AuthMind
Seed Round in 2025 
AuthMind is a firm specializing in identity security. It employs access neural network technologies to identify and prevent hidden identity risks continuously.
Reality Defender
Series A in 2024 
Reality Defender specializes in detecting deepfakes and AI-generated media across various formats such as audio, video, images, and text. Its patented multimodal approach enables real-time detection of advanced impersonations, helping mitigate risks associated with manipulated content. The platform offers flexible deployment options that integrate smoothly into existing infrastructure.
HashiCorp
Acquisition in 2024 
HashiCorp, Inc. is an open-source software company based in San Francisco, California, founded in 2012 by Mitchell Hashimoto and Armon Dadgar. The company specializes in developing multi-cloud infrastructure automation software that addresses the challenges of cloud adoption. HashiCorp's primary products include Terraform, a cloud infrastructure as code tool for provisioning and managing resources; Vault, which secures and controls access to sensitive data; Nomad, a work orchestrator for deploying and managing applications across various environments; and Consul, a tool for service discovery and orchestration. Additionally, HashiCorp offers Vagrant for creating reproducible development environments and Packer for generating identical machine images for multiple platforms. The company aims to provide consistent workflows and a standardized approach to automate infrastructure processes, thereby enabling organizations to effectively run distributed applications in both public and private cloud environments.
Tides is a financial services company based in San Francisco, California. Founded in 2018, Tides specializes in trading cryptocurrency without putting coins at risk, all from within a secure and controllable wallet. The company offers a platform that allows users to conveniently trade crypto assets while maintaining security and control over their investments. By leveraging innovative technology, Tides aims to provide a seamless and efficient trading experience for its customers in the ever-evolving cryptocurrency market.
Gem Security
Series A in 2023 
Gem Security specializes in cloud-based cybersecurity solutions. Its platform offers centralized threat management, real-time detection, investigation, and response capabilities, empowering businesses to automate their security processes.
HiddenLayer
Series A in 2023 
HiddenLayer provides security solutions for machine learning systems and the data that power them. The company offers threat modeling, ML risk assessment training, and red team assessment services, as well as model scanning and detection and response implementation for ML pipelines. Its platform analyzes model interactions to identify malicious activity without requiring prior knowledge of a user's AI model or sensitive training data, helping organizations detect and protect against threats to algorithms, models, and data throughout AI deployments.
Ox Security
Venture Round in 2023 
Ox Security is a company that provides a comprehensive security platform aimed at safeguarding the modern software supply chain from vulnerabilities. Its solution offers real-time, end-to-end visibility into various elements that affect software throughout the development pipeline. By providing insight into the software supply chain attack surface, including source code, pipelines, artifacts, container images, runtime assets, and applications, Ox Security enables DevOps teams to effectively identify and mitigate potential security risks. This holistic approach allows organizations to prevent attacks and enhance their overall software security posture.
AuthMind
Seed Round in 2023 
AuthMind is a firm specializing in identity security. It employs access neural network technologies to identify and prevent hidden identity risks continuously.
Polar Security - an IBM Company
Acquisition in 2023 
Polar Security, an IBM Company, operates a pioneering Data Security Posture Management (DSPM) platform designed to automate cloud data security and compliance. This platform enables organizations to secure sensitive data generated during research and development while allowing security and compliance teams to continuously classify and manage this data effectively. By tracking the flow of information, Polar Security helps businesses identify potential risks and focus their resources on areas that require attention, thus enhancing their overall data security posture. The platform is tailored to meet the dynamic needs of developers, ensuring that data protection remains robust, regardless of the speed of data creation.
NetBox Labs
Series A in 2023 
NetBox Labs simplifies complex network management for operators through its open and composable products. Its flagship offering, NetBox Cloud, provides an enterprise-grade SaaS version of the open-source NetBox.
NetBox Labs
Seed Round in 2023 
NetBox Labs simplifies complex network management for operators through its open and composable products. Its flagship offering, NetBox Cloud, provides an enterprise-grade SaaS version of the open-source NetBox.
Octo Consulting Group, Inc. is a management and technology consulting firm that offers technology and digital services to federal agencies in the United States. Established in 2006 and headquartered in Reston, Virginia, with additional offices in Alexandria and Columbia, the company specializes in agile software development, user experience design, and cloud engineering. Octo aids government agencies in delivering information and services that enhance decision-making and improve citizen interactions with government services. The firm is adept at managing large data sets through web and semantic technologies, transforming data into actionable intelligence. Additionally, it develops and manages solutions across cloud-hosted, on-premise, and hybrid environments, employing agile methodologies throughout. Octo serves various departments, including Defense, Census, Health and Human Services, Labor, and Agriculture, providing comprehensive lifecycle strategy and management consulting services.
Cyolo
Venture Round in 2022 
Cyolo is a developer of a Zero Trust Access Solution that enables secure connectivity for both onsite and remote users to authorized assets across organizational networks, cloud environments, and IoT systems, including offline networks. The company's innovative software offers an ID-based connectivity approach that enhances visibility and provides self-calibrating insights, allowing businesses to effectively manage access to critical applications. By integrating a comprehensive operating method within a single scalable platform, Cyolo supports IT and security teams in maintaining security and productivity amidst the challenges posed by distributed workforces and evolving cyber threats.
Lightspin
Convertible Note in 2022 
Lightspin Technologies Ltd., established in 2020 and headquartered in Tel Aviv, Israel, specializes in cloud security software. Its platform maps and analyzes cloud stacks to identify and mitigate potential threats, focusing on native, Kubernetes, and microservices environments. Lightspin empowers customers with a self-service, transparent pricing model, enabling organizations to scale their security as needed.
Randori
Acquisition in 2022 
Randori Inc., founded in 2018 and headquartered in Waltham, Massachusetts with an additional location in Denver, Colorado, specializes in providing an automated attack platform designed to enhance security programs. The company offers Randori Recon, which helps users identify unknown misconfigurations and process failures, prioritize findings, and reduce attack surfaces by continuously profiling external attack surfaces. Additionally, Randori Attack enables users to test defenses and build resilience by evaluating detection and response capabilities against trusted adversaries. These solutions are utilized in various scenarios, including continuous red teaming, attack surface management, cloud migration, shadow IT risk, and ransomware prevention. Randori serves a diverse range of industries, such as energy, financial services, healthcare, entertainment, and transportation.
Quantinuum
Venture Round in 2022 
Quantinuum is a global leader in quantum computing, dedicated to advancing quantum hardware and software solutions. With nearly 500 professionals, including over 370 scientists and engineers, the company focuses on materials discovery, cybersecurity, and next-generation quantum AI.
Sentaca
Acquisition in 2022 
Sentaca is a consulting and professional services company that specializes in the mobile and telecommunications industry. Based in the UK, it offers a comprehensive range of services across the mobile domain, including service design, architecture, implementation, operational support, and private cloud development. Sentaca's expertise extends to optimization and security planning, with a focus on enhancing client operations. The company is known for its PRiSM Framework, which automates testing and streamlines messaging and charging processes, thereby improving efficiency and client satisfaction. Through its innovative solutions, Sentaca enables clients to automate manual testing and enhance their overall performance in the competitive telecom landscape.
SXiQ Limited is an Australian information technology company that specializes in providing comprehensive IT infrastructure and business solutions. Founded in 1981 and based in Hawthorn East, the company offers a range of services including business strategy solutions like ICT strategic planning and risk management, as well as business delivery services such as cloud migration and implementation. SXiQ also focuses on managed services and technology management, providing solutions for virtual data centers and user device management. The company serves a diverse clientele including government departments, financial institutions, educational entities, and various businesses, offering secure erasure services and hardware storage solutions. Formerly known as Southern Cross Computer Systems Pty Ltd, SXiQ rebranded in June 2017 to reflect its commitment to cloud and digital transformation, emphasizing cloud applications, infrastructure, and cybersecurity.
ReaQta
Acquisition in 2021 
ReaQta is a leading AI Endpoint Security Platform based in Europe, developed by a team of cyber security experts and AI/ML researchers with backgrounds in government intelligence. The platform is designed to protect organizations from advanced threats such as malware attacks and data exfiltration. ReaQta's proprietary dual-AI engines leverage behavioral analysis to provide comprehensive and customizable endpoint security solutions. By offering an intuitive user experience, the platform enables security teams to efficiently manage and respond to exploitation attempts, malware infections, and anomalous behaviors. This allows organizations to identify threats in real-time while reducing the complexity typically associated with endpoint security management.
Cambridge Quantum Computing
Venture Round in 2020 
Cambridge Quantum Computing Limited is a quantum computing software company based in Cambridge, United Kingdom, with additional operations in London, Chessington, San Francisco, Washington D.C., and Tokyo. Founded in 2014, the company specializes in developing software tools that facilitate the commercialization of quantum technologies. Its key offerings include t|ket, a quantum development platform; EUMEN, which focuses on quantum chemistry; QML, dedicated to quantum machine learning; and IronBridge, aimed at enhancing cybersecurity through quantum methods. Cambridge Quantum Computing's mission is to create effective and accessible applications of quantum computing for a diverse range of corporate and government use cases, leveraging its expertise in quantum protocols and algorithms.
Spanugo
Acquisition in 2020 
Spanugo Inc. is a cybersecurity company founded in 2016 and headquartered in Santa Clara, California. It specializes in providing Cybersecurity Posture Assurance for enterprise hybrid cloud environments. Spanugo automates key aspects of risk management, cybersecurity, and compliance by reading device settings, configurations, and logs, and comparing them to industry standards such as PCI and HIPAA. The company's solutions facilitate resource discovery, configuration management, and the implementation of security best practices. Spanugo offers a unified view that provides comprehensive visibility across on-premises and multi-cloud infrastructures, including virtual machines, physical machines, network elements, and applications. Its agent-less architecture allows for quick and seamless deployment, enabling organizations to implement its solutions with minimal effort and in under an hour.
Promontory Financial Group
Acquisition in 2016 
Promontory Financial Group is a provider of risk management and compliance services focused on assisting financial institutions in navigating complex regulatory environments. With over 85 years of specialized experience, the firm offers expertise in areas such as regulatory compliance, liquidity management, restructuring, acquisitions, due diligence, internal investigations, and cybersecurity. Promontory helps clients manage the risks associated with data handling and ensures compliance with legal obligations across various jurisdictions. The company is adept at balancing the need to leverage data for business value while safeguarding individual rights, delivering practical solutions that align industry standards with the operational needs of organizations.
IBM Resilient
Acquisition in 2016 
IBM Resilient is a provider of cloud-based incident response software designed to help organizations effectively manage and respond to various security incidents and business crises. The platform includes modules for response planning, management, and automation, enabling security teams to streamline their workflows and enhance coordination during incidents. Its solutions cater to a diverse range of industries, including financial services, healthcare, retail, and education, and are utilized by various organizations, from Fortune 500 companies to mid-sized enterprises. Founded in 2010 and based in Cambridge, Massachusetts, IBM Resilient was formerly known as Co3 Systems, Inc. The company became a subsidiary of International Business Machines Corporation in 2016, reflecting its integration into IBM's broader security offerings.
IRIS Analytics
Acquisition in 2016 
IRIS Analytics GmbH is a software and consulting company specialized in fraud prevention, serving financial service institutions across Europe and North America. Founded in 2000 and headquartered in Urbar, Germany, the company develops the IRIS software, a real-time solution that intercepts fraudulent transactions as they occur and generates case reports for further investigation. This technology addresses various forms of payment fraud, including card-based payments, online banking, transaction banking, and mobile payments. In addition to its software offerings, IRIS Analytics provides consultancy services tailored to the needs of retail banks, acquirers, payment processors, and payment service providers, helping these entities combat fraud and manage risk effectively.
CrossIdeas
Acquisition in 2014 
CrossIdeas, formerly known as Engiweb Security, was founded in 2001 and specializes in identity verification software. The company developed the IDEAS platform, an Identity and Access Governance Solution that facilitates the management of personnel, applications, and entitlements within organizations, promoting a risk-aware operational environment. After a management buy-out, CrossIdeas transitioned from its previous affiliation with the Engineering Group, aiming to expand its presence in European and U.S. markets. The expertise and innovative vision of its team serve as key assets in driving the company's growth and enhancing its service offerings.
Trusteer
Acquisition in 2013 
Trusteer is a provider of security solutions designed to protect online banks, brokerages, and retailers from financial malware attacks and fraudulent websites. The company focuses on safeguarding customer identities and financial transactions, ensuring the security of login credentials across various platforms. Trusteer's clientele includes prominent financial institutions such as ING DIRECT and other leading online banking and brokerage firms, reflecting its commitment to enhancing cybersecurity in the digital finance sector.
Apakau is a provider of an intelligent data delivery platform that focuses on safeguarding dynamic data from distributed denial of service (DDoS) attacks. Its flagship product, Apakau Cloud Proxy, is an edge-based networking solution designed to enhance the performance of RESTful APIs and DHTML applications while ensuring their security. This service is available both as a cloud-based solution and as a product for customer data centers, requiring no installation of code on the client side; users only need to add a CNAME to their DNS. Apakau's offerings cater to the needs of enterprises by facilitating the secure and efficient exchange of data across mobile devices and desktops for geo-distributed users, addressing the demands of a mobile-first, Internet-enabled environment.
Cibecs
Acquisition in 2012 
Cibecs specializes in providing robust data protection solutions for business IT environments. The company offers industry-leading data backup services, ensuring that critical information is securely stored and can be recovered when needed. Additionally, Cibecs focuses on Data Loss Prevention (DLP), which includes encryption to safeguard sensitive data, geo-location tracking to monitor data movement, and remote management capabilities for enhanced control and security.
i2, Inc. is a company that specializes in visual investigative analysis software tailored for law enforcement, intelligence, military, and commercial sectors. Founded in 1990 and headquartered in McLean, Virginia, i2 operates regional offices in California and Canada, with additional training facilities in McLean, Sacramento, and Ottawa. The software developed by i2 enables users to track critical missions, facilitating the development of intelligence and problem-solving strategies to support informed decision-making and effective resource allocation. By providing advanced multi-dimensional analytics, i2's tools help analysts create actionable intelligence aimed at detecting and countering sophisticated threats. Additionally, the company offers consulting, training, and support services to enhance its software's effectiveness for clients across the United States, Canada, Mexico, Central America, South America, and the Caribbean.
BigFix
Acquisition in 2010 
BigFix, Inc., established in 1997 and headquartered in Emeryville, California, specializes in providing an IT security and operations platform. This platform enables real-time visibility and control of globally distributed desktop, mobile, and server computers. The company's primary offerings include the BigFix Platform for messaging and management, BigFix AntiThreat for endpoint security, BigFix IT Policy Enforcement for setting and enforcing security policies, and BigFix Systems Management for automating IT operations tasks. Additionally, they provide customizable management content through BigFix Policy Content Modules, along with products support, consumer edition support, and professional services. Their client base comprises companies, government agencies, and public sector institutions.
National Interest Security Company
Acquisition in 2010 
National Interest Security Company is a Fairfax, Virginia-based information technology and services provider with more than 1,000 employees worldwide. It delivers IT solutions, information management, and strategic consulting focused on national security missions across five areas: Intelligence, Defense, Homeland Security, Energy, and Federal Health and Civilian agencies. The company offers systems integration, information assurance, managed network solutions, and network engineering for customers in the energy, aerospace, and security sectors, including government and commercial clients such as the U.S. Department of Defense and other partners. Its capabilities include enterprise content management, data capture and conversion, remote hosting, continuity of operations planning, storage and retrieval, data mining and analytics, multilingual data exploitation, document and media exploitation, cyber security and information assurance, large-scale data management, software development, and mission-focused information solutions.
Guardium
Acquisition in 2009 
Guardium is a database security company that specializes in preventing information leaks and ensuring the integrity of enterprise data. Founded in 2002, it has developed an enterprise security platform that is widely recognized and utilized across more than 450 data centers globally. Its client base includes prominent organizations such as the top banks, insurers, government agencies, and leading retailers. The company offers a scalable, cross-database management system (DBMS) solution that provides real-time protection for databases while automating compliance auditing processes. Guardium has established partnerships with various industry leaders and is a participant in key security councils, underscoring its commitment to advancing data security in the enterprise sector.
Ounce Labs
Acquisition in 2009 
Ounce Labs specializes in software solutions that assist organizations in identifying, prioritizing, and mitigating business risks associated with software security vulnerabilities. The company's software meticulously analyzes application source code to deliver comprehensive and precise assessments of vulnerabilities and their significance. This capability allows both business users and IT professionals to allocate resources effectively, focusing on the most critical security issues. By utilizing Ounce Labs' solutions, organizations enhance their application security, safeguard confidential information, and ensure compliance with internal policies as well as industry regulations, including PCI and FISMA, and best practices such as those outlined in the OWASP Top 10.
FilesX
Acquisition in 2008 
FilesX, founded in 2000, specializes in software solutions designed to enhance the recovery of data across diverse storage environments. The company focuses on continuous data protection and offers nearly instant recovery of data and applications for enterprises and remote offices. Its flagship product, Xpress Restore, is a disk-based data recovery solution that ensures rapid access to critical information. In addition to Xpress Restore, FilesX provides remote office protection solutions and archiving application protection to safeguard information archives. The company also offers support services to assist clients in implementing and maintaining these solutions. FilesX was acquired by IBM in April 2008, further expanding its reach and capabilities in the data protection sector.
Watchfire
Acquisition in 2007 
Watchfire Corporation, based in Kanata, Ontario, specializes in online risk management software and services. The company focuses on ensuring the security and compliance of websites through its advanced testing software. By offering solutions that address various security vulnerabilities and compliance requirements, Watchfire aims to help organizations safeguard their digital presence and maintain regulatory standards.
Consul Risk Management International
Acquisition in 2006 
Consul Risk Management International is a global provider of security event management solutions, specializing in compliance and security audit software. Founded in 1986 and headquartered in Delft, the Netherlands, with additional offices in the United States and Germany, the company develops software that assists organizations in managing identity and access initiatives. Its solutions monitor, report, and investigate both malicious and accidental violations of information use, ensuring adherence to external regulations and internal policies. By helping clients track and address non-compliant behaviors, Consul Risk Management International plays a crucial role in enhancing security and compliance across various industries.
Internet Security Systems
Acquisition in 2006 
Internet Security Systems, Inc. provides security solutions to numerous businesses and governments, offering proactive protection for networks, desktops, and servers. Founded in 1994, the company has established itself as a leader in the security industry with an integrated security platform that defends against both known and unknown threats. Its services are designed to ensure network reliability and protect customers from online attacks before they affect business operations. The effectiveness of ISS's offerings is backed by the X-Force research and development team, recognized for its expertise in vulnerability and threat research. Additionally, Internet Security Systems enhances its product line with comprehensive Managed Security Services and Professional Security Services, aimed at addressing the diverse security needs of its clients.
Micromuse
Acquisition in 2005 
Micromuse specializes in the development and marketing of software solutions tailored for business and service assurance. The company's flagship product suite, Netcool, is designed to collect, consolidate, analyze, and display critical information regarding the availability, performance, security, and overall business data of complex IT infrastructures. Micromuse's software offers comprehensive management capabilities across various domains, including business service management, network operations, security information management, and performance management. Through its solutions, the company aims to enhance the effectiveness and reliability of IT operations for its clients.
Systems Research & Development
Acquisition in 2005 
Develops and markets business intelligence and security analytics software for commercial and government organizations.
Ox Security is a company that provides a comprehensive security platform aimed at safeguarding the modern software supply chain from vulnerabilities. Its solution offers real-time, end-to-end visibility into various elements that affect software throughout the development pipeline. By providing insight into the software supply chain attack surface, including source code, pipelines, artifacts, container images, runtime assets, and applications, Ox Security enables DevOps teams to effectively identify and mitigate potential security risks. This holistic approach allows organizations to prevent attacks and enhance their overall software security posture.