Company Profile

Veramine Inc
Profile last edited on: 10/30/2017      CAGE: 7KPS7      UEI: THR6MU6X9S65

Business Identifier: NO Business Identifier is currently available for this company.
Year Founded
2016
First Award
2016
Latest Award
2021
Program Status
Active
Popularity Index
Is this YOUR Company?
Ensure accuracy and completeness of YOUR Company Profile by completing the brief Survey Instrument attached
Do you know about this Awardees?
Let us encourage you to provide any data which would enhance the completeness of this firm's profile.

Location Information

16420 38th Avenue Se
Bothell, WA 98012
   (206) 423-3644
   contact@veramine.com
   www.veramine.com
Location: Single
Congr. District: 01
County: Snohomish

Public Profile

Veramine, Inc. is structured around development of endpoint threat detection software to automate collection of all security-relevant events, detection of commodity and advanced attackers, flexible search of collected data, and rapid response to detected attacks. Involving several ex-Mircosoft personnel, the Veramine platform provides advanced capabilities to network defenders to detect and respond to malicious activities on the network. THsi involves use of three software components: (1) Sensor - A set of intelligent kernel and user-mode services that instrument the operating system to collect security-relevant events. (2) Pipeline - Data from the sensors are collected, aggregated, contextualized, and analyzed in a pipeline. The analysis engine uses a combination of heuristics and machine learning algorithms to automatically detect malicious activities. (3) Portal - Users control/manage the sensors and search over all collected data. The platform's capabilities can be categorized into four categories: * Collection - sensors collect and contextualize data from the all hosts on the network. Data includes processes, files, network, user logon/off, disk encryption state, and more. * Detection - data from the sensors are continuously analyzed in the background using a variety of heuristics and machine learning algorithms to identify anomalous behavior. Analysts can supplement the system with their own detection algorithms. * Response - depending on the analyst's needs, the platform can terminate processes or collect more specific data from systems on the network in response to certain behaviors. * Discovery - analysts can search over all collected data for reactive, retrospective, or proactive purposes. When combined with the contextualized data, analysts can rapidly perform hypothesis testing to detect unknown attacks. A key factor in system design is that all data are contextualized: all collected events have granular information associated with them. For example, given a network connection, system can pinpoint the machine, user, and process that initiated it. This context information is valuable because it increases the fidelity of machine learning algorithms. In addition to detecting malicious activities, platform also helps businesses with compliance and energy usage. BitLocker usage is automatically detected along with sleep modes, screensaver and screen lock activities, antivirus installations and other standard compliance requirements.

Extent of SBIR involvement

User Avatar

Synopsis: Awardee Business Condition

Employee Range
5-9
Revenue Range
.5M-1M
VC funded?
No
Public/Private
Privately Held
Stock Info
----
IP Holdings
N/A

Awards Distribution by Agency

Most Recent SBIR Projects

Year Phase Agency Total Amount
2021 2 AF $749,528
Project Title: Advancing Cyber Hunt Training
2020 1 AF $49,930
Project Title: Intelligence Driven Cyber Response
2020 2 AF $801,471
Project Title: Air Force Cyber CCTV
2016 1 OSD $149,979
Project Title: Cyber Deception for Network Defense

Key People / Management

  Jonathan Ness -- CEO and Co-Founder

  Michal Chmielewski -- Co-Founder

  Bruce Dang -- Co-Founder

  Sergiusz Fonrobert -- Co-Founder

  Lan Nguyer -- Co-Founder

Company News

There are no news available.