Top Security Startups 2023

December 2023

Browse 73 of the top Security startups funded by Y Combinator.

We also have a Startup Directory where you can search through over 4,000 companies.

  • Sift
    Sift (S11)Active • San Francisco
    Sift is the leader in Digital Trust & Safety, empowering digital disruptors to Fortune 500 companies to unlock new revenue without risk. Sift dynamically prevents fraud and abuse through industry-leading technology and expertise, an unrivaled global data network of 70 billion events per month, and a commitment to long-term customer partnerships. Global brands such as DoorDash, Twitter, and Wayfair rely on Sift to gain a competitive advantage in their markets.
    fintech
    machine-learning
    saas
    b2b
  • Vanta
    Vanta (W18)Active • 330 employees • San Francisco
    Vanta was founded in 2018, in the wake of several high-profile data breaches that shook our collective faith in internet businesses. Online security was only becoming more important, but we knew firsthand how hard it could be for fast-growing companies to invest the time and manpower it takes to build a solid security foundation. From our early days of automating security monitoring for compliance standards like SOC 2, HIPAA, and ISO 27001, to pioneering a brand-new market as the leading Trust Management Platform, our vision to restore trust in internet businesses by enabling companies to improve and prove their security remains unchanged. Now more than ever, making security continuous—not just a point-in-time check— is essential. Vanta is the leading Trust Management Platform that helps simplify and centralize security for organizations of all sizes. Over 4,000 companies including Autodesk, Chili Piper, Flo Health and Quora, rely on Vanta to build, maintain and demonstrate their trust—all in a way that's real-time and transparent. Recently named the #1 Leader in G2's Winter 2023 Grid® Reports for Security Compliance, Vanta debuted a number of new product innovations over the last year, including Access Reviews which automates the once-manual, time-consuming access reviews process and an enhanced Risk Management solution allowing companies to holistically understand, prioritize, and reduce risks within their company to build a stronger security approach and demonstrate compliance. Vanta was built on the idea that software can be used to do amazing things for the world—if we trust it to do so. And we can’t do it alone. Come join us!
    b2b
    compliance
    security
  • Salt Security
    Salt Security (W16)Active • 200 employees • Palo Alto
    Salt Security protects the APIs that form the core of every modern application. Its patented API Protection Platform is the only API security solution that combines the power of cloud-scale big data and time-tested ML/AI to detect and prevent API attacks. By correlating activities across millions of APIs and users over time, Salt delivers deep context with real-time analysis and continuous insights for API discovery, attack prevention, and shift-left practices. Deployed quickly and seamlessly integrated within existing systems, the Salt platform gives customers immediate value and protection, so they can innovate with confidence and accelerate their digital transformation initiatives. Salt pioneered API security and is the industry leader for API security with a proven record of success. You can watch a 90-second overview video of the Salt Security API Protection Platform here: https://youtu.be/Z5nzavnBJj4
    cybersecurity
  • Quantstamp
    Quantstamp (W18)Active • 80 employees • Toronto, Canada
    Quantstamp has protected billions in digital assets from hackers on our mission to secure web3. As a global team of security professionals, we have honed our technology and expertise through hundreds of audits and gained the trust of our clients to keep their innovative products safe. In addition to providing an array of security services, we facilitate the growth and longevity of the web3 space through strategic investments and acting as a trusted advisor to help projects scale. Quantstamp is honored to have worked with some of the top projects in the industry including Aave, Compound, Maker, OpenSea, Polygon and many more. As the leading blockchain security company in this emerging industry, we are always looking for team members that love taking initiative and solving challenging problems. Join the team and help us secure the future of web3.
    crypto-web3
    security
  • TRM Labs
    TRM Labs (S19)Active • 180 employees • San Francisco
    At TRM, we're on a mission to build trust in digital assets, because the promise of crypto is too valuable to be impeded by bad actors. We provide a blockchain intelligence platform to law enforcement, financial institutions, and crypto firms to assist in the detection and prevention of cryptocurrency fraud and financial crime. Our vision is to build a company that can sustainably deliver on our mission for decades to come, enabling consumers to transact safely and securely on the blockchain. Join our mission ➔ www.trmlabs.com/careers
    fintech
    machine-learning
    crypto-web3
    data-engineering
  • Sqreen
    Sqreen (W18)Acquired • 120 employees • San Francisco
    Sqreen is the application security platform for the modern enterprise. More than 800 organizations trust Sqreen to protect, observe and test their applications, APIs and microservices. As opposed to pattern-based approaches, Sqreen analyses in-app execution in real time to deliver more robust security without compromising performance.
    devsecops
    b2b
    security
  • Ambient.ai
    Ambient.ai (W17)Active • 95 employees • San Jose, CA
    Ambient.ai is a computer vision intelligence company transforming enterprise security operations to prevent security incidents before they happen. The Ambient.ai platform applies AI and computer vision intelligence to existing sensor and camera infrastructure to deliver continuous physical security monitoring and automate the immediate dispatch of human resources. Ambient.ai is the first platform that goes beyond basic motion detection and image recognition to achieve near-human perception with automated situational context. With physical security incidents on the rise and physical security organizations left under-resourced, Ambient.ai’s computer intelligence platform comes at a time of critical need, which is why the company has raised over $50 million from venture capital investors led by a16z. Today, large enterprises, schools and organizations – including many of the largest US tech companies and other Fortune 500 companies – use Ambient.ai to secure property, people, and assets from the most harrowing physical security threats. The company was founded in 2017 by experts in artificial intelligence from Stanford who previously built iconic products at Apple, Google, Microsoft and Dropbox. We are backed by Andreessen Horowitz (a16z), SV Angel, Y Combinator, and visionary angels like Jyoti Bansal, Mark Leslie and Elad Gil.
    computer-vision
    security
    ai
  • Keyri
    Keyri (S21)Active • 5 employees • San Francisco
    Keyri helps companies implement simple, secure anti-fraud and authentication solutions to delight users and keep bad actors off their platform. Keyri's mobile application and browser fingerprinting suite ties user identities to trusted devices, preventing fraudulent activity such as account opening, account takeovers, bot attacks, and referral/promo abuse. Keyri is able to establish an immutable device fingerprint for every device, alerting companies of any suspicious devices during sign up, log in, or subsequent authentication events. Keyri also offers a passwordless authentication suite that leverages Passkeys, WebAuthn, and QR codes to enable biometric authentication on all platforms and devices, providing a seamless user experience, strengthening multi-factor account security, and reducing reliance on other tedious and unsecure authentication methods.
    saas
    b2b
    security
  • QueryPie
    QueryPie (W20)Active • 23 employees • San Mateo, CA
    QueryPie, a trusted data governance platform based in San Mateo, California, was founded in 2017 to centralize data access and privacy control across the enterprise in a single platform, transforming a liability into an opportunity while promoting data security and compliance. Data governance is the foundation of data. To summarize, data governance enables businesses to use data to make better business decisions and, as a result, improve financial performance. Companies do this by implementing consistent policies, procedures, and processes across their enterprise, including Data Infrastructure, Analytics, and Intelligence. QueryPie is the simplest way for businesses to maximize the value of their data assets while complying with privacy regulations such as GDPR, CCPA, and PCI-DSS, as well as legal reporting requirements. With our headquarters in San Mateo, we also have a solid team of product developers and database experts in Korea.
  • Cinder
    Cinder (W22)Active • 12 employees • Washington, DC
    Cinder is a flexible intelligence and investigation platform that empowers trust and safety teams to make faster and more accurate decisions on the abusive content, fraud, and threats facing their company. By integrating relevant data sources, centralizing decision making, and offering customizable workflows, Cinder powers more effective decisioning for investigative teams across an enterprise.
    saas
    b2b
    security
    trust-&-safety
  • Upfort
    Upfort (S17)Active • 38 employees • San Francisco
    Upfort is a leading platform for cyber security and insurance that provides holistic protection from evolving cyber threats. Founded in 2017 to expand global access to cyber resilience, Upfort makes cyber risk easy to manage and simple to insure. Upfort delivers turnkey security proven to proactively mitigate risk and comprehensive cyber insurance from leading insurers. With proprietary data and intelligent automation, Upfort’s AI anticipates risk and streamlines mitigation for hassle-free underwriting. Insurers, brokers, and risk advisors partner with Upfort to offer clients resilience and peace of mind against cyber threats.
    next-gen-network-security
    security
    insurance
    cyber-insurance
  • D-ID
    D-ID (S17)Active • 27 employees • Tel Aviv-Yafo, Israel
    D-ID enables creators and developers to generate realistic high-quality AI personas easily and ethically through the use of our platform and APIs, based on deep-learning and AI-powered technology - Enabling Creative Reality™. D-ID is a Tel Aviv-based Creative Reality™ startup specializing in patented video reenactment technology using AI and deep learning. Established in 2017, D-ID created the first facial image de-identification solution to protect images and videos from facial recognition software. D-ID's products range from animating still photos to facilitating high-quality video productions and creating viral user experiences.
    artificial-intelligence
    deep-learning
    generative-ai
    entertainment
  • Firezone
    Firezone (W22)Active • 6 employees • Mountain View
    Open-source, scalable alternative to corporate VPNs that integrates with your identity provider and requires no firewall configuration
    devsecops
    next-gen-network-security
    b2b
    security
    open-source
  • Agency
    Agency (W22)Active • New York
    Agency performs enterprise-level cybersecurity for individuals at the highest risk of cyberattacks because of their job, employer, or industry. Our subscription includes advanced software, 24/7 monitoring and response, and reimbursement with our Agency Cyber Guarantee. We help organizations get advanced security for their largest threat surface while maintaining the privacy of their teams. Agency turns cybersecurity from a burden into a perk.
    saas
    consumer
    security
    insurance
    enterprise
  • Swif
    Swif (S20)Active • 10 employees • Santa Clara, CA
    Swif serves as an all-in-one AI-driven solution for managing device security and compliance across more than 100 teams. With top clients like UnitX, Symbl.ai, and HlthX, we cut their costs by over $100K and save 600 hours annually. We're achieving 30% monthly growth.
    saas
    b2b
    compliance
    security
    enterprise
  • EdgeBit
    EdgeBit (W23)Active • 5 employees
    Dependencies for software products are exploding in number and with that comes a sprawling supply chain. A supply chain isn't just a build-time check, it's highly dynamic. EdgeBit watches in real time – we cross-reference your build pipelines and server fleet with multiple data sources to communicate your live inventory and actual risk. Security teams aren’t experts at their company’s apps, so they are forced to distract the most skilled engineers with a firehose of vulnerabilities to investigate. We founded EdgeBit because we believe that we can solve this problem — to empower security teams to prioritize investigation of true risks without wasting engineers time.
    devsecops
    b2b
    security
  • Strac
    Strac (W22)Active • 4 employees • Bellevue, WA
    Strac DLP (Data Loss Prevention) eliminates data leaks from SaaS, Cloud and Generative AI apps by automatically detecting and redacting the most sensitive customer data like SSN, DL, Passport, Bank Statements, etc. across all communication channels like Office 365, Gmail, Slack, Onedrive, Google Drive, Zendesk, Salesforce, ChatGPT, Chrome, Jira and Web Applications.
    saas
    compliance
    security
    api
    enterprise
  • Notabene
    Notabene (S20)Active • 33 employees • New York
    Notabene helps businesses perform crypto transactions in a regulatory compliant way. Think of us as the SWIFT network for Crypto. New global regulations for crypto transactions are here and will be enforced over the next year. Businesses now have to follow strict rules similar to banks, or shut down. We provide a SaaS platform that allows businesses to perform due-diligence on their counter-parties and manage the risk of incoming and outgoing transactions.
    fintech
    crypto-web3
    regtech
  • Overwatch
    Overwatch (S22)Active • 5 employees • New York
    Overwatch Data offers real-time, actionable intelligence tailored for your fraud, security, and strategic insights teams. Our platform provides a comprehensive and contextualized view of opportunities and risks, drawing on the surface, social, and deep web, thereby enabling faster, data-driven decision-making.
    artificial-intelligence
    saas
    supply-chain
  • Shiboleth
    Shiboleth (W24)Active • 2 employees • New York
    Shiboleth unique algorithm detect spam, fraud or deepfakes from extremely short audio snippets. This extremely low latency system allows integration to existing telephony and VOIP networks. Nearly a quarter of all phone calls are spam or fraudulent. The problem is only getting worse with the rise of large language models (LLMs) and deep fake audio. Initially we focused on deepfake protection for the elderly. We built a physical adapter that connects to legacy landlines and detects deep fake audio by beeping. We presented the device and algorithm at the last Blackhat. Our GTM strategy is B2B audio spam solutions. However, in the longer term, we want to protect the consumers, starting with the elderly.
    generative-ai
    deepfake-detection
    b2b
    fraud-prevention
    call-center
  • PromptArmor
    PromptArmor (W24)Active • 2 employees
    Ensuring every AI Agent and Application is secure from adversarial attacks, and compliant with the latest legislation. Reach out for a security audit or pentest!
  • Bunkyr
    Bunkyr (W22)Active • 3 employees • Denver, CO
    Bunkyr enables companies to protect their users’ data with a simple, hardware-secured API. When a user forgets their password, applications using Bunkyr can provide them a familiar, robust recovery method to restore access to encrypted data. Zero-Knowledge architectures and end-to-end encryption are the only true safeguards against data breaches, but come with large user-experience burdens and engineering overhead. Bunkyr eliminates these obstacles in a way that is friendly to both developers and users, cost-effective, and extremely fast. Users won’t even know Bunkyr exists, while their data stays protected against both breaches and lost passwords.
    developer-tools
    saas
    crypto-web3
    b2b
    security
  • Palitronica Inc
    Palitronica Inc (W22)Active • 6 employees • Kitchener, Canada
    Palitronica builds and deploys cutting-edge solutions to defend critical physical infrastructure and its supply chain. By using side-channel information from endpoints, Palitronica provides a safe attack detection capability retrofittable to critical systems.
    hard-tech
    hardware
    security
  • SuperTokens
    SuperTokens (S20)Active • 10 employees • San Francisco
    SuperTokens is building open source authentication (as an alternative to Auth0, Firebase and AWS Cognito). Add secure, hassle free authentication to your app in 1 day. We enable startups to launch quicker and focus on their core product offering 1. We're easier to implement as we take a modular approach - making it possible to pick only the features you need for your use case. This means you need not worry about complications associated with other features (eg: SSO and OAuth if you don’t need it) and this in turn makes it easier to implement and manage SuperTokens. 2. Developer's can own and manage their user's data. 3. SuperTokens can be run on your premise for free and also has a generous hosted tier for those who dont want to manage it themselves. SuperTokens is being used by hundreds of developers across the globe.
    developer-tools
    saas
    b2b
    open-source
  • Datree
    Datree (W20)Active • 16 employees • Tel Aviv-Yafo, Israel
    Prevent Kubernetes misconfigurations from reaching production with Datree’s automated policy checks for your pipeline. The open-source CLI tool empowers engineers to write more stable and secure configurations, and further supports them in their roles so they can actually sleep at night. By revealing misconfigurations in seconds and combating the issues in early stages of the pipeline, your organization can enforce its standards and secure its infrastructure from development to production.
    developer-tools
    b2b
  • Metlo
    Metlo (S21)Active • 4 employees • San Francisco
    - Create an Inventory of all your API Endpoints. - Proactively test your APIs before they go into production. - Detect API attacks in real time.
    saas
    b2b
    security
    open-source
    api
  • Apozy
    Apozy (W17)Active • 9 employees • San Francisco
    Interlock protects DeFi while rewarding the community that makes it safer. We create cybersecurity products powered by blockchain that protect web users and create a dataset that powers security across the internet.
    defi
    crypto-web3
    security
  • Kobalt Labs
    Kobalt Labs (S23)Active • 2 employees • New York
    Our API enables companies to safely and securely use cloud-based models on sensitive data, and fine-tune on private data without compromising user privacy. We do this by: - detecting and anonymizing sensitive data from model inputs and re-enriching model outputs with the original content - integrating our (model-agnostic) privacy tooling with data stores and vector DBs - offering monitoring and observability for security leaders
    generative-ai
    compliance
    ai
  • Matano
    Matano (W23)Active • 2 employees • Seattle, WA
    Matano is a modern SIEM, built for cloud-first security teams. It replaces traditional SIEM databases like Splunk or Elastic with a cybersecurity platform built on top of a cost-effective Security Data Lake.
    devsecops
    analytics
    open-source
    cybersecurity
  • Blyss
    Blyss (W23)Active • 2 employees • San Francisco
    Blyss is a leakproof data warehouse that lets companies store and analyze sensitive data without ever decrypting it. This has long been considered the ‘holy grail’ of security, and after decades of research, it’s finally here - and we helped invent it. Data sent into Blyss is permanently sealed; once it enters, it's never decrypted. All analysis happens directly on the encrypted data. Regulated enterprises can use Blyss to unlock value from sensitive data without risking leaks. The company is founded by two Stanford engineers, Samir and Neil, who have extensive background in cryptography and high-performance computing, and previously worked at Apple, Yubico, and NVIDIA.
    developer-tools
    hard-tech
    crypto-web3
    security
    privacy
  • Malloc
    Malloc (S21)Active • 7 employees • Nicosia, Cyprus
    Malloc is a mobile app that monitors and prevents any app from recording you or transmitting your data without you knowing. We sell our app to individuals, enterprises and governments who care about their privacy.
    machine-learning
    saas
    security
  • Intrinsic
    Intrinsic (W23)Active • 2 employees
    Build safer platforms with Intrinsic. Get access to the best safety technologies from one unified API. Enable your Trust & Safety team to tell cohesive stories from policy to product, to enforcement. Michael and Karine first met two years ago at Apple’s Fraud Engineering, Algorithmic Risk team, which evolved to become Apple’s Trust & Safety function. We are both engineers and helped solve online abuse problems, including spam, botting, account security, and developer fraud for Apple’s customer base of over a billion users.
  • Escape
    Escape (W23)Active • 6 employees • Paris, France
    Find and fix business logic vulnerabilities in your applications in CI/CD before production — powered by Escape’s industry-leading API security intelligence.
    developer-tools
    security
    api
    graphql
  • Cyble
    Cyble (W21)Active • 190 employees • Atlanta, GA
    Cyble provides the fastest and most comprehensive coverage across adversaries, infrastructure, exposure, weaknesses, and targets. Cyble empowers governments and enterprises to safeguard their citizens and infrastructure by providing critical intelligence in a timely manner and enabling rapid detection, prioritization, and remediation of security threats through its advanced capabilities for data analysis, expert insights, and automated processes Headquartered in Alpharetta, Georgia, and with offices in Australia, Malaysia, Singapore, Dubai, Saudi Arabia and India, Cyble has a global presence. To learn more about Cyble, visit www.cyble.com. 
    artificial-intelligence
    saas
    security
  • Optery
    Optery (W22)Active • 12 employees • Walnut Creek, CA
    Optery is automated opt out software, and we serve individuals, families and businesses. With Optery, you can remove yourself from hundreds of data brokers that are posting and selling your home address, phone number, email and other private information on the internet. Optery was awarded"Editors' Choice" by PCMag.com as the most outstanding product in its category in 2022 and 2023, and was a winner in Fast Company's Next Big Things in Tech for Security and Privacy in 2023. Optery prevents phishing and social engineering, identity theft and fraud, online stalking and harassment, doxxing, and prevents people's private information from showing up in Google search results. Anyone can create a free account to receive a personalized Exposure Report with live screenshots summarizing where your information is being posted and sold online. Optery then provides free tools for self-service removals, or you can upgrade to a paid plan, and Optery will remove the profiles for you. Optery for Business serves enterprises removing personal information from the internet for their employees and executives, and offers an API enabling application developers to embed data broker scanning and removal technology into their applications.
    saas
    consumer
    security
    privacy
    enterprise-software
  • Canix
    Canix (S19)Active • 44 employees • San Francisco
    Canix is building the first generation of modern software for the burgeoning cannabis industry. We help our customers overcome daunting compliance regulation, sell more product, and optimize their day to day operations—from cultivation, to processing, to distribution. Recent winner of TechCrunch Disrupt 2020, find out more at TechCrunch and canix.com.
    saas
    cannabis
  • Remy Security
    Remy Security (S23)Active • 2 employees • San Francisco
    Remy automates product security reviews with LLMs. We make it possible for security teams to review all new product releases without delaying launches.
    generative-ai
    b2b
    productivity
    security
    ai
  • Feroot Security
    Feroot Security (W21)Active • 4 employees • Toronto, Canada
    Feroot is the first way to manage and automate everything you need to protect your data assets on the web – from credit card data to login credentials, ePHI, and more. All in one, online platform.
    security
  • Tarsal
    Tarsal (S21)Active • 3 employees • San Francisco
    Tarsal is the first data pipeline built for security teams. It's Fivetran, but for security data. Tarsal provides: - one-click ingestion and normalization for all security logs (e.g multi-cloud infra, Okta/Duo, Slack, CrowdStrike, etc.) - normalization across sources for easy correlations - a vendor-agnostic pipeline so you can use the best log destination for the job (supported destinations include Snowflake, S3, Databricks, Splunk, DataDog, etc.)
    b2b
    cybersecurity
    big-data
    data-engineering
  • Traces
    Traces (S19)Active • 10 employees • Mountain View
    We analyze thousands of video streams to find and track people without facial recognition. Our tech is available as an API and has multiple use cases. Unique people counting, forensic people search, falsa alarm filtering and many more.
    artificial-intelligence
    deep-learning
    computer-vision
  • Termius
    Termius (W19)Active • 32 employees
    Termius is an SSH client that works on desktop and mobile. It syncs and shares data via a secure vault in the cloud, like a password manager. With Termius, engineering and DevOps teams can share the list of servers that can be organized in groups and tagged for faster search. Termius also has built-in Terminal and Snippet Sharing. Terminal Sharing enables getting instant help from colleagues via providing a unique link instantly, and snippets are frequently-used shell commands that allow teammates to learn from each other easily.
    developer-tools
    devsecops
    iot-security
  • Reality Defender
    Reality Defender (W22)Active • 10 employees • New York
    Reality Defender’s deepfake detection platform empowers enterprises to flag fraudulent users and content (audio, visual, documents). Our API and app provides real-time risk scoring, reporting, alerts, and forensics review. Our team spent 20+ years at Google, Goldman Sachs, and the Intelligence Community at the intersection of data science and cybersecurity. Customer Use Cases: • Onboarding KYC (Ie. Anti-fraud to identify fraudulent users and materials) • Content Moderation (Ie. Social media, e-commerce, marketplaces, dating, streaming) • Disinformation Detection (Ie. News, defense, government) Website: www.realitydefender.com Contact: ask@realitydefender.com YC AMA: https://news.ycombinator.com/item?id=30766050
    saas
    deepfake-detection
    security
    privacy
    ai
  • ContraForce
    ContraForce (S21)Active • 15 employees • McKinney, TX
    ContraForce has developed a first of its kind hyperautomated security platform that enables automated security engineering, AI-operator workflows, and incident response velocity at scale.
    saas
    security
    ai
  • Corgea
    Corgea (S23)Active • 4 employees • San Francisco
    Corgea helps companies fix vulnerable code quicker, and save 80% of the engineering cost & time in fixing these issues. It does this by using AI to write code fixes and issues pull-requests for your engineers to approve. You can see examples of real fixes here: demo.corgea.com. 
    artificial-intelligence
    developer-tools
    saas
    security
    cybersecurity
  • Oneleet
    Oneleet (S22)Active • 11 employees • Amsterdam, Netherlands
    Oneleet provides a full-coverage cybersecurity platform through which companies can build, manage, and monitor their cybersecurity management program. The company's core product offers a roadmap for companies to become secure and build trust with their partners. The founder behind Oneleet has spent the past 10+ years helping companies become more secure by performing penetration tests.
    saas
    b2b
    compliance
    security
    ai
  • Telivy
    Telivy (S21)Active • 6 employees • San Francisco
    Telivy helps small and medium businesses purchase the best cyber insurance coverage. Our proprietary ML-based risk platform assesses insurability gaps, offers remediation plans and brokers insurance quotes from A+ rated carriers.
    security
    insurance
    cybersecurity
    cyber-insurance
  • NuCypher (S16)Active • 14 employees • Austin, TX
    NuCypher is a decentralized threshold cryptography network.
    crypto-web3
    cryptography
  • Castle
    Castle (W16)Active • 20 employees • San Francisco
    Instantly stop automated and human-originated account takeovers, fake accounts, and any behavior that violates your platform policies.
    developer-tools
    saas
    security
    fraud-detection
  • Riot
    Riot (W20)Active • 20 employees • Paris, France
    Riot is a SaaS platform to easily set up a cybersecurity awareness program for teams. We're making tools to protect your employees, and therefore protecting your company.
    saas
    security
  • Anjuna
    Anjuna (W18)Active • 55 employees • Palo Alto
    Anjuna makes hardware-grade application and data protection simple, fast and enterprise-ready. Anjuna software enables IT to “lift and shift” applications and data into the hardware-encrypted confines of a secure enclave, protecting them from malicious software, insiders, and bad actors. Available from every major chip, cloud, and system vendor, secure enclaves are the data security gold standard. Unlike point memory-only enclave solutions that require expensive and complicated software rewrites, Anjuna enables enterprises to achieve managed enterprise-class enclave protection that span memory, storage, networks, and clouds in minutes--without recoding. Anjuna is based in Palo Alto, California.
    cloud-workload-protection
    security
  • Cloudanix
    Cloudanix (S21)Active • 8 employees • Sunnyvale, CA
    We help DevOps teams to improve the security of their Cloud infrastructure. Our solution value increases for companies using multi-cloud (like GCP, Azure, AWS) or have multi-accounts (like Dev, Test, Prod)
    cloud-workload-protection
    devsecops
    identity
    security
  • Infisical
    Infisical (W23)Active • 5 employees • San Francisco
    Infisical is an open-source, end-to-end encrypted platform to manage secrets and configs across your team and infrastructure. Infisical stores your secrets and injects them back into your development workflow, CI/CD pipelines, and cloud infrastructure. It comes with secrets versioning, point-in-time recovery, audit logging, automatic secret rotation capabilities, and more.
    developer-tools
    saas
    b2b
    security
    open-source
  • JumpWire
    JumpWire (W22)Active • 2 employees • New York
    JumpWire is a software platform for enforcing data security between APIs, applications and databases. By referencing data schemas, JumpWire labels select properties inside data payloads and transforms the raw data into a protected format, using encryption, tokenization or masking. JumpWire’s approach to securing data in-place minimizes the risk of data leaks exposing sensitive information or mishandling by other applications and vendors. The exact security scheme applied to data is defined by policies that align with an organization’s existing InfoSec program. JumpWire helps companies who maintain information security with compliance programs such as SOC or HIPAA. They are processing sensitive data, often from their own customers, and exceed security best practices as a competitive advantage. JumpWire provides defense at depth to data and sits alongside access controls and Layer 4 encryption to provide a comprehensive data security solution. JumpWire is unique from solutions such as data vaults by installing inside our customers’ own infrastructure and clouds. It is interoperable with existing applications and databases, which eliminates the need for large data migrations or code refactoring. Lower-level approaches to data security, such as encryption at rest, are too blunt and lack the ability to differentiate between properties in the data itself. Its scope is limited to physical storage, and security is lost as soon as an application or query loads the data.
    security
    api
  • Munily
    Munily (W22)Active • 30 employees • Panama City, Panama
    There are three key roles among a community: The security Guard The resident The administrator When a visitor tries to access a designated community, the security guard must require an ID previously to allow entry. He proceeds to communicate with a specific resident through a intercom which is almost always broken or under repair, delaying the visitor’s entry to the compound WE come in, by interconnecting the security guard with the resident and the administrators through an app and a tablet we provide to make all the process of access pretty smooth and easy. When a visitor comes in, the security guard must only: Take a picture of its ID, using the tablet, Select the apartment, so the resident receives a pop up notification through which they can deny or approve the access. Last but not least, An even easier way has been developed by Munily which utilizes QR codes generated through Whatsapp. Which visitors just show and security guards scan to allow entry.
    proptech
  • LunaSec
    LunaSec (S19)Active • 4 employees • Seattle, WA
    LunaTrace isn't just another security scanner that blasts you with vulnerabilities. LunaSec has developed a hosted Open Source dependency security tool that is smarter, faster, and quieter than any other. It's backed by a team of security experts who monitor the latest attacks, write remediation guides, and help you patch in hours instead of weeks. In under 2 minutes, for free, you can generate your own vulnerability report to gain insight into the security + compliance of your software by clicking here: https://lunatrace.lunasec.io/ Email us at: contact@lunasec.io Our GitHub: https://github.com/lunasec-io/lunasec
    developer-tools
    devsecops
    security-orchestration-automation-and-response-(soar)
    security
    open-source
  • Xeol
    Xeol (S23)Active • 2 employees • New York
    It is pronounced Zee-O-L. We believe that secure software is not only free of known vulnerabilities. It is also built then distributed by known entities. SolarWinds and Codecov has shown that today's security landscape extends beyond your codebase. It includes your build and deployment systems as well. It includes every script, every machine, every human that touched your software. Our mission is to help every customer secure their software from code to deploy.
    cybersecurity
  • Rownd
    Rownd (W22)Active • 7 employees • Raleigh, NC
    Rownd helps companies register and retain more users through frictionless sign-in across all of their websites or apps, with a single simple code snippet. We let our customers change how and where authentication happens, killing the static login page forever. Increase your conversions by 50% within weeks!
    developer-tools
    security
    privacy
  • PlusIdentity
    PlusIdentity (S21)Active • 2 employees • New York
    At PlusIdentity, we’re building the best password manager for startups, starting with a Slack app. With backgrounds in CS and Econ, we (Channy & Ike) left Harvard to work on this because we noticed that there isn’t a password manager specifically built for startups. We recently launched within the YC community with our Slack app and our users already love how easy we are to set up and use. Our goal is to become every YC company's password manager, then grow with our users to eventually become the security & identity backbone of fast growing tech companies. In 5 years, we are going to be the Okta for startups.
    saas
    b2b
    identity
    compliance
    security
  • AmberBox Gunshot Detection
    AmberBox Gunshot Detection (W16)Active • San Francisco
    AmberBox is the most advanced indoor gunshot detection and response system used in the US today. AmberBox automates emergency processes to significantly reduce response time and remove human error. AmberBox detectors utilise a patented gunshot detection algorithm to respond immediately following a firearm discharge. With tri-factor authentication (percussion, audio and infrared), detectors are able to instantly determine a firearm signature with a near-zero false alarm rate. Upon activation, detectors alert first responders through our reporting network, and can integrate with other security systems, such as cameras, access control systems and mass notification to initiate.
    security
  • 0pass
    0pass (W23)Active • 5 employees
    90% of security breaches are caused by a simple employee mistake. Your employee gets a bad link, clicks an email, then types in their password, and maybe even their two-factor code - because it looks just like the normal company login page! Attackers have proven that your MFA is not enough. 0pass allows you to completely circumvent these basic risks by switching to a passwordless login that can't be stolen. Founded by cybersecurity leaders from SpaceX, AWS, and Blue Origin - we're building security tools that solve the biggest problems, without headaches for your employees.
  • Skypher
    Skypher (W20)Active • 6 employees • San Francisco
    Skypher makes security reviews easy for software companies.
    compliance
    cybersecurity
  • Stacksi
    Stacksi (W21)Acquired • 4 employees • Los Angeles, CA
    Stacksi helps companies automate the process of answering enterprise security questionnaires so they can close deals faster and save their best engineers’ time for more strategic projects. Salespeople, CTOs, and CEOs of fast-growing enterprise startups can upload security questionnaires into our system. If the company already has written security policies, they can upload those documents, too. From there, Stacksi parses their documents, identifies gaps in their security policies vs. standards, and helps them establish a successful security program. Ultimately, we will help them 1) automate completion of security questionnaires, 2) quickly get through enterprise security audits and 3) improve their security posture.
    compliance
    cybersecurity
  • Vectrix
    Vectrix (S20)Acquired • 7 employees • San Francisco
    As organizations around the world continue to rapidly adopt SaaS applications as the way they run their businesses, many are left without a way to manage the security of those same applications. Corporate IT and security teams are left asking questions like: - How will I know if someone shares a sensitive Google Doc publicly? - What if one of our employees doesn't have two-factor authentication enabled in Zoom? - Will I know when a new user is added to Slack? - What happens if our Salesforce minimum password setting isn't strong enough? With Vectrix's easy-to-use SaaS security scanning, organizations everywhere can quickly identify security issues and risks like these across their entire suite of SaaS apps, including Google Workspace, Microsoft 365, Slack, Zoom, GitHub, and more. When new issues arise, IT and security teams can be alerted in real-time so that further action can be taken right away. Founded by former security professionals from Autodesk, Vimeo, and PlanGrid, Vectrix is committed to providing teams of all sizes an efficient and reliable way to stay secure in the public cloud. Get started at https://www.vectrix.io
    saas
    security
  • Appcanary
    Appcanary (S15)Acquired • 2 employees • Toronto, Canada
    Never run vulnerable software again. We monitor your servers, and notify you when you need to update. Try us for free: https://appcanary.com
    security
    monitoring
  • Templarbit
    Templarbit (S17)Acquired • 11 employees • San Francisco
    Developer-oriented security platform, helping small and large companies protect their software from malicious activityDeveloper-oriented security platform, helping small and large companies protect their software from malicious activity
    security
  • Foxpass
    Foxpass (S15)Acquired • 10 employees • San Francisco
    Foxpass increases your organization's server and network security by ensuring employee accounts have access only to what they need. Our cloud-hosted LDAP and RADIUS systems help you bring best-practices to your infrastructure. And they're backed by your existing Google Apps accounts.
    devsecops
  • Cymmetria (S15)Acquired • 11 employees • Tel Aviv-Yafo, Israel
    Cymmetria is a cybersecurity company at the forefront of deception technology, and offers the only commercially available deception technology that has caught 5 nation-state APTs. Cymmetria’s deception products, MazeRunner and ActiveSOC, give organizations the ability to hunt attackers, detect lateral movement inside the perimeter, automate incident response, and mitigate attacks. The company also offers deception as a service, enabling organizations to customize deception technologies for their business environment. Founded in 2014 by security expert Gadi Evron, Cymmetria is changing the asymmetry of cybersecurity, giving defenders the upper hand. For more information, visit www.cymmetria.com.
    cybersecurity
  • Sphere Secure Workspace (S15)Acquired • 2 employees • London, United Kingdom
    Sphere Secure Workspace For a product demonstration, or for any other enquiries please contact at info@sphere.works
  • Hunter2 (W18)Acquired0 • Boston
    Hunter2 teaches modern appsec to engineering teams through interactive labs. Developers get hands-on practice exploiting and patching real web apps written in their tech stack.
    developer-tools
    education
    cybersecurity
  • CyberFend (W15)Acquired • 2 employees • Santa Clara, CA
    Cyberfend offers a robust security solution to protect your web and mobile applications from sophisticated attacks and fraudulent activity. Cyberfend's solution detects account take-over, payment fraud and the use of stolen credentials. All of these problems are relevant to every consumer facing web and mobile product/service. Cyberfend’s solution uses a new security paradigm – human cognitive science coupled with advanced machine learning. The result is a robust detection system with near zero false positives and false negatives. Today Cyberfend protects nearly a billion login and payment transactions every month for many large e-commerce, web and payment customers. Cyberfend's product is at the intersection of almost every single cutting edge technology today : a) Our core product employs heavy machine learning b) On the backed, our product is cloud based and deals with enormous scale (customers are directing significant portions of their traffic to us) c) On the front end we need to deal with both web and mobile (IOS, SDK) challenges.Please visit us at: www.cyberfend.com. Cyberfend is backed by Y Combinator, SV Angel and A Capital. Cyberfend was acquired by Akamai Technologies in December 2016.
    cybersecurity
    fraud-prevention
  • Clickfacts (S05)Acquired • 11 employees • San Francisco
    ClickFacts is a Malware Software Solutions company for buyers and sellers of online media. Its automated plug and play malware discovery solution tests online ads (SWFs & 3rd Party Ad Tags) and web pages within websites to ensure they do not distribute malware onto users’ computers (which can lead to identity theft). Its moderation software solution monitors websites to ensure the ads running on them are free of inappropriate content (e.g., nudity, racism), and its Ad Buddy product provides to advertisers real-time continuous monitoring and a complete history of where their ads have run. ClickFacts Inc. was founded in 2005 by Mikhail Ledvich, Mikhail Gurevich, and Greg Gurevich in Boston Mass, with initial funding by YCombinator. It is now based in San Francisco, California.
  • Smyte (W15)Acquired • 11 employees • San Francisco
    Smyte stops spam, scams, harassment and credit card fraud for marketplaces and social networks. We automatically classify your website and mobile app's event data and stop bad actors at scale.
    security
    fraud-detection