CIO Influence
Automation CIO Influence News Machine Learning Security

Command Zero Launches With $21Million Funding to Tackle Major Security Operations Bottleneck

Command Zero Launches With $21Million Funding to Tackle Major Security Operations Bottleneck

Command Zero, the industry’s first autonomous and user-led cyber investigation platform, emerged from stealth today with $21 Million in seed funding, led by Andreessen Horowitz with participation from Insight Partners and over 60 cyber industry thought leaders and executives. Using encoded expert knowledge, automation and advanced Language Learning Models (LLMs), Command Zero is solving the most significant bottleneck in security operations: investigations.

Latest CIO Influence Article: Leveraging Big Data Analytics for Strategic Decision-Making: A Guide for CIOs

Despite increasing investments in cybersecurity, adversaries outpace most organizations when it comes to adopting innovation. This leaves defenders struggling with the fundamentals in complex enterprise environments. Automation has improved detection and triaging capabilities, yet all escalated cases still require tedious manual investigations. This makes investigations the most significant bottleneck for security operations. Manually investigating all escalated cases by tier-2 and tier-3 analysts is an impossible task for most organizations today. Complex incidents often result in resource starvation for security operations, or the need to hire third party remediation and response firms.

Investigations are made of questions and answers. Depending on the complexity, investigations can be formed by dozens or thousands of questions. Command Zero combines expert investigative questions, autonomous and user-led methods on a federated data model to transform investigations. For the first time in cyber, the platform enables asking questions in a technology independent way across all universal data sources in modern enterprises. Using the platform, analysts can leverage automation and LLMs to increase speed, accuracy and consistency of investigations.

Today, human intelligence and creativity remain irreplaceable in investigations. Supporting human qualities, machines excel at repetitive tasks and can process vast amounts of data at incredible speeds. Command Zero leverages both strengths by incorporating automation and advanced LLMs to augment human investigators. During an investigation, each question and response is interpreted and analyzed, in context of the investigation and organization. This removes the laborious work from SecOps teams and helps analysts better interpret the responses from data sources. This unique approach also allows users to know which questions to ask, how to interpret answers and build complete narratives of what occurred. The same capabilities also generate timelines and end-to-end reports for investigations, saving valuable cycles for all analysts.

Founded by a seasoned leadership team with extensive experience in security operations and incident response, Command Zero delivers a consistent, efficient and scalable path for investigations and threat hunting. Co-founders Dov Yoran , Dean De Beer  and Alfred Huger  have led seven successful cybersecurity acquisitions to date including exits to Symantec, McAfee, Sourcefire, Cisco and IBM.

Also Read: Security as a Business Enabler: How Collaboration Between IT and Business Teams Strengthens Data Protection

“Running escalations to ground truth has always been the biggest challenge in cyber. To date, conducting thorough cyber investigations has relied on individual expertise, and has been exclusive to select few advanced organizations,” said Dov Yoran, co-founder and CEO. “Command Zero removes technology expertise barriers, dramatically reduces repetitive manual work and speeds up investigations. Improving institutional knowledge, automation and consistent outcomes are transforming how organizations run threat hunting and investigations at scale.”

Command Zero’s research team carefully creates and curates investigative sequences and technology-specific investigation questions. The platform combines decades of experience in incident response, automation capabilities with an advanced and thoughtful LLM implementation to deliver expert outcomes for all users.

Latest CIO Influence Article: CIO’s Guide to Preventing Ransomware Attacks in B2B Enterprises

[To share your insights with us as part of editorial or sponsored content, please write to psen@itechseries.com]

Related posts

Fermyon: 50x More Apps on Kubernetes with WebAssembly

Inmarsat Unveils the Communications Network of the Future

CIO Influence News Desk

Quectel 5G modules enable next-generation connectivity powered by the NVIDIA Jetson AGX Orin