Mike Starr, a former NSA engineer, has raised $3.35 million in seed funding for his new startup, Trackd. Their main goal is to develop technology that can effectively fix software vulnerabilities through automation.
In the cybersecurity space, vulnerabilities present a huge challenge for defenders. Software vulnerabilities can leave systems open to attack and the task of remediation can be a laborious and time-consuming process. Now, with the help of Trackd, a Reston, Virginia based startup, the process of vulnerability management and remediation may soon be automated.
Trackd recently secured $3.35 million in seed funding led by Flybridge, with additional investments from Lerer Hippeau, SaaS Ventures, and Expa. The goal of the financing is to build a platform that will help defenders apply patches without fear of disruption. The platform records the experience of all patches applied by its users, and anonymously makes it available to other users in real-time.
The platform also uses a lightweight agent to collect metadata about the operating system and all installed applications. This data is used to drive patching decisions and pinpoint any signs of disruptions or patch quality problems. If a patch is disruptive, that information is made available to other vulnerability remediation teams applying the same patch, allowing them to plan accordingly. If a patch is applied multiple times with no evidence of disruption, the teams responsible for vulnerability management can confidently use auto-patching to speed remediation with little to no impact on resources.
Trackd is hoping to revolutionize the way software vulnerabilities are managed and remediated. Automating the process promises to reduce time and effort spent on patching, while also increasing the security of applications and systems. With the help of its new seed funding, Trackd is well positioned to make a major impact in the cybersecurity space.
Key Points:
- Trackd has secured $3.35 million in seed funding to build technology to automate the remediation of software vulnerabilities.
- The platform records the experience of all patches applied by its users, and anonymously makes it available to other users in real-time.
- The platform also uses a lightweight agent to collect metadata about the operating system and all installed applications.
- If a patch is disruptive, that information is made available to other vulnerability remediation teams applying the same patch, allowing them to plan accordingly.
- Automating the process promises to reduce time and effort spent on patching, while also increasing the security of applications and systems.