Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

BUSINESS (NO PLAGARISM A+ WORK, ON TIME)

BUSINESS DISCUSSION

SOMETHING VENTURED: Venture Capitalists Set
Sights on Cloud Security

ProQuest document link

FULL TEXT

(This article was originally published Wednesday.)

–Venture capitalists are funding startups that can remove one of cloud computing’s few remaining obstacles: data
security.
–Companies are worried about the security of data in the cloud
–And many face government and industry regulations about how data can be stored in the cloud

By Scott Denne

As cloud computing continues to take a larger share of computing budgets, venture capitalists have been getting
behind startups that can remove one of the movements few remaining obstacles: data security.
Now one of Silicon Valley’s most influential venture firms, Andreessen Horowitz, has followed up with more funding
for one of its early seed investments in the space by leading a new $30 million round for CipherCloud Inc., a company
that encrypts data in order to keep it secure. Other existing investors Index Ventures and T-Venture, the venture
capital unit of Deutsche Telekom AG, also participated.
“One of the problems I noticed in 2010 was all these enterprises wanted to adopt cloud applications,” said Pravin
Kothari, the company’s chief executive and founder. “But the big problem they had was that they had no control over
their data.”
John Jack, a board partner at Andreessen Horowitz, contemplated entering this market when he was CEO of Fortify
Software Inc., a maker of application security testing software, but decided that it wasn’t closely related to the core
business and “we couldn’t quite figure out in our minds how to solve the problem,” he said.
That hasn’t stopped other startups from getting into the cloud encryption market. In February, Valutive Inc. raised $10
million in Series A funding for a similar service that’s focused on cloud-based Microsoft applications, and Porticor Ltd.,
which makes an encryption service centered around Amazon.com Inc .’s cloud services, launched that same month
with an undisclosed amount of funding.
Last year PerspecSys Inc. raised an $8 million Series A from Intel Capital and others, and Salesforce.com Inc. acquired
cloud encryption company Navajo Systems shortly after it raised seed funding from Jerusalem Venture Partners.
Companies are not only worried about the security of critical data, like customer information, but many also face
government and industry regulations about how the data can be stored when they’re considering implementing
cloud applications.
CipherCloud ‘s service solves that problem by encrypting data before sending it out to a cloud application.
CipherCloud provides encryption tools built around several specific applications, including Salesforce.com and
Gmail, or a template for encrypting data for other applications and cloud services.
Providing such a service may be a simple idea, but it’s difficult to execute. The gateway that encrypts the data has to
be extremely secure and support high levels of traffic for applications that are a crucial part of a business, Mr. Kothari

PDF GENERATED BY PROQUEST.COM Page 1 of 3

said.
Though CipherCloud ‘s latest round is technically its Series A round, the two-year-old company is well past that stage
of development, Mr. Kothari said. It already has over 40 enterprise customers, 1.2 million people using the service and
a revenue run-rate that’s over $10 million, he said.
As the market for cloud computing continues to grow, CipherCloud will grow with it, said Mr. Kothari, who previously
founded ArcSight Inc . Research firm Gartner predicts that a quarter of enterprises will use cloud security applications
by 2016. The same firm predicts the market for cloud computing to grow 20% this year to $109 billion.
Prior to this round, CipherCloud raised $1.4 million in seed funding. Mr. Kothari declined to disclose the valuation on
the round.

Write to Scott Denne at [email protected].

(TALK BACK: We invite readers to send us comments on this or other financial news topics. Please email us at
[email protected]. Readers should include their full names, work or home addresses and telephone
numbers for verification purposes. We reserve the right to edit and publish your comments along with your name; we
reserve the right not to publish reader comments.)

(END)
December 13, 2012 07:35 ET (12:35 GMT)

DETAILS

Subject: Software; Funding; Data encryption; Cloud computing; Startups; Venture capital

Business indexing term: Subject: Startups Venture capital; Corporation: Salesforce Inc

Location: Silicon Valley-California; Jerusalem Israel; United States–US; Israel

Company / organization: Name: ArcSight Inc; NAICS: 513210; Name: PerspecSys Inc; NAICS: 513210; Name: Index
Ventures; NAICS: 523910; Name: Microsoft Corp; NAICS: 334610, 513210; Name:
CipherCloud Inc; NAICS: 513210; Name: Intel Capital; NAICS: 523910; Name: Jerusalem
Venture Partners; NAICS: 523910; Name: Deutsche Telekom AG; NAICS: 517111, 517112;
Name: Amazon.com Inc; NAICS: 334310, 454110, 518210; Name: Andreessen Horowitz;
NAICS: 523910; Name: Fortify Software Inc; NAICS: 513210; Name: Salesforce Inc; NAICS:
513140, 513210, 541613

Publication title: Dow Jones Institutional News; New York

Publication year: 2012

Publication date: Dec 13, 2012

Publisher: Dow Jones &Company Inc.

Place of publication: New York

PDF GENERATED BY PROQUEST.COM Page 2 of 3

LINKS
Check for full text in other resources

Database copyright  2025 ProQuest LLC. All rights reserved.
Terms and Conditions Contact ProQuest

Country of publication: United States

Publication subject: Business And Economics

Source type: Wire Feed

Language of publication: English

Document type: News

ProQuest document ID: 2104657781

Document URL:
feeds%2Fsomething-ventured-venture-capitalists-set-
sights%2Fdocview%2F2104657781%2Fse-2%3Faccountid%3D8289

Copyright: Copyright Dow Jones &Company Inc Dec 13, 2012

Full text availability: This publication may be subject to restrictions within certain markets, including
corporations, non-profits, government institutions, and public libraries. In those cases
records will be visible to users, but not full text.

Last updated: 2024-12-05

Database: ProQuest Central

PDF GENERATED BY PROQUEST.COM Page 3 of 3

  • SOMETHING VENTURED: Venture Capitalists Set Sights on Cloud Security

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

W5

Course Project: Source Selection Criteria Instructions This week, you are required to produce your Source Selection Criteria deliverable. The Source Selection Criteria is a required deliverable to define how the evaluation of each response will be executed. Typically, evaluations are executed following multiple considerations, including (1) demonstrated competence, (2) compliance,

week 4 pj

 U.S. manufacturing over the last half century  Course Objectives: Students will apply international business theories and concepts to a various multinational organization. Questions: 1. Reflect on the changes in U.S. manufacturing over the last half century. Why did the United States lose so many jobs? 2. What impact did that job loss

MBA510 Week One Discussion Post 2. Please answer the discussion post in 250 min

Instructions How might companies incorporate AI into their value chain to improve operating efficiencies? Length: 250-400 words  Contributions must display original thinking and good knowledge of the subject matter, including links and references to sources to support your arguments. Additionally, make sure you cite sources you reference in-text and under a

MBA510 Week One Discussion Post 1. Please answer the discussion post in 250 min

Instructions · How do you think business structures might change in a world with AI? Length: 250-400 words  Contributions must display original thinking and good knowledge of the subject matter, including links and references to sources to support your arguments. Additionally, make sure you cite sources you reference in-text and under

Business

BUSI 301 Discussion Assignment Instructions Overview Discussions bring dialogue and communication into our learning experience. Unlike so much of the unsubstantiated opinion we see in the public square and social media, these discussions provide a space for in-depth analysis and application of the topics in our Learn readings and presentations.

HRM 6303 VIII

2 Training and Development HRM 6303 Unit VIII Reflection Paper Consider that you want to report to the executive team on how this course could help shape training and development program for leadership and career planning. Be sure to consider major training-related theories. Reflect on the course and thoroughly explain

ACC 5301 VII

1 5 Title of the Paper Goes Here Student Name Institution ACC 5301 Management Applications of Accounting Instructor Date Abstract The abstract is an overview of the paper, written after completion. Other researchers use the abstract to determine if your work will be useful to them. The abstract should include

Prof Double R

DISCUSSION 1 In a conversation with a family member, you are told: “Bad people do bad things. Some people are just bad eggs.” For this discussion, you will incorporate what you have learned about antisocial behavior and its implications for promoting diversity, equity, and inclusion. For your initial post, review

Case Study

answering the case by applying all the digital transformation tools  Chapter 1: The Five Domains of Digital Transformation: Customers, Competition, Data, Innovation, Value This chapter introduces the five domains of digital transformation: customers, competition, data, innovation, and value. It explains how digital technologies are changing strategic assumptions in each domain,

Group project

Background UNLO Kuwait Group Company is currently exploring new business opportunities by identifying and targeting untapped market segments. As part of this initiative, students will engage in a strategic consulting assignment focused on discovering feasible and sustainable market expansion options for the company. Student teams will work on real-world business

Business Finance – Management 2-2 Assignment: Communications Plan Template

  MGT 550 Module Two Assignment Guidelines and Rubric Overview Using the Communications Template, linked in the What to Submit section, identify two overall issues that are present in the final project case study that can be addressed using internal and external communications. For each issue, note the red flags

Calculate the economic value added assuming its cost of capital

At the end of 2011 Home Depot’s total capitalization amounted to $29,031 million. In 2012 debt investors received interest income of $648 million. Net income to shareholders was $4,487 million. (Assume a tax rate of 35%.) Calculate the economic value added assuming its cost of capital is 10%. (Do not

Econ 13

Instructions attached Please answer the following questions 1. Please research ‘forced arbitration” and tell us what you find out about it. What is it and do you think it is a good or a bad thing? Explain. To what extent is forced arbitration legal in California and federally. 2. How

leasing

   Lewis Securities Inc. has decided to acquire a new market data and quotation system for its Richmond home office. The system receives current market prices and other information from several online data services and then either displays the information on a screen or stores it for later retrieval by

HRM 6303 VII SA

2 Training and Development HRM 6303 Unit VII SA For this assignment, you will write a report that details the components of an executive leadership development program for a fictitious company. The fictitious company can be within an organization and industry of your choice. Do not use the name of

ACC 5301 VI

2 Management Applications of Accounting ACC 5301 Unit VI Assignment This assignment measures your mastery of ULOs 2.5, 4.1, 5.2, and 6.1. You have been hired at ABC Manufacturing, and you have been asked to work on the budget for the upcoming year regarding labor costs and the number of

Lead 4

Week 4: The KPI Dashboard The KPI Dashboard Review the following video. Transcript attached Instructions After reviewing the Week 4 Reading and Supplemental Materials, create a 2-page Microsoft Word Memo and infographic (instead of a traditional dashboard) for an organization you have been or still are affiliated with.  You do not have

MIS -4

Week 4: Project Paper #2: Jobs to be Done and Value Proposition Hypothesis Introduction You will use the Jobs to Be Done (JTBD) framework to reframe the problem from the customer’s perspective, then define the key value your product or service must deliver to solve it. This is your opportunity