63.8 F
Washington D.C.
Friday, April 26, 2024

Trusted Knight Raises Funds, Acquires Sentrix

Trusted Knight, a data security company dedicated to advanced solutions for today’s crimeware challenges, has announced that is has successfully closed a Series B financing round. Powered by its patented Protector technology, Trusted Knight disables crimeware and its zero-day malware variants and enables organizations to allow the enterprise, as well as online customers, safe interaction with financial institutions and sensitive data regardless of the security of their devices.

The funding will enable Trusted Knight to aggressively expand its sales and marketing efforts as well as broaden and accelerate product development. The management team has been expanded to include data security industry veteran Doug Klotnia who will serve as Chief Operating Officer. Doug has over 15 years of experience operating and leading businesses where much of his focus has been on the security of financial institutions and their customers.

“Trusted Knight’s success is due to our ability to dramatically reduce the theft of the most sensitive and valuable data through the patented Protector technology,” said Joseph Patanella, Chief Executive Officer at Trusted Knight. “We mitigate one of the greatest security challenges facing banks today and require no user interaction or configuration.”

In addition to the funding, Trusted Knight announced the acquisition of Sentrix. The acquisition brings together Sentrix’s dynamic Cloud-DMZ technology with Trusted Knight’s unique approach to defeating crimeware. The combination creates a modern approach to network and application security.

The Sentrix Cloud-DMZ offers an alternative to the conventional web application firewall (WAF) by serving traffic from a cloud-based replica of the original site that contains no vulnerabilities. Sentrix’s web service and cloud-delivered platform is a revolutionary approach to web security. The always-learning Sentrix Cloud-DMZ service greatly limits reliance on complex WAF rules and operational management by reducing the attack surface of sites by as much as 99%.

“An enterprise website or application is fully protected by the replica minimizing the need for traditional WAF whitelist rules,” explained Patanella. “This approach addresses many traditional WAF shortcomings by eliminating false positives, automating security, accelerating deployment time, greatly reducing overhead and simplifying management.” 

The acquisition of Sentrix was finalized in December.

author avatar
Homeland Security Today
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.
Homeland Security Today
Homeland Security Todayhttp://www.hstoday.us
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.

Related Articles

Latest Articles