Corporate relocation startup Shyft raises $15M

Shyft is announcing it has raised $15 million in Series A funding to make the moving process less painful — specifically in the situations where your employer is paying for the move.

Other startups are looking to offer concierge-type services for regular moving — I used a service called Moved last year and liked it. But Shyft co-founder and CEO Alex Alpert (who’s spent years in the moving business) told me there are no direct competitors focused on corporate relocation.

“Even at the highest levels, the process is totally jacked up,” Alpert said. “We saw an opportunity to partner with corporations and relocation management companies to build a customized, tech-driven experience with more choices, more flexibility and to be able to navigate the quoting process seamlessly.”

So when a company that uses Shyft decides to relocate you — whether you’re a new hire or just transferring to a new office — you should get an email prompting you to download the Shyft app, where you can chat with a “move coach” who guides you through the process.

You’ll also be able to catalog the items you want to move over a video call and get estimates from movers. And you’ll receive moving-related offers from companies like Airbnb, Wag, Common, Sonder and Home Chef.

And as Alpert noted, Shyft also partners with more traditional relocation companies like Graebel, rather than treating them as competitors.

Shyft screenshot

The company was originally called Crater and focused on building technology for creating accurate moving estimates via video. It changed its name and its business model back in 2018 (Alpert acknowledged, “It wasn’t a very popular pitch in the beginning: ‘Hey, we’re building estimation software for moving companies.’ “), but the technology remains a crucial differentiator.

“Our technology is within 95% accurate at identifying volume and weight of the move,” he said. “When moving companies know the information is reliable, they can bid very aggressively.”

As a result, Alpert said the employer benefits not just from having happier employees, but lower moving costs.

The new funding, meanwhile, was led by Inovia Capital, with participation from Blumberg Capital and FJ Labs.

“There’s a total misalignment between transactional relocation services and the many logistical, social, and lifestyle needs that come with moving to a new city,” Inovia partner Todd Simpson said in a statement. “As businesses shift towards more distributed workforces and talent becomes accustomed to personalized experiences, the demand for a curated moving offering will continue to grow.”

Thundra announces $4M Series A to secure and troubleshoot serverless workloads

Thundra, an early-stage serverless tooling startup, announced a $4 million Series A today led by Battery Ventures. The company spun out from Opsgenie after it was sold to Atlassian for $295 million in 2018.

York IE, Scale X Ventures and Opsgenie founder Berkay Mollamustafaoglu also participated in the round. Battery’s Neeraj Agarwal is joining the company’s board under the terms of the agreement.

The startup also announced that it had recently hired Ken Cheney as CEO, with technical founder Serkan Ozal becoming CTO.

Originally, Thundra helped run the serverless platform at Opsgenie. As a commercial company, it helps monitor, debug and secure serverless workloads on AWS Lambda. These three tasks could easily be separate tools, but Cheney says it makes sense to include them all because they are all related in some way.

“We bring all that together and provide an end-to-end view of what’s happening inside the application, and this is what really makes Thundra unique. We can actually provide a high-level distributed view of that constantly changing application that shows all of the components of that application, and how they are interrelated and how they’re performing. It can also troubleshoot down to the local service, as well as go down into the runtime code to see where the problems are occurring and let you know very quickly,” Cheney explained.

He says that this enables developers to get this very detailed view of their serverless application that otherwise wouldn’t be possible, helping them concentrate less on the nuts and bolts of the infrastructure, the reason they went serverless in the first place, and more on writing code.

Serverless trace map in Thundra. Screenshot: Thundra

Thundra is able to do all of this in a serverless world, where there isn’t a fixed server and resources are ephemeral, making it difficult to identity and fix problems. It does this by installing an agent at the Lambda (AWS’ serverless offering) level on AWS, or at runtime on the container at the library level, he said.

Battery’s Neeraj Agarwal says having invested in Opsgenie, he knew the engineering team and was confident in the team’s ability to take it from internal tool to more broadly applicable product.

“I think it has to do with the quality of the engineering team that built Opsgenie. These guys are very microservices-oriented, very product-oriented, so they’re very quick at iterating and developing products. Even though this was an internal tool I think of it as very much productized, and their ability to now sell it to the broader market is very exciting,” he said.

The company offers a free version, then tiered pricing based on usage, storage and data retention. The current product is a cloud service, but it plans to add an on-prem version in the near future.

IBM snaps out of its revenue doldrums, breaking a five-quarter losing streak in Q4

International Business Machines is living a case study of a large, established company vying to transform. Over the last decade, the technology elder has struggled to move into areas like cloud and AI. IBM has leaned on a combination of its own R&D abilities and deep pockets to push into modern markets, but has struggled to turn them into revenue growth.

At one point, Big Blue posted 22 sequential quarters of falling revenue, a mind-boggling testament to how hard it can be to turn around a juggernaut. More recently, IBM shrank for another five consecutive quarters, a streak it broke with yesterday’s news that it had beat analyst expectations. 

The quarter brought modest, but welcome revenue growth. Perhaps more importantly, the company’s top line expansion was co-led by the old IBM mainframe business and its newest champion, Red Hat.

IBM can be happy for the positive financial news, for now at least, but it needs to repeat the result. The challenge it faces moving forward will include finding a way to continue revenue growth while modernizing its product line and ensuring that its huge Red Hat purchase continues to perform.

ServiceNow acquires Loom Systems to expand AIOps coverage

ServiceNow announced today that it has acquired Loom Systems, an Israeli startup that specializes in AIOps. The companies did not reveal the purchase price.

IT operations collects tons of data across a number of monitoring and logging tools, way too much for any team of humans to keep up with. That’s why there are startups like Loom turning to AI to help sort through it. It can find issues and patterns in the data that would be challenging or impossible for humans to find. Applying AI to operations data in this manner has become known as AIOps in industry parlance.

ServiceNow is first and foremost a company trying to digitize the service process, however that manifests itself. IT service operations is a big part of that. Companies can monitor their systems, wait until a problem happens and then try to track down the cause and fix it — or, they can use the power of artificial intelligence to find potential dangers to the system health and neutralize them before they become major problems. That’s what an AIOps product like Loom’s can bring to the table.

Jeff Hausman, vice president and general manager of IT Operations Management at ServiceNow, sees Loom’s strengths merging with ServiceNow’s existing tooling to help keep IT systems running. “We will leverage Loom Systems’ log analytics capabilities to help customers analyze data, automate remediation and reduce L1 incidents,” he told TechCrunch.

Loom co-founder and CEO Gabby Menachem not surprisingly sees a similar value proposition. “By joining forces, we have the unique opportunity to bring together our AI innovations and ServiceNow’s AIOps capabilities to help customers prevent and fix IT issues before they become problems,” he said in a statement.

Loom has raised $16 million since it launched in 2015, according to PitchBook data. Its most recent round for $10 million was in November 2019. Today’s deal is expected to close by the end of this quarter.

Google Cloud gets a Secret Manager

Google Cloud today announced Secret Manager, a new tool that helps its users securely store their API keys, passwords, certificates and other data. With this, Google Cloud is giving its users a single tool to manage this kind of data and a centralized source of truth, something that even sophisticated enterprise organizations often lack.

“Many applications require credentials to connect to a database, API keys to invoke a service, or certificates for authentication,” Google developer advocate Seth Vargo and product manager Matt Driscoll wrote in today’s announcement. “Managing and securing access to these secrets is often complicated by secret sprawl, poor visibility, or lack of integrations.”

With Berglas, Google already offered an open-source command-line tool for managing secrets. Secret Manager and Berglas will play well together and users will be able to move their secrets from the open-source tool into Secret Manager and use Berglas to create and access secrets from the cloud-based tool as well.

With KMS, Google also offers a fully managed key management system (as do Google Cloud’s competitors). The two tools are very much complementary. As Google notes, KMS does not actually store the secrets — it encrypts the secrets you store elsewhere. Secret Manager provides a way to easily store (and manage) these secrets in Google Cloud.

Secret Manager includes the necessary tools for managing secret versions and audit logging, for example. Secrets in Secret Manager are also project-based global resources, the company stresses, while competing tools often manage secrets on a regional basis.

The new tool is now in beta and available to all Google Cloud customers.

The Good, the Bad and the Ugly in Cybersecurity – Week 4

Image of The Good, The Bad & The Ugly in CyberSecurity

The Good

US politics is deeply divided, but at least both sides of the aisle agree on one thing: cybercrime needs to be tackled in an urgent and coordinated fashion. So it’s good news that on Jan 17th, Congress proposed the bipartisan “Cybersecurity State Coordinator Act of 2020” bill. If passed, it would allow for the appointment of 50 employees (one for each state) to join CISA, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency. Each employee would function as a cybersecurity state coordinator, allowing them to facilitate between federal and non-federal agencies in various capacities such as providing federal cyber-security risk advice, being a principle point of contact during cyber incidents, and acting as a strategic facilitator. Key responsibilities would include helping organizations to plan for and manage the development of cybersecurity infrastructure, promote sharing of threat intel, promote federal cyber resources to non-federal entities as well as supporting training, exercises, and remediation efforts related to cybersecurity risks and incidents.

The bill is a step in the right direction. Instead of hitting agencies with another “stick” in the form of more regulation and penalties for failing to secure data and services, this is more of a “carrot” – offering much-needed practical help to state and local governments, schools, hospitals and other organizations that are currently struggling to keep up with the cyber onslaught.

image of Cybersecurity State Coordinator Act

The Bad

All data breaches are bad, but to paraphrase Tolstoy, “Each data breach is miserable in its own way”. But then there are some data breaches that eclipse anything else we know. Such a data breach was made public this week, by none other than Microsoft.

In a blog post, the OS maker said that an internal customer support database that was storing anonymized user analytics was accidentally exposed online without proper protections between December 5th and 31st. The result was the exposure of 14 years’ of customer support logs, containing 250 million records, with information such as email addresses, IP addresses, and support case details. Microsoft said that most of the records didn’t contain any personal user information. The misconfigured servers were exposed to the internet for 25 days before being identified and closed. The researchers who found the servers said that the data could be valuable to tech support scammers, in particular those that pretend to be Microsoft support representatives. Microsoft did act promptly and fixed things within two days of notification. However, this incident highlights that even extremely-proficient organizations still struggle with cloud configuration and security.

image of Bob Diachenko tweet

The Ugly

The big ugly story this week involves Amazon, but in this case the online retail giant, or more accurately its founder and CEO Jeff Bezos, is the victim rather than the perpetrator. The UK’s Guardian newspaper learned that Bezos’ iPhone was apparently hacked in May 2018 via malware hidden in an mp4 file that was sent to Bezos in a WhatsApp message. And what has really caused an ugly cyberstorm around this story is that the message was allegedly sent to Bezos by Saudi Arabia’s crown prince Mohammed bin Salman.

image of tweet jeff bezos

While the Saudi embassy has naturally denied the claims, calling the accusations ‘absurd’, the researchers who conducted the analysis on the Amazon CEO’s iPhone said it was “highly probable” that the malware had come from an infected video file sent from the account of the crown prince. Within hours of the malware infection, large amounts of personal data from Bezos’ phone were exfiltrated, presumably uploaded to servers controlled by the malware authors.

As for the motive for such a highly personal attack, speculation revolves around the fact that Bezos also owns the Washington Post. Saudi Arabia has long been disgruntled at stories in the Post critical of the country’s human rights record, and there are suggestions it may have hoped to use the stolen data to gain leverage for more favorable press coverage. The Post was, of course, also the employer of the murdered Saudi journalist Jamal Khashoggi. There’s plenty more intrigue to this story, we’re sure, and we’d all definitely like to know more about the malware used in the attack. In the meantime, be careful who you chat with and beware unsolicited mp4 files!


Like this article? Follow us on LinkedIn, Twitter, YouTube or Facebook to see the content we post.

Read more about Cyber Security

In latest JEDI contract drama, AWS files motion to stop work on project

When the Department of Defense finally made a decision in October on the decade-long, $10 billion JEDI cloud contract, it seemed that Microsoft had won. But nothing has been simple about this deal from the earliest days, so it shouldn’t come as a surprise that last night Amazon filed a motion to stop work on the project until the court decides on its protest of the DoD’s decision.

The company announced on November 22nd that it had filed suit in the U.S. Court of Federal Claims protesting the DoD’s decision to select Microsoft. Last night’s motion is an extension of that move to put the project on hold until the court decides on the merits of the case.

Sources tell us that AWS decided not protest the start of initial JEDI activities at the time of the court filing in November as an accommodation made at DoD’s request. DoD declined to comment on that.

As for why they are doing it now, an Amazon spokesperson had this to say in a statement last night: “It is common practice to stay contract performance while a protest is pending and it’s important that the numerous evaluation errors and blatant political interference that impacted the JEDI award decision be reviewed. AWS is absolutely committed to supporting the DoD’s modernization efforts and to an expeditious legal process that resolves this matter as quickly as possible.”

As we previously reported, the statement echoes sentiments AWS CEO Andy Jassy made at a press event during AWS re:Invent in December:

“I would say is that it’s fairly obvious that we feel pretty strongly that it was not adjudicated fairly,” he said. He added, “I think that we ended up with a situation where there was political interference. When you have a sitting president, who has shared openly his disdain for a company, and the leader of that company, it makes it really difficult for government agencies, including the DoD, to make objective decisions without fear of reprisal.”

This is just the latest turn in a contract procurement process for the ages. It will now be up to the court to decide if the project should stop or not, and beyond that if the decision process was carried out fairly.

Proxyclick raises $15M Series B for its visitor management platform

If you’ve ever entered a company’s office as a visitor or contractor, you probably know the routine: check in with a receptionist, figure out who invited you, print out a badge and get on your merry way. Brussels, Belgium and New York-based Proxyclick aims to streamline this process, while also helping businesses keep their people and assets secure. As the company announced today, it has raised a $15 million Series B round led by Five Elms Capital, together with previous investor Join Capital.

In total, Proxyclick says its systems have now been used to register more than 30 million visitors in 7,000 locations around the world. In the U.K. alone, more than 1,000 locations use the company’s tools. Current customers include L’Oréal, Vodafone, Revolut, PepsiCo and Airbnb, as well as a number of other Fortune 500 firms.

Gregory Blondeau, founder and CEO of Proxyclick, stresses that the company believes that paper logbooks, which are still in use in many companies, are simply not an acceptable solution anymore, not in the least because that record is often permanent and visible to other visitors.

Proxyclick’s founding team.

“We all agree it is not acceptable to have those paper logbooks at the entrance where everyone can see previous visitors,” he said. “It is also not normal for companies to store visitors’ digital data indefinitely. We already propose automatic data deletion in order to respect visitor privacy. In a few weeks, we’ll enable companies to delete sensitive data such as visitor photos sooner than other data. Security should not be an excuse to exploit or hold visitor data longer than required.”

What also makes Proxyclick stand out from similar solutions is that it integrates with a lot of existing systems for access control (including C-Cure and Lenel systems). With that, users can ensure that a visitor only has access to specific parts of a building, too.

In addition, though, it also supports existing meeting rooms, calendaring and parking systems, and integrates with Wi-Fi credentialing tools so your visitors don’t have to keep asking for the password to get online.

Like similar systems, Proxyclick provides businesses with a tablet-based sign-in service that also allows them to get consent and NDA signatures right during the sign-in process. If necessary, the system also can compare the photos it takes to print out badges with those on a government-issued ID to ensure your visitors are who they say they are.

Blondeau noted that the whole industry is changing, too. “Visitor management is becoming mainstream, it is transitioning from a local, office-related subject handled by facility managers to a global, security and privacy-driven priority handled by chief information security officers. Scope, decision drivers and key people involved are not the same as in the early days,” he said.

It’s no surprise then that the company plans to use the new funding to accelerate its roadmap. Specifically, it’s looking to integrate its solution with more third-party systems with a focus on physical security features and facial recognition, as well as additional new enterprise features.

Xerox wants to replace HP board that rejected takeover bid

In Xerox’s latest effort to get HP to bend to its will and combine the two companies, it announced its intent today to try to replace the entire HP board of directors at the company’s stockholder’s meeting in April. That would be the same board that unanimously rejected Xerox’s takeover bid.

Xerox and HP have been playing a highly public game of tit for tat in recent months. Xerox wants very much to combine with HP, and offered $34 billion, an offer HP summarily rejected at the end of last year. Xerox threatened to take it to shareholders.

Now it wants to take over the board, announcing today that it had nominated 11 people to replace the current slate of directors.

As you might imagine, HP was none too pleased with this latest move by Xerox. “We believe these nominations are a self-serving tactic by Xerox to advance its proposal, that significantly undervalues HP and creates meaningful risk to the detriment of HP shareholders,” HP fired back in a statement today emailed to TechCrunch.

It went on to blame Xerox shareholder Carl Icahn for the continued pressure. “We believe that Xerox’s proposal and nominations are being driven by Carl Icahn, and his large ownership position in Xerox means that his interests are not aligned with those of other HP shareholders. Due to Mr. Icahn’s ownership position, he would disproportionately benefit from an acquisition of HP by Xerox at a price that undervalues HP,” the company stated.

The two companies exchanged increasingly harsh letters in November as Xerox signaled its intent to take over the much larger HP. HP questioned Xerox’s ability to raise the money, but earlier this month it announced had in fact raised the $24 billion it would need to buy the company. HP was still not convinced.

Today’s exchange is just the latest between the two companies in an increasingly hostile bid by Xerox to combine the two companies.

As SaaS stocks set new records, Atlassian’s earnings show there’s still room to grow

Hello and welcome back to our regular morning look at private companies, public markets and the gray space in between.

SaaS stocks had a good run in late 2019. TechCrunch covered their ascent, a recovery from early-year doldrums and a summer slowdown. In 2020 so far, SaaS and cloud stocks have surged to all-time highs. The latest records are only a hair higher than what the same companies saw in July of last year, but they represent a return to form all the same.

Given that public SaaS companies have now managed to crest their prior highs and have been rewarded for doing so with several days of flat trading, you might think that there isn’t much room left for them to rise. Not so, at least according to Atlassian . The well-known software company reported earnings after-hours yesterday and the market quickly pushed its shares up by more than 10%.

Why? It’s worth understanding, because if we know why Atlassian is suddenly worth lots more, we’ll better grok what investors — public and private — are hunting for in SaaS companies and how much more room they may have to rise.