what products do security startups rely on to win the market?

Posted by tetley at 2020-04-16

Welcome to reprint this translation. Please indicate the source as "Saibo Shuofang".

There are two purposes for compiling this article:

First, it's said that it's hard to start a business. Maybe we must be biased when we start our business, and lose in the so-called "idea";

Second, one of the best ways to understand the development trend of an industry is to focus on the industry positioning of start-ups. After doing enough market research, even if we follow the trend, the entrepreneurial risk will be relatively reduced.

This paper introduces 30 start-ups in the information security industry, which are classified into 9 categories (as follows), each of which has obtained huge financing. Their product positioning is worthy of our in-depth study and learning.

Quantum cryptography, predictive analysis, spoofing security, autonomous systems, Internet of things security, mobile security, automotive security, critical infrastructure security, cyber security (Security Assessment).

Quantum cryptography

Applying quantum mechanics to encryption technology is a great innovation in the field of information security. The most famous form of quantum encryption is quantum key distribution (QKD). QKD uses quantum mechanics to generate a shared random key between the two sides of communication, through which the information is encrypted and decrypted, so as to achieve the purpose of communication security.


The company is committed to developing such a product around quantum key distribution (QKD). Qoptica is the second generation QKD developed by the company. It uses quantum physics to form a secure key exchange for encryption of digital communication.

Investment: US $1.1 million

Senior investors: Western Pacific banking group, Australian Department of Defense

ID Quantique 

Provide a multi protocol network encryption solution based on conventional and quantum technology. The company's cerberis QKD server implements a key exchange, which can theoretically prevent attacks from quantum computers, so that non quantitative encryption may eventually be eliminated.

Investment: 9.6 million USD

Senior investors: SK Telecom, qwave


Through quorum technology, biometrics, algorithm encryption and other ways to protect the security of enterprise data and communication systems, to avoid being quantum or supercomputer advanced form of code cracking.

Investment: US $10.4 million

Senior investors: am partners, VMS investment group, Barclays accelerator

Forecast analysis

The output products of these startups can analyze the dynamic data of various external network activities and the internal behavior data of the enterprise network, and provide operational information to help analysts prevent potential attack activities.


By integrating internal and external data from public websites, social platforms, dark networks and deep networks, enterprises can predict network threats in a timely manner.

Investment: US $14 million

Senior investors: Trident capital cybersecurity, Telefonica ventures, Benhamou global ventures, Adara venture partners

 Fortscale Security 

It provides a platform for enterprises to combine predictive, big data analysis and machine learning, to view the behavior of users and entities on the system and network in real time, and to find internal threats by identifying abnormal behaviors that cause risks.

Investment: US $23 million

Senior investors: Intel Capital, ust global, CME ventures, swarth group, Blumberg capital


Realize the correlation of threat index, real-time network activity log and forensics log data, detect and identify the attackers in the enterprise network.

Investment: US $56 million

Senior investors: Google ventures, general catalyst partners, in-q-tel


By using a wide range of security information and combining attack mode and malware technology modeling, we can provide a predictive executable inspection engine for customers, that is to say, through predictive execution modeling, we can realize real-time detection and protect devices from the zero day threat with clear targets.

Investment: US $19.5 million

Senior investors: data collective, redpoint ventures, westly group, Itochu technology ventures, sound

Cheat security

These start-ups generally output network security system, using the assets in the network as the bait of attackers, identifying and tracking security threats (such as advanced automatic malware attacks), and interrupting before they cause harm.

 Acalvio Technologies 

Provide advanced threat prevention solutions to detect and respond to malicious activities on the security boundary. These solutions are based on patent innovations that cheat security and data science.

Investment amount: unpublished

Senior investors: Google ventures, Splunk, accel partners, ignition partners, eileeses capital

 TrapX 360 

The trapx 360 platform captures malware through a virtualized honeypot and trap sensor network before it is compromised.

Investment: 19 million USD

Senior investors: Opus capital, Intel Capital, BRM group, liberty Media Corporation, strategic cyber Ventures

 Illusive Networks 

Provide solutions that take advantage of the weakest link (i.e. "human" factor) in network attacks to resist apt threats. The company has developed a deceptive platform specifically for attackers, spreading false information of network resources to lure attackers to fall into the net.

Investment: US $30 million

Senior investors: new enterprise associates, Bessemer venture partners, Microsoft Ventures

Autonomous System

Autonomous systems are software or programs that use advanced algorithms to respond to security threats efficiently and quickly, with little or no security analysts involved.

 Sift Science 

We are committed to developing machine learning software, learning threat signals independently, detecting fraud behavior patterns, and making reminders before customers recruit.

Investment: US $53.5 million

Senior investors: first round capital, Union Square ventures, spark capital


A threat management provider dedicated to phishing, malware, and covert threats. Triage is an event response platform for phishing, which allows analysts to automatically optimize, analyze and respond to phishing threats.

Investment: US $58 million

Senior investors: Bessemer venture partners, Paladin capital group, Aldrich Capital Partners


Through its cloud Network DVR (virtual camera in the cloud) to provide network security services, the device can record all content on the network. Protectwise's cloud software can detect threats in real time and automatically replay the stored data, so as to discover threats that have not been discovered before.

Investment: 62.1 million US dollars

Senior investors: Trinity ventures, crosslink capital, Arsenal venture partners


Exabeam's user behavior analysis solution uses existing log data to quickly detect advanced attacks, prioritize events and give effective guidance on response methods.

Investment: US $65 million

Senior investors: Northwest venture partners, icon ventures, aspect Ventures


The network defender, who takes behavioral intelligence as the leading role, uses advanced mathematical methods to automatically detect abnormal behaviors and manage risks of all types of network attacks, such as physical, virtual, cloud, Internet of things, industrial control system, etc.

Investment: 17.3 million US dollars

Senior investors: invoke capital, Talis capital, summit partners, Softbank group, Samsung Ventures

Internet of things security

This category mainly covers start-ups that protect IOT devices and transmit data security in IOT systems and industrial Internet.


Provide wearable biometric system with functions of security authentication, mobile payment protection and intelligent device interaction. It unlocks the device and accesses the secure Internet gateway through the unique biometric feature of the user's wrist vein.

Investment: US $2.13 million

Senior investors: masschallenge, SICPA, age, foundation for technological innovation

 Rubicon Labs 

We are committed to protecting the security of the Internet of things through symmetric cryptography, digital fingerprint, cloud identity services, etc.

Investment: US $18.4 million

Senior investors: Pelion venture partners, Akamai technologies, third point


Provide authentication and authorization platform for identity solutions of devices such as the Internet of things.

Investment: US $24.2 million

Senior investors: Bessemer venture partners, K9 ventures, Portland seed fund, Silicon Valley Bank, Trinity Ventures

Mobile Security

These manufacturers are committed to protecting the privacy, reliability and accessibility of data accessed, stored and processed by mobile devices.


We are committed to developing cloud platforms to identify and grade known or unknown malware, enterprise data filtering, intellectual property disclosure and other risk behaviors in mobile applications. The company's mobile security solutions are based on the needs of enterprise security and mobile end teams.

Investment: US $23.3 million

Senior investors: venlock, US venture partners, Trident capital cybersecurity, Bluecoat systems


Using behavior based analysis, mobile devices can be continuously protected from Wi Fi, cellular, and host based threats. Much like doctors can diagnose diseases by analyzing the symptoms of the body, zips can detect known and unknown threats by analyzing the behavior of mobile devices.

Investment: US $60.3 million

Senior investors: Telstra ventures, Sierra ventures, Samsung ventures, Softbank group, Toyo


Skycure's risk-based mobile security approach is designed from scratch to prevent all threats from exposing, stealing and manipulating business data. Skycure technology uses a lot of knowledge to actively identify threats and secure mobile devices.

Investment: US $27.5 million

Senior investors: pitango venture capital, New York Life Insurance Company, Shasta ventures, foundation capital

Car safety

Such startups mainly protect driverless or networked cars from malicious cyber attacks.


Protect vehicle and IOT networks with critical tasks from malicious intrusion, passive monitoring and other network attacks.

Investment amount: unpublished

Senior investors: global brain Corporation, DBJ capital, Mizuho capital

 Karamba Security 

Protect the vehicle's external connection components, identify attack attempts and prevent vulnerabilities from penetrating the vehicle's network.

Investment: US $5 million

Senior investors: YL ventures, glenrock Israel, fontinalis partners

 Argus Cyber Security 

Protect private cars, commercial vehicles, motorcades, connectivity platforms and dealers from cyber attacks.

Investment: US $30 million

Senior investors: vertex venture capital, magma venture partners, Allianz ventures, SBI group, startup autobahn

Key infrastructure security

Such companies mainly protect the network security of key infrastructure networks, especially industrial control system (ICS), to avoid serious damage to public property, public health and public security.

 Nozomi Networks 

Build industrial network model and use behavior analysis and continuous monitoring to determine the security status, grasp the status of ICs network, equipment and process in real time, quickly identify and repair network attacks and deal with abnormal behaviors.

Investment: US $7.5 million

Senior investors: planven investments, lux capital, GCV capital


Through machine learning technology to analyze the network behavior, detect the abnormal behavior in the industrial Internet, and combine the network monitoring with the proprietary ICs Threat Intelligence, to achieve the purpose of network attack detection and risk reduction.

Investment: US $11 million

Senior investors: upwest labs, swarth group, glilot capital partners, glenrock Israel, Flint capital, FF venture capital


Provide real-time situation awareness, visualization and security protection for ICs used in key infrastructure.

Investment: 18 million US dollars

Senior investors: aspect ventures, magma venture partners, SBI group, vertex Ventures

Cyber insurance (Security Assessment)

The main business of the following companies is to provide products and services for insurance companies, quantify network risk, negotiate premium, and help insurance companies to model and price network risk, a new type of insurance.


In order to make the security risk intuitive and easy to understand, upguard has designed a set of security assessment system called CStar (network security threat assessment report), which can let enterprise customers know their own security level through scores.

Investment: US $27.4 million

Senior investors: Valar ventures, square peg capital, insurance Australia Group, 500 startups


A start-up company dedicated to quantifying network risk, they have built a data analysis platform for insurance companies to help them select, survey and manage network risk more efficiently, and introduce dynamic risk pricing to help insurance companies be able to flexibly respond to the rapidly changing network risk.

Investment: US $40 million

Senior investors: Institutional venture partners, new enterprise associates

 BitSight Technologies 

It mainly provides network security rating, third-party risk control and benchmark performance services for enterprises, and negotiates network insurance premiums.

Investment: US $87 million

Senior investors: Comcast ventures, Flybridge capital partners, GGV capital, globespan capital partners, liberty global ventures, SingTel Innov8

Reference source: CB insights, InfoWorld

Long press attention, play together