CounterTack raises $20 million from SAP NS2, announces strategic partnership

CounterTack, provider of memory-based Endpoint Threat Platform (ETP) for the enterprise, has today announced that it has raised $20 million in its Series D round of funding from Singtel Innov8 and SAP NS2.
Along with the funding, the company has also entered into a strategic partnership with SAP National Security Services, Inc. (SAP NS2). As a part of that, the company will deliver full-spectrum, highly scalable endpoint security technology to enterprise and government customers.
With the SAP NS2 partnership, CounterTack aims to take the leadership position in the next-generation endpoint security market with ability to meet the performance and scale requirements of the largest enterprise environments.

Its Endpoint Threat Platform (ETP) is built on the SAP HANA analytics platform and applies a unique combination of behavioral analysis, machine learning and reputational techniques to counter the most advanced threats to enterprise security.

Mark Testoni, chief executive officer of SAP NS2, said,

The demands on cybersecurity teams today are intense, and the ability to detect and remediate threats rapidly means high-availability data across large, highly distributed environments. We are excited to be partnering with CounterTack to bolster the scale of their ETP deployments for enterprise and government customers, and to enhance customer use cases for widespread threat response, integrated with SAP HANA.

CounterTack says that they are investing in the future by building ETP product using the SAP HANA in-memory database engine and analysis engines, which include Smart Data Streaming, Machine Learning and Predictive Analysis, Natural Language Processing (NLP) and graph features to strengthen CounterTack’s existing and future capabilities.

The combined features deliver the capability to rapidly ingest huge volumes of data, enabling full fidelity data persistence to extract, exploit and provide situational awareness for deep understanding of network and endpoint events needed by security analysts to respond to threats as they occur.

READ MORE AT THE SOURCE