COMPANIES



Stacks Image 34

The ML-first SaaS application for unstructured data. [Read more]
Stacks Image 42

Keep Windows, OS X and Linux system free from vulnerabilities with cloud based patch management. [Read more]
Stacks Image 50

Bandura enables organizations of all sizes to aggregate, integrate, and take action with threat intelligence to protect their networks in an easy and scalable way. [Read more]


Stacks Image 529

Boldend designs products that support United States efforts to defend cyberspace. Their solutions blend cutting-edge electronic warfare components with next-generation cyber operations. [Read more]
Stacks Image 62

Uses AI and data science to build technology workforces for the world’s most progressive companies. [Read more]
Stacks Image 70

Runtime Application Self Protection - detects web app vulnerabilies missed by static, dynamic and crowd sourced analysis. [Read more]


Stacks Image 78

Build your cyber training program and use it to recruit new hires. 2 Million users strong! [Read more]
Stacks Image 87

Leading provider of cyber threat, fraud, corporate security, physical security and insider threat intelligence.
Stacks Image 95

High performance data analytics, ideal for threat hunting, working with petabytes of data and replacing Splunk!. [Read more]


Stacks Image 554

GreyNoise analyzes Internet background noise. Use GreyNoise to remove pointless security alerts, find compromised devices, or identify emerging threats.[Read more]
Stacks Image 103

Combines secure video conferencing, messaging, file sharing, multi-factor authentication and email security intro one slick and easy to use application that scales to 100,000+ enterprise users
Stacks Image 112

Detects malicious persistence on Windows computers for MSPs and MSSPs. [Read more]


Stacks Image 467

Talk Securely Anytime, Anywhere: Protect your calls and messages with end-to-end encryption.
Stacks Image 120

Prevents false emails and phishing attacks through artificial intelligence, computer vision and machine learning. [Read more]
Stacks Image 128

Run legacy and modern apps faster, safer and with less cost using single process unikernels. [Read more]


Stacks Image 146

Endpoint Anti-Phishing - eliminates phishing attacks delivered by email, social media, USB sticks and messaging apps with computer vision detection and prevention. [Read more]
Stacks Image 154

Augmented Reality for Your Desktop - Humans are good at analysis but bad at recall. Make your team smarter by giving them superhuman data awareness and recall. [Read more]
Stacks Image 172

CyberConverged Network Attached Storage - Software defined secure storage with advanced security, encryption, monitoring and compliance controls. [Read more]


Stacks Image 180

Enables agile development teams to have effective conversations, discover new insights, and generate action plans.
Stacks Image 547

The world’s first data-centric, always-on DLP, with built-in autonomous discovery & classification. Controls access & prevents data breaches by proactively encrypting data regardless of where it is created, consumed, stored, or modified.
Stacks Image 540

Speeds delivery of VC-backed, commercially developed technologies to government-funded national security missions, helping ensure U.S. warfighters receive cutting-edge capabilities quickly & cost-effectively. [Read more]


Stacks Image 190

Brings deep learning & forced code-execution to the battle against advanced malware. Their dynamic analysis malware detector uses patented technology to find, execute & characterize hidden code paths.
Stacks Image 198

Container Adaptive Threat Protection - Docker & SecDevOps security monitoring and intrusion prevention. [Read more]

Stacks Image 206
Scythe is a platform that enables blue, red & purple teams to easily build, emulate & replay real-world threat campaigns with a combination of communications & end-point capabilities. [Read more]


Stacks Image 216

Stops Web Browser Attacks - Reduces fraud by agentlessly preventing browser attacks. [Read more]
Stacks Image 224

Web Advertising Fraud Prevention - Saves advertising budget by removing botnets from web leads




Stacks Image 267

406 Ventures invests in technologies and tech-driven services that solve thorny problems for big markets in unique and compelling ways. Portfolio companies include Carbon Black, Edgewise Networks, HYPR, Terbium Networks and Veracode.
Stacks Image 513

C5 Capital is a specialist investment firm that exclusively invests in the secure data ecosystem including cybersecurity, cloud infrastructure, data analytics and space. Portfolio invesments include 4IQ, Ironnet Cybersecurity and Enveil. [Read more]
Stacks Image 275

DataTribe leverages deep experience and expertise to build & launch successful product companies in Maryland. Portfolio companies include Dragos, Prevailion, Attila, EnVeil and ReFirm Labs. [Read more]


Stacks Image 283

Forgepoint Capital focuses on advancing the cybersecurity ecosystem by connecting entrepreneurs, customers, strategic partners, advisors, and executives to forge the next generation of cybersecurity companies that protect the digital world. Portfolio companies include Attivo, Bishop Fox, IronNet and Reversing Labs. [Read more]
Stacks Image 292

Inner Loop Capital invests in cybersecurity, cloud infrastructure, data analytics, and enterprise SaaS seed-stage start-ups with a greater Washington DC and Silicon Valley focus. Portfolio companies include AppOmni, DNS Filter, Greynoise and NS8. [Read more]
Stacks Image 300

Tech Operators invests in cybersecurity and business to business start-ups with a focus on Atlanta and southeast US companies. Portfolio companies include Endgame, Ionic Security and Kyck Global. [Read more]


Stacks Image 508

Work Bench is an enterprise technology venture fund based in New York City. They invest in category-defining enterprise technology startups early in their go-to-market. Portfolio companies include Algorithmia, ArthurAI, RippleMatch and Scytale. [Read more]




Stacks Image 522

2020 - Thycotic, a provider of privileged access management (PAM) solutions, acquired fellow PAM solution provider Onion ID to extend its PAM coffering. With the acquisition, Thycotic added 3 new products to its PAM portfolio to further protect enterprise cloud apps and ensure remote worker productivity.
Stacks Image 460

2020 - Scytale Acquired by HPE. Scytale standardized, scaled and accelerated service authentication across cloud, container, and on-premise platforms. Scytale received investments from both Tech Operators and Work-Bench.
Stacks Image 437

2019 - Protego Labs was acquired by Checkpoint Software to offer serverless security monitoring. Protego joins the Checkpoint CloudGuard family and monitors AWS Lambda applications and APIs for user configuration and coding security issues.


Stacks Image 326

2019 - ThreatCare was acquired by ReliaQuest to integrate their attack simulation technology into the GreyMatter security platform for security operations centers.
Stacks Image 334

2019 - NewEdge's cloud first VPN which enabled secure application networking was acquired by Netskope to further extend their cloud security solutions.
Stacks Image 342

2019 - Gula Tech Adventures exited our investment in ThreatConnect after they received funding from Providence Strategic Growth. ThreatConnect continues to innovate in the threat and orchestration markets.


Stacks Image 351

2019 - Avast acquired TrackOff to offer PC, Mac and mobile solutions that enables consumers to see who is tracking them online and prevent personal information from being collected.
Stacks Image 359

2019 - NetScout acquired Eastwind Networks to integrate their security analytics and forensics of cloud telemetry (O365, Salesforce, .etc) and on-premise network traffic.
Stacks Image 367

2018 - Tenable held an IPO on the NASDAQ. Ron was CEO and co-founder from 2002 till 2016 and Cyndi was an executive at the company from 2002 till 2015.


Stacks Image 376

2017 - ForcePoint acquired RedOwl to integrate their UEBA technology to deliver holistic views of cyber behaviors.
Stacks Image 384

2014 - Cisco acquired ThreatGrid to integrate their dynamic malware analysis & threat intelligence technology with Cisco AMP.
Stacks Image 392

2000 - Enterasys Networks acquired Network Security Wizards and within a year, the Dragon Intrusion Detection System was recognized by Gartner as the top solution to detect network intrusions.


COMPLETE PORTFOLIO



Stacks Image 481
With investments in multiple cyber funds in many different types of cyber categories, we maintain a full list of all 53 companies we are currently directly or indirectly involved in on our blog.