Sandbox Graveyard

Cybersecurity startups from RSAC Innovation Sandbox & Y Combinator — the acquired, the IPO'd, the shutdown, and the survivors. Every startup is a lesson.

321
Total
113
Acquired
4
IPO
184
Active
20
Shutdown
20
Winners
Source
Year
Status
Category
RSAC ISB2005Winner
Acquired

Sourcefire

Network Security

Network security and intrusion detection/prevention systems (IDS/IPS); creator of the Snort open-source IDS.

Raised $56.5MExit $2.7B12y to exit

Sierra Ventures · New Enterprise Associates (NEA) · Core Capital Partners +1

Acquired by Cisco Systems in 2013 for $2.7B

Open-source community building (Snort) created massive adoption that translated into commercial success. Lesson: give away the detection engine, sell the management platform.

RSAC ISB2006Winner
Acquired

Imperva

Application Security

Web application firewall (WAF) and database security provider.

Raised $26.3MExit $3.6B21y to exit

Shlomo Kramer (founder) · U.S. Venture Partners

Acquired by Thales Group in 2023 for $3.6B (IPO 2011, taken private by Thoma Bravo for $2.1B in 2019)

IPO in 2011 raising $90M

Pioneered WAF market at scale. Lesson: creating a new security category (database activity monitoring + WAF) can yield massive returns if timing matches regulatory pressure.

RSAC ISB2006
Acquired

Elemental Security

Security Operations

Security policy management and compliance platform.

Acquired by ArcSight in 2009

RSAC ISB2007Winner
Acquired

Yoggie Security Systems

Endpoint Security

Hardware-based personal security device providing endpoint protection via a dedicated security mini-computer.

Raised <$5M6y to exit

Acquired by CUPP Computing in 2011 (acqui-hire)

Hardware-based endpoint security was too niche and expensive for mainstream adoption. Lesson: if the form factor doesn't match the market's buying behavior, even innovative tech struggles.

RSAC ISB2009Winner
Active

AlertEnterprise

Identity & Access

Converged cyber-physical security and access governance platform.

Bridging IT and physical security was visionary but slow to adopt. Now thriving as IT/OT convergence becomes mainstream.

RSAC ISB2009
IPO

Yubico

Identity & Access

Hardware authentication security keys (YubiKey) for strong two-factor authentication.

Raised $88M

Andreessen Horowitz · New Enterprise Associates (NEA) · Bure Equity

IPO via SPAC on Nasdaq Stockholm in 2023 at ~$800M valuation

Didn't win the Sandbox but became one of the most successful finalists ever. Lesson: hardware-based auth with open standards (FIDO/U2F) can create a durable moat.

RSAC ISB2009
Acquired

Trusteer

Threat Detection

Online banking fraud prevention and endpoint protection against financial malware.

Raised $10MExit $800M-$1B7y to exit

Shlomo Kramer · Marius Nacht

Acquired by IBM in 2013 for ~$800M-$1B

RSAC ISB2009
Acquired

Prevx

Endpoint Security

Cloud-based anti-malware and endpoint protection.

Acquired by Webroot in 2010

RSAC ISB2009
Acquired

NetWitness

Network Security

Network forensics and security analytics platform for real-time network monitoring.

Acquired by EMC/RSA in 2011; now part of RSA NetWitness

RSAC ISB2009
Acquired

Purewire

Network Security

Cloud-based web security gateway.

Acquired by Barracuda Networks in 2009

RSAC ISB2009
Acquired

Guardium

Data Security

Database security and activity monitoring.

Raised $21MExit $225M7y to exit

Acquired by IBM in 2009 for ~$225M

RSAC ISB2009
Acquired

Catbird

Cloud Security

Virtualization and cloud infrastructure security monitoring.

Acquired by ServiceMesh (now CSC) around 2013

RSAC ISB2009
IPO

Palo Alto Networks

Network Security

Next-generation firewall platform with application-aware traffic inspection.

Raised $65M

Greylock Partners · Sequoia Capital · Globespan Capital Partners

IPO in 2012; market cap over $100B as of 2025

The biggest success story among all Innovation Sandbox finalists. Didn't need to win the contest. Lesson: product-market fit in next-gen firewalls created a generational company.

RSAC ISB2009
Acquired

Silver Tail Systems

Threat Detection

Web session intelligence and fraud detection via behavioral analysis.

Acquired by EMC in 2012

RSAC ISB2010Winner
Acquired

Altor Networks

Cloud Security

Virtual network firewall for virtualized data centers.

Raised $16MExit $95M3y to exit

Acquired by Juniper Networks in 2010 for $95M

Quick acquisition validated the virtual firewall concept. Lesson: in a land grab moment, get acquired fast or get outspent. 6x return on $16M funding.

RSAC ISB2010
Acquired

Catbird

Cloud Security

Security compliance and monitoring for virtual and cloud environments.

Acquired by ServiceMesh (later CSC/DXC Technology)

RSAC ISB2010
Acquired

Incapsula

Application Security

Cloud-based web application security and CDN service.

Acquired by Imperva in 2014; integrated into Imperva's cloud WAF

Cloud WAF pioneer eventually absorbed by 2006 ISB winner Imperva. The Innovation Sandbox ecosystem feeds itself.

RSAC ISB2010
Shutdown

KiduSema

Security Operations

IT risk management and security posture monitoring.

Company appears to have ceased operations; limited public information available.

RSAC ISB2010
Acquired

Navaho Systems

Endpoint Security

Mobile security and device management.

Exit ~$30M

Acquired by Salesforce for ~$30M (December 2010). Technology integrated into Salesforce mobile platform.

RSAC ISB2011Winner
Acquired

Invincea

Endpoint Security

Advanced endpoint protection using application containment and machine learning to prevent malware execution.

Raised $40.8M8y to exit

New Enterprise Associates (NEA) · Dell Ventures · Aeris Capital

Acquired by Sophos in 2017

Early ML-based endpoint protection. Acquired by Sophos rather than competing as standalone. Lesson: deep tech in endpoint security often leads to acquisition by platform vendors.

RSAC ISB2011
Acquired

Bromium

Endpoint Security

Micro-virtualization technology to isolate threats at the endpoint.

Raised $116M9y to exit

Andreessen Horowitz · Lightspeed Venture Partners · Intel Capital +1

Acquired by HP in 2019

Raised $116M but acquisition price was likely modest relative to funding. Lesson: heavy VC funding doesn't guarantee a good exit — hardware-assisted isolation was too niche.

RSAC ISB2011
Acquired

Mykonos Software

Application Security

Web application intrusion deception technology.

Raised $4MExit $80M

Acquired by Juniper Networks in 2012 for $80M

RSAC ISB2011
IPO

Zscaler

Network Security

Cloud-native secure web gateway and zero-trust network security.

Raised $138M

Lightspeed Venture Partners · Symmetric Capital · Google

IPO in 2018; market cap ~$25B+ as of 2025

Another non-winner that became a massive public company. Lesson: cloud-delivered security (SASE/SSE) was the right bet at the right time.

RSAC ISB2011
Acquired

Immun.io

Application Security

Runtime application self-protection (RASP).

Acquired by Trend Micro (November 2017). RASP technology folded into Trend Micro Cloud One.

RSAC ISB2011
Acquired

Virtustream

Cloud Security

Cloud infrastructure management and migration for enterprise workloads.

Raised $130MExit $1.2B

Acquired by EMC in 2015 for $1.2B; now part of Dell Technologies

RSAC ISB2011
Acquired

Cyphort

Threat Detection

Advanced threat detection using sandboxing and machine learning.

Acquired by Juniper Networks in 2017

RSAC ISB2011
Acquired

PacketMotion

Network Security

Network user activity monitoring and insider threat detection.

Acquired by VMware in 2012

RSAC ISB2011
Acquired

Vaultive

Data Security

Cloud data encryption gateway for SaaS applications.

Acquired by CyberArk (March 2018). Encryption gateway technology integrated into CyberArk's privileged access platform.

Cloud encryption proxy became a feature of CASB platforms, not a standalone product. Lesson: when your product is a feature, platform vendors will absorb you or kill you.

RSAC ISB2011
Acquired

Solera Networks

Network Security

Full packet capture and network forensics platform.

Acquired by Blue Coat Systems in 2013 for $105M; Blue Coat later acquired by Symantec

RSAC ISB2012Winner
Acquired

Appthority

Endpoint Security

Mobile application risk management and app reputation scoring.

Raised $25M7y to exit

U.S. Venture Partners · Venrock · Trident Capital Cybersecurity

Acquired by Symantec in 2018

Mobile app risk scoring was ahead of its time. Lesson: being early in a market can work if you survive long enough for demand to catch up.

RSAC ISB2012
Acquired

CloudPassage

Cloud Security

Automated security and compliance for cloud infrastructure (Halo platform).

Raised $82M11y to exit

Benchmark Capital · Tenaya Capital · Lightspeed Venture Partners

Acquired by Fidelis Cybersecurity in 2021

RSAC ISB2012
Active

Content Raven

Data Security

Secure content sharing and document DRM for enterprises.

RSAC ISB2012
Acquired

Dome9 Security

Cloud Security

Cloud security posture management (CSPM) for AWS and Azure.

Raised $27.3MExit $175M7y to exit

SoftBank Capital · Opus Capital

Acquired by Check Point Software in 2018 for $175M

CSPM became a critical cloud security category. Lesson: early movers in cloud security config get acquired by firewall vendors seeking cloud relevance.

RSAC ISB2012
Acquired

Impermium

Threat Detection

Social media and web platform abuse/fraud detection.

Raised $9M4y to exit

Accel Partners · Charles River Ventures · Greylock Partners

Acquired by Google in 2014

RSAC ISB2012
Active

Sonatype

Application Security

Software supply chain security and open-source component management (Nexus).

Software supply chain security was prescient. Lesson: the SolarWinds and Log4j incidents proved this market's importance a decade later.

RSAC ISB2012
Acquired

Sumo Logic

Security Operations

Cloud-native log management and security analytics (SIEM).

Raised $346M (venture) + $326M (IPO)Exit $1.7B13y to exit

Greylock Partners · Accel Partners · Sequoia Capital +2

Acquired by Francisco Partners in 2023 for $1.7B (taken private)

IPO in 2020 on NASDAQ

Cloud SIEM competed with Splunk. Lesson: going public then private shows the challenge of cloud SIEM economics against platform plays.

RSAC ISB2013Winner
Acquired

Remotium

Endpoint Security

Secure mobile workspace delivering virtual applications to mobile devices.

Raised $1M3y to exit

CyberAgent Capital · DNX Ventures

Acquired by Avast Software in 2015; all 15 employees joined Avast.

Mobile workspace virtualization was a valid approach but became a feature rather than a company. Lesson: acqui-hires can be a soft landing when the market picks simpler MDM/MAM approaches over elegant virtualization.

RSAC ISB2013
Acquired

Bluebox Security

Endpoint Security

Mobile threat detection and app security testing.

Acquired by Lookout in 2015

RSAC ISB2013
Active

Cylera

IoT / Hardware Security

IoT and medical device security analytics.

RSAC ISB2013
Acquired

Elastica

Cloud Security

Cloud application security broker (CASB) with data science-driven threat detection.

Raised $36.3MExit $280M3y to exit

Mayfield Fund · Third Point Ventures · Pelion Venture Partners

Acquired by Blue Coat Systems in 2015 for $280M; Blue Coat later acquired by Symantec

CASB was one of the hottest security categories of 2014-2016. Lesson: when Gartner creates a Magic Quadrant for your category, it's time to sell or scale fast.

RSAC ISB2013
Acquired

Light Point Security

Network Security

Remote browser isolation (RBI) platform.

Raised $200K10y to exitBootstrapped

Acquired by McAfee in 2020

RSAC ISB2013
Active

Mashape

Application Security

API marketplace and API management (later became Kong).

API management pivoted from marketplace to gateway/mesh. Lesson: the pivot from marketplace to infrastructure platform unlocked the real value.

RSAC ISB2013
Acquired

Morta Security

Threat Detection

Advanced threat protection and breach detection. Founded by former NSA officials.

Raised $1M2y to exit

Andreessen Horowitz · Greylock Partners · Norwest Venture Partners

Acquired by Palo Alto Networks in 2014 (acqui-hire, PAN's first acquisition)

RSAC ISB2013
Acquired

Perspecsys

Data Security

Cloud data protection and tokenization gateway.

Acquired by Blue Coat Systems in 2015; Blue Coat later acquired by Symantec

RSAC ISB2013
Acquired

ThreatStream

Threat Detection

Threat intelligence platform aggregating and operationalizing threat data.

Rebranded as Anomali; raised significant funding; still active as Anomali

RSAC ISB2013
Acquired

Vormetric

Data Security

Data-at-rest encryption and key management.

Raised $52.6MExit $400M15y to exit

Split Rock Partners · Sigma Partners · Jackson Square Ventures

Acquired by Thales in 2016 for $400M

RSAC ISB2014Winner
Acquired

RedOwl

Threat Detection

Insider threat detection using behavior analytics on employee communications and activity.

Raised $35.8M6y to exit

AllegisCyber Capital · Blackstone Group · Marc Benioff +1

Acquired by Forcepoint in 2017

Insider threat analytics was compelling but privacy concerns slowed adoption. Lesson: employee monitoring solutions face cultural headwinds regardless of technical merit.

RSAC ISB2014
Acquired

Cylance

Endpoint Security

AI/ML-based endpoint protection that prevents malware pre-execution using mathematical models.

Raised $297MExit $1.4B7y to exit

Khosla Ventures · Blackstone · KKR +2

Acquired by BlackBerry in 2019 for $1.4B. BlackBerry later sold Cylance to Arctic Wolf for $160M in 2024 — a massive loss.

ML-first endpoint protection was revolutionary but got absorbed into a declining platform (BlackBerry). Lesson: who acquires you matters as much as the acquisition price.

RSAC ISB2014
Acquired

Aorato

Identity & Access

Active Directory security and identity attack detection.

Raised $11MExit $200M2y to exit

Accel Partners · Innovation Endeavors (Eric Schmidt) · Glilot Capital Partners

Acquired by Microsoft in 2014 for ~$200M; became Microsoft Advanced Threat Analytics (ATA) / Defender for Identity

AD security became a critical Microsoft product. Lesson: if your product protects a Microsoft asset, Microsoft will buy you.

RSAC ISB2014
Active

Vectra AI

Threat Detection

AI-driven network detection and response (NDR) for real-time cyberattack identification.

NDR category pioneer. Lesson: patience and category leadership can sustain an independent security company.

RSAC ISB2014
Active

TrustInSoft

Application Security

Formal methods and mathematical verification for C/C++ code security.

RSAC ISB2014
Acquired

Fortscale

Threat Detection

User and entity behavior analytics (UEBA) for insider threat detection.

Merged with Presidio Identity to form Fortscale; eventually wound down or absorbed

RSAC ISB2014
Acquired

Vera

Data Security

Digital rights management (DRM) and file-level encryption for enterprise documents.

Acquired by HelpSystems (now Fortra) in 2020

RSAC ISB2014
Shutdown

TaaSera

Threat Detection

Threat detection through network behavior analysis of pre-breach activity.

Company appears to have shut down.

RSAC ISB2014
Active

Trusted Objects

IoT / Hardware Security

Security for IoT devices and embedded systems using secure elements.

RSAC ISB2014
Acquired

Bitglass

Cloud Security

Cloud access security broker (CASB) and cloud DLP.

Raised $150M8y to exit

New Enterprise Associates (NEA) · Norwest Venture Partners · Singtel Innov8

Acquired by Forcepoint in 2021

RSAC ISB2015Winner
Active

Waratek

Application Security

Runtime application self-protection (RASP) and virtual patching for Java applications.

RASP and virtual patching for Java — practical but niche. Lesson: winning the Sandbox with a solid product doesn't mean the market will be huge.

RSAC ISB2015
IPO

SentinelOne

Endpoint Security

Autonomous AI-powered endpoint detection and response (EDR) platform.

Raised $697M

Tiger Global · Sequoia Capital · Insight Partners +1

IPO in 2021 at $8.9B valuation; peaked over $18B market cap. Highest-valued cybersecurity IPO at the time.

Didn't win the Sandbox but became a top-5 cybersecurity company by market cap. Lesson: autonomous EDR was the right product at the right time, and execution beat contest wins.

RSAC ISB2015
Active

Cybereason

Endpoint Security

Endpoint detection and response using behavioral analysis and operation-centric approach.

Massive valuation but couldn't IPO. Lesson: in the EDR wars, only the top 2-3 vendors survive as independents; the rest consolidate.

RSAC ISB2015
Acquired

Phantom

Security Operations

Security orchestration, automation, and response (SOAR) platform.

Acquired by Splunk in 2018 for $350M; Splunk later acquired by Cisco for $28B

SOAR pioneer. Lesson: automation in security ops was the right bet; getting acquired by Splunk (then Cisco) validated the approach.

RSAC ISB2015
Active

SecurityDo (Fluency)

Security Operations

Security analytics and log management platform.

RSAC ISB2015
Active

Bastille Networks

IoT / Hardware Security

RF (radio frequency) threat detection for enterprise IoT and wireless security.

RSAC ISB2015
Acquired

Prevoty

Application Security

Runtime application security and autonomous protection.

Acquired by Imperva in 2018

RSAC ISB2015
Active

Menlo Security

Network Security

Isolation-based web security platform eliminating malware from web/email.

RSAC ISB2015
Acquired

ProtectWise

Network Security

Cloud-based network detection and response with full packet capture visualization.

Acquired by Verizon in 2019

RSAC ISB2015
Acquired

Dtex Systems

Threat Detection

Insider threat detection and user behavior intelligence.

Merged with CISO Global; later acquired by Proofpoint in 2023

RSAC ISB2016Winner
Acquired

Phantom Cyber

Security Operations

Security orchestration, automation and response (SOAR) — automate playbooks across security tools.

Raised $22.7MExit $350M4y to exit

Kleiner Perkins · Blackstone · In-Q-Tel +1

Acquired by Splunk in 2018 for $350M; Splunk acquired by Cisco in 2024 for $28B

Defined the SOAR category. Lesson: building a platform that integrates with other tools (rather than replacing them) is a powerful go-to-market wedge.

RSAC ISB2016
Active

Bastille Networks

IoT / Hardware Security

Enterprise RF threat detection for IoT/wireless security.

RSAC ISB2016
Acquired

Illusive Networks

Threat Detection

Deception-based cybersecurity — creates fake credentials and data trails to detect attackers.

Raised $54M8y to exit

Team8 · NEA · Bessemer Venture Partners +1

Acquired by Proofpoint in 2022 for est. $100-150M

RSAC ISB2016
Active

Menlo Security

Network Security

Cloud-based isolation platform for web and email security.

RSAC ISB2016
Acquired

Prevoty

Application Security

Runtime application self-protection (RASP).

Acquired by Imperva in 2018

RSAC ISB2016
Acquired

ProtectWise

Network Security

Cloud-delivered NDR with immersive 3D visualization of network threats.

Acquired by Verizon in 2019

RSAC ISB2016
Active

SafeBreach

Vulnerability Management

Breach and attack simulation (BAS) platform for continuous security validation.

RSAC ISB2016
Acquired

Skyport Systems

Cloud Security

Trusted computing infrastructure with hardware-rooted security.

Acquired by Cisco in 2018

RSAC ISB2016
Acquired

Vera

Data Security

File-level security and DRM for enterprise content.

Acquired by HelpSystems (Fortra) in 2020

RSAC ISB2016
Active

Versa Networks

Network Security

SD-WAN and SASE platform combining networking and security.

RSAC ISB2017Winner
Acquired

UnifyID

Identity & Access

Implicit authentication using machine learning on sensor data (gait, environment) for passwordless identity.

Raised $23.4M6y to exit

NEA · Andreessen Horowitz · Stanford-StartX Fund

Acquired by Prove (identity verification) in June 2021

Behavioral biometrics for passive auth was innovative but niche. Acquired by Prove for the team/tech. Lesson: winning the Sandbox with cool demo tech doesn't guarantee a big exit.

RSAC ISB2017
Active

Obsidian Security

Cloud Security

Cloud detection and response for SaaS application security.

RSAC ISB2017
Active

EnVeil

Data Security

Homomorphic encryption and encrypted search — compute on encrypted data without decryption.

Raised $43M

C5 Capital · USAA · Mastercard +2

Homomorphic encryption remains promising but performance overhead limits real-world use. Lesson: cryptographic breakthroughs need practical performance to reach adoption.

RSAC ISB2017
Active

Claroty

IoT / Hardware Security

OT/IoT/ICS security platform for industrial control systems and critical infrastructure.

Raised $882M

Bessemer Venture Partners · Temasek · SoftBank Vision Fund +2

OT security became critical infrastructure priority. Lesson: timing with ICS/OT threat landscape expansion was perfect.

RSAC ISB2017
Shutdown

Mashero

Application Security

API security and protection against bot attacks.

Company no longer appears operational.

RSAC ISB2017
Acquired

Awake Security

Network Security

Network detection and response (NDR) using AI-driven entity analysis.

Acquired by Arista Networks in 2020

RSAC ISB2017
Acquired

ShieldX Networks

Cloud Security

Multi-cloud micro-segmentation and network security.

Acquired by Fortinet (FTNT) — integrated into FortiGate network security platform

Multi-cloud micro-segmentation found a home inside a platform vendor. Lesson: niche capabilities get absorbed by firewall giants seeking cloud relevance.

RSAC ISB2017
Acquired

Solebit

Threat Detection

Deep inspection for detecting evasive malware and document-based threats.

Raised $13MExit $88M (net of cash)4y to exit

ClearSky Security · MassMutual Ventures · Glilot Capital Partners

Acquired by Mimecast in 2018 for ~$100M

RSAC ISB2017
Acquired

GreatHorn

Threat Detection

Cloud-native email security using behavioral AI.

Acquired by Barracuda Networks in 2022

RSAC ISB2017
Active

Dispel

Network Security

Secure remote access using disposable virtual infrastructure.

RSAC ISB2017
Acquired

RedLock

Cloud Security

Cloud threat defense and security analytics — cloud security posture management (CSPM) with real-time threat detection across AWS, Azure, and GCP.

Raised $12MExit $173M3y to exit

Sierra Ventures · Storm Ventures

Acquired by Palo Alto Networks for $173M (October 2018). Technology became the foundation of Prisma Cloud.

Cloud security posture management hit a nerve as multi-cloud adoption exploded. RedLock's $12M-to-$173M exit in ~3 years is one of the best ROIs in the RSAC Sandbox history. Lesson: right category + right timing = massive acqui-hire by platform vendors racing to fill cloud gaps.

RSAC ISB2018Winner
Active

BigID

Privacy & Compliance

Data intelligence platform for privacy, protection, and governance — discover and classify personal data at scale.

Raised $320M

Bessemer Venture Partners · Salesforce Ventures · Tiger Global +2

GDPR timing was perfect. Lesson: regulatory tailwinds (GDPR, CCPA) can create billion-dollar companies overnight if you're in the right category.

RSAC ISB2018
Active

Acalvio Technologies

Threat Detection

Autonomous deception technology using AI-driven honeypots and decoys.

RSAC ISB2018
Acquired

BluVector

Threat Detection

AI-powered network detection for fileless malware and advanced threats.

Acquired by Comcast in 2019

RSAC ISB2018
Acquired

CyberGRX

Security Operations

Third-party cyber risk management exchange and assessment platform.

Merged with ProcessUnity in 2023

RSAC ISB2018
Active

Fortanix

Data Security

Runtime encryption and confidential computing using Intel SGX enclaves.

RSAC ISB2018
Acquired

Hysolate

Endpoint Security

Endpoint isolation using OS-level virtual workspaces.

Acquired by Perception Point (March 2022). Distressed exit — technology absorbed into Perception Point's endpoint protection.

OS-level isolation struggled against lighter-weight browser isolation approaches. Timing and market fit matter — even great technology can fail if adoption friction is too high.

RSAC ISB2018
Acquired

ReFirm Labs

IoT / Hardware Security

IoT firmware security analysis and binary scanning.

Raised $5M4y to exit

DataTribe · New Dominion Angels · TEDCO

Acquired by Microsoft in 2021

Firmware security became critical for IoT. Lesson: Microsoft's IoT ambitions made firmware scanning strategically valuable.

RSAC ISB2018
Acquired

ShiftLeft

Application Security

Application security testing (SAST/DAST) with code property graphs.

Merged with Qwiet AI in 2023

RSAC ISB2018
Acquired

Awake Security

Network Security

Network traffic analysis using entity-based security model.

Acquired by Arista Networks in 2020

RSAC ISB2018
Acquired

Securiti.ai

Privacy & Compliance

AI-driven data privacy and governance automation.

Acquired by Veeam in 2025 for $1.725B

RSAC ISB2019Winner
Active

Axonius

Security Operations

Cybersecurity asset management platform — aggregates data from all security tools to give unified visibility.

Raised $595M

YL Ventures · Bessemer Venture Partners · Lightspeed Venture Partners +2

Asset visibility sounds boring but it's foundational. Lesson: the unsexy 'Toyota Camry of cybersecurity' can be worth billions if every CISO needs it.

RSAC ISB2019
Active

Arkose Labs

Threat Detection

Fraud and bot detection using adaptive challenges.

RSAC ISB2019
Acquired

CloudKnox Security

Cloud Security

Cloud infrastructure entitlement management (CIEM) — manage and reduce cloud permissions.

Acquired by Microsoft in 2021; became Microsoft Entra Permissions Management

CIEM became a critical cloud security capability. Lesson: identity-centric cloud security is a must-have, and Microsoft buys what it can't build fast enough.

RSAC ISB2019
Acquired

DFLabs

Security Operations

Security orchestration, automation and response (SOAR) with case management.

Acquired by Sumo Logic in 2021

RSAC ISB2019
Acquired

DisruptOps

Cloud Security

Cloud security operations automation.

Acquired by FireMon in 2021

RSAC ISB2019
Active

Eclypsium

IoT / Hardware Security

Firmware and hardware-level security for enterprise devices and supply chains.

RSAC + YCW16
Active

Salt Security

Application Security

API security platform using AI/ML for threat detection in API traffic.

RSAC ISB2019
Acquired

Capsule8

Cloud Security

Real-time detection and response for Linux production environments.

Acquired by Sophos in 2021

RSAC ISB2019
Acquired

WireWheel

Privacy & Compliance

Privacy management and data rights automation platform.

Acquired by Mimecast in 2022

RSAC ISB2019
Acquired

Duality Technologies

Data Security

Privacy-enhancing computation using homomorphic encryption.

Acquired by Baffle in 2023

RSAC ISB2020Winner
Acquired

Securiti.ai

Privacy & Compliance

PrivacyOps platform combining AI-powered data discovery, DSR automation, and compliance management.

Raised $156MExit $1.725B7y to exit

General Catalyst · Mayfield · Cisco Investments +1

Acquired by Veeam in October 2025 for $1.725B (~3x last valuation of $575M)

Privacy automation at the right regulatory moment. Lesson: GDPR/CCPA created a rush for automated compliance, and the winner captured massive value.

RSAC ISB2020
Active

AppOmni

Cloud Security

SaaS security posture management (SSPM) for enterprise SaaS environments.

RSAC ISB2020
Acquired

BluBracket

Application Security

Code security for detecting secrets and PII in source code repositories.

Raised $19.5M4y to exit

Evolution Equity Partners · Unusual Ventures · Point72 Ventures

Acquired by HashiCorp in 2023 (integrated into Vault)

RSAC ISB2020
Active

Elevate Security

Security Operations

Human risk quantification and employee security behavior scoring.

RSAC + YCW18
Acquired

Sqreen

Application Security

In-app security monitoring and protection (RASP + WAF).

Raised $18M6y to exit

Greylock Partners · Y Combinator · Alven Capital

Acquired by Datadog in 2021

RASP embedded in observability. Lesson: security that lives inside the observability pipeline is where the market is heading.

RSAC ISB2020
Acquired

Tala Security

Application Security

Client-side web security protecting against Magecart-style attacks.

Raised $14.2M5y to exit

Jackson Square Ventures · TriplePoint Capital

Acquired by Intuit in 2021

RSAC ISB2020
Acquired

Vulcan Cyber

Vulnerability Management

Vulnerability remediation orchestration — prioritize and fix vulns across tools.

7y to exit

Acquired by Tenable in 2025 to supercharge exposure management platform Tenable One

RSAC ISB2020
Active

Pixm

Threat Detection

Computer vision-based anti-phishing for detecting fake login pages.

RSAC ISB2020
Active

Inky

Threat Detection

AI-powered email security using computer vision and machine learning.

RSAC ISB2020
Active

Obsidian Security

Cloud Security

SaaS security and cloud detection/response.

RSAC ISB2021Winner
Active

Apiiro

Application Security

Code risk platform that analyzes code changes in real-time to identify risks before they reach production.

Shift-left risk analysis connecting code to cloud. Lesson: developers making security decisions need context, not just alerts.

RSAC ISB2021
Acquired

Wiz

Cloud Security

Agentless cloud security platform scanning entire cloud environments for risks across VMs, containers, and serverless.

Raised $1.9BExit $32B5y to exit

Sequoia Capital · Index Ventures · Insight Partners +3

Acquired by Google/Alphabet in 2025 for $32B (all cash). Largest cybersecurity acquisition in history.

Didn't win the Sandbox but became the biggest cybersecurity acquisition in history. Lesson: fastest-growing security startup ever proved that agentless cloud scanning + amazing UX beats everything.

RSAC ISB2021
Active

Abnormal Security

Threat Detection

AI-based email security using behavioral analysis to detect business email compromise (BEC).

RSAC ISB2021
Acquired

Axis Security

Network Security

Zero-trust network access (ZTNA) as a service.

Acquired by Hewlett Packard Enterprise (HPE) in 2023

RSAC ISB2021
Active

Cape Privacy

Data Security

Encrypted data collaboration using secure multi-party computation.

Raised $61M
RSAC ISB2021
Active

Deduce

Identity & Access

Identity fraud prevention using a network of anonymized identity signals.

RSAC ISB2021
Active

Open Raven

Data Security

Cloud-native data discovery and classification for data security posture management.

RSAC ISB2021
Acquired

Satori

Data Security

DataSecOps platform — universal data access control and security for databases and data lakes.

Acquired by Hive (part of Cisco/ThousandEyes)

RSAC ISB2021
Active

Strata Identity

Identity & Access

Identity orchestration for multi-cloud and hybrid environments.

RSAC ISB2021
Active

WABBI

Application Security

Continuous security and compliance governance for DevSecOps pipelines.

RSAC ISB2022Winner
Acquired

Talon Cyber Security

Endpoint Security

Enterprise browser — secure, managed browser for distributed workforces replacing VDI.

Raised $143MExit $625M2y to exit

Evolution Equity Partners · Team8 · Lightspeed Venture Partners +2

Acquired by Palo Alto Networks in December 2023 for $625M

Enterprise browser became a hot new category. Lesson: the browser as the new endpoint struck a nerve, and getting acquired by Palo Alto within 2 years shows how fast things move in cyber.

RSAC ISB2022
Active

Torq

Security Operations

No-code security automation and orchestration platform.

RSAC ISB2022
Acquired

Dasera

Data Security

Automated data governance and security for cloud data stores.

5y to exit

Acquired by Netskope (October 2024). DSPM technology integrated into Netskope One Platform for unified data protection.

Data security posture management (DSPM) became a must-have as enterprises moved data to Snowflake, Databricks, and hyperscalers. Lesson: standalone DSPM gets absorbed by SSE/SASE platforms seeking unified data security.

RSAC ISB2022
Acquired

Lightspin

Cloud Security

Cloud security posture management with attack path analysis.

Raised $25MExit $200-250M3y to exit

Dell Technologies Capital · Ibex Investors · IBM

Acquired by Cisco in 2023 for $200-250M

RSAC ISB2022
Acquired

Neosec

Application Security

API security using XDR-like behavioral analytics for API traffic.

Raised $20.7M3y to exit

True Ventures · TLV Partners

Acquired by Akamai in 2023

RSAC ISB2022
Active

Sevco Security

Security Operations

Cloud-native asset intelligence to find and fix gaps in security tool coverage.

RSAC ISB2022
Active

Spin.AI

Cloud Security

SaaS security for protecting data in SaaS applications (Google Workspace, Microsoft 365).

RSAC ISB2022
Acquired

BastionZero

Identity & Access

Zero-trust infrastructure access for remote access to servers, containers, and clusters.

Raised $11.8M4y to exit

Dell Technologies Capital · Akamai Technologies

Acquired by Cloudflare in 2024

RSAC ISB2022
Acquired

Cado Security

Security Operations

Cloud-native digital forensics and incident response (DFIR).

Raised $31.5MExit $100M5y to exit

Ten Eleven Ventures · Blossom Capital · Eurazeo

Acquired by Darktrace in January 2025 for ~$100M

RSAC ISB2022
Active

Cycode

Application Security

Software supply chain security — protect CI/CD pipelines and source code.

RSAC ISB2023Winner
Active

HiddenLayer

AI Security

AI/ML model security platform — protect machine learning models from adversarial attacks, model theft, and inference manipulation.

First AI-security-focused winner, perfectly timed with GenAI explosion. Lesson: protecting AI models (not just using AI for security) is a new frontier.

RSAC ISB2023
Active

Pangea

Application Security

Security-as-code APIs — embeddable security services (auth, vault, audit) for developers.

RSAC ISB2023
Acquired

Dazz

Cloud Security

Cloud security remediation platform unifying findings across tools.

Raised $110MExit $450M3y to exit

Insight Partners · Greylock Partners · Index Ventures +1

Acquired by Wiz in November 2024 for $450M (ISB finalist acquiring ISB finalist)

Remediation (not just detection) became the differentiator. Lesson: ISB finalists acquiring other ISB finalists (Wiz buying Dazz) shows the ecosystem's compounding effect.

RSAC ISB2023
Active

Endor Labs

Application Security

Dependency lifecycle management — secure open-source selection and vulnerability management.

RSAC ISB2023
Active

Zama

Data Security

Open-source fully homomorphic encryption (FHE) tools for developers.

RSAC ISB2023
Active

Relyance AI

Privacy & Compliance

Data governance using AI to trace data flows and enforce privacy policies in code.

RSAC + YCS20
Active

SafeBase

Privacy & Compliance

Smart trust center for automating security questionnaires and compliance sharing.

RSAC ISB2023
Active

Valence Security

Cloud Security

SaaS security posture management with focus on SaaS-to-SaaS supply chain risks.

RSAC ISB2023
Active

Astrix Security

Identity & Access

Non-human identity security — secure service accounts, API keys, and machine identities.

Non-human identity security emerged as a category. Lesson: as APIs and service accounts proliferate, managing non-human identities becomes critical.

RSAC ISB2023
Active

AnChain.AI

Other

Blockchain security and crypto compliance using AI-powered analytics.

RSAC + YCW22Winner
Active

Reality Defender

AI Security

Deepfake and AI-generated media detection platform for enterprises and governments.

Deepfake detection became critical as generative AI exploded. Lesson: the flip side of GenAI innovation is GenAI-powered fraud, creating an entirely new security category.

RSAC ISB2024
Active

Harmonic Security

AI Security

Data protection for GenAI — prevent sensitive data from leaking into LLMs and AI tools.

RSAC ISB2024
Active

Dropzone AI

Security Operations

AI-powered SOC analyst that autonomously investigates security alerts.

RSAC ISB2024
Active

Bedrock Security

Data Security

Data security posture management (DSPM) for protecting sensitive data across clouds.

RSAC ISB2024
Active

Mitiga

Cloud Security

Cloud investigation and response automation (CIRA) for SaaS and cloud environments.

RSAC ISB2024
Active

P0 Security

Identity & Access

Cloud access governance — just-in-time privileged access for cloud environments.

RSAC ISB2024
Active

Antimatter

Privacy & Compliance

Data privacy infrastructure for building privacy-compliant applications.

RSAC ISB2024
Active

Aembit

Identity & Access

Workload identity and access management — IAM for machine-to-machine communication.

RSAC ISB2024
Active

RAD Security

Cloud Security

Cloud-native runtime security using behavioral fingerprints instead of signatures.

RSAC ISB2024
Active

VulnCheck

Vulnerability Management

Vulnerability intelligence and exploit detection platform.

RSAC ISB2025Winner
Active

ProjectDiscovery

Vulnerability Management

Open-source vulnerability detection and security automation platform (Nuclei) for finding and fixing security issues.

Open-source-first security tooling (Nuclei) with massive community adoption. Lesson: building community-driven detection templates created a moat that proprietary scanners can't replicate.

RSAC ISB2025
Active

Aurascape

AI Security

AI security and protection platform for monitoring and securing AI applications.

RSAC ISB2025
Active

CalypsoAI

AI Security

AI application security at runtime — guardrails for LLM deployments.

RSAC ISB2025
Active

Command Zero

Security Operations

Autonomous investigations platform using AI agents for security operations.

RSAC ISB2025
Active

EQTY Lab AG

AI Security

AI integrity and governance — cryptographic provenance for AI model training and outputs.

RSAC ISB2025
Active

Knostic

AI Security

LLM access control — need-to-know controls for enterprise AI deployments.

RSAC + YCS23
Active

Metalware

IoT / Hardware Security

Firmware security and automated fuzzing for embedded systems and IoT devices.

RSAC ISB2025
Active

MIND

Data Security

Data loss prevention and insider risk management with real-time data flow visibility.

RSAC ISB2025
Active

Smallstep

Identity & Access

Device identity and zero-trust infrastructure using automated certificate management.

RSAC ISB2025
Active

Twine Security

Security Operations

AI digital employees (agents) for cybersecurity tasks — autonomous security workforce.

RSAC ISB2026
Active

Charm Security

Threat Detection

AI-powered social engineering defense.

RSAC + YCS24
Active

Clearly AI

AI Security

AI security and explainability platform.

RSAC ISB2026
Active

Crash Override

Vulnerability Management

Attack surface management and exposure prioritization.

RSAC ISB2026
Active

Fig Security

Identity & Access

Identity security and access governance.

RSAC ISB2026
Active

Geordie AI

AI Security

AI agent security and governance.

RSAC ISB2026
Active

Glide Identity

Identity & Access

Identity verification using telco network signals.

RSAC ISB2026
Active

Humanix

Security Operations

Human-centric cybersecurity with behavioral AI.

RSAC ISB2026
Active

Realm Labs

AI Security

Security infrastructure for AI agents.

RSAC ISB2026
Active

Token Security

Identity & Access

Non-human identity security and machine credential management.

RSAC + YCS24
Active

ZeroPath

Application Security

AI-powered application security testing.

Y CombinatorW26
Active

BeeSafe AI

Threat Detection

Stopping Scams Before They Reach Your Customers

Y CombinatorW26
Active

Carson

Security Operations

Carson is a desktop AI workspace that replaces MS Office with agents

Y CombinatorW26
Active

Cascade

AI Security

Making Autonomous Intelligence Safe & Reliable

Y CombinatorW26
Active

Clam (formerly Baseframe)

AI Security

Enterprise-grade security for broad-access AI Agents like OpenClaw

Y CombinatorW26
Active

Crosslayer Labs

Vulnerability Management

Protect, monitor and defend your Internet presence

Y CombinatorW26
Active

Hex Security

Vulnerability Management

Agentic Offensive Security at Scale

Y CombinatorW26
Active

Lexius

IoT / Hardware Security

AI for Corporate Security Cameras

Y CombinatorW26
Active

Oximy

AI Security

The system of record for enterprise AI usage.

Y CombinatorW26
Active

Protent

IoT / Hardware Security

Protent turns passive surveillance into proactive intelligence.

Y CombinatorS25
Active

Alter

Identity & Access

Secure access control and authorization platform for agent workflows

Y CombinatorS25
Active

Better Auth

Identity & Access

The authentication framework for TypeScript

Y CombinatorS25
Acquired

BitPatrol

Application Security

AI-powered code security

Y CombinatorS25
Active

Casco

Application Security

Autonomous security testing for web apps, APIs, cloud, and AI systems

Y CombinatorF25
Active

ComplyDo

Privacy & Compliance

Global Compliance for Enterprises

Y CombinatorS25
Active

ContextFort

AI Security

Visibility and Controls for Browser Agents

Y CombinatorS25
Active

Cotool

Security Operations

AI Agents for Security Operations Teams

Y CombinatorS25
Active

GhostEye

Vulnerability Management

Vulnerability Management for Human Risk

Y CombinatorS25
Active

Golf

AI Security

Agentic AI Security and Governance

Y CombinatorF25
Active

Kestrel AI

Cloud Security

AI-Native Cloud Incident Response Platform

Y CombinatorF25
Active

LogosGuard

AI Security

The risk management software for enterprises adopting AI

Y CombinatorS25
Active

MindFort

Security Operations

Autonomous Security Agents

Y CombinatorF25
Active

Multifactor

Identity & Access

Zero-trust authentication, authorization, and auditing for AI agents

Y CombinatorS25
Active

Probo

Privacy & Compliance

We help you get compliant while you focus on your business.

Y CombinatorS25
Active

Riverbank

Vulnerability Management

AI-native Red Teaming and Offensive Security

Y CombinatorS25
Active

Theorem

Application Security

Program verification so even your systems engineers can vibecode

Y CombinatorS25
Active

Tinfoil

AI Security

Tinfoil makes your AI workflows secure, verifiable, and private.

Y CombinatorF25
Active

Veria Labs

Vulnerability Management

Continuous AI pentesting that finds and fixes vulnerabilities

Y CombinatorW25
Active

Archon

Privacy & Compliance

We help software companies sell to government.

Y CombinatorW25
Active

Haleum

Threat Detection

Human Risk Intelligence for the AI-era

Y CombinatorW25
Active

SubImage

Cloud Security

Software that maps your infrastructure. Open core alternative to Wiz

Y CombinatorF24
Active

Gecko Security

AI Security

The AI Security Engineer to Find and Fix Vulnerabilities

Y CombinatorS24
Active

Unbound

Data Security

Use AI tools without fear of data leakage

Y CombinatorS24
Active

winfunc

Application Security

ai-native security engineering for mission critical codebases

Y CombinatorW24
Shutdown

Aedilic

AI Security

Open-Source AI-generated image/deepfake detection

Y CombinatorW24
Active

Delve

Privacy & Compliance

AI that makes compliance effortless

Y CombinatorW24
Active

PromptArmor

AI Security

LLM Security and Compliance

Y CombinatorW24
Active

Pythagora

Application Security

Worlds first all-in-one AI development platform.

Y CombinatorW24
Active

Risotto

Security Operations

Risotto auto-solves IT support requests using AI

Y CombinatorW24
Active

Shiboleth

Privacy & Compliance

Shiboleth automates lending compliance for financial institutions…

Y CombinatorW24
Active

Superagent

AI Security

Red teaming for AI agents

Y CombinatorW24
Active

Tesseral

Identity & Access

The open source platform for managing identity in business software

Raised $3.3M
Y CombinatorS23
Active

Corgea

Application Security

Corgea finds, and fixes insecure code and packages autonomously.

Y CombinatorS23
Active

Hiro

Security Operations

Your first security hire

Y CombinatorS23
Active

Roundtable

Identity & Access

Proof of Human - invisible human verification

Y CombinatorS23
Acquired

Xeol

Application Security

Close your outdated dependency attack vector

Y CombinatorW23
Active

Adri AI

Privacy & Compliance

Vanta for AI

Y CombinatorW23
Shutdown

Blyss

Data Security

End-to-end encrypted AI.

Y CombinatorW23
Active

Credal.ai

AI Security

Connect AI to every tool. Enterprise security built in.

Y CombinatorW23
Acquired

EdgeBit

Application Security

Autofix your software dependencies

Y CombinatorW23
Active

Escape

Vulnerability Management

Offensive security for the teams that are 100x outnumbered

Y CombinatorW23
Active

Infisical

Data Security

Unified platform for secrets, certs, and privileged access management

Y CombinatorW23
Active

Logital AI (Teclada)

AI Security

Compare models and ouputs without random noise skewing your results.

Y CombinatorW23
Active

Matano

Cloud Security

Cloud Native SIEM (alternative to Splunk/Elastic)

Y CombinatorW23
Active

Repacket

Security Operations

Employee security done for you.

Y CombinatorW23
Active

Variance

Threat Detection

AI Agents for Fraud Review and Investigations

Y CombinatorW23
Active

compliant-llm

Data Security

Detect every data leak into third-party GenAI tools

Y CombinatorS22
Active

AccessOwl

Identity & Access

Managing your Employees' Access to SaaS

Y CombinatorS22
Active

Oneleet

Privacy & Compliance

YC's most popular security compliance platform (SOC 2, ISO 27001,…

Y CombinatorS22
Active

Overwatch

Threat Detection

Enterprise software for strategic, risk, and cyber fraud intelligence

Y CombinatorS22
Acquired

Slauth.io

Identity & Access

The IAM Policy Copilot

Acquired by Ark Infotech (December 2023). IAM policy automation integrated into Ark's cloud security platform.

Y CombinatorS22
Active

Wolfia

Privacy & Compliance

We help security, legal and sales teams answer customer questions

Y CombinatorW22
Active

Agency

Privacy & Compliance

Solving Complex Security and Compliance

Y CombinatorW22
Active

Argument Computer Corporation

Data Security

Accelerate verifiable computing

Y CombinatorW22
Active

Bunkyr

Data Security

Zero-Knowledge security without seed phrases or backup codes

Y CombinatorW22
Active

Cinder

Data Security

Cinder | Responsible AI, Trust & Safety, and Data Labeling At Scale

Y CombinatorW22
Active

Firezone

Network Security

Easiest way to set up Zero Trust Access for your team

Y CombinatorW22
Acquired

JumpWire

Identity & Access

Dynamic access controls for all data and databases

Y CombinatorW22
Active

Munily

Identity & Access

Access control management app for Latam´s gated communities

Y CombinatorW22
Active

Optery

Privacy & Compliance

Opt out software that removes your private info from the internet

Y CombinatorW22
Active

Palitronica Inc

IoT / Hardware Security

Detect cyber attacks on critical physical infrastructure

Y CombinatorW22
Active

Prembly (formerly Identitypass)

Identity & Access

Identity Verification API for Emerging Markets

Y CombinatorW22
Active

Strac

Cloud Security

Data Discovery, DLP, DSPM for SaaS, Cloud, Gen AI & Endpoints

Y CombinatorS21
Active

Cloudanix

Cloud Security

Cloud and Container Security Platform

Y CombinatorS21
Active

ContraForce

Security Operations

Security Delivery Platform to orchestrate AI agents for Service…

Y CombinatorS21
Active

Hyperbrowser

Other

Web infra for AI agents

Y CombinatorS21
Acquired

Keyri

Identity & Access

Secure fraud prevention and authentication platform for developers

Y CombinatorS21
Active

Malloc Inc

Endpoint Security

AI-driven mobile cybersecurity

Y CombinatorS21
Shutdown

Protego

Threat Detection

We help companies recover lost revenue from chargebacks

Y CombinatorS21
Active

Rootly

Security Operations

AI-native on-call and incident response carefully crafted to help…

Y CombinatorS21
Shutdown

Squire.ai

Application Security

Never code alone.

Y CombinatorS21
Acquired

Tarsal

Data Security

Data pipeline for your security data lake.

Y CombinatorS21
Acquired

Telivy

Vulnerability Management

Automate your cyber security risk assessments

Y CombinatorS21
Active

idemeum

Identity & Access

AI-powered Application Control

Y CombinatorW21
Active

Cyble

Threat Detection

Cyble - World’s First Intelligence-Driven, AI-Native Security…

Y CombinatorW21
Active

Feroot Security

Privacy & Compliance

AI-powered Compliance Platform for PCI 4, CCPA, HIPAA, CIPA, 50+ laws

Y CombinatorW21
Shutdown

Observa

Data Security

Catch accidental database exposures before the bad guys

Y CombinatorW21
Shutdown

SlashAuth

Identity & Access

The solution for fine-grained access control in web3

Y CombinatorW21
Acquired

Stacksi

Privacy & Compliance

Automated Answers to Security Questionnaires

Y CombinatorW21
Active

authzed

Identity & Access

Cloud Infrastructure for Authorization

Y CombinatorS20
Active

Formal

Data Security

Take control of your data in real-time.

Y CombinatorS20
Active

Notabene

Privacy & Compliance

The Notabene platform is the trust layer for global money movement.

Y CombinatorS20
Active

SuperTokens

Identity & Access

Open source alternative to Auth0 / AWS Cognito / Firebase Auth

Y CombinatorS20
Active

Swif.ai

Endpoint Security

The guardrail for AI on every device

Y CombinatorS20
Acquired

Vectrix

Cloud Security

Scan your SaaS apps and instantly identify security issues

Y CombinatorW20
Shutdown

Datree

Cloud Security

Datree prevents Kubernetes misconfigurations from reaching production

Y CombinatorW20
Active

Riot

Security Operations

Cybersecurity awareness for fast growing companies

Y CombinatorW20
Active

Skypher

Privacy & Compliance

AI agent for Compliance Questionnaires Automation

Y CombinatorW20
Shutdown

Visual One

IoT / Hardware Security

AI for security cameras

Y CombinatorS19
Active

Canix

Privacy & Compliance

Canix makes it easy to get and stay compliant as a cannabis business.

Y CombinatorS19
Shutdown

LunaSec

Application Security

An Open Source dependency security tool that is smarter than the rest

Y CombinatorS19
Active

TRM Labs

Threat Detection

TRM is building a safer financial system for billions of people.

Y CombinatorS19
Active

Traces

IoT / Hardware Security

Transform your video monitoring with AI

Y CombinatorW19
Active

Doppler

Data Security

Secure secrets. Prevent breaches. Keep teams moving.

Y CombinatorW19
Active

Dyneti Technologies

Threat Detection

Reduce payment fraud

Y CombinatorW19
Acquired

Fuzzbuzz

Application Security

Fuzzing as a Service

Y CombinatorW19
Active

MedCrypt

IoT / Hardware Security

MedCrypt gives medical device vendors cybersecurity features in a few…

Y CombinatorW19
Active

Sublime Security

Threat Detection

AI-powered email security platform for detecting and preventing phishing, BEC, and other email threats.

Raised $244M+

IVP · Citi Ventures · Index Ventures

Y CombinatorW19
Active

Termius

Network Security

Termius is an SSH client with team collaboration features

Y CombinatorS18
Active

Federacy

Vulnerability Management

Penetration testing and bug bounty platform.

Y CombinatorS18
Active

Tall Poppy

Security Operations

Protecting your employees against online harassment

Y CombinatorW18
Active

Anjuna

Cloud Security

Anjuna enabled organizations to trust any infrastructure

Y CombinatorW18
Shutdown

EnvKey

Data Security

End-to-end encrypted configuration and secrets management

Y CombinatorW18
Acquired

Hunter2

Application Security

Hunter2 trains engineering teams in application security through…

Y CombinatorW18
Active

Quantstamp

Application Security

Security auditing for Web3

Y CombinatorW18
Active

Vanta

Privacy & Compliance

Vanta—the proven leader in automated compliance helping startups…

Y CombinatorS17
Active

D-ID

AI Security

Enable creators and developers to generate realistic AI personas

Y CombinatorS17
Acquired

Templarbit

Application Security

Protecting applications from malicious activity

Y CombinatorS17
Active

Upfort

Privacy & Compliance

Turnkey security & hassle-free cyber insurance from leading insurers

Y CombinatorW17
Active

Ambient.ai

IoT / Hardware Security

AI company transforming enterprise physical security to prevent…

Y CombinatorW17
Active

Apozy

Network Security

Apozy makes every website safe to browse

Y CombinatorS16
Shutdown

Metapacket

Endpoint Security

Metapacket is the first selective web gateway that stops malware by…

Y CombinatorW16
Active

AmberBox Gunshot Detection

IoT / Hardware Security

Detect Gunshots | Inform Law Enforcement | Empower First Responders

Y CombinatorW16
Active

Castle

Threat Detection

Block bots & bad behavior

Y CombinatorW16
Shutdown

Patchwork Security

Security Operations

Security patch notifications for servers. Build it, deploy it, and…

Y CombinatorS15
Acquired

Appcanary

Vulnerability Management

Appcanary tracks the dependencies you use in your apps and servers…

Y CombinatorS15
Acquired

Cymmetria

Threat Detection

Cyber deception platform using decoy virtual machines to detect lateral movement, hunt attackers, and automate incident response. First Israeli security company selected by Y Combinator.

Raised $11M5y to exit

Y Combinator · Felicis Ventures · Seedcamp

Acquired by Stage Fund (September 2019). Deception technology market later consolidated around Attivo Networks (acquired by SentinelOne) and others.

Deception technology proved effective but struggled as a standalone category — eventually absorbed by EDR/XDR platforms. Attivo Networks (similar space) was acquired by SentinelOne for $616M in 2022.

Y CombinatorS15
Acquired

Foxpass

Identity & Access

Making enterprise security practices available for all companies.

Y CombinatorS15
Acquired

Sphere Secure Workspace

Endpoint Security

Sphere Secure Workspace

Y CombinatorS15
Shutdown

Traversal Networks

Threat Detection

Enterprise Threat Detection: Tuning, Triage, and Analysis by Experts.

Y CombinatorW15
Acquired

CyberFend

Threat Detection

Cyberfend delivers robust, real-time web and mobile security by…

Y CombinatorW15
Acquired

Final

Threat Detection

A credit card that drastically reduces payment fraud and gives…

Y CombinatorW15
Acquired

Rescue Forensics

Security Operations

Actionable human trafficking intelligence

Acquired by IST Research (December 2016). Technology integrated into IST's intelligence and analytics platform.

Y CombinatorW15
Acquired

Smyte

Network Security

Smyte stops bad actors on social networks and marketplaces.

Y CombinatorW15
Shutdown

ThinAir

Data Security

Intelligent data security for teams

Y CombinatorS14
Shutdown

Bannerman

IoT / Hardware Security

Security Guard Company Marketplace

Y CombinatorW14
Acquired

Kuna Systems

IoT / Hardware Security

We're making a smart, front door camera with intercom that lets you…

Y CombinatorW13
Acquired

Meldium

Identity & Access

Simple password & identity management for teams. Acquired by LogMeIn…

Y CombinatorS12
Active

Mattermost

Security Operations

Secure Collaboration for Technical Teams

Y CombinatorW12
Acquired

Authy

Identity & Access

Authy is a Two-Factor Authentication platform for developers

Y CombinatorW12
Shutdown

Documents.Me

Cloud Security

Client-side encryption for your devices and the cloud.

Y CombinatorW12
Shutdown

WireOver

Data Security

Really secure file sending for big files.

Y CombinatorS11
Active

Sift

Threat Detection

The Leader in Digital Trust & Safety

Y CombinatorS10
Acquired

AeroFS

Data Security

Secure Enterprise Collaboration.

Y CombinatorS05
Acquired

Clickfacts

Identity & Access

Clickfacts