Posts Tagged ‘Data’

Start-Up Data Storage Firm Actifio Hits $1 Billion Mark

March 24th, 2014

Social networking companies, online game developers and other consumer-focused tech start-ups have attracted huge investor attention, and lofty valuations to boot.

Today, a young start-up, Actifio, is drawing similar investor interest in a decidedly unflashy sector: data storage.

On Monday, Actifio is to announce that it has raised $100 million in new financing, valuing the entire company at $1 billion. That vote of confidence places Actifio in an elite club of start-ups with 10-figure valuations, stepping up the pressure on the company to deliver on its ambitions.

Though little known outside of technology circles, Actifio is rapidly gaining large corporate customers as it attacks a problem that the incumbent data storage firms have been slow to address. Its software, which costs an average of $349,000 for a three-year contract, allows a company access to a virtual version of backup copies of data, freeing up space and improving the overall efficiency of the company’s data storage.

Actifio’s backers draw a comparison to VMware, which was a leader in creating software that was critical to cloud computing. While that expanded the amount of work a single computer server could do, Actifio’s product is aimed at enhancing a data center.

“An idea like this comes along about once a decade,” said Jamie Goldstein, a partner at North Bridge, a venture capital firm that was an initial investor in Actifio and participated in the latest financing round. “Data has become such an important part of the tech economy, and the entire economy. Anybody who is collecting a lot of data is going to be facing this problem.”

Actifio, which was founded in 2009, hopes to go public at some point next year, and its investors are betting on a big payday. A hedge fund company, Tiger Global Management, led the latest investment round, which included participation from Andreessen Horowitz, Greylock Partners and other venture capital firms.

The company, based in Boston, is not profitable, but it had other impressive numbers to show its investors. It says that its bookings grew by 182 percent last year, and that it now has more than 300 business customers around the world. Those include companies like Time Warner Cable, Netflix, IBM and Unilever.

One customer, the big private equity firm Kohlberg Kravis Roberts, is in the process of putting the software in place in North America and Europe. Peter Sung, a vice president for information technology at K.K.R., said the software greatly reduces the time it takes to retrieve copies of data and makes those copies easier to manage.

Actifio has a potential rival in EMC, the data storage giant, which last year increased its focus on managing copies of data. In response, Actifio’s founder and chief executive, Ash Ashutosh, wrote a blog post sarcastically congratulating EMC on “recognizing the transformational impact of copy data management.”

But for the most part, large data storage firms have hesitated to embrace this business, in part because it poses a threat to their main activity of selling more storage space, said Ashish Nadkarni, a research director at IDC.

“This was never a technology problem,” Mr. Nadkarni said. “It was always a matter of, ‘O.K., so, if we bring this technology to market, it is going to mean less sales for us.’ ”

Mr. Ashutosh previously had success in a related business. Another company he founded, AppIQ, which made software to manage storage infrastructure, was sold to Hewlett-Packard for $300 million in 2005.

After a stint at H.P., he joined Greylock as a partner. The idea for Actifio came while he was analyzing trends in the field of enterprise software companies, he said.

The comparison to VMware, invoked by Actifio itself, is a complicated one. VMware has sought to reposition itself in recent years, in the face of increased competition and a changed technology landscape.

But Actifio does not expect to encounter a similar problem.

“I think we have tremendous patent protection here,” Mr. Goldstein, the North Bridge partner, said, “and a very large lead on the rest of the market.”


Snowden Used Cheap Software To Plunder NSA Data

February 10th, 2014

Edward Snowden used widely available automated software to steal classified data from the National Security Agency’s networks, intelligence officials have determined, raising questions about the security of other top secret military and intelligence systems under the NSA’s purview.

The New York Times, citing anonymous sources, reported that the former NSA contractor used a “web crawler,” cheap software designed to index and back up websites, to scour the NSA’s data and return a trove of confidential documents. Snowden apparently programmed his search to find particular subjects and determine how deeply to follow links on the NSA’s internal networks.

Investigators found that Snowden’s method of obtaining the data was hardly sophisticated and should have been easily detected. Snowden accessed roughly 1.7 million files, intelligence officials said last week, partly because the NSA “compartmented” relatively little information, making it easier for a web crawler like the one Snowden used to access a large number of files.


‘Off-the-shelf’ malware used in Target data breach

January 17th, 2014

Hackers used cheap, off-the-shelf malware to breach security at U.S. Target stores and compromise data for more than 110 million customers, a tech website said.

Target confirmed last weekend malicious software was embedded in point-of-sale equipment at its checkout counters to collect secure data as credit cards were swiped during transactions. Brian Krebs, of the Krebs on Security website, reported Thursday the malware has been determined to be BlackPOS — also known as “reedum” — which uses a memory-scraping technique to collect secure data, temporarily stored in Windows OS computers during a transaction.

BlackPOS likely comes from Russia, and can be bought for about $1,800, Forbes reported.

Data on cards’ magnetic stripes are encrypted when sent from POS terminals to financial institutions for verification but the memory-scraping malware snags the information while it is temporarily “parked” as plain text in POS terminals.

“Interestingly, a search in — a Google-owned malware scanning service — for the term ‘reedum’ suggests that this malware has been used in previous intrusions dating back to at least June 2013,” Krebs said.

Forbes said the hackers likely had access to every POS terminal in every Target store for more than two weeks.

The website Help Net Security said Thursday a Russian security firm has been tracking the activities of cyber criminals it suspects of using BlackPOS in thefts from customers of a number of U.S. banks.


Get Adobe Flash player