Founders: Daniel Shechter, Itai Goldman
Year founded: 2023
Field: ADR
HQ: Tel Aviv, Israel
Our 查询澳洲号码记录历史结果-彩号查询 team of experts are always on hand to help you see your vision through. With support tailored to your needs and preferences, we work with you from the earliest stages of your journey to outpace the competition and secure market dominance.
HEAR IT FROM OUR FOUNDERSOur multidisciplinary team of experts are always on hand to help you see your vision through. With support tailored to your needs and preferences, we work with you from the earliest stages of your journey to outpace the competition and secure market dominance.
HEAR IT FROM OUR FOUNDERSWith over 15 years of cybersecurity company-building experience and an in-house team of industry veterans, we offer a broad spectrum of expertise to complement your own. Cybersecurity is our sole focus, and we specialize in helping founders identify and take on the industry’s greatest challenges.
With over 15 years of cybersecurity company-building experience and an in-house team of industry veterans, we offer a broad spectrum of expertise to complement your own. Cybersecurity is our sole focus, and we specialize in helping founders identify and take on the industry’s greatest challenges.
Our 奥10历史数据查询,结果检索 community of cybersecurity experts, potential customers, partners and growth investors hail from the largest companies and firms in the world. Build a full sales pipeline of Fortune 500 companies and tap into a wellspring of advice and knowledge from your target market and seasoned cybersecurity executives.
Our global community of cybersecurity experts, potential customers, partners and growth investors hail from the largest companies and firms in the world. Build a full sales pipeline of Fortune 500 companies and tap into a wellspring of advice and knowledge from your target market and seasoned cybersecurity executives.
Acquired by
Tenable
Acquired by
Okta
Acquired by
Snyk
Acquired by
Claroty
Acquired by
Elastic
Exited at Unicorn Valuation
Acquired by
Palo Alto Networks
Acquired by
Microsoft
Acquired by
Proofpoint
Acquired by
CA Technologies
Acquired by
Walmart
Acquired by
Radware
Acquired by
Limelight Networks
Exited to
Amadeus Capital
Using in-application context to shed light on your biggest attack surface, Miggo’s ADR enables businesses to monitor how applications behave in runtime and stop attackers from manipulating chains of trust between distributed services. With Miggo, monitor application weak spots, identify and mitigate attacks in real time.
The Aim GenAI Security platform ensures the security of every GenAI interaction, agent, and application, safeguarding against adversarial attacks, data leaks, and compliance breaches. With Aim, security and business leaders can get comfortable and unleash the business benefits of GenAI without compromising on security.
Gutsy helps organizations understand how its security teams, tools, and services work together to lower risk, accelerate auditing and compliance, and drive accountability. Gutsy connects to all existing systems, automatically correlates how they work together, and identifies inconsistencies that lead to risk and non-compliance.
Consolidating all security issues across posture and vulnerability tools, Opus automatically aggregates, deduplicates and prioritizes the most crucial data for streamlined, effective remediation. Dramatically reduce the time from identification to remediation with Opus’ effective ability to tag the right technical owner, leverage automation and eliminate manual tasks, while tracking and measuring the process across the entire organization.
Acquired by
Tenable
Know exactly where data resides, categorize its type, learn who and what can access it, and keep it continuously secure by reducing risks and identifying threats. The SaaS platform is designed for easy deployment and is ready to go in minutes. Eureka’s mission is simple: help every customer achieve their “Eureka!” moment by finding and securing all data risks in the cloud without slowing down the business.
Piiano provides developer infrastructure to protect customer secrets and ensure their privacy–even in the event of a breach. The Piiano Vault enables organizations to safely store sensitive personal data in their own cloud environments with automated compliance controls, saving engineers and security leaders time, effort and resources while achieving secure and compliant applications.
SaaS applications are becoming decentrally managed and more complex, which is introducing misconfiguration, identity, data, and SaaS-to-SaaS integration risks. The Valence SaaS Security Platform provides visibility and remediation capabilities for business-critical SaaS applications. With Valence, security teams can empower their business to securely adopt SaaS.
Grip’s SaaS Security Control Plane platform helps companies discover, prioritize, secure and orchestrate the mitigation and remediation of risks. The innovative approach of leveraging identity as the key control point allows companies to secure all SaaS applications and empowers enterprises to embrace SaaS adoption securely.
Satori continuously discovers sensitive data across all databases, lakes and warehouses, tracks data usage and applies security policies dynamically.
The complete ASPM platform can replace existing application security testing tools or integrate with them while providing cyber resiliency through unmatched visibility, risk driven prioritization and just-in-time remediation of code vulnerabilities at scale. Cycode’s Risk Intelligence Graph (RIG), the ‘brain’ behind the platform, provides traceability across the entire SDLC through natural language.
The Orca Cloud Security Platform delivers the world’s most comprehensive coverage and visibility of all risks across the cloud. With continuous first-to-market innovations and expertise, the Orca Platform ensures security teams quickly identify and remediate risks to keep their businesses secure.
SIEM replacement, Hunters SOC Platform provides data ingestion, built-in and always up-to-date threat detection, and automated correlation and investigation capabilities, minimizing the time to understand and respond to real threats. Organizations like Booking.com, ChargePoint, Yext, Upwork and Cimpress leverage Hunters SOC Platform to empower their security teams.
Ride Vision is the only Advanced Rider Assistance System (ARAS) on the market specifically designed with the limitations and safety needs of riders in mind. Its industry-leading Collision Aversion Technology (CAT™) is a fusion of Artificial Intelligence and Computer Vision, designed to seamlessly integrate with all motorcycle and scooter makes and models.
By integrating with any security tool, the platform consolidates asset and vulnerability data into one view. With its powerful enrichment and context engine, it highlights critical risks and orchestrates remediation with automated workflows to help security teams own risk.
IoT product manufacturers in automotive, renewable energy, enterprise edge, and IoT rely on Karamba’s products and services to seamlessly protect their connected devices against cyberattacks. With more than 120 successful engagements with Fortune 500 companies, IoT product manufacturers trust Karamba’s award-winning solutions for compliance and brand competitiveness when protecting their customers against cyber threats.
Acquired by
Okta
Spera offers a proactive approach to identifying and addressing identity-based risks by helping security teams take control of their identity sprawl, manage partially offboarded users, and protect against stolen credentials and account takeovers. The company’s innovative platform provides visibility and contextualized insights into identities, permissions, and actions.
Acquired by
Snyk
Enso empowers organizations to build, manage and scale their AppSec programs. The platform deploys into organizations’ environments to create an actionable, unified inventory of all application assets, their owners, security posture, and associated risk.
Acquired by
Claroty
Medigate provides a dedicated platform for securing networked medical devices that are connected to electronic medical records, device servers, other enterprise systems and the internet. Medigate delivers complete visibility into devices and risk, detects anomalies and actively blocks malicious activities. Medigate enables providers to ensure the delivery of critical treatment and the protection of patient personal and private information.
Acquired by
Elastic
build.security is the first true platform for authorization, providing developers with a simple solution for managing and eliminating the kind of product vulnerabilities that can capsize entire organizations when exploited.
Exited at Unicorn Valuation
Axonius delivers a unified, extensible, and open platform that integrates information from networked devices and existing device-specific standalone management solutions, creating a single visibility and control environment. Axonius dramatically improves an organization’s security and operational posture, allowing IT and security operations teams to safely enable device adoption and usage at scale.
Acquired by
Palo Alto Networks
Twistlock provides the industry’s first enterprise suite for container security. Twistlock’s product addresses risks on the host and within the containerized application, enabling enterprises to enforce consistent security policies from development to production. Twistlock’s innovative technologies monitor container activities, manage vulnerabilities, detect and isolate threats targeting production containers.
Acquired by
Microsoft
Founders: Eran Barak, Barak Klinghofer, Idan Levin
Field: Cybersecurity Orchestration and Automation
Year Acquired: 2017
Acquired by: Microsoft (MSFT)
Acquired by
Microsoft
Hexadite AIRS is the first agentless intelligent security orchestration and automation platform for Global 2000 companies. By easily integrating with customers’ existing security technologies and harnessing artificial intelligence that automatically investigates every cyber alert and drives remediation actions, Hexadite enables security teams to go from alert to remediation in minutes at scale.
Acquired by
Proofpoint
Founders: Doron Elgressy, Yair Grindlinger
Field: Cloud Access Security Broker
Year Acquired: 2016
Acquired by: Proofpoint (PFPT)
Acquired by
Proofpoint
FireLayers enables the responsible adoption of cloud apps, while ensuring security, compliance and governance of any cloud application on any device by any user. The FireLayers Secure Cloud Application Platform delivers full control over homegrown and popular apps like Salesforce, Office 365, SuccessFactors, NetSuite and endless others.
Acquired by
CA Technologies
BlazeMeter ensures delivery of high-performance software by enabling DevOps teams to quickly and easily run open-source based performance tests against any mobile app, website or API at massive scale to validate performance at every stage of software delivery.
Acquired by
Walmart
Upstream Commerce transforms the way retailers grow sales and boost margins through real-time pricing and product assortment optimization, using state of the art Predictive and Prescriptive Analytics and competitive intelligence tools.
Acquired by
Radware
The Seculert Attack Detection & Analytics Platform, delivered as a service, combines machine-learning based analytics and threat intelligence to automatically detect cyber attacks inside the network, revealing exactly which devices and users are compromised.
Acquired by
Limelight Networks
AcceloWeb is the pioneer and leader in browsing experience optimization, enabling websites to accelerate page load times by factors of 2x to 10x, without requiring server-side code changes or client-side plug-ins. AcceloWeb’s proprietary technology can work with or without content delivery networks to provide near-instantaneous Internet browsing, thereby improving user experience and increasing revenues.
Exited to
Amadeus Capital
Clicktale lights up the digital world, revealing customer behavior, needs and intent. The world’s #1 enterprise-class Experience Analytics platform, Clicktale’s deep-drill downs get to the heart of the “how” and “why” behind customer behavior.
Welcome Maeve Juday, Business Development Associate, to the YL Ventures team! Maeve will work closely with our portfolio companies on business development and go-to-market initiatives, including enriching their customer pipelines and forging strategic partnerships. Having previously worked at #VC firm OpenView, Maeve will leverage her industry connections with prominent #cybersecurity leaders to bolster our companies’…
Welcome Maeve Juday, Business Development Associate, to the @ylventures team! Maeve will work closely with our portfolio companies on business development and GTM initiatives, including enriching their customer pipelines & forging strategic partnerships.
Welcome Maeve Juday, Business Development Associate, to the YL Ventures team! Maeve will work closely with our portfolio companies on business development and go-to-market initiatives, including enriching their customer pipelines and forging strategic partnerships. Having previously worked at #VC firm OpenView, Maeve will leverage her industry connections with prominent #cybersecurity leaders to bolster our companies’…
Our portfolio company Aim Security is on the lookout for a talented Product Manager to join their growing team! If you’re passionate about cybersecurity and have a knack for driving product development from concept to launch, this is the role for you. Join the team paving the way for secure enterprise-grade GenAI adoption. Interested in…
Our portfolio company @Aim_Security_ is on the lookout for a talented Product Manager to join their growing team! Interested in learning more? Reach out to our Talent Acquisition Lead Noy Goldstein for details: [email protected]
Our portfolio company Aim Security is on the lookout for a talented Product Manager to join their growing team! If you’re passionate about #cybersecurity and have a knack for driving #product development from concept to launch, this is the role for you. Join the team paving the way for secure enterprise-grade #GenAI adoption. Interested in…
YL Ventures leverages its unique vantage point on the Israeli cybersecurity ecosystem to aggregate data and insights on funding rounds, deals and acquisitions in this highly competitive “Ivy League” of global cybersecurity. In the first half of 2024 and despite a continuously challenging economic climate and global geopolitical challenges, the Israeli cybersecurity industry has shown…
In the first half of 2024 and despite a continuously challenging economic climate and global geopolitical challenges, the Israeli cybersecurity industry has shown extraordinary resilience and significant growth. Read our insights on @Calcalistech: https://hubs.la/Q02DxNQM0
YL Ventures leverages its unique vantage point on the Israeli cybersecurity ecosystem to aggregate data and insights on funding rounds, deals and acquisitions in this highly competitive “Ivy League” of global cybersecurity. In the first half of 2024 and despite a continuously challenging economic climate and global geopolitical challenges, the Israeli cybersecurity industry has shown…
This week, we had the pleasure of gathering an esteemed group of founders in our network for an intimate dinner, hosted in partnership with our friends at Intel Capital. It was an incredible evening filled with insightful conversations, shared experiences, and invaluable networking. It’s always a pleasure to bring together such a talented group of…
We love seeing our portfolio companies collaborate! Daniel Shechter, CEO of @MiggoSecurity, guest-starred on the ’30 Min On: Vulnerability Management’ podcast, produced by @opus_security. Daniel joined host James Berthoty to delve into ADR. Listen here: https://hubs.ly/Q02DssDQ0
Our portfolio companies Miggo Security and Opus Security came together for another insightful episode of the ’30 Min On: Vulnerability Management’ podcast, produced by Opus! Miggo Co-Founder & CEO Daniel Shechter joined host James Berthoty to delve into Application Detection and Response (ADR), discussing innovative application security methods, challenges in today’s application environments, the intersection…
YL Ventures Partner, Justin Somaini, recently joined David Malicoat on The Professional CISO Podcast to discuss the evolving cybersecurity landscape, the importance of NIST CSF, and essential advice for current and aspiring CISOs navigating the industry’s challenges. Justin also shares his journey transitioning from an in-house CISO to the world of venture capital, offering invaluable…
This week, we had the pleasure of gathering a select group of founders for an intimate dinner, hosted in partnership with @intelcapital. A huge thank you to everyone who joined us & contributed to the dynamic atmosphere – here’s to many more conversations & collaborations ahead!
YL Ventures Partner, Justin Somaini, recently joined David Malicoat on The Professional CISO Podcast to discuss the evolving cybersecurity landscape, the importance of NIST CSF, and essential advice for current and aspiring CISOs navigating the industry’s challenges. Justin also shares his journey transitioning from an in-house CISO to the world of venture capital, offering invaluable…