Founders: Daniel Shechter, Itai Goldman
Year founded: 2023
Field: ADR
HQ: Tel Aviv, Israel
Our multidisciplinary team of experts are always on hand to help you see your vision through. With support tailored to your needs and preferences, we work with you from the earliest stages of your journey to outpace the competition and secure market dominance.
HEAR IT FROM OUR FOUNDERSOur multidisciplinary team of experts are always on hand to help you see your vision through. With support tailored to your needs and preferences, we work with you from the earliest stages of your journey to outpace the competition and secure market dominance.
HEAR IT FROM OUR FOUNDERSWith over 15 years of cybersecurity company-building experience and an in-house team of industry veterans, we offer a broad spectrum of expertise to complement your own. Cybersecurity is our sole focus, and we specialize in helping founders identify and take on the industry’s greatest challenges.
With over 15 years of cybersecurity company-building experience and an in-house team of industry veterans, we offer a broad spectrum of expertise to complement your own. Cybersecurity is our sole focus, and we specialize in helping founders identify and take on the industry’s greatest challenges.
Our global community of cybersecurity experts, potential customers, partners and growth investors hail from the largest companies and firms in the world. Build a full sales pipeline of Fortune 500 companies and tap into a wellspring of advice and knowledge from your target market and seasoned cybersecurity executives.
Our global community of cybersecurity experts, potential customers, partners and growth investors hail from the largest companies and firms in the world. Build a full sales pipeline of Fortune 500 companies and tap into a wellspring of advice and knowledge from your target market and seasoned cybersecurity executives.
Acquired by
Tenable
Acquired by
Okta
Acquired by
Snyk
Acquired by
Claroty
Acquired by
Elastic
Exited at Unicorn Valuation
Acquired by
Palo Alto Networks
Acquired by
Microsoft
Acquired by
Proofpoint
Acquired by
CA Technologies
Acquired by
Walmart
Acquired by
Radware
Acquired by
Limelight Networks
Exited to
Amadeus Capital
Using in-application context to shed light on your biggest attack surface, Miggo’s ADR enables businesses to monitor how applications behave in runtime and stop attackers from manipulating chains of trust between distributed services. With Miggo, monitor application weak spots, identify and mitigate attacks in real time.
The Aim GenAI Security platform ensures the security of every GenAI interaction, agent, and application, safeguarding against adversarial attacks, data leaks, and compliance breaches. With Aim, security and business leaders can get comfortable and unleash the business benefits of GenAI without compromising on security.
Gutsy helps organizations understand how its security teams, tools, and services work together to lower risk, accelerate auditing and compliance, and drive accountability. Gutsy connects to all existing systems, automatically correlates how they work together, and identifies inconsistencies that lead to risk and non-compliance.
Consolidating all security issues across posture and vulnerability tools, Opus automatically aggregates, deduplicates and prioritizes the most crucial data for streamlined, effective remediation. Dramatically reduce the time from identification to remediation with Opus’ effective ability to tag the right technical owner, leverage automation and eliminate manual tasks, while tracking and measuring the process across the entire organization.
Acquired by
Tenable
Know exactly where data resides, categorize its type, learn who and what can access it, and keep it continuously secure by reducing risks and identifying threats. The SaaS platform is designed for easy deployment and is ready to go in minutes. Eureka’s mission is simple: help every customer achieve their “Eureka!” moment by finding and securing all data risks in the cloud without slowing down the business.
Piiano provides developer infrastructure to protect customer secrets and ensure their privacy–even in the event of a breach. The Piiano Vault enables organizations to safely store sensitive personal data in their own cloud environments with automated compliance controls, saving engineers and security leaders time, effort and resources while achieving secure and compliant applications.
SaaS applications are becoming decentrally managed and more complex, which is introducing misconfiguration, identity, data, and SaaS-to-SaaS integration risks. The Valence SaaS Security Platform provides visibility and remediation capabilities for business-critical SaaS applications. With Valence, security teams can empower their business to securely adopt SaaS.
Grip’s SaaS Security Control Plane platform helps companies discover, prioritize, secure and orchestrate the mitigation and remediation of risks. The innovative approach of leveraging identity as the key control point allows companies to secure all SaaS applications and empowers enterprises to embrace SaaS adoption securely.
Satori continuously discovers sensitive data across all databases, lakes and warehouses, tracks data usage and applies security policies dynamically.
The complete ASPM platform can replace existing application security testing tools or integrate with them while providing cyber resiliency through unmatched visibility, risk driven prioritization and just-in-time remediation of code vulnerabilities at scale. Cycode’s Risk Intelligence Graph (RIG), the ‘brain’ behind the platform, provides traceability across the entire SDLC through natural language.
The Orca Cloud Security Platform delivers the world’s most comprehensive coverage and visibility of all risks across the cloud. With continuous first-to-market innovations and expertise, the Orca Platform ensures security teams quickly identify and remediate risks to keep their businesses secure.
SIEM replacement, Hunters SOC Platform provides data ingestion, built-in and always up-to-date threat detection, and automated correlation and investigation capabilities, minimizing the time to understand and respond to real threats. Organizations like Booking.com, ChargePoint, Yext, Upwork and Cimpress leverage Hunters SOC Platform to empower their security teams.
Ride Vision is the only Advanced Rider Assistance System (ARAS) on the market specifically designed with the limitations and safety needs of riders in mind. Its industry-leading Collision Aversion Technology (CAT™) is a fusion of Artificial Intelligence and Computer Vision, designed to seamlessly integrate with all motorcycle and scooter makes and models.
By integrating with any security tool, the platform consolidates asset and vulnerability data into one view. With its powerful enrichment and context engine, it highlights critical risks and orchestrates remediation with automated workflows to help security teams own risk.
IoT product manufacturers in automotive, renewable energy, enterprise edge, and IoT rely on Karamba’s products and services to seamlessly protect their connected devices against cyberattacks. With more than 120 successful engagements with Fortune 500 companies, IoT product manufacturers trust Karamba’s award-winning solutions for compliance and brand competitiveness when protecting their customers against cyber threats.
Acquired by
Okta
Spera offers a proactive approach to identifying and addressing identity-based risks by helping security teams take control of their identity sprawl, manage partially offboarded users, and protect against stolen credentials and account takeovers. The company’s innovative platform provides visibility and contextualized insights into identities, permissions, and actions.
Acquired by
Snyk
Enso empowers organizations to build, manage and scale their AppSec programs. The platform deploys into organizations’ environments to create an actionable, unified inventory of all application assets, their owners, security posture, and associated risk.
Acquired by
Claroty
Medigate provides a dedicated platform for securing networked medical devices that are connected to electronic medical records, device servers, other enterprise systems and the internet. Medigate delivers complete visibility into devices and risk, detects anomalies and actively blocks malicious activities. Medigate enables providers to ensure the delivery of critical treatment and the protection of patient personal and private information.
Acquired by
Elastic
build.security is the first true platform for authorization, providing developers with a simple solution for managing and eliminating the kind of product vulnerabilities that can capsize entire organizations when exploited.
Exited at Unicorn Valuation
Axonius delivers a unified, extensible, and open platform that integrates information from networked devices and existing device-specific standalone management solutions, creating a single visibility and control environment. Axonius dramatically improves an organization’s security and operational posture, allowing IT and security operations teams to safely enable device adoption and usage at scale.
Acquired by
Palo Alto Networks
Twistlock provides the industry’s first enterprise suite for container security. Twistlock’s product addresses risks on the host and within the containerized application, enabling enterprises to enforce consistent security policies from development to production. Twistlock’s innovative technologies monitor container activities, manage vulnerabilities, detect and isolate threats targeting production containers.
Acquired by
Microsoft
Founders: Eran Barak, Barak Klinghofer, Idan Levin
Field: Cybersecurity Orchestration and Automation
Year Acquired: 2017
Acquired by: Microsoft (MSFT)
Acquired by
Microsoft
Hexadite AIRS is the first agentless intelligent security orchestration and automation platform for Global 2000 companies. By easily integrating with customers’ existing security technologies and harnessing artificial intelligence that automatically investigates every cyber alert and drives remediation actions, Hexadite enables security teams to go from alert to remediation in minutes at scale.
Acquired by
Proofpoint
Founders: Doron Elgressy, Yair Grindlinger
Field: Cloud Access Security Broker
Year Acquired: 2016
Acquired by: Proofpoint (PFPT)
Acquired by
Proofpoint
FireLayers enables the responsible adoption of cloud apps, while ensuring security, compliance and governance of any cloud application on any device by any user. The FireLayers Secure Cloud Application Platform delivers full control over homegrown and popular apps like Salesforce, Office 365, SuccessFactors, NetSuite and endless others.
Acquired by
CA Technologies
BlazeMeter ensures delivery of high-performance software by enabling DevOps teams to quickly and easily run open-source based performance tests against any mobile app, website or API at massive scale to validate performance at every stage of software delivery.
Acquired by
Walmart
Upstream Commerce transforms the way retailers grow sales and boost margins through real-time pricing and product assortment optimization, using state of the art Predictive and Prescriptive Analytics and competitive intelligence tools.
Acquired by
Radware
The Seculert Attack Detection & Analytics Platform, delivered as a service, combines machine-learning based analytics and threat intelligence to automatically detect cyber attacks inside the network, revealing exactly which devices and users are compromised.
Acquired by
Limelight Networks
AcceloWeb is the pioneer and leader in browsing experience optimization, enabling websites to accelerate page load times by factors of 2x to 10x, without requiring server-side code changes or client-side plug-ins. AcceloWeb’s proprietary technology can work with or without content delivery networks to provide near-instantaneous Internet browsing, thereby improving user experience and increasing revenues.
Exited to
Amadeus Capital
Clicktale lights up the digital world, revealing customer behavior, needs and intent. The world’s #1 enterprise-class Experience Analytics platform, Clicktale’s deep-drill downs get to the heart of the “how” and “why” behind customer behavior.
Today, our Senior Partner, Ofer Schreiber, spoke at EY Israel about the dynamic and innovative Israeli #cybersecurity landscape and YL Ventures’ #investment strategy. Ofer explained how the #security market reacts to evolving technological developments and shared key insights and trends shaping the future of cybersecurity, including the latest M&A activity, notable funding rounds, and much…
Gain key takeaways and conclusions from the tenth edition of our CISO Circuit Report, authored by our very own Sara Behar, Or Salom and @csoandy, on Fortune! Read the latest on CISO reporting, here >> https://hubs.la/Q02HCvfV0
Today, our Senior Partner, Ofer Schreiber, spoke at EY Israel about the dynamic and innovative Israeli #cybersecurity landscape and YL Ventures’ #investment strategy. Ofer explained how the #security market reacts to evolving technological developments and shared key insights and trends shaping the future of cybersecurity, including the latest M&A activity, notable funding rounds, and much…
Gain key takeaways and conclusions from the tenth edition of our CISO Circuit Report, authored by our very own Sara Behar, Or Salom and Andy Ellis, on Fortune! Based on data pulled from surveying Fortune 1000 CISOs and #cybersecurity decision-makers, we explored executive #security needs related to transparency, reporting and the impact of recent FTC and SEC actions….
TOMORROW! Join our portfolio company @MiggoSecurity for a live webinar as we dive deep into dive into the risks of distributed application architecture and the latest best practices to safeguard your critical assets. Register now to secure your spot: https://hubs.la/Q02HrBN50
Gain key takeaways and conclusions from the tenth edition of our CISO Circuit Report, authored by our very own Sara Behar, Or Salom and Andy Ellis, on Fortune! Based on data pulled from surveying Fortune 1000 CISOs and #cybersecurity decision-makers, we explored executive security needs related to transparency, reporting and the impact of recent FTC and SEC actions….
Who are CISOs reporting to? Gain direct insight into the strategies and minds of the world’s leading #CISOs in the tenth edition of our CISO Circuit Report! In this edition of the CISO Circuit report, our team explores the dynamics between enterprise #security leadership and their boards of directors. We also delve into executive security…
Operating Partner @csoandy shares his perspective on the recent CrowdStrike update outage and its broader implications for the #cybersecurity landscape. Read the full article in @SCMagazine: https://hubs.ly/Q02HmH750
Happening tomorrow! Join our portfolio company Miggo Security for a live #webinar as they dive deep into dive into the risks of distributed application architecture and the latest best practices to safeguard your critical assets. Miggo CEO Daniel Shechter will join industry experts Mukund Sarma from Chime and Matthew Hurewitz from Best Buy as they…
Check out Partner Justin Somaini’s latest feature in Venture Capital Journal. Justin shares his journey from CISO to venture capital, explaining the motivations behind his career pivot and the responsibilities of his new role. Justin’s ultimate goal at YL Ventures, he explains, is to “make sure that we focus on, grow and mature solutions that…
The tenth edition of the CISO Circuit report explores the dynamics between enterprise #security leadership and their boards of directors and examines the impact of recent FTC & SEC actions on personal CISO accountability. 🔗 The full report: https://hubs.la/Q02H4QQX0
Operating Partner Andy Ellis shares his perspective on the recent CrowdStrike update outage and its broader implications for the #cybersecurity landscape. “There will hopefully be a lot of discussion around the role of administrative software in the enterprise. Some of that happened post-SolarWinds, but only on the server-side. There is too much #security software that…
The results are in 📈 With Q2 of 2024 officially behind us, Senior Partner Ofer Schreiber dives into the evolving landscape of venture funding for #cybersecurity #startups with Crunchbase. “This surge is mainly the result of a growing number of exceptionally large growth rounds. After several years of a near freeze in late-stage #funding, this…
Check out Partner @JustinSomaini’s feature in @VCJournal! Read the full article to learn more about Justin’s hands-on work with our portfolio companies and his efforts in building strong relationships with security leaders and practitioners >> https://hubs.la/Q02G-T1H0
Who are CISOs reporting to? Gain direct insight into the strategies and minds of the world’s leading CISOs in the tenth edition of our CISO Circuit Report! In this edition of the #CISO Circuit report, our team explores the dynamics between enterprise #security leadership and their boards of directors. We also delve into executive security…