Lastline
Edit

Lastline

http://www.lastline.com/
Last activity: 30.05.2022
Categories: ProductProviderSecurityServiceTechnologyAnalyticsDataIndustryNetworksPlatform
Lastline is innovating the way companies detect active breaches caused by advanced persistent threats, targeted attacks and evasive malware with its software-based Breach Detection Platform. Lastline’s open architecture integrates advanced threat defenses and intelligence into existing operational workflows and security systems. Inspection of suspicious objects occurs at scale in real time using a full-system emulation approach to sandboxing that is superior to virtual machine-based and OS emulation techniques. Lastline's technology correlates network and object analysis to achieve timely breach confirmation and incident response. Lastline was built by Anubis and Wepawet researchers and industry veterans with decades of experience focused specifically on advanced breach weaponry and tactics. Headquartered in Redwood City, California with offices throughout North America, Europe and Asia, Lastline’s platform is used by global managed security service providers, Global 2000 enterprises and leading security vendors worldwide. To learn more, visit www.lastline.com.
Likes
943
Website visits
4.4K /mo.
Mentions
41
Location: United States, California, San Mateo
Employees: 51-200
Phone: +1 805-456-7075
Total raised: $48.5M
Founded date: 2011

Investors 5

Funding Rounds 3

DateSeriesAmountInvestors
11.07.2017Series C$28.5M-
21.08.2014-$10M-
25.06.2013-$10Me.ventures

Mentions in press and media 41

DateTitleDescriptionSource
30.05.2022Космические пираты атакуют, или Как мы обнаружили новую APT-...Летом 2021 года мы, специалисты экспертного центра безопасности Positive Technologies, выявили ранее...habr.com/r...
11.11.2021Telemetry Peak Analyzer – An Automatic Malware Campaign Dete...Contributors: Jason Zhang, Stefano Ortolani, Giovanni Vigna Cyber security threats have been growing...marketscre...
30.09.2021Symbexcel: Bringing the Power of Symbolic Execution to the F...Office macros are a popular attack vector to compromise a user's environment and deploy additional c...marketscre...
13.08.2021Excel is still a security headache after 30 years because of...Image: solarseven, Getty Images/iStockphoto Microsoft released Excel 4.0 for Windows 3.0 and 3.1 in ...techrepubl...
04.06.2020VMware acquires network security firm Lastline, said to lay ...VMware is acquiring network security firm Lastline, TechCrunch has learned. Since its launch in 2012...techcrunch...
11.05.2020Cybercriminals exploiting the coronavirus to deploy infostea...Cybercriminals have been busy devising email campaigns that take advantage of the coronavirus outbre...techrepubl...
25.02.2020The challenge of obtaining visibility into cloud securityDigital criminals are increasingly pivoting to the network after initially attacking an endpoint or ...betanews.c...
14.08.2019C-Suite in the hot seat -- Execs' responsibility regarding d...Are you killing your numbers? Crushing your targets? Growing your team? Leading with authenticity an...betanews.c...
11.07.2019Summer heightens cyber security risksYou might think that cyber attacks are a constant year round activity, or perhaps that they are focu...betanews.c...
09.07.2019Can you hack my network? Why ethical hacking is essential fo...Congratulations! You’ve selected and deployed a new cybersecurity solution. But, once you’re up and ...betanews.c...
Show more

Reviews 0

Sign up to leave a review

Sign up Log In