Based in Japan and India. Has led to 1 successful fundraise in Japan. Been working the space of Venture Capital and Private Equity for the last 3 years.

Awake Security today announced the general availability of its advanced security analytics solution, the only offering to provide deep visibility and answers to questions that cannot even be asked today. The solution’s patent-pending Security Knowledge GraphTM data model uses machine learning and data science to automate painstaking analysis by expert investigators. In early customer deployments with Fortune 500 security teams, Awake has increased productivity by tenfold, enabling teams to detect, investigate and hunt down threats that had previously been missed.

The company also announced today that it has closed more than $30 million in funding from leading venture companies Greylock Partners and Bain Capital Ventures.

Awake Advanced Security Analytics provides security teams with insights needed to immediately understand the extent and impact of observed behavior and to investigate only credible alerts and threats. By eliminating cumbersome tasks during the investigation process, Awake enables analysts to focus on high-value security work, speed up the detection of insider threats, corporate espionage, lateral movement and data exfiltration. By capturing the knowledge and conclusions that the security team develops while performing its work, Awake allows teams to be better and more effective every day; facilitates collaboration, training and evaluation; and makes security work more rewarding.

“Today, security tools generate massive amounts of alerts and data, but have completely failed to account for how useful or contextual the data is for security teams. As a result, analysts need to manually connect dots to hunt for threats, an exhausting process for even the most experienced investigator,” said Gary Golomb, co-founder of Awake and a world-renowned investigator. “Awake is launching a new security operations model by allowing analysts to explore devices instead of IP addresses, people instead of packets, data instead of protocols and activities instead of sessions. This empowers the analyst to target and stop the threats that really matter. “That’s right.

Detecting, Investigating and Hunting for Threats Solutions that are currently missing
Developed on the basis of research involving hundreds of security professionals and more than a dozen Fortune 500 and Global 2000 SOCs, Awake uses machine learning and data science to embody the expertise of the world’s leading researchers in a broad-based analytical solution.

“From business to e-commerce, our digital strategy is transforming our business,” said Richard Noguera, CISO at Gap, Inc. And a design partner for Awake Security “And security is the foundation of our strategy We are constantly looking at the latest techniques and technologies for rapid detection and response of threats. Our partnership with the Awake team has allowed us to provide feedback while working with world-class investigators and security professionals to help design and develop their solutions-a truly refreshing approach. “That’s right.

The Awake Hybrid SaaS architecture has two key components: the Awake Analytics Hub, which is located in an organization’s on-site or cloud environment, and the SaaS back-end hosted in the Awake Cloud, which provides operational monitoring, software upgrades and intelligence updates to each Analytics Hub. Awake’s advanced security analysis is based on a proprietary set of rich parsers that capture and process data that requires no integration other than a simple network connection.

Awake then uses a multidisciplinary approach that leverages patterns, heuristics, and machine learning to build a patented Security Knowledge Graph data model that automatically identifies and tracks real-world entities such as devices, users, and domains. Analysts can then examine this model using a human-friendly vocabulary. The Security Knowledge Graph also captures the findings and findings of team members, improving collaboration and training while preserving otherwise undocumented tribal knowledge.

Security Knowledge Graph enables and enriches EntityIQTM algorithms that surface notable entities within the model and cluster similar ones. Through the wokflow-driven Awake user interface, EntityIQ can also predict questions that analysts are likely to ask, pointing them to the next investigative path quickly and effectively.

Awake’s ActivityIQTM analytics correlates network traffic with data model entities and visualizes the timeline of the attack as a victim would experience it, and as a qualified investigator it would be split together. As a result, Awake eliminates the need to sift through raw data

By offering the ability to accurately understand entities and related activities in near-real time, Awake enables analysts to focus on high-value security work, including:

Network Traffic Analysis: Awake entity-centric view allows analysts to see all network traffic, with devices fingerprinted and tracked across IP addresses. It provides insight into the Internet of Things (IoT), BYO and other non-discoverable devices using log or agent-based approaches. Watchlists created using Awake’s behavioral query language also help detect attacker activity that occurs after an initial compromise, which is often unnoticed today.
Alert Investigations: Analysts can easily rotate from an alert indicator to a deep device understanding This includes behavioral analysis of the device and analysis of similar devices for broader campaign analysis. Analysts know what questions to ask next by looking at the consequential devices associated with the device.
Proactive Threat Hunting: Awake provides investigative starting points for analysts by highlighting notable entities with abnormal behavior The rich and responsive user interface enables efficient hunting by enabling analysts to quickly filter and query the Security Knowledge Graph data model in real time, not only for compromise indicators, but also for entity behaviors and activities.
“When it’s time for a security analyst to roll their sleeves and dive into an incident, a flood of event information from security tools can be more distracting than helpful,” said Eric Ogren, Senior Security Analyst at 451 Research. “The network does not lie, so tapping into network data, automating the analysis and presenting it in such a way as to help connect the dots to the investigation will have a significant impact on empowering analysts to more efficiently clarify the investigations. “That’s right.

Awake Advanced Security Analytics Solution is immediately available. For further information, please visit: http://www Wake up security Come on,

About Security Awake
Awake Security is the only advanced security analytics solution that delivers deep visibility and answers to questions that can’t even be asked today, increasing productivity by tenfold. The company’s patented Security Knowledge GraphTM data model uses machine learning and data science to automate painstaking analyzes by expert investigators. Identifies and tracks network entities as humans think of them, and highlights entity attributes, relationships, behaviors, and activities. This allows analysts to proactively detect, hunt, investigate and respond to threats. Awake is built on the foundation of more than two years of research involving hundreds of security professionals and more than a dozen security teams. The company is supported by Greylock Partners and Bain Capital Ventures and is based in Mountain View, CA.

Please note that this piece of work originally appeared in English at As Investocracy aims to bring global startup news and updates in both English and Japanese to you, it’s important that we attribute original source to you. If you have any questions/concerns please write to us at

Leave a Reply

Your email address will not be published. Required fields are marked *