Search company, investor...

Founded Year

2000

Stage

Unattributed VC - III | Alive

Total Raised

$681.65M

Last Raised

$2M | 4 yrs ago

Revenue

$0000 

Mosaic Score
The Mosaic Score is an algorithm that measures the overall financial health and market potential of private companies.

-139 points in the past 30 days

About Kaseya

Kaseya specializes in unified information technology (IT) management and security software for managed service providers and small to medium-sized businesses. The company offers a platform that enables organizations to manage, secure, and back up IT infrastructure and services. Its IT complete platform includes integrated solutions designed to streamline IT operations, enhance cybersecurity, and improve workflow efficiency for IT professionals. It was founded in 2000 and is based in Miami, Florida.

Headquarters Location

701 Brickell Avenue Suite 400

Miami, Florida, 33131,

United States

877-282-8857

Loading...

ESPs containing Kaseya

The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.

EXECUTION STRENGTH ➡MARKET STRENGTH ➡LEADERHIGHFLIEROUTPERFORMERCHALLENGER
Enterprise Tech / Development

The remote monitoring & management market offers remote monitoring and management capabilities for IT systems and infrastructure. These solutions enable IT administrators to manage and monitor servers, networks, and endpoints remotely, using a single console. The market includes a variety of vendors offering solutions that cater to the needs of small, medium, and large enterprises. With the increa…

Kaseya named as Outperformer among 13 other companies, including Intel, Datadog, and New Relic.

Loading...

Expert Collections containing Kaseya

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Kaseya is included in 3 Expert Collections, including Unicorns- Billion Dollar Startups.

U

Unicorns- Billion Dollar Startups

1,249 items

C

Cybersecurity

9,840 items

These companies protect organizations from digital threats.

T

Tech IPO Pipeline

257 items

The tech companies we think could hit the public markets next, according to CB Insights data.

Kaseya Patents

Kaseya has filed 116 patents.

The 3 most popular patent topics include:

  • computer networking
  • network protocols
  • wireless networking
patents chart

Application Date

Grant Date

Title

Related Topics

Status

2/8/2021

12/20/2022

Block ciphers, Backup, Disk file systems, Computer data storage, Rotating disc computer storage media

Grant

Application Date

2/8/2021

Grant Date

12/20/2022

Title

Related Topics

Block ciphers, Backup, Disk file systems, Computer data storage, Rotating disc computer storage media

Status

Grant

Latest Kaseya News

How to Reduce Risk From Misconfigured Build Assets

Oct 25, 2024

Security Boulevard Community Chats Webinars Library How to Reduce Risk From Misconfigured Build Assets With the software development factory becoming more complex and automated, there are increasing opportunities for misconfigurations to create risk. In fact, misconfigured SDLC assets, such as SCMs, build servers, and artifact repositories, have led to some significant breaches in recent years. They’re a popular target because they allow threat actors to gain access to systems and then move laterally within an organization. Although these build assets all provide configuration mechanisms to prevent these issues, they need to be used and continually monitored for proper use.​ Based on our experience, that use and monitoring are not happening consistently. Misconfigured build assets Legit frequently finds When we first start working with an enterprise, we often discover misconfigured build servers in their environment. This is a common problem, but also one that creates significant vulnerabilities. Build systems are essentially automated, implicitly trusted pathways straight to the cloud, yet most aren’t treated as critical from a security perspective. In many cases, these systems — like Jenkins, for example — are misconfigured or otherwise vulnerable and unpatched. Working with one large enterprise, the Legit team found an exposed Jenkins server with access to the public Internet. The Legit research team was able to access proprietary code via the Internet through that Jenkins server. We also often find Jenkins servers that have unnecessary access to many S3 buckets. An attacker who breaches a server with this kind of access has a treasure trove of data to pursue. Attacks related to misconfigured build assets These misconfigurations don’t just represent a hypothetical risk either; they have led to significant real-world breaches, including: Codecov : In the Codecov attack, attackers used an unpinned Docker image to alter the Bash Uploader script. This modification enabled them to steal sensitive data from many of Codecov’s clients, highlighting the risks of not locking Docker image versions in CI/CD pipelines. Kaseya : Attackers used an exploit to get into a build pipeline and change code in a package that was then sent to all of Kaseya’s customers. Below are our recommendations to prevent these risky and exploitable misconfigurations. Branch protection: Enable branch protection and enforce code review (where the reviewer is not the committer) for all important repositories.​ Continual monitoring: Keep in mind that it’s important to have continual monitoring and verification of configurations. We recently partnered with a security team at a large enterprise; the team would enable branch protection, and then their development team would disable it. Obviously, developer/security communication and collaboration goes a long way here, but also continual monitoring of a constantly changing environment. Enforce authentication: Ensure build servers require authentication. Some build servers, like Jenkins, have configuration settings that do not require authentication, which allows any user with network access to the server to perform any action. Limit permissions: Limit the ability to create public repositories. When non-admins can create public repos, it increases the likelihood that a repo that should be private becomes public by mistake, and once public, it can be published, cached, or stored by external parties. Similarly, ensure that cloud storage (e.g., S3 buckets) is not publicly writable and ensure it is only publicly readable when necessary. Unprotected S3 buckets are one of the major causes of data theft and intrusions. Expire keys: Security keys are often not set to expire by default. Ensure that your infrastructure settings define security key expiration times and key rotation. Never execute third-party resources before verification: Third-party resources should be verified by checksum or, if checksum is unavailable from the supplier, consumed from the local artifact registry after it’s been downloaded and reviewed. If users of CodeCov followed this best practice, they would have caught that the checksums did not match and avoided being collateral damage from their compromised supplier. Avoid unsafe cross workflow actions:  When possible, avoid creating a job in your builds that references another image that might be changed externally. For example, avoid always pulling the “latest” image from an external source because if that image is compromised, you will automatically pull in the affected image. Understanding common SDLC risks As development environments become more complex, they introduce more risk, much of it unknown. Risky misconfigurations are just one of these risks. Get our new guide on the top unknown SDLC risks we uncover to get a sense of the risks that might be lurking in your development environment, and how to address them. *** This is a Security Bloggers Network syndicated blog from Legit Security Blog authored by Joe Nicastro . Read the original post at: https://www.legitsecurity.com/blog/reduce-risk-misconfigured-build-assets

Kaseya Frequently Asked Questions (FAQ)

  • When was Kaseya founded?

    Kaseya was founded in 2000.

  • Where is Kaseya's headquarters?

    Kaseya's headquarters is located at 701 Brickell Avenue, Miami.

  • What is Kaseya's latest funding round?

    Kaseya's latest funding round is Unattributed VC - III.

  • How much did Kaseya raise?

    Kaseya raised a total of $681.65M.

  • Who are the investors of Kaseya?

    Investors of Kaseya include Insight Partners, TPG Alternative & Renewable Technologies and Ireland Strategic Investment Fund.

  • Who are Kaseya's competitors?

    Competitors of Kaseya include NinjaOne, Malwarebytes, Datto, Barracuda, Auvik Networks and 7 more.

Loading...

Compare Kaseya to Competitors

NinjaOne Logo
NinjaOne

NinjaOne is a unified IT operations solution provider in the IT management software industry. The company offers a platform that enables IT teams and Managed Service Providers (MSPs) to automate, manage, and remediate all their endpoint management tasks, improving efficiency and user satisfaction. Its primary customers are in the IT departments and MSPs sectors. NinjaOne was formerly known as NinjaRMM. It was founded in 2013 and is based in Austin, Texas.

Action1 Logo
Action1

Action1 operates as a risk-based patch management platform for distributed enterprise networks globally. Action1 helps to discover, prioritize, and remediate vulnerabilities in a single solution to prevent security breaches and ransomware attacks. The company streamlines OS and third-party patching and mitigates ransomware and security risks, while lowering costs. It provides vulnerability assessment and automated remediation capabilities, P2P patch distribution, and enterprise integrations, to enable organizations to ensure continuous patch compliance. Action1 is certified for SOC 2, ISO 27001, and TX-RAMP. Action1 was founded in 2018 and is based in Houston, Texas.

Atera Logo
Atera

Atera develops predictive automation and remote monitoring and management (RMM) platforms. It specializes in service desks, remote network management, business management, and cloud services. The company was founded in 2014 and is based in Tel Aviv, Israel.

P
Pulseway

Pulseway is a company that specializes in IT management, specifically in the remote monitoring and management (RMM) sector. The company offers a range of services including device management, backup and disaster recovery, ransomware protection, and professional service automation. These services are designed to help IT teams and Managed Service Providers (MSPs) reduce downtime and improve efficiency through automation. It was founded in 2011 and is based in Dublin 2, Ireland.

ConnectWise Logo
ConnectWise

ConnectWise focuses on providing software solutions for technology service providers (TSPs). The company offers a range of services including cybersecurity management, unified monitoring and management, business management, and integrated expert services. These services are designed to help businesses automate, manage, and secure their operations. It was founded in 1982 and is based in Tampa, Florida.

Auvik Networks Logo
Auvik Networks

Auvik Networks is a company that specializes in network management in the information technology sector. The company offers services such as network mapping, inventory management, configuration backup, performance monitoring, and network traffic analysis. It also provides software as a service (SaaS) management and Wi-Fi management solutions. Auvik Networks primarily serves sectors such as manufacturing, financial services, education, healthcare, and government. It was founded in 2011 and is based in Waterloo, Ontario.

Loading...

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.