Monday, July 22 2024

Today, alphaMountain.ai announced it has received $2.7 million in seed funding led by Mercato Partners’ Prelude Fund. The round will help the company continue developing the company’s threat intelligence, which has already landed several major partner integrations with Cisco SecureX, ReversingLabs, Cyware, Maltego and others.

alphaMountain.ai’s unique technology is based on a continuously trained neural network and actor voting system that combines data from threat feeds and real-time user network telemetry. While legacy solutions have struggled to protect enterprises due to low accuracy and poor coverage, alphaMountain.ai’s technology provides broad coverage for nearly 1 billion domains and IPs in all geographies and languages, including site malicious risk and web reputation, content classification and cybersquatting (i.e. phishing) detection.

“What’s unique about alphaMountain – aside from having two of the brightest minds in network security and machine learning at the helm – is that they are actually using AI. Many cyber tools claim to use AI but are actually using static based human authored rules.” said Zach Sivertson, partner at Mercato Partners’ Prelude Fund. “Even at this early stage, alphaMountain.ai’s technology is very impressive, and partners can tell a difference in the quality of data.”

alphaMountain.ai has an enviable investor roster that includes CrossPoint Capital Partners, Andrew Peterson, co-founder at Signal Sciences and a group of prominent Utah-based investors. Already, the company has gained strong early traction with five major partner integrations, impressive data customers, and technology that scales to billions of lookups per day.

“At Blue Coat Systems, John and Mathew laid the foundation for several web protection tools that companies still rely on today,” said Greg Clark, Managing Partner of Crosspoint Capital Partners and former CEO of Blue Coat Systems and Symantec. “Given the relevant experience the founding team has in this critical cybersecurity area, it was an easy decision to back this endeavor. Early results from the intelligence platform are very encouraging.”

CEO John Ahlander and CTO Matthew Wood co-founded alphaMountain.ai in 2020 to bring the latest machine learning techniques to enterprises in search of coverage from the Internet’s malicious actors. As former Vice President of Product Development and Cloud Operations at Symantec, John Ahlander has decades of experience leading teams in malware defense, web filtering, breach detection, reporting and analytics. Similarly, Matthew Wood has nearly two decades’ experience as a Chief Scientist and Engineering Director for Symantec, Solera Networks and others, where he was instrumental in building a network forensics platform used by some of the world’s largest organizations.

alphaMountain.ai has partnered with Cisco to enable security for major events, including Super Bowl LVI (2022) and Black Hat USA (2021).  The integration provided threat intelligence to the Cisco SecureX platform used to investigate suspicious activities in the event networks.

“alphaMountain.ai is a valued member of the Cisco Secure Technical Alliance, with their SecureX integration,” said Jessica Bair Oppenhenheimer, director of the Cisco Secure Technical Alliance. “We appreciate their support in securing major events, like the global Black Hat conferences and the NFL’s Super Bowl LVI SOC, where alphaMountain.ai provided full threat intelligence licenses to aid the Cisco teams in protecting the networks.”

John Ahlander
John Ahlander, founder and chief executive officer at alphaMountain.ai

Previous

Fortress Information Security REceives $125M investment from Goldman Sachs

Next

Devo Technology Acquires Kognos

Check Also

Widget

Don’t Miss

Sevco Security Platform Product Review

Ellie Buscemi

What is the Sevco Security Platform? The Sevco Security Platform is a cyber asset attack service management (CAASM) product that focuses on aggregating and correlating data from across a company’s cybersecurity infrastructure to give cybersecurity professionals a better sense of what the company’s infrastructure looks like as a whole. The platform’s sources include a company’s […]

Cyber Deals: Huntress, Cyberhaven, and SpyCloud

CISOstack

Cybersecurity Surge: Top Funding Rounds and Strategic Acquisitions Fuel Growth in AI, Cloud Security, and Threat Prevention Solutions

Fidelis Elevate: A Deep Dive

Ellie Buscemi

What is Fidelis Elevate? Fidelis Elevate is an open extended detection and response (open XDR) solution focusing on network protection, endpoint security, and cyber attacker deception. The platform aims to protect various elements of a company’s infrastructure, such as devices and servers while tracking suspicious behavior and preventing access to cyber criminals. What features does […]

Partially closed laptop screen

Best Extended Detection and Response (XDR) Solutions

Lara Oporto

What is Extended Detection and Response and how does it work? Extended Detection and Response (XDR) is a cybersecurity system that gathers information from different places like computers, networks and emails. Unlike other security tools that focus on one area like computers or networks, XDR looks at everything together. The comprehensive approach helps to find […]

Close up of computer chip

Best Managed Detection and Response (MDR) Solutions

Lara Oporto

What is Managed Detection and Response? Managed Detection and Response (MDR) is a cybersecurity service that provides continuous monitoring, threat detection and incident response capabilities. MDR achieves these capabilities through the deployment of advanced technologies such as machine learning and behavioral analytics as well as analysis from security professionals. MDR is a cybersecurity service that […]

Best Hyperconverged Infrastructure Software

Ellie Buscemi

What is Hyperconverged Infrastructure and how does it work? Hyperconverged infrastructure (HCI) is a software that provides computing, storage and network operations for a company from a single point on a company’s hardware. Originally, computing, storage and network operations were divided in a company’s hardware infrastructure and potentially provided by separate vendors with different management […]