Our Investments

Since 2008, we’ve invested across multiple industry verticals through four funds. 

Featured Securetech Investments



Cupertino, CA

AccuKnox is a Zero Trust Cloud Native Application Protection Platform (CNAPP). Developed in partnership with Stanford Research Institute, AccuKnox is built to scale runtime protection for complex cloud native applications that are rapidly developed, deployed, and iterated. It combines CSPM, KSPM, CWPP features into a comprehensive CNAPP, integrates with leading DevOps & security tools, and supports all cloud environments. AccuKnox’s, KubeArmor is an open source CNCF project with 200K+ users.

Dublin, CA

AiStrike addresses cloud investigation and response through automation and AI. It alleviates alert fatigue for cloud security operations by cutting Cloud/CNAPP alert volumes by 85%, automatically enriching and prioritizing alerts for faster MTTR and better decision-making. With AiStrike, you get real-time alert triage, guided investigation, and automated response—all within a single intuitive platform.

South Plainfield, NJ

Alfahive transforms the way businesses analyze risk and build cyber resilience. Alfahive’s RiskNest security performance automation platform models the financial impact of cyber risks across your business functions and provides a roadmap of security controls to reduce risk. We enable CISOs to collaborate with the board, make data-driven investment decisions and manage security risk performance on an ongoing basis. RiskNest includes continuously researched cyber risk scenarios and machine learning techniques to help you save months of consulting effort.

Sacramento, CA

AuthNull provides a modern privileged access management (PAM) platform. It uses risk-based MFA to prevent unauthorized access to critical infrastructure resources. This is done using passwordless, vaultless strategies, which reduce both costs and complexity, addressing significant enterprise challenges for securing and managing large-scale infrastructure. AuthNull's features include machine-to-machine authentication and an AI security co-pilot designed to replace IT help desk support. AuthNull was conceptualized and is being implemented in stages at a Fortune 50 company.

Nirmata is a Kubernetes policy and governance solution. Nirmata’s game-changing Policy and Governance platform, powered by the popular open source policy engine Kyverno, leverages the power of policy-as-code to tackle risk early in the delivery cycle. With Nirmata, platform teams seamlessly create, manage, and enforce policies, ensuring unrivaled security, operational excellence, and compliance throughout the entire software supply chain.

Arlington, VA

Bricklayer AI is the first multi-agent LLM-based AI solution that brings autonomous AI specialists and human experts into a single collaborative and effective security team. Our automated AI Security Analyst, Threat Intelligence Analyst, and Incident Responder autonomously handle complex incidents with minimal human oversight. They learn continuously, collaborate seamlessly, and enable human teams to build a stronger defense.

New York, NY

Cylera uses machine learning-powered solutions to defend medical devices from cyber attacks, including zero day exploits, data breaches, and ransomware.

Palo Alto, CA

Daxa provides a multi-cloud data security platform that empowers security teams to intuitively discover high-risk data and proactively prioritize its protection. The agentless offering enables companies to continuously and collaboratively de-risk their crown jewels against increasingly sophisticated threats, including indirect and internal attacks.

Philadelphia, PA

Formotiv provides real-time predictive behavioral analytics of end-user intent detecting fraudulent data entry or manipulation and determining true user motives. Already trusted by banks, insurance companies, and other financial institutions, Formotiv uses machine learning to understand how users behave in both web-based and mobile apps.

Saratoga, CA

Lineaje is a software supply chain security company. The most damaging attacks in cybersecurity in recent years have featured software supply chain compromises where existing security controls and cloud security products had failed to detect them. From SolarWinds to Kaseya to open-source software (OSS) compromises, these attacks put software & digital brands and their customers at risk. Lineage addresses this unsolved problem by attesting software bill of materials (SBOM) integrity and detecting threats throughout the software supply chain.

San Jose, CA

Oort is an identity threat detection and response platform. Oort automatically identifies vulnerable user accounts and triggers alerts related to behavioral anomalies, best practices, or policies not being followed. Oort also identifies inactive, overactive, overprivileged, or unusual behavior to reduce the identity attack surface and prevent account takeover before it happens.

Boston, MA

Palo Alto, CA

Opscura prevents industrial cyber attacks with a patented zero trust security overlay on the infrastructure. As of 2022, 34% of industrial control systems (ICSs) suffered at least one attack and 40% of these facilities experienced an attempted shutdown. Opscura protects industrial system downtime due to cyberattacks without modifying the current network nor demanding team resources.

Westwood, MA

San Jose, CA

RaySecur is a first-line package-scanning and defense solution that detects and confirms the presence of suspicious powders and liquids in extremely small quantities using advanced millimeter wave technology. Compared to X-rays, this technology requires little training, emits no radiation, is more effective, and far lower cost. Four of the five most valuable companies in the world are protected by RaySecur.

Spec provides a no-code identity abuse & fraud prevention platform. Today, Fintechs and eCommerce providers are under constant pressure from automated attacks and onerous regulatory requirements, which limits their ability to focus engineering efforts on business needs. Spec addresses this challenge with a cloud-native solution at the edge that can be commissioned in minuteas and managed by fraud investigation teams without any code modifications.

Santa Clara, CA

Swif.ai is an AI-powered tool to supercharge your device's security and compliance. Swif was designed from scratch to support hybrid device management on Mac, Windows, and Linux devices. We are the first company to merge device management, compliance automation, and AI to assist companies with their device security and compliance needs. Swif provides a one-click checklist to secure your device for compliance requirements, like automatically deploying policies, malware protection, and password management in one. Swif.ai is being used by over 100 organizations of various sizes.

Huntsville, AL

TestifySec is software supply chain attestation solution. Ensuring the integrity of software artifacts and the software development process is a significant challenge for organizations, as they face sophisticated attacks across the supply chain. This requires visibility, auditability, and integrations throughout the various stages that a software artifact passes through during development and deployment. TestifySec is the first solution to utilize the CNCF accepted in-toto framework to automatically document and validate each step of the software development process, from the initial commit to production deployment. TestifySec provides policy-based cryptographic attestations as well as automation and AI features, which simplify security, compliance, and user onboarding.

Washington, DC

Beaverton, OR

UpSight is an anti-ransomware solution that provides instant response on endpoints. It employs a transformative approach to predict, interdict, and evict malware at the point of initial access. Unlike traditional EDRs that analyze events in batches—creating a vulnerability window for zero-day threats—UpSight uses highly specialized Small Language Models (SLMs) that act on the endpoint in real-time, preventing attacks before malware can even deploy payloads. It maps threats to MITRE ATT&CK, analyzing behaviors like a language to predict attacks accurately. Moreover, UpSight requires no configuration; it automatically evicts malware, reversing attacker persistence—in contrast with EDRs, which require expert fine-tuning and manual cleanup after attacks.

Tidal Cyber is a threat-informed defense platform. Despite a multitude of cybersecurity products, security analysts spend considerable time analyzing new threats to answer basic questions, "Should we care?" and "Are we protected?". By leveraging The MITRE ATT&CK framework to map adversary tactics, techniques and procedures (TTPs) to the enterprise's cyber defenses, Tidal empowers analysts to efficiently assess, organize and optimize their cyber defenses based on a deep understanding of the threats and adversaries that are most relevant to them.

Tewksbury, MA

Ascent AeroSystems designs and manufactures unique coaxial drones that are more portable and rugged than conventional multi-rotor drones. Ascent’s rugged cylinder-shaped vehicles scale to any size and are ideal for industrial, public safety and military markets where mission-critical operations in tough environments are the norm.

New York, NY

Large and mid-size enterprises have an urgent need for up-to-date sector and country-specific information and expertise, in support of their operations across global markets. Today, these insights are locked in silos with policymakers, boutique lobby firms, and expensive consultancies. Axis is the first platform that instantly surfaces business-critical data, making it easily accessible, actionable, and integrated into key enterprise workflows.

College Park, MD

Cyber Skyline provides a cloud-based platform that distributes cybersecurity technical evaluation, aggregates performance metrics, and tracks performance and growth by providing users with a single score and ranking that can be compared across specific skills within a group, company or an entire industry.

New York, NY

CYBERA provides a solution to disrupt financially motivated cybercrime. The FBI reports 1 in 600 Americans are victims of financial scams. Yet, lack of a comprehensive solution that coordinates a rapid response between victims, local law enforcement agencies and global banking institutions leaves both victims and banks losing billions annually in lost funds and reimbursement costs. CYBERA's solution automatically files criminal complaints to recover funds and alerts banks instantly to prevent money laundering and fraudulent transactions before victim losses occur.

CyR3con

Tempe, AZ

CyR3con (Cyber Reconnaissance) predicts cyber attacks before they occur using proprietary technology designed to uniquely address each customer’s threat landscape.

Boston, MA

CYTRIO enables resource-constrained midsize organizations to comply with data privacy regulations swiftly and cost-effectively. Today, over 80% of enterprises use a manual approach to identify personal information (PI) and fulfill consumer data requests. Manual compliance is time-consuming, costly, and error-prone, resulting in regulatory fines and erosion of customer trust. CYTRIO’s SaaS platform solves these challenges with easy to use self-guided deployment, automated discovery and identification of PI data, and privacy rights fulfillment workflows.

Philadelphia, PA

Dash provides solutions for automating the compliance process in the public cloud and for managing vendor risk. The automated platform streamlines cloud security for enterprise organizations and allows companies to manage regulatory compliance without consultants and security experts.

Chicago, IL

Havoc Shield is a cybersecurity platform designed for startups facing stringent security requirements and increasing threats. Like how TurboTax® simplified the complicated tax filing process, Havoc Shield provides a self-serve cybersecurity program executed by your existing non-security staff. It maps complex security requirements to plain-language modules and guides you through rolling out the integrated tools, policies, and changes needed to strengthen your defenses and certifiably prove your efforts, so you can focus on closing big deals.

Redwood City, CA

Hideez solves the stolen login credentials problem using its flagship product The Hideez Security Key. It differentiates itself from other hardware key solutions by including an embedded password vault, which enables organizations to make the transition from a password-based to password-less world. Hideez also provides an Enterprise Manager for administering keys in a large enterprise deployment.

New York, NY

JustProtect reduces the average compliance assessment process from 6-8 weeks to just one day, using a platform that focuses on behavioral analytics and analyzing potential discrepancies.

Berkeley, CA

LOCH Technologies fortifies networks from Internet of Things (IoT) risks through non-intrusive wireless monitoring across the entire electromagnetic spectrum (Wifi, LTE, Bluetooth, etc). LOCH Technologies’ products are used across a wide range of industries for asset management and security monitoring, giving organizations the ability to prevent network breaches and avoid data loss due to infiltration from wireless networks.

Bethesda, MD

Neuralys simplifies the risk mitigation process by providing enterprises transparency, accountability, and governance to improve collaboration between security teams and business units, drastically reducing risk mitigation times.

Omaha, NE

V2verify is a voice biometric technology that can authenticate users within 2 seconds, eliminating the need for passwords, PINs, or knowledge-based questions. The technology contains built-in multi-factor authentication and works across all channels and customer touchpoints.

Philadelphia, PA

ZeroEyes uses is a video-based system leveraging artificial intelligence to detect weapons and send real-time alerts, improving situational awareness and decreasing response times for first responders. Guarding schools, houses of worship, and other often-targeted locations, ZeroEyes delivers a fast, highly automated solution that alerts first responders to weapons drawn and potential mass shootings shaving minutes off of response times during extreme potential loss of life situations.