Founders: Micha Rave, Shmulik Ladkani, Chen Nisnkorn, Alon Horowitz
Year founded: 2025
Field: The First Secretless Access Management Platform
HQ: Tel Aviv, Israel
YL Ventures Named to TIME's List of America's Top Venture Capital Firms for 2025 and Ranked Among PitchBook's Top 10 Global Fund Managers (2022, 2023, 2024).
Learn MoreOur multidisciplinary team of experts are always on hand to help you see your vision through. With support tailored to your needs and preferences, we work with you from the earliest stages of your journey to outpace the competition and secure market dominance.
HEAR IT FROM OUR FOUNDERSOur multidisciplinary team of experts are always on hand to help you see your vision through. With support tailored to your needs and preferences, we work with you from the earliest stages of your journey to outpace the competition and secure market dominance.
HEAR IT FROM OUR FOUNDERSWith over 15 years of cybersecurity company-building experience and an in-house team of industry veterans, we offer a broad spectrum of expertise to complement your own. Cybersecurity is our sole focus, and we specialize in helping founders identify and take on the industry’s greatest challenges.
With over 15 years of cybersecurity company-building experience and an in-house team of industry veterans, we offer a broad spectrum of expertise to complement your own. Cybersecurity is our sole focus, and we specialize in helping founders identify and take on the industry’s greatest challenges.
Our global community of cybersecurity experts, potential customers, partners and growth investors hail from the largest companies and firms in the world. Build a full sales pipeline of Fortune 500 companies and tap into a wellspring of advice and knowledge from your target market and seasoned cybersecurity executives.
Our global community of cybersecurity experts, potential customers, partners and growth investors hail from the largest companies and firms in the world. Build a full sales pipeline of Fortune 500 companies and tap into a wellspring of advice and knowledge from your target market and seasoned cybersecurity executives.
Acquired by
Cato Networks
Acquired by
ORCA
Acquired by
Commvault
Acquired by
Tenable
Hush Security helps organizations discover and take control of their Non-human Identities (NHIs) and the secrets they use to access resources in runtime. While NHIs form the backbone of modern IT infrastructure, they present an expanding and dynamic security challenge across multi-cloud environments. Unlike existing solutions that only provide secrets inventory and visibility, Hush also enables security teams and developers to operationalize and prioritize secrets management based on actual consumption at runtime. The platform combines real-time risk assessment with automated IAM policy enforcement, delivering comprehensive posture management that ensures robust security, operational efficiency and regulatory compliance.
MIND is the first-ever data security platform that puts data loss prevention (DLP) and insider risk management (IRM) programs on autopilot to automatically protect sensitive information, mitigate risk and preserve brand reputation. We enable businesses to mind what really matters—their most sensitive data.
Using in-application context to shed light on your biggest attack surface, Miggo’s ADR enables businesses to monitor how applications behave in runtime and stop attackers from manipulating chains of trust between distributed services. With Miggo, monitor application weak spots, identify and mitigate attacks in real time.
Acquired by
Cato Networks
The Aim GenAI Security platform ensures the security of every GenAI interaction, agent, and application, safeguarding against adversarial attacks, data leaks, and compliance breaches. With Aim, security and business leaders can get comfortable and unleash the business benefits of GenAI without compromising on security.
Acquired by
ORCA
Consolidating all security issues across posture and vulnerability tools, Opus automatically aggregates, deduplicates and prioritizes the most crucial data for streamlined, effective remediation. Dramatically reduce the time from identification to remediation with Opus’ effective ability to tag the right technical owner, leverage automation and eliminate manual tasks, while tracking and measuring the process across the entire organization.
MCPTotal provides centralized developer infrastructure to secure Model Context Protocol (MCP) activity and prevent new attack surfaces from going unchecked. Its hub-and-gateway framework enables enterprises to consolidate all MCP usage in one place, ensuring oversight, auditability, and compliance without slowing innovation.
The MCPTotal platform allows organizations to host vetted MCP servers with SSO, route activity through an AI-native firewall with policy enforcement, and unify governance with full logging, auditing, and visibility. By addressing untrusted servers, exposed keys, and prompt injection risks, MCPTotal helps security leaders safeguard sensitive systems while enabling employees to securely connect AI agents to business applications.
SaaS applications are becoming decentrally managed and more complex, which is introducing misconfiguration, identity, data, and SaaS-to-SaaS integration risks. The Valence SaaS Security Platform provides visibility and remediation capabilities for business-critical SaaS applications. With Valence, security teams can empower their business to securely adopt SaaS.
Grip’s SaaS Security Control Plane platform helps companies discover, prioritize, secure and orchestrate the mitigation and remediation of risks. The innovative approach of leveraging identity as the key control point allows companies to secure all SaaS applications and empowers enterprises to embrace SaaS adoption securely.
Acquired by
Commvault
Satori continuously discovers sensitive data across all databases, lakes and warehouses, tracks data usage and applies security policies dynamically.
The complete ASPM platform can replace existing application security testing tools or integrate with them while providing cyber resiliency through unmatched visibility, risk driven prioritization and just-in-time remediation of code vulnerabilities at scale. Cycode’s Risk Intelligence Graph (RIG), the ‘brain’ behind the platform, provides traceability across the entire SDLC through natural language.
The Orca Cloud Security Platform delivers the world’s most comprehensive coverage and visibility of all risks across the cloud. With continuous first-to-market innovations and expertise, the Orca Platform ensures security teams quickly identify and remediate risks to keep their businesses secure.
SIEM replacement, Hunters SOC Platform provides data ingestion, built-in and always up-to-date threat detection, and automated correlation and investigation capabilities, minimizing the time to understand and respond to real threats. Organizations like Booking.com, ChargePoint, Yext, Upwork and Cimpress leverage Hunters SOC Platform to empower their security teams.
Ride Vision is the only Advanced Rider Assistance System (ARAS) on the market specifically designed with the limitations and safety needs of riders in mind. Its industry-leading Collision Aversion Technology (CAT™) is a fusion of Artificial Intelligence and Computer Vision, designed to seamlessly integrate with all motorcycle and scooter makes and models.
Acquired by
Tenable
By integrating with any security tool, the platform consolidates asset and vulnerability data into one view. With its powerful enrichment and context engine, it highlights critical risks and orchestrates remediation with automated workflows to help security teams own risk.
IoT product manufacturers in automotive, renewable energy, enterprise edge, and IoT rely on Karamba’s products and services to seamlessly protect their connected devices against cyberattacks. With more than 120 successful engagements with Fortune 500 companies, IoT product manufacturers trust Karamba’s award-winning solutions for compliance and brand competitiveness when protecting their customers against cyber threats.
As the pioneers of container security with Twistlock and author of NIST SP 800-190, Minimus solves the endless treadmill of cloud software vulnerabilities by simply preventing 95% of them from ever existing.
At YL Ventures, supporting our founders goes beyond capital. It means working side by side, sharing expertise, and creating real opportunities for growth. This week, we hosted an exclusive GenAI Marketing Workshop for portfolio marketers, focused on practical, battle-tested AI tools and workflows for cybersecurity startups. From content creation and research to sales enablement, the…
At YL Ventures, supporting our founders goes beyond capital. It means sharing expertise & creating opportunities for growth. This week, we hosted a GenAI Marketing Workshop for portfolio marketers, focused on AI tools & workflows for cybersecurity startups. Thank you, Adi Retman!
At YL Ventures, supporting our founders goes beyond capital. It means working side by side, sharing expertise, and creating real opportunities for growth. This week, we hosted an exclusive GenAI Marketing Workshop for portfolio marketers, focused on practical, battle-tested AI tools and workflows for cybersecurity startups. From content creation and research to sales enablement, the…
We’re proud to share that Miggo Security has been named a Gartner Cool Vendor in AI Security! Miggo is the only Application Detection & Response (ADR) platform recognized in this category, a strong signal of its unique approach to securing AI applications at runtime. With predictive vulnerability intelligence, DeepTracing™ runtime detection, and its WAF Copilot,…
Cycode has entered the 2025 Gartner Magic Quadrant™ for Application Security Testing (AST), a milestone that underscores their leadership in securing the software the world depends on. Read the full announcement: https://hubs.la/Q03MXSfG0
At YL Ventures, supporting our founders goes beyond capital. It means working side by side, sharing expertise, and creating real opportunities for growth. This week, we hosted an exclusive GenAI Marketing Workshop for portfolio marketers, focused on practical, battle-tested AI tools and workflows for cybersecurity startups. From content creation and research to sales enablement, the…
We’re proud to share that Miggo Security has been named a Gartner Cool Vendor in AI Security – the only Application Detection & Response (ADR) platform recognized in this category! Read more on Miggo’s announcement: https://hubs.la/Q03MWp2f0
Cycode has entered the 2025 Gartner Magic Quadrant™ for Application Security Testing (AST), a milestone that underscores their leadership in securing the software the world depends on. From the start, Cycode set out to unify AST, ASPM and Software Supply Chain Security into one AI-native platform. Today, they stand as the only company to deliver…
Cycode has entered the 2025 Gartner Magic Quadrant™ for Application Security Testing (AST), a milestone that underscores their leadership in securing the software the world depends on. From the start, Cycode set out to unify AST, ASPM and Software Supply Chain Security into one AI-native platform. Today, they stand as the only company to deliver…
We’re proud to share that Miggo Security has been named a Gartner Cool Vendor in AI Security! Miggo is the only Application Detection & Response (ADR) platform recognized in this category, a strong signal of its unique approach to securing AI applications at runtime. With predictive vulnerability intelligence, DeepTracing™ runtime detection, and its WAF Copilot,…