Skip to content
Try it Free Request Your Demo

    The Word On The Street

    Explore recent press releases and media coverage to see what’s on our minds.

    Press Releases

    Press Release Uptycs Strengthens Cloud Security Offering with Cloud Identity and Entitlement Management (CIEM), Announces Multi-Cloud Support May 4, 2022 /PRNewswire/ -- Uptycs, provider of the first cloud-native security analytics platform enabling cloud and endpoint security from a common solution, announced today new cloud ... Read The Release
    Press Release Uptycs Strengthens Executive Team by Adding Kevin Durkin as Chief Financial Officer April 12, 2022 /PRNewswire/ -- Uptycs announced today that Kevin Durkin has joined the company as Chief Financial Officer (CFO). With more than 30 years of finance and leadership experience, Durkin ... Read The Release
    Press Release MITRE Engenuity ATT&CK® Evaluations Highlights Uptycs' Ransomware Detection Capabilities March 31, 2022 /PRNewswire/ -- Uptycs, provider of the first cloud-native security analytics platform enabling cloud and endpoint security from a common solution, today announced the results of its ... Read The Release
    press release Uptycs Adds Advanced Detection Capabilities in XDR Solution To Bolster Protection for Remote Workforces March 3, 2022 /PRNewswire/ -- Uptycs announced today it has added capabilities to their XDR solution to provide improved detection and triage of advanced attacks and APT threat actors. Now, security ... Read The Release
    Press Release Uptycs Bolsters Leadership Team to Fuel Continued Growth Feb. 9, 2022 /PRNewswire/ -- Uptycs announced today that it is expanding its team with key leadership promotions and hiring. Read The Release
    Press Release Uptycs Enables Security Teams To Neutralize Immediate Threats Without Delay, With New Remediation And Blocking Capabilities Aug. 10, 2021 /PRNewswire/ -- Uptycs, today announced Uptycs Protect, which adds new blocking and remediation capabilities in their extended detection and response (XDR) offering. Read The Release
    Press Release Uptycs Adds David Geevaratne As SVP Of Sales June 22, 2021 /PRNewswire/ — Uptycs announced today that David Geevaratne has joined the company as Senior Vice President of Sales. In his new role, Geevaratne is responsible for leading the ... Read The Release
    Press Release Uptycs Raises $50m To Accelerate Growth and Innovation Of Cloud-Native Security Analytics Platform May 26, 2021 /PRNewswire/ — Uptycs announced today that it has raised $50 million in a Series C funding round, bringing the company's total amount raised to $93 million. This latest funding round was ... Read The Release
    Press Release MITRE Engenuity ATT&CKⓇ Evaluation Showcases Uptycs' Advanced Endpoint Threat Detection Capabilities April 21, 2021 /PRNewswire/ — Uptycs, the leader in cloud-native security analytics, today announced its results from the 2020 ATT&CK® Evaluations for Enterprise performed by MITRE Engenuity. With ... Read The Release
    Press Release Uptycs Announces Cloud Security and Compliance for AWS; Further Enhancing their Cloud-Native Security Analytics Platform for Audit, Compliance, Detection, and Investigation Jan. 13, 2021 /PRNewswire/ — Uptycs, a leader in SQL-powered security analytics, announced today its advanced cloud security and compliance offering. The Uptycs Security Analytics Platform now ... Read The Release
    Press Release Uptycs Announces Second Annual osquery@scale Conference Dec. 15, 2020 /PRNewswire/ — Uptycs announced osquery@scale 2021, the second annual conference hosted by Uptycs for security professionals. This year's conference will feature more than a dozen ... Read The Release

    Media Coverage

    NETSECURITY New infosec products of the week: May 6, 2022 Looking at the most interesting products from the past week, featuring releases from AuditBoard, BIO-key, Data Theorem, Enpass, Microsoft, N-able and of course Uptycs! Read the Article
    DARKREADING Docker Under Siege: Cybercriminals Compromise Honeypots to Ramp Up Attacks Cloud containers are increasingly part of the cybercrime playbook, with researchers flagging ongoing scanning for Docker weaknesses along with rapid exploitation to infect systems with coin-miners, ... Read the Article
    SECURITYAFFAIRS Vulnerable Docker Installations Are A Playhouse for Malware Attacks Uptycs researchers identified ongoing malicious campaigns through our Docker honeypot targeting exposed Docker API. Read the Article
    TECHTARGET Logistics firm refreshes SecOps, replaces EDR with XDR Flexport, a freight logistics company undergoing digital transformation overhauled its SecOps tools, which led it to embrace Uptycs for XDR, security monitoring and incident response. Read The Article
    THREATPOST Malware Builder Leverages Discord Webhooks Researchers discovered a simple malware builder designed to steal credentials, then pinging them to Discord webhooks. Read the Article
    THREATPOST Keksec Cybergang Debuts Simps Botnet for Gaming DDoS The newly discovered malware infects IoT devices in tandem with the prolific Gafgyt botnet, using known security vulnerabilities. Read The Article
    SECURITYAFFAIRS Discovery of Simps Botnet Leads To Ties to Keksec Group Uptycs’ threat research team discovered a new botnet, tracked as Simps botnet, attributed to Keksec group, which is focused on DDOS activities. Read The Article
    Security Magazine CASB, CWPP, CSPM, and CNAPP: Which one is right for securing your cloud environment? As organizations shift IT spending to cloud services, it’s important to prepare for more regulations, a high rate of data loss, and a likely increase in attacks on cloud apps. Read The Article
    TechRepublic Container security: How to get the most out of best practices Containers are complex virtual entities that provide proven benefits to the business but also require strong security guidelines. Learn how to get the most out of container security best practices. Read The Article
    Security Boulevard Reducing the Risk of Credential Leakage Given the current state of credential sprawl, how can security teams effectively track down and audit the location of long-term credentials across different locations, including source code, binaries ... Read The Article
    DarkReading Security Providers Describe New Solutions (& Growing Threats) at RSAC Leading security companies meet Dark Reading in the RSA Conference Broadcast Alley to talk about tackling insider threat, SOC complexity, cyber resilience, mobile security, attacker evasion, supply ... Read The Article

    Subscribe To The Uptycs Blog

    Want more security practitioner content delivered to your inbox?

    After a thorough evaluation by our security engineering team, Uptycs was deployed on a large scale as a key component of our security posture. The Uptycs platform provides a broad set of security capabilities with instant endpoint and asset visibility that powers detection and response as well as compliance and governance.

    Leon Li

    Vice President, Comcast Security

    As a cloud-based company running on AWS, finding a platform to solve all of our security needs across all of our accounts and services was a top priority. Finding a single solution that could solve for audit and inventory of our cloud assets, as well as endpoint detection and response, was a challenge — until we found Uptycs. Now we're able to do more with less, and save time, while maintaining a strong cloud security posture.

    Kevin Paige

    CISO, Flexport

    We’ve been using Uptycs for security visibility, threat detection, and incident investigation across our Linux and MacOS fleet. Their audit and compliance analytics have been instrumental for our FedRAMP authorization and ISO 27001 certification.

    Grant Kahn

    Director, Security Intelligence Engineering at Lookout

    We can detect really, really fast: 0.7 seconds from execution to detection, and 1.6 seconds from execution to case management alert.

    Security Engineer, Global Financial Services Company

    Uptycs have been a bit of a revelation to me. Instead of ingesting logfiles and asking you to write IDS rules in a custom query language, they leverage osquery to expose your entire infrastructure as SQL. Everything you want to know or alert on is just as straight-forward as querying a database. It's fantastic.

    Dieter Van der Stock

    Security Engineer