Information security products, services, and professionals have never been in higher demand, making for a world of opportunities for cybersecurity startups. Investors recognize the potential too, as funding for cybersecurity ventures more than doubled from previous years to almost $22 billion in 2021.
There remains a massive shortage of experienced security professionals available to fill open positions – and with no shortage of innovative startups entering the marketplace, that makes the competition for talent even tougher.
With evolving attack methodologies due to machine learning, quantum computing, and sophisticated nation-state hackers, security startups are receiving record funding. Investors, business clients, and more continue to look for secure application access for remote workers, provide real-time visibility into cyberattacks, and protect data as it travels from the cloud to edge networks and end-users and back.
This article looks at the top 60 cybersecurity startups to watch in 2022 based on their innovations in new and emerging technologies, length of operation, early funding rounds, scalability, and more. Jump to our section on cybersecurity startup trends for more information, or read about the latest in venture capital with Top VC Firms in Cybersecurity.
We’ll start with the top 10 overall and then look at other noteworthy startups in a number of markets, including threat detection, identity, DevSecOps, cloud security, attack surface management.
Top 10 Cybersecurity Startups
|Abnormal Security||2018||San Francisco, CA||261||$284.0||C|
|Apiiro Security||2019||Tel Aviv, Israel||65||$35.0||A|
|BluBracket||2019||Palo Alto, CA||27||$18.5||A|
|Cado Security||2020||London, UK||26||$11.5||A|
|Confluera||2018||Palo Alto, CA||33||$29.0||A|
|Cycode||2019||Tel Aviv, Israel||56||$81.0||B|
|Open Raven||2019||Los Angeles, CA||45||$19.1||A|
|Perimeter 81||2018||Tel Aviv, Israel||159||$165.0||C|
|SECURITI.ai||2018||Santa Clara, CA||305||$81.0||C|
|Wiz||2020||Tel Aviv, Israel||186||$600.0||C|
- Abnormal Security
- Cado Security
- Apiiro Security
- Open Raven
- Perimeter 81
Abnormal Security is an advanced cloud email security platform that offers integration with Office 365 and Google Suite for the cloud era. Abnormal Security applies artificial intelligence to catch suspicious identities, relationships, and context within email communications and can help organizations securely migrate from legacy to cloud infrastructure.
Cado Security made a name by offering the first cloud-native forensics and response platform. The Cado Response platform gives security teams the capability to respond to threat incidents in cloud or container environments rapidly. Most traditional tools used for investigating cyber attacks cannot assess potential impacts on these environments.
Recognizing cloud security doesn’t come down to one single misconfiguration, Wiz helps organizations migrating to the cloud guard against a web of potential vulnerabilities with the proper visibility. Wiz addresses a growing awareness of insecurity in the public cloud with an agentless solution.
Boasting itself as the world’s first Code Risk Platform, Apiiro Security offers risk visibility across design, code, and cloud segments. Apiiro can connect across hybrid infrastructure through a read-only API and promises real-time inventory and actionable remediation for risks in addressing DevSecOps.
Read more: And the Winner of the 2021 RSAC Innovation Contest is…
As source code exploits become a growing concern, BluBracket offers a deep scan of organization codebases for enhanced visibility into code mistakes, lingering tokens, and problematic commit history. Clients can use BluBracket’s Risk Score to measure vulnerability and take informed steps to improve application security.
Confluera focuses on another attractive factor for remote workforces – autonomy. The cybersecurity startup offers an extended detection and response (XDR) solution that tracks network traffic and automatically combines the information with machine-comprehended threat detection. It uses this data to show a complete narrative of an attack in real-time.
In a year where the supply chain was on trial, Cycode is a startup filling the vulnerability gap often present in the software supply chain and DevOps pipeline. Cycode focuses on all phases of the software development lifecycle (SDLC) with solutions for Infrastructure as Code, source control and code leakage, hardcoded secrets, and code tampering.
Also read: SBOMs: Securing the Software Supply Chain
Open Raven is committed to data security visibility and compliance for the cloud and brings much cybersecurity industry experience to the table. Open Raven analyzes data at rest, classifies inventory, and automates data governance as these become critical capabilities for the hybrid infrastructure’s security posture.
Perimeter 81 is already a well-known vendor and offers a robust security stack that includes zero trust, SASE, FWaaS, and SD-WAN solutions. Clients can take advantage of Perimeter 81’s industry-leading technologies related to unified networking and security while capitalizing on the least privileged access trend.
SECURITI’s solutions help organizations secure data while automating privacy and compliance using AI and machine learning tactics. With sizable growth in a short span and the market presence to show for it, SECURITI.ai was recently named a Leader in the Forrester Wave’s Privacy Management Software, Q4, 2021.
Read more: Top Enterprise Network Security Tools
Best Threat Detection Startups
|Anvilogic||2019||Palo Alto, CA||34||$39.4||B|
|Stairwell||2019||Palo Alto, CA||31||$24.5||A|
Anvilogic’s namesake platform offers continuous assessment, detection automation, and hunt, triage, and response capabilities for security teams. Designed to automate SOC operations and reduce alert noise, Anvilogic is a no-code, user-friendly solution with out-of-the-box policies aligned to 500+ MITRE ATT&CK framework.
Powered by machine learning and human analytics, Cyble is a threat intelligence startup offering solutions for attack surface management, third-party risk scoring, and monitoring for brand reputation and dark web exposure. Cyble Vision can integrate with an existing SIEM or SOAR and provide incident response, threat analysis, and vulnerability management.
Also read: Top Endpoint Detection & Response (EDR) Solutions
SenseOn is a cybersecurity startup with an “AI Triangulation” technology that emulates actual security analyst behavior for detection, investigation, and response. SenseOn products are available as a network appliance, lightweight endpoint agent, or cloud-hosted microservices, with an Enterprise solution for deployment across multiple global sites.
SnapAttack is a threat hunting and detection startup recently spun out from Booz Allen’s DarkLabs incubator. SnapAttack seeks to empower clients with proactive threat intelligence, behavioral analytics, and attack emulation through a collaborative platform. Enterprise and service providers are currently available, with a free community subscription coming soon.
Stairwell is an advanced threat detection startup presenting its Inception platform for threat intelligence, SOC functionality, and incident response capabilities. Inception helps collect files across environments, analyze historical and real-time data, investigate abnormal behavior, and connect security systems through the Inception API.
Best DevOps and AppSec Startups
|Satori||2019||Tel Aviv, Israel||62||$25.3||A|
|Ubiq Security||2019||San Diego, CA||25||$6.4||Seed|
GitGuardian is a developer favorite offering a secrets detection solution that scans source code to detect certificates, passwords, API keys, encryption keys, and more. Ranked as the top-downloaded security app on GitHub, GitGuardian’s products include solutions for internal repository monitoring and public repository monitoring for prompt remediation.
Evervault is on a mission to make encrypting sensitive data seamless with its security toolkit for developers. The developer-friendly startup offers Relay to encrypt field-level data and codes to isolate and process code as needed. With robust encryption policies, Evervault can help reduce insurance premiums and offers PCI-DSS and HIPAA compliance automation.
Also read: Top Code Debugging and Code Security Tools
Satori is a data access startup for monitoring, classifying, and controlling access to sensitive data. Satori’s platform creates a layer of protection and visibility between data users and data stores to guard against vulnerabilities related to transferring sensitive data. Ultimately, Satori aims to provide data access control, visibility into usage and traffic, and compliance fulfillment.
Ubiq Security offers an API-based platform that integrates data encryption directly into application development. Without the need for experienced developers, encryption expertise, or excessive manual hours, Ubiq Security makes securing applications during the development process seamless, allowing personnel to focus on what’s most important.
Wabbi is a cybersecurity startup with a continuous security platform offering solutions for managing vulnerabilities, application security policies, and release infrastructure. As rapid software development is the new norm, Wabbi aims to help organizations securely deliver software to clients and achieve continuous authority-to-operate (ATO).
Read more: Application Security is Key to Stopping Ransomware, Vendor Says
Best Cloud Security Startups
|Araali Networks||2018||Fremont, CA||15||–||Seed|
|DoControl||2020||New York, NY||37||$43.4||B|
|Ermetic||2019||Palo Alto, CA||167||$97.3||B|
|Grip Security||2021||Tel Aviv, Israel||25||$25.0||A|
|Isovalent||2017||Mountain View, CA||48||$29.0||A|
|Lightspin||2020||Tel Aviv, Israel||43||$20.0||A|
|Mitiga||2019||Tel Aviv, Israel||87||$32.0||A|
|Valence Security||2021||Tel Aviv, Israel||29||$7.0||Seed|
- Araali Networks
- Grip Security
- Valence Security
To secure cloud-native workloads, Araali Networks offers identity-based threat management to prevent malicious communications and data leaks. With a trio of products, customers can choose from Lens for visibility into cloud infrastructure, Sense for actionable alerts and risk prioritization, and Shield for protecting vulnerable applications.
DoControl is a startup specializing in SaaS data access control with a platform offering cloud asset management, automated security workflows, and continuous cloud infrastructure monitoring. As organizations increasingly rely on SaaS applications for data storage and transfer, DoControl helps guard against unauthorized access of sensitive data.
Ermetic’s cloud security platform brings together cloud infrastructure entitlement management (CIEM) and cloud security posture management (CSPM) to give clients an identity-first, multi-cloud security solution. With cloud asset management, organizations can gain visibility, assess risks across traffic, and automate remediation for anomaly and threat detection.
Grip Security boasts a solution that beats traditional cloud access security brokers (CASB), providing clients with a complete SaaS inventory upon deployment for visibility, governance, and data security. No matter the device or location, Grip’s solution helps enhance and automate security policy enforcement across an organization’s cloud infrastructure.
Isovalent’s flagship product, Cilium, is powered by the open-source eBPF kernel technology and offers infrastructure services for networking, monitoring, and security for organizations. Isovalent’s solutions were designed with scale in mind to secure mission-critical and complex workloads in cloud environments, including Kubernetes.
Also read: Twitch Breach Shows the Difficulty of Cloud Security
Lightpsin is a cloud-native application protection platform (CNAPP) offering agentless tools to protect cloud and virtual environments, including Kubernetes infrastructure. With graph-based analytics into existing relationships, the startup’s solutions help visualize prospective attack routes so clients can prioritize sensitive remediation within their cloud stack.
To accelerate investigation, response, and time to recovery, Mitiga is the cloud incident response company offering emergency IR, ransomware readiness, and incident readiness and response. By capturing and processing cloud forensic data, Mitiga’s IR experts can help clients proactively manage vulnerabilities and breaches from a central crisis management dashboard.
Privafy aims to serve a valuable corner of the market – securing data-in-motion. As up to 80 percent of data breaches occur while data moves between cloud networks, Privafy offers security for cloud infrastructure as well as a list of edge computing solutions to securely deploy IoT devices and edge networks in the years to come.
Strata Identity offers an identity orchestration solution, the Maverics Platform, which aims to solve enterprise organizations’ complex identity and access management (IAM) problems. By integrating identity systems across the modern infrastructure, organizations can easily create and replicate orchestrations for apps.
Valence Security’s focus is the third-party integration risks presented by a universe of cloud applications used for business workflows. With the rise of the SaaS to SaaS supply chain, as Valence calls it, organizations need visibility into application interactions. Through its platform, Valence brings workflows, permission scopes, API keys, and OAuth access tokens to light.
Read more: Cloud-based security: SECaaS
Best Cyber Asset and Attack Surface Management Startups
|Horizon3||2019||San Francisco, CA||56||$38.5||B|
|Noetic Cyber||2020||Waltham, MA||29||$20.0||A|
|Sevco Security||2020||Austin, TX||48||$21.7||A|
Horizon3.ai presents its solution, the NodeZero, as Autonomous Penetration Testing as a Service (APTaaS) for identifying an organization’s potential attack vectors. Whether on-premises, cloud, IoT, internal, or external attack surfaces, NodeZero can identify vulnerable controls, maximize security infrastructure, and leverage the latest threat intelligence.
JupiterOne is a cyber asset management startup providing clients with a cloud-native solution for insights into relationships, governance and compliance, and empowering security engineering. JupiterOne helps aggregate cyber assets for central visibility and faster investigations with increasing complexity in security operations and assurance.
Noetic Cyber offers a continuous cyber asset management and controls platform to give clients a comprehensive view of systems, policies, and the relationship between entities. Real-time visibility means organizations can identify and act on misconfigurations and coverage gaps and maximize existing infrastructure with a proactive remediation strategy.
Randori bills itself as the world’s first automated breach and attack simulation (BAS) platform. By mirroring malicious attackers in a real-world attack, Randori provides an up-to-date assessment of an organization’s attack surface and identifies vulnerabilities and their potential impacts.
Sevco Security is a cloud-native cyber asset and attack surface management platform offering a real-time inventory of assets, multi-source correlation, and asset telemetry to support incident response workflows. With robust visualizations of network devices and traffic, Sevco’s agentless asset intelligence platform gives network administrators the visibility to identify and remediate coverage gaps.
SpiderSilk offers an impressive proprietary internet scanner that maps out a company’s assets and network attack surface to detect vulnerabilities. Over the years, SpiderSilk’s research has informed several high-profile breaches, and for clients, the vendor can simulate cyberattacks to ensure organizations take preventive measures before the real thing.
Also read: Overcoming Zero Trust Security Challenges
Best Identity & Access Management Startups
|Authomize||2020||Tel Aviv, Israel||69||$22.0||A|
|Cerby||2020||San Francisco, CA||42||$15.5||Seed|
|Deduce||2019||New York, NY||22||$17.3||A|
|SafeBase||2020||San Francisco, CA||28||$20.1||A|
Authomize is the cloud identity and access security platform designed to map all identities and assets across XaaS environments. Putting observability first, Authomize continuously monitors security policies to identify exposed assets, entitlement escalation paths, and hidden and unmonitored permissions. Authomize utilizes an AI-based engine to manage and automate remediation for client’s Authorization Security Lifecycle.
Cerby is on a mission to wrangle unmanageable applications, otherwise known as shadow IT – or the universe of apps employees use without permission from the IT department. Through application APIs and robotic process automation (RPA), Cerby helps automate access corresponding to managed identity platforms like Okta and Azure AD while monitoring for application misconfigurations that violate security policies.
Deduce is an identity-focused cybersecurity startup with two core solutions: Customer Alerts for protecting users and their data from account takeover and compromise, and Identity Insights for validating legitimate users and stopping fraud. Deduce offers actionable identity intelligence through event-level telemetry to act against abnormal user activity.
SafeBase is a trust-focused security platform streamlining the third-party risk management process between companies. Through the Smart Trust Center, companies can quickly share their private documents, compliance policies, risk profile, and product security details. SafeBase’s stack of features covers enterprise authentication, role-based access, security questionnaires, and auto-populated NDA templates.
Securden is the privileged access governance upstart offering companies password management, privilege management for endpoints and servers, secure remote access, and endpoint application control. Designed for least privilege and zero trust security architectures, Securden specializes in privilege management for Windows-centric organizations and data centers.
A leading startup hailing from Latin America, Truora offers a stack of solutions to simplify and secure user interactions. On top of solutions for chatbots, electronic signatures, and employee background checks, Digital Identity by Truora helps organizations quickly and safely verify online identities by validating documents, email, and phone, facial recognition, and more.
Best Remote Access Security Startups
|Talon Cyber Security||2021||Tel Aviv, Israel||29||$26.0||Seed|
|Twingate||2019||Redwood City, CA||72||$59.0||B|
BastionZero is the Infrastructure Access as a Service company helping organizations configure, manage, and secure access controls to hybrid infrastructure targets. Through a central cloud console, engineers can authenticate and access all servers, containers, clusters, and databases. Designed to remove the hassle of VPNs, BastionZero offers passwordless access, identity-aware logging, SSO, and MFA.
Building off the open source WireGuard protocol, Tailscale is a VPN service that utilizes a peer-to-peer mesh network, or “tailnet”, and removes the central gateway server for network traffic. Tailscale allows companies to integrate existing SSO and MFA solutions, define role-based access controls for sensitive targets, and ensure network traffic meets compliance policies through log audits.
Talon Cyber Security
As organizations increasingly adopt remote personnel, Talon Cyber Security addresses web and browser-based threats with a secure, corporate browser. Based on Chromium OS, Talon’s browser-centric security solution aligns with its larger strategy to protect the distributed workforce and enable secure access to hybrid infrastructure.
In the race to replace traditional VPNs, Twingate offers a secure zero trust network access (ZTNA) for computers, servers, and cloud instances. Twingate allows network administrators to map resources, approve users for resources, and connect to any device from anywhere. Easy to integrate into existing infrastructure, Twingate includes identity-indexed analytics, universal MFA, and built-in split tunneling.
Best Compliance & Governance Startups
|Dasera||2019||Mountain View, CA||27||$9.0||Seed|
|Ethyca||2018||New York, NY||44||$27.5||A|
|Strike Graph||2020||Seattle, WA||52||$11.9||A|
|Unit21||2018||San Francisco, CA||84||$47.0||B|
Dasera is the data governance platform offering continuous policy enforcement, automated audits, and access to more data to inform decision-making. Monitoring for misconfigurations, cloud data stores, and change management across hybrid infrastructure, Dasera reduces manual workloads and ensures security while sharing data with necessary stakeholders.
Ethyca is compliance-focused as regulatory enforcement becomes an essential part of data privacy. With Ethyca, clients get a bundle of tools for privacy by design in the development process. Ethyca can automate compliance tasks, including real-time data mapping, automated subject requests, consent management, and subject erasure handling.
Strike Graph is the cybersecurity compliance helping companies meet a long list of security frameworks, including SOC 2, ISO 27001 and 27701, HIPAA, GDPR, CCPA, and PCI DSS. From certification readiness to dedicated Audit Success Managers, Strike Graph can help companies automate evidence collection, streamline security questionnaires, and challenge vulnerabilities through penetration testing.
Boasting a simple-to-use API and dashboard, Unit21 is a hot startup for enterprise organizations looking to mitigate fraud and money laundering risks without the extensive engineering personnel. Unit21 is a no-code platform with operations and case management solutions, transaction monitoring, identity verification, and analytics and reporting for compliance.
Read more: Why You Need to Tune EDR to Secure Your Environment
Other Top Cybersecurity Startups
|Cape Privacy||2018||New York, NY||25||$25.0||A|
|Cowbell Cyber||2019||Pleasanton, CA||124||$23.6||A|
|Havoc Shield||2019||Chicago, IL||9||$4.9||Seed|
|Hook Security||2019||Greenville, SC||16||$1.6||A|
|Neosec||2021||Palo Alto, CA||62||$20.7||A|
|Nucleus Security||2018||Sarasota, FL||42||$23.1||B|
- Cape Privacy
- Cowbell Cyber
- Havoc Shield
- Hook Security
BreachQuest is a digital forensics and incident response (DFIR) startup preparing to launch its Priori Platform for active continuous monitoring, detection, and recovery capabilities. With plenty of cybersecurity experience at the helm – including NSA, DoD, and U.S. Cyber Command – BreachQuest has client preparedness for attacks top of mind.
Cape Privacy addresses secure communication between organizations by building machine learning models on encrypted data. Currently ideal for industries like financial services managing sensitive data, Cape Privacy’s Snowflake is an innovative multi-party computation (MPC) platform that prevents single points of failure and ensures compliance.
Cowbell Cyber is a dedicated cyber insurance company that relies on continuous risk assessment, AI data analytics, and real-time underwriting to give clients pre- and post-breach services. The risk management startup offers visibility into exposures dubbed Cowbell Factors, giving clients opportunities for potential remediation and better coverage.
Designed for small businesses, Havoc Shield offers clients a suite of cybersecurity tools to manage cybersecurity programs with confidence. In a single bundle, Havoc Shield’s stack covers asset inventory, vulnerability management, endpoint protection, patch management, email security, cyber awareness training, and vendor risk management.
The eponymous Hook Security specializes in phishing testing and security awareness training to transform workforce culture surrounding cybersecurity. Available as a managed service or self-managed solution, Hook Security’s solutions include a customizable phishing simulator, learning management system, reporting, and a catalog of available awareness training content.
Neosec is a cybersecurity startup using behavioral analytics to address rising concerns surrounding vulnerabilities in APIs. By maintaining an inventory of an organization’s APIs, Neosec can determine the risk posture presented by a critical portion of the traffic. Neosec’s leadership has strong industry roots, further supporting the vendor’s likelihood of success.
Read more: OAuth: Your Guide to Industry Authorization
Nucleus Security is a risk-based vulnerability management platform offering risk scoring and reporting, asset management, and vulnerability intelligence. Sitting at the intersection of threat intelligence, asset management, and vulnerability scanning data, Nucleus offers a central hub with over 100 security integrations to optimize visibility into cybersecurity coverage gaps.
In the vendor’s own words: “We protect plans, trains, and tanks from cyber attacks.” Specializing in cybersecurity solutions for operational technology (OT), Shift5 offers protection for the world’s transportation infrastructure and weapons systems. Shift5 continuously monitors data intake from hardware and software to visualize critical insights, detect anomalies, and prevent intrusions.
SolCyber is the newest managed security service provider (MSSP) on the block to reduce cyber risk, wastage, and complexity. Led by a C-suite with solid industry and technical experience, SolCyber currently offers foundational and extended coverage to meet varying needs in building out cybersecurity systems and adequate SOC capabilities.
Torq is the no-code security automation platform for building and integrating workflows between cybersecurity systems. With a long and impressive list of potential use cases, teams can utilize Torq to automate security workflows related to cloud security posture management, email phishing response, application security, data security, and more. For example, companies with existing EDR, XDR, and SIEM systems can automate threat hunting workflows with Torq.
Also read: Choosing a Managed Security Service: MDR, Firewalls & SIEM
Investor Considerations for Cybersecurity Startups
Potential to Scale, Lean R&D
Scalability will always be one of the most critical factors for investing in a successful startup. When there are growth opportunities, startups should and usually do capitalize on them.
Investors are also looking for startups that can continue to improve their products without the need for substantial capital investment. Lean research and development (R&D) show efficiency, even with limited resources. Investors can evaluate how the product and business model evolve before investing more capital. This fact makes any startup’s quality of personnel and leadership a critical factor in the organization’s success.
A Solid Business Plan
Another factor investors have always looked for is an air-tight business plan. They want assurance that there is a marketable problem that the product solves. Investors also want to see financial reports and revenue growth projections backed up by market analysis.
Read more: Top Database Security Solutions
Regulatory compliance, such as HIPAA, GDPR, and CCPA, is essential for organizations collecting and protecting user information, including virtually all enterprise-level companies. Investors will be looking for startups that can ensure customers will maintain compliance.
Remote Work Experts
Remote work is and will continue to be, for the foreseeable future, a top-of-mind factor for venture capitalists. Even with vaccines, a largely remote workforce is likely here to stay.
Startups that can immediately impact the remote worker ecosystem will garner much attention. Specifically, startups with SaaS (software-as-a-service), those that provide automation, and products that include endpoint protection will fall into this category.
Cybersecurity Startup Trends
As organizations, clients, and end-users increasingly rely on cyberinfrastructure, the need to protect these systems will only deepen.
Given the relative newness of IT industries at large, cybersecurity remains a budding marketplace with plenty of opportunities for new vendors. Some of the best cybersecurity companies are longtime technology stalwarts. Still, many have proven the right solution and service can catch on fast with eager investors ready to help worthy startups scale.
Also read: Top Cybersecurity Companies for 2022
Most Popular Cybersecurity Startup Solutions in 2022
- Application Security
- Attack Surface Management
- Cloud Security
- Cyber Asset Management
- Digital Forensics and Incident Response
- Identity and Access Management
- Governance, Risk, and Compliance
- Risk Scoring and Assessments
- Software Development Lifecycle (SDLC)
- Threat Detection (EDR, XDR)
Endpoint Security and Protection Against Ransomware
Endpoint security, including traditional endpoint detection and response (EDR), managed EDR (MDR), and increasingly, its advanced iteration, extended detection and response (XDR) continue to be in high demand in light of the boom in remote work.
Products like EPP, EDR, MDR, and XDR solutions secure the devices spanning a remote ecosystem and will continue to be invaluable. The healthcare segment alone saw significant investment in cybersecurity due to the adoption of telehealth and teleworking models.
Also read: Antivirus vs. EPP vs. EDR: How to Secure Your Endpoints
Most Popular Headquarters for Cybersecurity Startups
The United States, Israel, Canada, and the United Kingdom continue to be popular national locations for cybersecurity startups, with most of the funding directed between the first two.
Within the United States, the San Francisco Bay Area remains the hottest region for startups. The second-largest contingent of cybersecurity startups is a continent away from Palo Alto, in New York City. The industry newcomers benefit from the proximity to partnerships, skilled IT personnel, and funding opportunities.
Though it’s hard to compare to the presence of San Francisco and New York, other U.S. cities holding multiple top contenders this year include:
- Atlanta, GA
- Austin, TX
- Boston, MA
- Chicago, IL
- Dallas, TX
- Los Angeles, CA
- San Diego, CA
Top Startup Selection Criteria
- Time Operating: less than 5 years; established between 2017 and 2021
- Funding: minimum $1 million raised through seed, Series A, or Series B rounds*
- Autonomy: independent organizations (not recently acquired)
- Solutions: presents innovative cybersecurity product or service
- Business Model: viable business plan with evidence of scalability
*As of January 1, 2022.
Several security companies making previous eSecurity Planet top startup lists continue to be prominent vendors heading into 2022, whether as well-funded growing companies or the newest acquired team for other top IT service providers. These companies include:
|Axis Security||2018||San Mateo, CA||108||$99.5||Series C|
|Bitglass||2013||Campbell, CA||170||$150.1||Acquired by Forcepoint|
|Cato Networks||2015||Tel Aviv, Israel||400||$532.0||Venture|
|Cybereason||2012||Boston, MA||1,100||$713.6||Series F|
|Darktrace||2013||Cambridge, UK||1,600||$230.5||IPO: “DARK” on LSE|
|Illumio||2013||Sunnyvale, CA||461||$557.5||Series F|
|Immuta||2015||Boston, MA||180||$158.2||Series D|
|OneTrust||2016||Atlanta, GA||2,000||$926.4||Series C|
|Orca Security||2019||Los Angeles, CA||271||$482.0||Series C|
|SentinelOne||2013||Mountain View, CA||1,080||$696.5||IPO: “S” on NYSE|
|Vdoo||2017||Tel Aviv, Israel||900||$70.0||Acquired by JFrog|
Startups on the Move in 2022
Since our last update in January 2022, a handful of the featured startups obtained Series C funding and will join our “Graduated Startups” list starting in 2023. These movements include:
|Startup||Est||Headquarters||Est. Size||Funding||Funding Type|
|Abnormal Security||2018||San Francisco, CA||261||$284.0||Series C|
|JupiterOne||2018||Morrisville, NC||87||$70.0||Series C|
|Perimeter 81||2018||Tel Aviv, Israel||159||$165.0||Series C|
|Randori||2018||Waltham, MA||73||$29.8||Acquired by IBM|
|Wiz||2020||Tel Aviv, Israel||186||$600.0||Series C|
Read more: 34 Most Common Types of Network Security Protections
This article was originally published on January 29, 2021 by Kyle Guerico, written for 2022 by Sam Ingalls on January 11, 2022, and updated again on August 31, 2022.