Area 1 Security raises $25 million in growth funding

Company provides AI-driven protection against phishing

Head with binary code inside it made to look like artificial intelligence

Area 1 Security announced on Sunday that it has secured $25 in growth funding led by new investor, GrowthPoint Capital.

The firm uses AI to find and eliminate phishing emails before they reach anyone’s inbox. This preemptive approach works with Google Suite and Microsoft 365 to add an extra layer of protection for cloud-based emails. 

According to Venturebeat, an Area 1 Security spokesperson said that the company will use the money largely for research and development as well as expanding its go-to-market resources. 

According to Verizon’s 2019 Data Breach Investigation Report, 95% of all data breaches get their foothold through phishing emails. Area 1 Security’s approach aims to filter out phishing emails before they reach the user so companies don’t have to rely on their employees’ ability to identify phishing emails before it's too late.

Area 1 Security claims to have saved $233 million in “long con” BEC fraud in just a 12-week period earlier this year. 

Phishing attacks have been on the rise in 2020 as criminals take advantage of coronavirus chaos to phish unsuspecting people. Earlier this month 15,000 Wells Fargo customers got phished as well. 

The company also announced Patrick Sweeney as CEO. Sweeney has more than 25 years of executive and general management experience in high-tech, including successful runs with Dell and SonicWall. He was most recently the CEO of Talari Networks which Oracle purchased in 2019.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

Cyber criminals bypassing MFA to access cloud service accounts
two-factor authentication (2FA)

Cyber criminals bypassing MFA to access cloud service accounts

14 Jan 2021
What is zero trust?
network security

What is zero trust?

11 Jan 2021
Hackers breach T-Mobile customer records
data breaches

Hackers breach T-Mobile customer records

4 Jan 2021
Biden promises tough response to cyber attacks
cyber security

Biden promises tough response to cyber attacks

18 Dec 2020

Most Popular

How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021
The fate of Parler exposes the reality of deregulated social media
Policy & legislation

The fate of Parler exposes the reality of deregulated social media

14 Jan 2021
Should IT departments call time on WhatsApp?
communications

Should IT departments call time on WhatsApp?

15 Jan 2021