CyberArk is a cybersecurity company established in 1999 by Udi Mokady and headquartered in Newton, Massachusetts. The company specializes in protecting high-value information assets, infrastructure, and applications from targeted cyber threats. By offering innovative security solutions, CyberArk aims to help organizations proactively address cyber risks and prevent the escalation of attacks that could lead to significant business damage. With a global presence that includes offices in Israel, the U.K., France, Germany, the Netherlands, and Singapore, CyberArk serves clients across more than 65 countries, positioning itself as a leader in the cybersecurity sector.
Zilla Security offers a software-as-a-service (SaaS) platform specializing in identity governance and administration (IGA). The platform automates key processes related to identity compliance, provisioning, and security, enabling organizations to manage user access effectively. Zilla provides integration capabilities for both commonly used and custom applications, facilitating smoother operations. Its Zilla AI Profiles feature simplifies the creation and maintenance of rules that define roles or user groups. By leveraging automation, Zilla helps clients streamline deployment, conduct access reviews, and enhance provisioning processes, ultimately reducing the need for extensive IT service management tickets. The platform is designed to secure cloud applications, networks, and customer data, ensuring that businesses can maintain robust security measures.
Venafi
Acquisition in 2024
Venafi, Inc. is a cybersecurity company that specializes in enterprise key and certificate management solutions. Founded in 2000 and headquartered in Salt Lake City, Utah, Venafi offers a range of products that enhance the security of machine identities, including the Venafi Director platform for comprehensive oversight of keys and certificates, Server Certificate Manager for certificate inventory security, and SSH Key Manager for improved threat intelligence. The company’s solutions enable organizations to secure machine-to-machine communications across various environments, including on-premises, virtual, cloud, and IoT. Additional offerings include Symmetric Key Manager, Mobile Certificate Manager, and Venafi Cloud for DevOps, which collectively help manage cryptographic keys and digital certificates efficiently. Venafi serves clients across multiple sectors, including financial services, healthcare, and telecommunications, addressing challenges such as compliance, risk management, and system availability. Through automated remediation and global visibility, Venafi mitigates risks associated with machine identities, ensuring secure communications within the extended enterprise.
Sweet Security
Seed Round in 2023
Sweet’s Cloud Runtime Security Suite delivers capabilities for defending cloud workloads, shifting cloud security right. Founded by retired, IDF commanders with prodigious expertise in offensive and defensive cloud security, Sweet’s approach elevates the ability of security teams to shut down cloud attacks when they occur, where they occur, with maximum precision and minimal business disruption.
Dig Security
Seed Round in 2022
Dig Security is a cloud data security startup focused on providing real-time visibility, control, and protection for data assets. As enterprises increasingly adopt complex environments with various database types across multiple clouds, the challenge of monitoring and detecting data exfiltration and policy violations has intensified. Dig Security addresses this issue with a cloud-native, agentless approach that reinvents data loss prevention through its Data Detection & Response (DDR) capabilities. The platform offers comprehensive cloud data security solutions, enabling businesses to manage cloud data sprawl effectively while maintaining operational efficiency and ensuring robust threat protection for their data in public cloud environments.
aapi
Acquisition in 2022
aapi is a developer of an integration and automation platform that enhances identity solutions, incident response systems, and communication tools. The company specializes in improving identity and access management (IAM) solutions, identity governance and administration (IGA) systems, and various business applications. By offering features such as identity automation, aapi enables organizations to streamline identity events across apps, ensuring a more seamless and secure user experience. The platform also incorporates embedded app functions, allowing users to efficiently act on data within applications with a single click. Furthermore, aapi provides micro access control, which delivers granular access to specific app functionalities, advancing the principles of zero trust beyond traditional privileged access management and cloud access security broker solutions. Through these innovations, aapi supports organizations in effectively managing and tracking identities while maximizing their existing technology investments.
Idaptive
Acquisition in 2020
Idaptive, LLC is a cybersecurity company based in Santa Clara, California, that specializes in next-generation access solutions designed to protect organizations from data breaches through a Zero Trust approach. Founded in 2018, Idaptive focuses on securing access to applications and endpoints by verifying users, validating devices, and intelligently managing access levels. Its platform uniquely integrates single sign-on, adaptive multifactor authentication, enterprise mobility management, and user behavior analytics. This comprehensive approach enhances security while reducing complexity, allowing organizations to confidently pursue new business models and improve customer experiences. As of May 2020, Idaptive operates as a subsidiary of CyberArk Software Ltd.
Vaultive
Acquisition in 2018
Vaultive specializes in cloud data encryption services that address the critical challenge of securing data in the cloud. By employing advanced encryption-in-use technology, Vaultive enables businesses to maintain control and ownership of their data, even as they transition to cloud applications. Customers retain their encryption keys, ensuring they can utilize cloud services while adhering to necessary governance and security requirements. This approach allows encrypted data to be processed—searched, indexed, and sorted—within cloud applications without needing to be decrypted first. As a result, organizations can benefit from the cost-effectiveness and efficiency of cloud computing while upholding the data security, control, and compliance standards typically associated with on-premise solutions.
Conjur
Acquisition in 2017
Conjur offers a DevOps security software platform that helps organizations secure their cloud environments while automating infrastructure processes. The platform focuses on identity and access management, enabling enterprises to identify, authorize, and audit all service and user identities across various systems, including cloud services, virtual machines, and containers. By addressing operational, compliance, and security challenges, Conjur allows customers to protect sensitive IT systems and monitor access in real-time. The software enforces security policies, reduces vulnerability points, and generates detailed activity reports for compliance and security audits. As organizations increasingly adopt cloud computing, Conjur provides essential tools for security-conscious enterprises to deploy sensitive workloads confidently. Its notable clientele includes companies such as Discovery Communications, AOL, and Cisco. Conjur is backed by seed funding from investment firms like Avalon Partners and Amplify Partners.
Agata Solutions
Acquisition in 2016
Agata Solutions Ltd. specializes in developing cybersecurity solutions centered around its deep packet inspection (DPI) technology. Founded in 2008 and based in Hod Hasharon, Israel, the company provides a range of products and services focused on network traffic management and security. Its offerings include network intelligence solutions, high-speed network forensics, and a comprehensive detection suite equipped with security tools, packet processing capabilities, and network analytics. Agata Solutions serves a diverse clientele, including government agencies, enterprises, and network operators, utilizing tens of thousands of dynamic policy rules and Layer-7 intelligence to enhance security and data management. As of 2015, Agata Solutions operates as a subsidiary of CyberArk Software.
Viewfinity
Acquisition in 2015
Viewfinity, Inc. specializes in application control and privilege management solutions designed to enhance the security of desktop, laptop, and server environments within enterprises. The company offers two primary products: Privilege Management for Endpoints, which regulates user rights for applications requiring elevated permissions, and Privilege Management for Servers, which allows for granular control of privileges based on user roles. Additionally, Viewfinity Application Control automates the processes of whitelisting and blacklisting applications, thereby streamlining security measures against sophisticated threats such as zero-day attacks and malware. The company serves a diverse range of sectors, including healthcare, education, energy, finance, government, and legal markets. Founded in 2007 and headquartered in Waltham, Massachusetts, Viewfinity also has locations in Europe and Israel. As of October 2015, it operates as a subsidiary of CyberArk Software, Ltd.
Cybertinel
Acquisition in 2015
Cybertinel is a provider of cyber threat detection services, focusing on the early identification of credential threats during the initial stages of the attack cycle. The company utilizes innovative technology and employs a team of experts to enhance its offerings in the cybersecurity field. Cybertinel's solutions serve as strong, complementary additions to existing cybersecurity frameworks, helping organizations bolster their defenses against potential cyber threats.
Spot something off? Help us improve by flagging any incorrect or outdated information. Just email us at support@teaserclub.com. Your feedback is most welcome.