Trackd Snags $3.35M Seed Funding to Automate Vuln Remediation

Share This Post

Trackd, an early stage startup founded by former NSA engineer Mike Starr, has secured $3.35 million in seed funding to build technology to automate the remediation of software vulnerabilities.

The company said the funding was led by Flybridge with additional investments from Lerer Hippeau, SaaS Ventures, and Expa.

Based in Reston, Virginia, Trackd is working on new technology to help tackle the vexing problem of vulnerability management and remediation. The company launched a beta product on Tuesday promising to help defenders apply patches without fear of disruption.

“The dirty little secret in the vulnerability remediation community is that fear of disruption due to patching… when patching broke things frequently,” Trackd chief executive Starr said in a note announcing the financing. “Times have changed, and only a very small percentage of patches cause disruption, but that perception and fear is difficult to overcome,” he added.

Starr said Trackd’s patch management platform records the experience of all patches applied by its users, anonymizes that data, and makes it available in real-time to all other users.  If a patch is disruptive, that information is made available to other vulnerability remediation teams applying the same patch, allowing them to plan accordingly. 

Conversely, if a patch is applied multiple times with no evidence of disruption, the teams responsible for vulnerability management can confidently use auto-patching to speed remediation with little to no impact on  resources.

The company is currently working with design partners and beta customers on a platform that uses a lightweight agent to collect metadata about the operating system and all installed applications. The data is used to drive patching decisions and pinpoint any signs of disruptions or patch quality problems.

Related: VulnCheck Raises $3.2M Seed Round for Threat Intel

Related: Vulnerability Management Fatigue Fueled by Non-Exploitable Bugs

Related: CISA ‘Must Patch’ KEV List Puts Spotlight on Vuln Management Processes

SecurityWeek RSS Feed

Read More

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.

Article

BFU – Seeing is Believing

Oh no, the device is in BFU. This is the common reaction; a device needs extracting, and you find it in a BFU state. Often, there’s an assumption that a BFU extraction will only acquire basic information, but that isn’t always the case.