Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

2/24/2017
02:30 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

20 Cybersecurity Startups To Watch In 2017

VC money flowed plentifully into the security market last year, fueling a new crop of innovative companies.
Previous
1 of 21
Next

In spite of a slowdown in the overall funding activity from venture capital firms in 2016, the cybersecurity market continued to raise money at full steam. Last year saw the market break records in terms of funding deals, with Q3 tallying up to be the most active quarter for deals in cybersecurity in the last five years, according to CBInsights.

That influx of money is driving innovation in a number of areas. Particularly notable market segments targeted by these firms include security for data centers and public cloud infrastructure, security orchestration and incident response tools, and third-party risk assessment tools.

The following 20 firms are primarily early- to middle-stage startups, with a few more mature start-ups that have courted growth equity to change course or expand into a particularly hot new market segment. We believe these firms are worth watching due to several factors. On the funding front, they either managed to snag $25 million or more in funding in 2016, or garnered a notable funding round within the last three months. Many of these firms have been founded in the past three years and a number of them are notable for acting as first-movers in a particularly hot security niche. Additionally, a number of the firms are notable for their leadership by security veterans and visionaries.

In the interest of bringing some new blood to our annual spotlight on startups, we've included only companies that were not already featured in our lists in the last two years.

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Previous
1 of 21
Next
Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Roon215
50%
50%
Roon215,
User Rank: Apprentice
2/24/2017 | 8:46:33 PM
Bitglass will rock
Good article, but I am with Bitglass, bitglass will surely outrank their competitor and will do great in '17.
TER3
100%
0%
TER3,
User Rank: Apprentice
3/2/2017 | 2:15:22 PM
VCs wasting their money
I guess returns don't matter to VCs again. This is a list of "me-too" ideas that are waaaay overfunded. Spend a day at RSA and try to pick out any of these or hundreds of others who stand out.
zaf009
50%
50%
zaf009,
User Rank: Apprentice
6/27/2017 | 7:19:01 AM
Re: VCs wasting their money
Hi there - What is RSA? Thanks 
DallasSec
50%
50%
DallasSec,
User Rank: Apprentice
6/28/2017 | 10:03:05 AM
Re: VCs wasting their money
https://www.rsa.com/en-us
entucaro
50%
50%
entucaro,
User Rank: Apprentice
6/13/2018 | 4:08:05 PM
Re: VCs wasting their money
Look's like the VC's aren't doing so bad

 

https://techcrunch.com/2018/02/27/splunks-data-analytics-gets-a-security-boost-with-350-million-acquisition-of-phantom-cyber/
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13868
PUBLISHED: 2020-06-05
An issue was discovered in the Comments plugin before 1.5.5 for Craft CMS. CSRF affects comment integrity.
CVE-2020-13869
PUBLISHED: 2020-06-05
An issue was discovered in the Comments plugin before 1.5.6 for Craft CMS. There is stored XSS via a guest name.
CVE-2020-13870
PUBLISHED: 2020-06-05
An issue was discovered in the Comments plugin before 1.5.5 for Craft CMS. There is stored XSS via an asset volume name.
CVE-2020-5591
PUBLISHED: 2020-06-05
XACK DNS 1.11.0 to 1.11.4, 1.10.0 to 1.10.8, 1.8.0 to 1.8.23, 1.7.0 to 1.7.18, and versions before 1.7.0 allow remote attackers to cause a denial of service condition resulting in degradation of the recursive resolver's performance or compromising the recursive resolver as a reflector in a reflectio...
CVE-2020-10071
PUBLISHED: 2020-06-05
The Zephyr MQTT parsing code performs insufficient checking of the length field on publish messages, allowing a buffer overflow and potentially remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.