalyptus Systems Frequently Asked Questions (FAQ)

  • When was Eucalyptus Systems founded?

    Eucalyptus Systems was founded in 2007.

  • Where is Eucalyptus Systems's headquarters?

    Eucalyptus Systems's headquarters is located at 6755 Hollister Ave, Goleta.

  • What is Eucalyptus Systems's latest funding round?

    Eucalyptus Systems's latest funding round is Acquired.

  • How much did Eucalyptus Systems raise?

    Eucalyptus Systems raised a total of $55.5M.

  • Who are the investors of Eucalyptus Systems?

    Investors of Eucalyptus Systems include DXC Technology, Benchmark, Headline, New Enterprise Associates, Institutional Venture Partners and 3 more.

  • Who are Eucalyptus Systems's competitors?

    Competitors of Eucalyptus Systems include Ravello Systems and 2 more.

Compare Eucalyptus Systems to Competitors

ElasticHosts Logo

ElasticHosts aims to make flexible virtualization easy. Their offering allows users to configure their cloud infrastructure to match their needs with any web browser, giving them what the company believes is a combination of instant flexibility, ease of use and cost efficiency.

CohesiveFT Logo

CohesiveFT is engaged in onboarding solutions for virtual infrastructure and cloud computing. Their products include Elastic Server, VPN-Cubed, and Context-Cubed as detailed below.Elastic Server - Virtual Server Life Cycle Management (VSLM) framework designed for managing virtual machines from inception, through deployment, and into secure archive for forensics. The Elastic Server supports all major virtual environments - allowing consistent deployment across multiple cloud providers. Elastic Server is available as a web-based On-Demand Edition, On-Premise Edition, and Cloud Hosted Edition.VPN-Cubed - VPN-Cubed, our cloud networking control and security offering, forms the foundation for our Secure Cloud Container Solutions. VPN-Cubed Managers are hybrid devices; they are virtual routers, virtual switches, SSL VPN concentrators, IPSec VPN concentrators, and protocol re-distributors, configurable in a mesh. They can be used to run key business computing topologies that have been moved to a cloud, but need secure access to the corporate datacenter. They can be used to provision development infrastructure on the fly - allowing "N" identical copies of virtual servers to be run simultaneously - identical down to its IP address. Integrating with existing edge and DMZ equipment like IPSec extranet boxes, intrusion prevention, intrusion detection and stateful inspection VPN-Cubed doesn't require new knowledge or training to implement. Enterprise application topologies can be easily deployed in a controlled global network, accessible by staff, customers and partners alike, all under the application owner's control.Context-Cubed - A cloud topology management server that manages Boot-Time commands for launching virtual servers and for controlling running vm's in an overlay network. Contextualization information for each type of server in a topology, and for each target deployment environment is retained in XML form to allow for audit-able versioning and role based security.

Skytap Logo

Skytap helps dev and test teams build better software faster. Skytap Cloud provides self-service access to production-like environments, enabling dev/test teams to test more frequently. The company's collaboration tools enable development teams to identify, share and reproduce software defects significantly faster. Skytap provides IT with full visibility and control in order to enable dev/test teams to be effective while avoiding infrastructure sprawl and runaway costs.

Infinio Systems

Infinio, formerly SilverLining Systems, is developing solutions to disrupt the enterprise storage market. The company provides enterprise-grade, peer-to-peer technology to help large data centers with data and software replication.

Elastra Logo

ELASTRA aims to provide software for designing, deploying, and managing application systems in public and private cloud computing environments. The company's products simplify and automate the complex processes associated with database and application infrastructure.

JetPatch Logo

JetPatch is a cloud-based, centralized patch management platform that lets enterprises follow an industry standard automated vulnerability patching lifecycle — across environments.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.