Impermium

Impermium is a cybersecurity technology startup that protects over 1.5M sites and has processed over 8B total transactions in its 3-year history. The company's advanced risk-evaluation platform improves account management by identifying fraudulent registrations, compromised logins, and risky transactions. It has proven successful at stopping fraudulent user account registrations in real-time — using a blend of machine learning, statistical anomaly detection, and a proprietary database of malicious actors — for hundreds of transactions per second from many of the largest consumer Internet companies.



about the company

Founders

Vish is CTO and Co-Founder of Impermium. Before joining Impermium, Vish led engineering for Yahoo! Mail anti-spam, security, and data mining, and was involved in protecting every major component of the Yahoo! network from spam, fraud, misuse.

Mark is CEO and Co-Founder of Impermium. As the former "Spam Czar" for Yahoo!, he has regularly presented worldwide to government, industry, and consumer groups about spam, abuse, and cyber security issues.

Naveen is Distinguished Engineer and a Co-Founder of Impermium. For more than twelve years, Naveen designed and built core systems across Yahoo!, including the outbound spam and abuse filters responsible for a 60% reduction in the impact of fraudulent registrations.

Impermium in the press

Nov. 13, 2013

3 hot security startups to watch

Impermium, Pindrop Security, and MokaFive all showed off their technology as part of the conference’s Innovation Sandbox competition for startups. Three security startups caught our eye at the RSA Conference here in San Francisco today. There, MokaFive piles on security features that allow IT to wipe a computer if it is stolen, update desktops, and more. Impermium was founded in 2010 and has received funding from Greylock Partners, Accel Partners, Highland Capital Partners, and The Social+Capital Partnership. 10 startups got the chance to strut their wares on stage, solving all sorts of issues from the bring-your-own-device (BYOD) trend to telecommunications.

Nov. 13, 2013

As Its Influence Grows, Twitter Becomes A Hacking Target

As Its Influence Grows, Twitter Becomes A Hacking Targeti toggle caption iStockphoto.com iStockphoto.comIn recent weeks, the Associated Press, NPR and the BBC have all had their Twitter accounts hijacked. "If hackers compromise a computer and either steal a Twitter password or trick someone into giving that password up, they're in. As the social media platform has become an essential news and communication platform globally, it has also become a honey pot for hackers. And many need better passwords, better practices and better defenses against hackers. Still, Behrens says the primary responsibility for keeping social media accounts secure rests with the people and institutions that use them.

Nov. 13, 2013

Hiring digital 007s

“AT BOOZ ALLEN, we’re shaping the future of cyber-security,” trumpets a recruiting message on the website of Booz Allen Hamilton, a consulting and technology firm. But while Booz Allen has hogged the headlines, much to the chagrin of its leaders, a broader trend has gone largely unremarked. Government types can also help cyber-security firms and consultancies, which are prime targets for hackers, to protect their own operations better. The current director, James Clapper, is a former Booz Allen executive. Lattice Engines, a software company looking into hiring trends in the data field, reckons Booz Allen has over 300 vacancies for such people and may well be recruiting more of them than Google or Facebook.

Nov. 13, 2013

Why two-factor authentication isn't a cure-all

It is time for the online world to embrace its similar position of responsibility. These defenses must be active, and many must operate on the service itself: with the diversity of malware, phishing schemes, and online vulnerabilities, sites cannot expect optional two-factor authentication to solve all their problems, and must instead shoulder this burden themselves. )Three fundamental authentication technologies are something you have, something you know, and something you are. It's not just that a basic username+password has proven insufficient; even with a stronger lock, reliance on a single gateway authentication is inadequate. Broad databases of suspicious online behaviors then empower virtual policemen to quickly act on a criminal's new modus operandi, and machine learning algorithms can be trained to identify atypical and suspicious behavior.

Nov. 13, 2013

A Ticking Cybersecurity Timebomb

Feb. 13, 2013

15 Most Important Security Startups

We've assembled this list of the hottest, coolest security startups creating buzz for a number of reasons:They've landed big finance rounds. They are solving a hard security problem. Computer security is a difficult problem that attracts some of the brightest minds in the tech industry who build some of the most innovative products. They are approaching security in a fresh new way. They have impressive founders.

May 29, 2012

40% of accounts on Facebook, Twitter and other social networks are spam

“Social spam can be a lot more effective than e-mail spam,” Risher told Bloomberg Businessweek in a recent interview. Social networks like Facebook and Twitter are become focal points of our digital lives, and just as they did with email and other popular digital technologies, spammers are looking to capitalize. According to Mark Risher, chief executive officer of anti-spam software company Impermium, spammers are responsible for creating as much as 40% of the accounts on popular social media sites like Facebook and Twitter. “The bad guys are taking to this with great abandon.” Roughly 8% of messages sent on social networks are spam according to Risher, and that figure has doubled in the past six months, the spam expert estimates. Businessweek notes that companies like Twitter and Facebook are beginning to increase their efforts to quell spam, having recently sued several perpetrators and increased their respective investments in anti-spam personnel and resources.

Aug. 31, 2011

Impermium Launches Social Spam Index; Finds That Up To 40 Percent Of Online IDs Are Fake

But the real fight that Impermium wants to help companies wage is the one against social spam — the spam that is proliferating on Facebook, Twitter, Google+, and social networks near you. So, as part of this effort, Impermium is creating a resource for regularly published data on social web spam and abuse trends. Impermium’s report shows that small businesses have entered into social spam, reacting to the difficult economy by expanding into more illicit areas. In June, we covered the launch of Impermium, a young startup aimed at zapping the Internet’s social spam wherever it hides. Today, Impermium is announcing the inaugural Social Spam Index, which will include quarterly reports based on the data it collects from its customers and daily spam hunting.

June 27, 2011

Former Yahoo Spam Ninjas Unveil Impermium

The world is getting a first look at Impermium, a new startup that aims to help sites fight growing user generated spam – spammy comments, hacked accounts and (my personal favorite) fraudulent registrations. Part of what makes Impermium work well, says Risher, is that they can analyze content across multiple partners to detect previously unknown patterns. Companies can use Impermium as a service to detect and remove fraudulent and spammy content. We’ve asked Impermium if they’d work with us on CrunchBase to help flag spammy edits to that site before human review. CEO Mark Risher was known as Yahoo’s “Spam Czar” until he left in June 2010.