Portfolio

Secure By Design


Secure by design is an approach to software and system development that aims to ensure security is built into applications from the very beginning of the design process.

 

Decreases the challenges for small businesses to meet compliance and regulations for deployment to US Government systems, increasing their ability to access high-value service contracts.

Simplifies Software Supply Chain Security & Cloud Product Security, making security & compliance a breeze for modern security & development teams.

Behavioral

Cloud Native Detection and Response - eliminates cloud native attacks with verifiable workload, identity and infrastructure baselines. (Formerly named KSOC)

Integrated asset visibility & asset lifecycle automation for all your technology assets to improve IT efficiency, cost management & audit readiness.

Simplify unstructured data security, enhance privacy and ensure resilience for hybrid- and multi-cloud environments.

The only end-to-end cyberstorage solution to stop ransomware, insider threats and data extortion in under a second.

Confidently phase out passwords and give workers, customers and citizens a convenient log in experience.

Fend’s one-way communication data diode solutions for protecting critical assets guarantees protection for your critical infrastructure.

Enterprise collaboration suite that provides integrated secure communications and storage of intellectual property and regulated information.

Effortlessly connect apps, staff, developers, containers, cloud & devices anywhere without VPN servers, opening firewalls or changing infrastructure.

 
 

Hunting & Hygiene


The cyber attacker has an immense advantage over cyber defenders. Because of this, Gula Tech Adventures invests in companies and solutions which help increase the effectiveness and reduce the costs of proactive attack prevention, threat hunting and cyber hygiene.

Aggregate cyber intelligence data – in real time, at scale – and automatically eliminate known threat actors from entering and exiting your network

ConcealBrowse, powered by the ConcealSherpaAI engine, identifies potentially harmful webpages autonomously, stopping cyber attacks that take advantage of weaponized links.

Fully managed threat prevention for sophisticated attacks via network & file inspection. Priced by bandwidth, not by seat.

Enables any small or medium-sized organization to securely conduct business in today’s digital world with Microsoft 365.

Secure your endpoints, email and employees. Powered by custom-built technology for SMBs and the expert analysis of their 24/7 operations center.

Know your security posture by testing your teams & systems with Scythe’s adversary emulation platform that behaves just like hackers do in the real world.

A data platform with no limits. Boost observability. Search, visualize, & analyze all your raw data and ask any question you want. Fixed price log analysis.

Sandfly is an agentless Linux security solution that detects and repels attackers without the need for endpoint agents.

The Behavioral Email Security Platform. Block phishing threats, prevent data leaks, business email compromise and coach users to make smart decisions.

Delivers swift, strong response to cyber incidents such as ransomware, email compromise, malware and data theft with end-to-end response capabilities.

Save time, eliminate risk, & automate the patching, configuration, & control of all your Windows, macOS, & Linux endpoints with AI-powered automation.

Cybrary's accessible, affordable training platform provides curated career paths, threat-informed training, & certification preparation for professionals at all levels.

Makes critical threat intelligence information more accessible, due to affordable pricing, during a time when cyber attacks and ransomware have become increasingly common.

DNSFilter makes it simple to deploy an enterprise threat protection & content filtering solution at an affordable price. Be up and running in minutes.

Halcyon is the first Anti-Ransomware & Cyber Resilience Platform with automated encryption key capture & autonomous decryption capabilities.


PIXM provides simple and affordable last line of defense against hacking to personal and small-business systems.

Knowledge and data is spread across disparate systems. Polarity fuses them together in one unified view.

 

Emerging Technology


Gula Tech Adventures is a strong supporter of public and private partnerships and recognizes that great private sector technology developed for use in the federal government, military, intelligence and law enforcement agencies increases our national security. 

Delivers a revolutionary source of global knowledge-based on RF geospatial intelligence to those working to make the world a safer place.

Designs products that support United States efforts to defend cyberspace with solutions that blend cutting-edge electronic warfare components with next-generation cyber operations.

Jet propulsion with no moving parts for an affordable and sustainable future.

Onsights brings online retail metrics, insights, and visibility you care about into your brick and mortar retail locations.

NanoVMs makes it easy to leverage unikernels, which offer a dramatic increase in performance and security over containers.

X-energy is a nuclear reactor & fuel design engineering company. We develop Generation IV high-temp gas cooled nuclear reactors & the TRISO-X fuel to power them.

Makes software development teams more efficient and empowered.

Gradient, loves MSP’s and envision a world where MSP’s can choose, use, and offer any products to their customers, seamlessly integrated with their platform of choice

Creation of a pipeline of engineering talent is critical to the future of American innovation and entrepreneurship.

 

Successful and Historical Exits


2022 - SecurityTrails was acquired by Recorded Future.

2021 - SecureCircle was acquired by CrowdStrike.

2021 - Audax Private Equity acquired a majority stake in Flashpoint.

2021 - StackRox was acquired by Red Hat.

2020 - Goldman Sachs Merchant Banking, ClearSky, and NightDragon acquired WhiteOps.

2020 - Thycotic was acquired by Onion ID.

2019 - Protego Labs was acquired by Checkpoint Software.

2019 - ThreatCare was acquired by ReliaQuest.

2019 - GTA exited our investment in ThreatConnect after they received funding from Providence Strategic Growth.

2019 - NewEdge's cloud-first VPN which enabled secure application networking was acquired by Netskope.

2019 - Avast acquired TrackOff to offer PC, Mac, and mobile solutions.

2019 - NetScout acquired Eastwind Networks.

2018 - Tenable held an IPO on the NASDAQ.

2017 - ForcePoint acquired RedOwl.

2014 - Cisco acquired ThreatGrid.

2000 - Enterasys Networks acquired Network Security Wizards.