Uptycs company logo

The profile is currenly unclaimed by the seller. All information is provided by CB Insights.

uptycs.com

Founded Year

2015

Stage

Series C | Alive

Total Raised

$93M

Last Raised

$50M | 1 yr ago

About Uptycs

Uptycs develops a fast way to deploy osquery at scale. The company provides a cloud solution for system management, anomaly detection, and incident response using a robust analytics platform and out-of-the-box integration with threat intelligence.

Uptycs Headquarter Location

404 Wyman Street Suite 357

Waltham, Massachusetts, 02451,

United States

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Expert Collections containing Uptycs

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Uptycs is included in 1 Expert Collection, including Cybersecurity.

C

Cybersecurity

4,937 items

Latest Uptycs News

Uptycs releases new CDR functionality to help organizations detect malicious behaviors

Jul 28, 2022

Uptycs releases new CDR functionality to help organizations detect malicious behaviors Uptycs released new cloud detection and response (CDR) capabilities for detecting and remediating sophisticated attacks against cloud infrastructure. The new CDR feature will help organizations detect malicious behaviors such as discovery, privilege escalation, remote code execution, and data exfiltration in their AWS cloud environment. Attackers that have cloud credentials typically need to discover what is in the environment and escalate their privileges before they can achieve their goal, whether stealing data, installing coin mining software, or deploying ransomware. As they go about reconnoitering the environment and move laterally their activity is frequently logged, but someone with cloud security expertise needs to examine the sequence of events to discern malicious behavior. The new Uptycs CDR capabilities automate this analysis, alerting cloud security teams to attacks in progress. “Threat actors today have become cloud experts. Their tactics and techniques are evolving quicker than most want to believe. When (not if) a threat actor steals credentials to your cloud environment, time is of the essence to detect their activity before they achieve their goal,” says Andre Rall, Director of Cloud Security at Uptycs. “The new CDR function in Uptycs evens the playing field for defenders, giving them automated expertise so they can detect and respond to these sophisticated threats.” “Detection and response capabilities are essential to reducing risk and securing cloud infrastructure,” says Ganesh Pai, Co-Founder and CEO at Uptycs. “Our vision is to enable companies to innovate with cloud-native applications in a secure manner. That means securing the entire cloud-native application lifecycle, from the point where the code is written on developers’ laptops to the application workload run in the cloud. CDR plays a critical role, providing security teams with the ability to quickly detect stealthy attacks against cloud infrastructure as they unfold.” Uptycs CDR detections correlate discrete events so that alerts are only fired when there is a high-confidence of malicious behavior. For example, Uptycs correlates together the following sequence of events into a single privilege escalation detection: Using stolen credentials, the attacker uses the CLI and retrieves details about the user whose credentials they’ve stolen The attacker lists the policies attached to that user, along with the number of versions of those policies The attacker gets details about previous policy versions to find one that has elevated privileges The attacker elevates their privileges by reverting to the previous policy version with elevated privileges Daily Newsletter - E-mail sent every business day with a recap of the last 24 hours Weekly Newsletter - E-mail sent every Monday with a recap of the last 7 days (IN)SECURE Magazine - E-mail sent when a new issue is released

Uptycs Web Traffic

Rank
Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

Uptycs Rank

  • When was Uptycs founded?

    Uptycs was founded in 2015.

  • Where is Uptycs's headquarters?

    Uptycs's headquarters is located at 404 Wyman Street, Waltham.

  • What is Uptycs's latest funding round?

    Uptycs's latest funding round is Series C.

  • How much did Uptycs raise?

    Uptycs raised a total of $93M.

  • Who are the investors of Uptycs?

    Investors of Uptycs include Sapphire Ventures, Norwest Venture Partners, ServiceNow Ventures, Comcast Ventures, ForgePoint Capital and 4 more.

  • Who are Uptycs's competitors?

    Competitors of Uptycs include Anvilogic, Swimlane, Securonix, Lacework, Mitiga, Sysdig, Panther Labs, Aqua Security, Stellar Cyber, Wiz and 12 more.

You May Also Like

W
Wiz

Wiz operates as a cloud security company that allows companies to secure their cloud infrastructure at scale. Wiz delivers a contextual risk assessment of a client's cloud with the aims of enabling a reduction in security alerts, a clear action plan, and cloud hygiene at scale.

Stellar Cyber Logo
Stellar Cyber

Stellar Cyber is a security analytics provider that has created Starlight, a unified security analytics platform designed to be the SOC Command Center for pervasive data collection, breach detection, investigation and response (CDIR). The company's customers are mid-tier and large enterprises and service providers building managed detection and response services for those who don't have in house incident responders.

Securonix Logo
Securonix

Securonix provides enterprises with a security analytics platform that uses Hadoop and machine learning technology to consume, enrich and analyze massive volumes of data to detect and prioritize the highest insider threat, cyber threat, cloud, and fraud attacks automatically and accurately. The company was founded in 2017 and is based in Addison, TX.

Sysdig Logo
Sysdig

Sysdig provides an intelligence platform to deliver monitoring, security, and troubleshooting in a microservices-friendly architecture used by a community of developers, administrators, and other IT professionals looking for visibility into systems and containers.

Exabeam Logo
Exabeam

Exabeam complements existing security information and event management and log management systems with machine-learning technology that focuses on attacker behavior rather than malware and tools to detect modern cyberattacks. Exabeam's user behavior analytics solution leverages existing log data to quickly detect advanced attacks, prioritize incidents and guide effective response. The company's Stateful User Tracking automates the work of security analysts by resolving individual security events and behavioral anomalies into a complete attack chain. The firm primarily serves retail banks, investment banks, academic institutions, retail, and technology firms. It was founded in 2013 and is based in Foster city, California.

C
Cado Security

Cado Security is a software platform for responding to cyber-security incidents and performing digital forensics.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.