
YAXA
Real-time risk monitoring and threat remediation platform for enterprises seeking to actively block malicious behaviors.
Date | Investors | Amount | Round |
---|---|---|---|
- | investor | €0.0 | round |
N/A | €0.0 | round | |
N/A | €0.0 | round | |
N/A | N/A | Seed | |
Total Funding | 000k |
Related Content
YAXA operated as a cybersecurity firm with a focus on safeguarding critical digital assets within enterprise data centers, whether on-premise or in the cloud. The company, which was founded in 2015 and appears to have ceased operations around June 2021, developed a solution centered on behavioral analysis to protect against insider threats. Initial funding included an angel investment of $500K in August 2015, followed by $100K from an accelerator in March 2017.
The core of YAXA's offering was an appliance, deployable in a data center or the cloud, that utilized machine learning algorithms. This system worked by continuously monitoring user access patterns and network traffic in real-time to build individual behavioral fingerprints. These fingerprints were created from a variety of user traits, including the time and duration of access, geolocation, client device, and the sequence of operations. By establishing a baseline of normal user behavior, the system could detect anomalies that might indicate a compromised account or a malicious insider.
Upon detecting an anomaly, YAXA's platform was designed to trigger an automated incident response, such as initiating a multi-factor authentication request to verify the user's identity in real-time, thereby mitigating risk without waiting for retrospective log analysis. The solution also featured adaptive learning, allowing it to incorporate user feedback to refine its behavioral models and reduce false positives over time. It was built to be identity-aware and could integrate with existing Identity and Access Management (IAM) servers. The company's technology was positioned as a defense against threats that traditional signature-based tools like firewalls and IPS/IDS systems are not designed to handle.
Keywords: cybersecurity, data center security, insider threat detection, user behavior analytics, machine learning, anomaly detection, network security, cloud security, real-time threat mitigation, behavioral fingerprinting, access control, automated incident response, IAM integration, data protection, enterprise security, network traffic analysis, application security, risk management, data loss prevention, adaptive learning