Predict your next investment

MOBILE & TELECOMMUNICATIONS | Mobile Software & Services / Security
marblesecurity.com

See what CB Insights has to offer

Founded Year

2005

Stage

Series B | Dead

Total Raised

$31.6M

Last Raised

$22M

About Marble Security

Marble Security, formerly Ironkey, offers a mobile security management platform that prevents sophisticated attacks on enterprise networks. By combining primary research from our lab with a real-time, big data engine, Marble learns and adapts to emerging threats before widespread attacks can be launched.

Marble Security Headquarter Location

5150 El Camino Real Suite C31

Los Altos, California, 94022,

United States

650-492-4055

Latest Marble Security News

Proofpoint Unveils TAP Mobile Defense to Secure Organizations From Malicious Mobile Applications

Aug 5, 2015

August 05, 2015 -- SUNNYVALE, Calif., Aug. 5, 2015 (GLOBE NEWSWIRE) -- Proofpoint, Inc., (NASDAQ:PFPT), a leading next-generation security and compliance company, today announced from Black Hat USA 2015 (booth #111) the availability of Proofpoint Targeted Attack Protection (TAP) Mobile Defense, providing security teams with the ability to stop malicious Android and iOS mobile apps before they compromise sensitive data. Proofpoint TAP Mobile Defense leverages technology assets recently acquired from Marble Security and extends Proofpoint's proven threat intelligence and advanced threat protection for email and social media security. "Targeted attacks have historically been conducted over email and social media, but attackers have found a new and lucrative threat vector, malicious mobile apps," said David Knight, executive vice president and general manager of Information Security Products for Proofpoint. "By tricking users into downloading their malicious apps, attackers can siphon off private data including email content, contacts and other personal details. Proofpoint TAP Mobile Defense allows cybersecurity teams to detect and stop bad apps before sensitive data is compromised. " According to recent Marble Security research, more than 30 percent of Android apps are capable of leaking users' private data, and many iOS apps are vulnerable. In addition, a new class of mobile malware, exemplified by WireLurker, Masque and others, exposes organizations to sensitive data loss by allowing cybercriminals and hostile governments to target Android and iOS users. These attacks socially engineer mobile users into serving as entry points to corporate data repositories, including SharePoint and file shares, which are increasingly accessed by mobile devices. Research has also found that many apps, even in legitimate app stores, are mining private data and sending the information to unauthorized servers around the world. This exposes companies to data loss, compliance violations and future targeted attacks. With Proofpoint TAP Mobile Defense, IT administrators can detect apps with risky behaviors. Proofpoint TAP Mobile Defense can also proactively remove malicious apps by leveraging its tight integration with the leading enterprise mobility management (EMM) platforms, including MobileIron and AirWatch by VMware. In addition, TAP Mobile Defense intelligence integrates with Proofpoint Targeted Attack Protection , which uses the latest in big data anomaly detection and advanced malware sandboxing to protect users from sophisticated, targeted attacks—regardless of the channel the attackers try. "We are committed to bringing our customers innovation to power their strategic mobility initiatives and by joining forces with Proofpoint, we will be able to better serve companies battling new malware," said John Spencer, vice president of Ecosystem, MobileIron. Proofpoint TAP Mobile Defense: Integrates into the leading enterprise mobility management platforms including AirWatch and MobileIron. Combines comprehensive, correlated threat intelligence (across multiple data sources) with an adaptive engine to assess mobile app risk within the world's app stores. Insight allows enterprises to detect side loading and suspicious enterprise-signed apps. Offers three levels of privacy controls to keep employee apps and content completely private. The Proofpoint purchase of Marble Security technology assets for $8.5 million is expected to have no material impact to the financial guidance provided during Proofpoint's recent earnings call on July 23, 2015. For more information, visit www.proofpoint.com/us/solutions/products/targeted-attack-protection . About Proofpoint, Inc. Proofpoint Inc. (NASDAQ:PFPT) is a leading next-generation security and compliance company that provides cloud-based solutions for comprehensive threat protection, incident response, secure communications, social media security, compliance, archiving and governance. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system. Proofpoint protects against phishing, malware and spam, while safeguarding privacy, encrypting sensitive information, and archiving and governing messages and critical enterprise information. More information is available at www.proofpoint.com . Proofpoint is a registered trademark of Proofpoint, Inc. in the U.S. and/or other countries. All other trademarks contained herein are the property of their respective owners. Forward-Looking Statements This press release contains forward-looking statements that involve risks and uncertainties. These forward-looking statements include statements regarding future offerings and solutions and the features of such offerings and solutions. It is possible that future circumstances might differ from the assumptions on which such statements are based. Important factors that could cause results to differ materially from the statements herein include: technical challenges in implementing future product offerings and solutions in a timely fashion; disagreements with technology partners such as the EMMs; changes in strategy; unforeseen delays in developing new technologies and the uncertain market acceptance of new products or features; and the other risk factors set forth from time to time in our filings with the SEC, including our Quarterly Report on Form 10-Q for the three months ending June 30, 2015, and the other reports we file with the SEC, copies of which are available free of charge at the SEC's website at www.sec.gov or upon request from our investor relations department. All forward-looking statements herein reflect our opinions only as of the date of this release, and Proofpoint undertakes no obligation, and expressly disclaims any obligation, to update forward-looking statements herein in light of new information or future events. CONTACT: MEDIA CONTACT:

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Expert Collections containing Marble Security

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Marble Security is included in 1 Expert Collection, including Cybersecurity.

C

Cybersecurity

4,589 items

Marble Security Patents

Marble Security has filed 2 patents.

patents chart

Application Date

Grant Date

Title

Related Topics

Status

5/2/2009

8/6/2013

Cryptography, Disk encryption, Cryptographic attacks, Block ciphers, Key management

Grant

00/00/0000

00/00/0000

Subscribe to see more

Subscribe to see more

Subscribe to see more

Application Date

5/2/2009

00/00/0000

Grant Date

8/6/2013

00/00/0000

Title

Subscribe to see more

Related Topics

Cryptography, Disk encryption, Cryptographic attacks, Block ciphers, Key management

Subscribe to see more

Status

Grant

Subscribe to see more

CB Insights uses Cookies

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.