Connect with us

18 cybersecurity startups to watch out for



In this article, we will tell you about the most interesting startups in the field of cybersecurity that you should pay attention to.

If you want to know what’s happening in the field of cybersecurity – pay attention to startups related to this area. Startups start with an innovative idea and go beyond standard solutions and a core approach. Startups often tackle problems that no one else can solve.

The downside of startups is, of course, a lack of resources and maturity. Choosing a startup product or platform is a risk that requires a special relationship between customer and supplier . However, if successful, the company can gain a competitive advantage or reduce the strain on security resources.

Below are the most interesting startups (companies founded or emerged from “stealth mode” in the last two years).

Abnormal Security

Company Abnormal Security, founded in 2019, offers a cloud-based e-mail security platform, which uses the analysis of behavioral data to detect and prevent attacks on e-mail. The AI-powered platform analyzes user data behavior, organizational structure, relationships and business processes to identify abnormal activity that could indicate a cyberattack. Abnormal email protection platform can prevent corporate email compromise, supply chain attacks, account fraud, credential phishing, and email account compromise. The company also provides tools for automating incident response, and the platform provides a cloud API for integration with enterprise platforms such as Microsoft Office 365, G Suite, and Slack.


Apiiro came out of “hidden mode” in 2020. Her platform devsecops translates safety lifecycle development “from a manual and periodic approach” developers in the least “to the automatic approach based on risk assessment,” the developers in the first place “, he wrote in a blog co-founder and CEO Idan Carpenter. The Apiiro platform works by connecting all on-premises and cloud-based source and ticket control systems through an API. The platform also provides customizable predefined code management rules. Over time, the platform builds inventory by “exploring” all products, projects, and repositories. This data allows for better identification of risky code changes.

Axis Security

Axis Security Application Access Cloud is a cloud-based, zero-trust application access solution. It does not rely on having agents installed on user devices. Therefore, organizations can connect users – local and remote – on any device to private applications without affecting the network or the applications themselves. Axis exited stealth mode in 2020.


BreachQuest, which came out of stealth mode on August 25, 2021, offers an incident response platform called Priori. The platform provides greater visibility by constantly monitoring malicious activity. The company claims Priori can provide instant information on an attack and which endpoints are compromised after a threat is detected.


Cloudrise provides managed data protection and security automation services in SaaS format. Despite its name, Cloudrise protects both cloud and on-premises data. The company claims it can integrate data protection into digital transformation projects. Cloudrise automates workflows with data protection and privacy solutions. Cloudrise was launched in October 2019.


Cylentium claims that its cyber-stealth technology can “hide” a corporate or home network and any device connected to it from intruders. The company calls this concept “zero identity”. The company sells its products to businesses, consumers and the public sector. Cylentium was launched in 2020.


Deduce , founded in 2019, offers two products for the so-called “intelligent personality analysis”. The Customer Alert Service notifies customers of potential account compromise, and the Identity Risk Assessment uses aggregated data to assess the risk of account compromise. The company uses cognitive algorithms to analyze sensitive data from more than 150,000 websites and applications to detect possible fraud. Deduce claims that using its products reduces account hijack damage by over 90%.


Drata’s automated security and compliance platform is focused on audit readiness against standards such as SOC 2 or ISO 27001. Drata monitors and collects security data to provide evidence of their existence and performance. The platform also helps streamline workflows. Drata was founded in 2020.


FYEO is a threat monitoring and access control platform for consumers, enterprises, and small and medium businesses. The company claims its credential management solutions remove the burden of digital identity management. FYEO Domain Intelligence (“FYEO DI”) provides domain, credential and threat monitoring services. FYEO Identity will provide password and identity management services starting in Q4 2021. FYEO exited stealth mode in 2021.

Hive Pro

Kronos is Hive Pro’s predictive vulnerability analytics (PVA) platform based on four pillars: prevention, detection, response and prediction. Hive Pro automates and coordinates vulnerability remediation with a single view. Artemis’ product is a data-driven penetration testing platform and service. Hive Pro was founded in 2019.


The Israeli company Infinipoint was founded in 2019. It calls its core cloud product “device identification as a service,” or DIaaS , which is a device identification and positioning solution. The product integrates with SSO authentication and acts as a single point of enforcement for all corporate services. DIaaS uses risk analysis to enforce policy, provides device security status as claimed, and fixes vulnerabilities with one click.


Semiconductor manufacturing company Kameleon does not have its own factories and has a special place among cybersecurity vendors. The company has developed a Proactive Security Processing Unit (ProSPU). It is designed to protect systems at boot time and for use in data centers, managed computers, servers, and cloud computing systems. Kameleon was founded in 2019.

Open Raven

Open Raven cloud data security platform is designed to provide greater transparency of cloud resources. The platform displays all cloud data stores, including shadow cloud accounts, and identifies the data they store. Open Raven then monitors data breaches and policy violations in real time and alerts teams when fixes are needed. Open Raven can also monitor log files for sensitive information that should be removed. The company came out of “hidden mode” in 2020.


Company Satori, founded in 2019, calls its service access to data “DataSecOps”. The purpose of the service is to decouple security and privacy controls from the architecture. The service monitors, classifies and controls access to confidential data. You can configure policies based on criteria such as groups, users, data types, or schema to prevent unauthorized access, mask sensitive data, or start a workflow. The service offers pre-configured policies for general rules like GDPR , CCPA, and HIPAA .

Scope Security

Scope Security recently emerged from stealth mode when it was founded in 2019. Its Scope OmniSight product targets the healthcare industry and detects attacks on IT infrastructure, clinical systems, and electronic health records . Threat Intelligence can collect threat indicators from a variety of internal and third-party sources, presenting data through a single portal.


Strata’s flagship product is the Maverics Identity Orchestration Platform . It is a distributed multi-cloud identity management platform. Strata’s stated goal is to provide consistency across distributed cloud environments for user identity for applications deployed across multiple clouds and on-premises. Features include a secure hybrid access solution to extend zero-trust access to on-premises applications for cloud users, an identity abstraction layer for better identity management in a multi-cloud environment, and a connector catalog for integrating identities from popular cloud and identity management systems. Strata was founded in 2019.


SynSaber , launched on July 22, 2021, offers a solution for monitoring industrial assets and the network. The company promises to provide “ongoing understanding and awareness of health, vulnerabilities and threats across all points in the industrial ecosystem, including IIoT, cloud and on-premises.” SynSaber was founded by former Dragos and Crowdstrike leaders.


Traceable calls its core AI product a cross between web application firewall and application runtime self-defense. The company claims to offer accurate detection and blocking of threats by monitoring application activity and continuous training to distinguish normal from malicious activity. The product integrates with API gateways. Traceable was founded in July 2020.


Company Wiz, founded by a team of Microsoft cloud security offers a solution for security within cloud, designed for large-scale work. The company claims that its product can analyze all layers of the cloud stack to identify high-risk attack vectors and provide insights to better prioritize. Wiz takes an agentless approach and can scan all virtual machines and containers. Wiz came out of “hidden mode” in 2020.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *


Chinese TikTok adds 5-second pauses between videos to combat addictions



5-second warning clips will remind you to “put the phone away” or “go to bed”.

Douyin, the Chinese app “twin” of TikTok, owned by the same ByteDance company, is introducing measures to combat its own algorithms, tuned to keep users’ attention as long as possible. Now those who “stick” in the application for too long will be revived by forced pauses between clips. Reported by the South China Morning Post.

On the social network, there are five-second pauses between videos that cannot be missed. During such pauses, users will be forced to watch videos reminding them of the need to “put the phone away”, “go to bed” or that “work tomorrow”. They will appear when the user spends too much time in the application.

Previously, Douyin had already limited video viewing – then the changes affected the children’s audience. Teenagers under 14 were allowed to watch videos for a maximum of 40 minutes a day, and were also banned from entering the application from 10 pm to 6 am.

Continue Reading


Trump’s social network developers accused of illegal use of program code



The Software Freedom Conservancy claims Trump Media and Technology Group copied the open source code of the decentralized social network Mastodon, created a new social network based on it.

The Software Freedom Conservancy (SFC), a not-for-profit organization that enforces the rights of open source software developers and the rules for using open licenses, accused in violation of the AGPLv3 license of the Trump social network developers Truth Social.

The Software Freedom Conservancy says that the developers of the service used the open source code of the decentralized social network Mastodon in violation of the license agreement.

Although the Mastodon code is free and free, the projects using it must comply with the terms of the Affero General Public License (or AGPLv3), among which is the mandatory availability of the project source code for all its users. Trump’s media company does not yet provide such an opportunity to TRUTH Social users and calls the social network a proprietary development.

The Software Freedom Conservancy gave Trump Media and Technology Group 30 days to improve, writes The Verge. Otherwise, the use of open source Mastodon will be prohibited for the company.

Continue Reading


Facebook end-to-end encryption will give foreign intelligence services surveillance capabilities



Former Facebook employee Frances Haugen criticized the company’s decision to transfer correspondence in its services to end-to-end encryption.

The introduction of end-to-end encryption in Facebook messengers could negatively affect the privacy of users and lead to increased surveillance by intelligence agencies. This opinion was expressed by a former employee of Mark Zuckerberg’s company, Frances Haugen, reports TASS.

According to her, after the launch of encryption in the Messenger application and the social network Instagram, which are owned by Facebook, the company will lose the ability to track possible “malicious operations of special services representatives.” “End-to-End Encryption Will Allow Facebook to Eliminate [от модерирования контента] and serve as an excuse for inaction, “Haugen said ahead of her October 25 speech in the British Parliament as part of discussions on online security bill.

The social network itself does not agree with this point of view. In their opinion, the introduction of end-to-end encryption in Facebook Messenger and Instagram applications, on the contrary, is aimed primarily at protecting the privacy of users and will protect them not only from foreign surveillance, but also from hackers.

Continue Reading

Most Popular