Important advances
in security are happening right now due to the large secular trends of
virtualization everywhere and the aggressive unbundling of modern application development
in the cloud. A few of the most exciting cloud-native security startups have
just released the first versions of their core products in September 2012.
The way we build and
run apps today on virtualized cloud infrastructure stitched together from many
third party cloud service providers has dramatically changed the surface area
of an application that needs to be secured, defended and monitored.
Today, up and down
the stack, it's common for every component to be delivered as a third party
service, from Typekit fonts - the icing on the presentation layer - to a
managed DB service from MongoHQ. This trend builds on the third party services
that are already a fait accompli: CDNs, app monitoring, exception logging,
etc. All of these services, including your own core application logic are
likely running on layers of virtualized hardware - usually Amazon AWS.
In general, third
party services provide better security for your app because each third party
provider can have a deeper knowledge of their domain, and can afford to focus
all their attention on it, whereas if you managed that service yourself, you
may not have the bandwidth to stay perfectly up to date on it. However, this
general principle goes along with increased uncertainty. As a customer, you
can't have perfect information about the precise security practices of any
particular cloud service provider.
Excitingly, there
has not yet been a new series of security company exits for companies that are
truly native to the massive secular cloud and virtualization trends. Clearly,
there will be, and soon. This is an investable trend right now.
I highlight a few
of the most interesting new security companies that are truly cloud-native
below:
Bromium puts a
cloud of micro-VMs on your local machine, isolating each process within its own
VM. This prevents malicious code entering from the browser to metastasize
throughout your computer. Bromium just started shipping its first release
vSentry focused on Windows 7 on September 20th 2012. Bromium has a blue chip
team that previously founded Xen, and is capitalized to match, having raised
over $35M from A16Z, Lightspeed, Ignition, Intel and Highland.
Also in September
2012, and at the other end of the incumbency spectrum, Qubes released an open
source direct competitor to Bromium based on Linux. The Qubes developers are
best known for devising some well-publicized virtualization exploits, and may
not have any outside funding at all.
Instead of bringing
the cloud to your desktop, Authentic8 is taking your browser to the cloud. Authentic8
just started letting consumers into its beta in September 2012. A8's disposable
browser securely connects you to a browser instance in a newly created, isolated
environment every time you start a new session and destroys that environment
afterward. Virtual execution in the cloud keeps any malicious code from
reaching your local machine. Like Bromium, A8 has a blue chip team that
previously founded Postini, but has been far more measured in their approach to
venture capital having announced only a single round from Foundry Group and
Merus to date.
Tinfoil Security is one of the best
cloud security examples of the consumerization of IT trend. Most development
teams building web applications do not address security systematically. Instead
security work tends to combine a loose set of best practices (hashing
passwords, etc.) mostly implemented most of the time clustered around a
particular employee with domain knowledge having the spare cycles to carve out
the time to make a security enhancement. Tinfoil provides a simple third party
web service that systematizes security monitoring for web apps in much the same
way that CI tools have helped systematize the build process and reduce long
stretches of broken builds.
Similarly, Netflix
is known for building a tool called SecurityMonkey to systematize application
security testing and monitoring across their infrastructure. While Netflix has
made a loose promise to open source SecurityMonkey, a few engineers there are
contributing to a parallel open source security-testing platform called
Gauntlt. Gauntlt provides a platform and domain specific language to
systematize the use of common security testing tools in the same way that popular
deployment platforms like Chef let developers systematize deployment scripts
that were previously run locally.
Obviously big
companies are not standing still. Virtualization vendors like VMware have their
own security offerings and older security companies are starting to pivot their
product positioning towards these new kinds of cloud security issues.
Beyond putting a
cloud of VMs on your computer like Bromium or putting your browser sessions in
the cloud like Authentic8, Intel/McAfee and ARM are working on a third
interesting category virtualized security product. DeepSafe from Intel creates
a small VM as close to the hardware as possible that intends to provide a clean
source of truth to compare the primary computing environment against in order
to determine if it has been compromised by malware. Chipmaker ARM is building
an identical product through a joint venture for ARM chips.
Of additional
interest are Amazon's quiet experiments into doing some browser processing in
the cloud with the Silk Browser installed on the Kindle Fire. While pitched as
a performance upgrade, adding additional security resources in the cloud along
the lines of Authentic8 would be a natural fit.
This post has been
confined entirely to security for the cloud services trend, and has left out
any discussion of mobile security, an equally large opportunity and the subject
of a future post.