{"id":21714,"date":"2022-04-26T10:46:56","date_gmt":"2022-04-26T10:46:56","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=21714"},"modified":"2023-10-16T23:48:45","modified_gmt":"2023-10-16T23:48:45","slug":"top-vc-firms","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/","title":{"rendered":"Top 20 Venture Capital (VC) Firms in Cybersecurity"},"content":{"rendered":"\n<p>Whether it&#8217;s a startup or established organization seeking funding, the right venture capital (VC) firm can make the difference in financial and operational success.<\/p>\n\n\n\n<p>Navigating the funding landscape takes time, preparation, and the innovative spirit to convince VC partners to invest in a new or unrecognized business opportunity. Achieving funding is no simple task, and <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-cybersecurity-companies\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity<\/a> entrepreneurs have a difficult path competing in a complex and competitive landscape.<\/p>\n\n\n\n<p>Luckily for <a href=\"https:\/\/www.esecurityplanet.com\/products\/hot-cybersecurity-startups\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity startups<\/a>, there&#8217;s no shortage of interest in tomorrow&#8217;s next big security vendors. Investments in cybersecurity more than <a href=\"https:\/\/techcrunch.com\/2022\/02\/09\/vc-cybersecurity-startups-record-year\/#:~:text=According%20to%20new%20data%20from,the%20two%20previous%20years%20combined.\" target=\"_blank\" rel=\"noreferrer noopener\">doubled<\/a> from $12 billion to $29.5 billion in 2021, and growing concerns over <a href=\"https:\/\/www.esecurityplanet.com\/products\/database-security-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">data security<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-hackers-compromise-the-software-supply-chain\/\" target=\"_blank\" rel=\"noreferrer noopener\">software supply chains<\/a>, and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware<\/a> suggest the market will remain strong through economic ups and downs.<\/p>\n\n\n\n<p>This article looks at the top VCs in cybersecurity, a selection of investments, and considerations for entrepreneurs trying to develop an idea or scale a business.<\/p>\n\n\n\n<p><strong>Table of Contents<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#top\">Top Cybersecurity Venture Capital Firms<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#honorable\">Honorable Mention Cybersecurity VCs<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#company\">Top Company-Linked VCs in Cybersecurity<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#early\">Top Seed and Early Stage VCs in Cybersecurity<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#what\">What are Venture Capital Firms?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#how\">How Do VC Firms Work?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#land\">How to Land a Round of Funding<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#hot\">Securing Data and Infrastructure is Hot<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Top Cybersecurity Venture Capital Firms<\/h2>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table class=\"has-fixed-layout\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#accel\">Accel<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#fp\">Forgepoint<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#nea\">NEA<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#sequoia\">Sequoia<\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#ac\">AllegisCyber<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#greylock\">Greylock<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#nd\">NightDragon<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#shasta\">Shasta<\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#a16z\">a16z<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#insight\">Insight<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#norwest\">Norwest<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#teneleven\">TenEleven<\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#bvp\">BVP<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#kp\">Kleiner Perkins<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#paladin\">Paladin<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#tg\">Tiger Global<\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#eep\">Evolution<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#lightspeed\">Lightspeed<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#redpoint\">Redpoint<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#yl\">YL Ventures<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.Accel_.png\" alt=\"Accel logo.\" class=\"wp-image-21721\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.Accel_.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.Accel_-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"accel\">Accel<\/h3>\n\n\n\n<p>Launched in 1983, Accel specializes in the growth stage and early funding opportunities, with an impressive investment portfolio in cybersecurity and beyond. Formerly known as Accel Partners, the Palo Alto-based company is a top-tier VC firm investing in consumer and enterprise solutions for segments like <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/\" target=\"_blank\" rel=\"noreferrer noopener\">SaaS<\/a>, fintech, hardware, media, and IT services. Accel\u2019s largest presence is in the Bay Area with sizable teams in London and Bangalore.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include Forescout, Imperva, Webroot, Tenable, and Crowdstrike; and Accel&#8217;s other successful investments include Atlassian, Cloudera, Etsy, and Meta.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Accel Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>1Password<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\" target=\"_blank\" rel=\"noreferrer noopener\">Password security<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2019<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Snyk<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/devsecops-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">DevSecOps<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2018<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Crowdstrike<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-security-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">Enterprise security<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2013<\/td><td class=\"has-text-align-center\" data-align=\"center\">NASDAQ: CRWD<\/td><\/tr><tr><td>Code42<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-cybersecurity-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity software<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2012<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Tenable<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">Vulnerability scanning<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2012<\/td><td class=\"has-text-align-center\" data-align=\"center\">NASDAQ: TENB<\/td><\/tr><tr><td>Webroot<\/td><td>Cybersecurity software<\/td><td class=\"has-text-align-center\" data-align=\"center\">2005<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Carbonite<\/td><\/tr><tr><td>Imperva<\/td><td>Enterprise security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2002<\/td><td class=\"has-text-align-center\" data-align=\"center\">NYSE: IMPV<\/td><\/tr><tr><td>Forescout<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">Zero trust<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2001<\/td><td class=\"has-text-align-center\" data-align=\"center\">NASDAQ: FSCT<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.AllegisCyber.jpeg\" alt=\"AllegisCyber logo.\" class=\"wp-image-21722\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.AllegisCyber.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.AllegisCyber-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"ac\">AllegisCyber Capital<\/h3>\n\n\n\n<p>AllegisCyber Capital was founded in 1996 to serve the growing cyber business ecosystem. AllegisCyber&#8217;s expertise lies in addressing cybersecurity challenges, and its portfolio shows, focusing on seed and early-stage investments. Partnering with two other top VCs, the AllegisCyber platform engages entrepreneurs through the start-up foundry, DataTribe, and growth stage firm, <a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#nd\">NightDragon<\/a>.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include E8 Security, IronPort, and Shape Security; and AllegisCyber&#8217;s other successful investments include Bracket Computing, Moki, Platfora, and Solera Networks.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">AllegisCyber Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>Vicarius<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">Vulnerability management<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2022<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Dragos<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/threats\/critical-infrastructure-ics-scada-under-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">ICS and OT security<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Safeguard Cyber<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/risk-management-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">Risk management<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>CyberGRX<\/td><td>Risk management<\/td><td class=\"has-text-align-center\" data-align=\"center\">2019<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Signifyd<\/td><td>Fraud protection<\/td><td class=\"has-text-align-center\" data-align=\"center\">2018<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>RedOwl<\/td><td>Security analytics<\/td><td class=\"has-text-align-center\" data-align=\"center\">2015<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Forcepoint<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.a16z.jpeg\" alt=\"a16z logo.\" class=\"wp-image-21715\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.a16z.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.a16z-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"a16z\">Andreessen Horowitz (a16z)<\/h3>\n\n\n\n<p>Andreessen Horowitz \u2013 abbreviated to a16z \u2013 is one of the world&#8217;s most active VC firms and specializes in biology and health, <a href=\"https:\/\/www.esecurityplanet.com\/applications\/cybersecurity-blockchain-applications\/\">crypto<\/a>, consumer, and enterprise sectors. Founded in 2009, a16z already has an extensive track record of success, investing in over 500 companies and producing 160 exits. In addition to being a leading investor, a16z offers a bundle of resources for interested entrepreneurs.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include Okta, CipherCloud, and SignalFx; and a16z&#8217;s other successful investments include Apptio, Asana, Box, PagerDuty, Intrinsic, and Stack Overflow.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">a16z Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>Isovalent<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/cloud-security-companies\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud security<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2020<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Illumio<\/td><td>Cloud security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2015<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>SignalFx<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-monitoring-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">Monitoring<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2015<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Splunk<\/td><\/tr><tr><td>CipherCloud<\/td><td>Cloud security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2012<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Lookout<\/td><\/tr><tr><td>Lookout<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-security-threats\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mobile security<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2011<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.Bessemer.jpeg\" alt=\"Bessemer Venture Partners logo.\" class=\"wp-image-21723\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.Bessemer.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.Bessemer-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"bvp\">Bessemer Venture Partners<\/h3>\n\n\n\n<p>Over a century in the making, Bessemer Venture Partners is another top-tier VC firm boasting over 130 IPOs in the last 50 years. Specializing in seed and Series A opportunities, the San Francisco-based firm has an extensive consumer, enterprise, and healthcare investments portfolio. As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today&#8217;s technologies and market complexities.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include VeriSign, Auth0, PagerDuty, and Verodin; and BVP&#8217;s other successful investments include LinkedIn, Pinterest, Shopify, Twitch, and Yelp.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">BVP Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>Verodin<\/td><td>Cybersecurity analytics<\/td><td class=\"has-text-align-center\" data-align=\"center\">2018<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired by FireEye<\/td><\/tr><tr><td>Kenna Security<\/td><td>Risk management<\/td><td class=\"has-text-align-center\" data-align=\"center\">2018<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired by Cisco<\/td><\/tr><tr><td>PhishMe<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/networks\/best-incident-response-tools-services\/\" target=\"_blank\" rel=\"noreferrer noopener\">Incident response<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2016<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: P.E.<\/td><\/tr><tr><td>PagerDuty<\/td><td>Operations performance<\/td><td class=\"has-text-align-center\" data-align=\"center\">2014<\/td><td class=\"has-text-align-center\" data-align=\"center\">NYSE: PD<\/td><\/tr><tr><td>Auth0<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">Identity management<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2014<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Okta<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.Evolution.Equity.Partners.jpeg\" alt=\"Evolution Equity Partners logo.\" class=\"wp-image-21724\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.Evolution.Equity.Partners.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.Evolution.Equity.Partners-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<p><strong>Also read<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Addressing Remote Desktop Attacks and Security<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"eep\">Evolution Equity Partners<\/h3>\n\n\n\n<p>Born from two board members of AVG Technologies, Evolution Equity Partners started in 2008 to help US and European-based entrepreneurs in cybersecurity, enterprise software, and consumer-enterprise crossover segments. Headquartered in NYC and Zurich, Switzerland, EEP has a smaller but impressive portfolio of companies. Evolution currently invests in companies between North America, Europe, and Israel, for seed up to growth stages.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include AVG Technologies, Cognitive Security, OpenDNS, and Carbon Black.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">EEP Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>Satori<\/td><td>DataSecOps<\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>BluBracket<\/td><td>Software supply chain<\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Cape Privacy<\/td><td>Data security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>ZecOps<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/digital-forensics-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">Digital forensics<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2019<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>SecurityScorecard<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/third-party-risk-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">Risk ratings<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2017<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Carbon Black<\/td><td>Security software<\/td><td class=\"has-text-align-center\" data-align=\"center\">2015<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: VMware<\/td><\/tr><tr><td>AVG<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">Antivirus software<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2015<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Avast<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"170\" height=\"170\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.ForgepointCapital.webp\" alt=\"\" class=\"wp-image-21758\" style=\"width:200px;height:200px\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.ForgepointCapital.webp 170w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.ForgepointCapital-150x150.webp 150w\" sizes=\"(max-width: 170px) 100vw, 170px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"fp\">Forgepoint Capital<\/h3>\n\n\n\n<p>Founded in 2015, Forgepoint Capital is another top-tier VC firm dedicated to securing the digital future through investments in transformative companies. The cloud and infrastructure software-focused company \u2013 spun off from veteran firm Trident Capital and previously known as Trident Capital Cybersecurity (TCC) until 2018 \u2013 leans towards early partnerships but serves every funding stage with a hands-on approach to working with entrepreneurs. Forgepoint\u2019s investments typically range between $5 to $50 million per company.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include Area 1 Security, Attivo Networks, IronNet Cybersecurity, and Qualys.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Forgepoint Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>Noname<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-to-control-api-security-risks\/\" target=\"_blank\" rel=\"noreferrer noopener\">API security<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Ermetic<\/td><td>Attack surface management<\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Qualys<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/networks\/security-compliance\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security and compliance<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2020<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nasdaq: QLYS<\/td><\/tr><tr><td>Huntress<\/td><td>Managed detection and response<\/td><td class=\"has-text-align-center\" data-align=\"center\">2020<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Bishop Fox<\/td><td>Attack surface management<\/td><td class=\"has-text-align-center\" data-align=\"center\">2019<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>BehavioSec<\/td><td>Biometrics and authentication<\/td><td class=\"has-text-align-center\" data-align=\"center\">2018<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: LexisNexis<\/td><\/tr><tr><td>Attivo Networks<\/td><td>Identity solutions<\/td><td class=\"has-text-align-center\" data-align=\"center\">2017<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: SentinelOne<\/td><\/tr><tr><td>IronNet Cybersecurity<\/td><td>Network security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2015<\/td><td class=\"has-text-align-center\" data-align=\"center\">NYSE: IRNT<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.GreylockPartners.png\" alt=\"Greylock Partners logo.\" class=\"wp-image-21726\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.GreylockPartners.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.GreylockPartners-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"greylock\">Greylock Partners<\/h3>\n\n\n\n<p>Formed in 1965, Greylock Partners has a long history of investing in enterprise and consumer software for seed and early-stage and beyond. With a team of investors, functional specialists, and business operations consultants, Greylock offers entrepreneurs across business and IT sectors the resources to scale. Formerly located in Cambridge, Massachusetts, Greylock migrated headquarters to Menlo Park, California, in 2009.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include Okta, Palo Alto Networks, and Skyhigh; and Greylock&#8217;s other successful investments include Airbnb, Coinbase, Dropbox, Meta, Roblox, and Workday.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Greylock Partners Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>Abnormal Security<\/td><td>Cloud email security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2019<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Sqreen<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/application-security-vendors\/\" target=\"_blank\" rel=\"noreferrer noopener\">Application security<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2019<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Datadog<\/td><\/tr><tr><td>Demisto<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/networks\/soar\/\" target=\"_blank\" rel=\"noreferrer noopener\">SOAR<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2018<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired by PAN<\/td><\/tr><tr><td>Skyhigh<\/td><td>Cloud security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2012<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: McAfee<\/td><\/tr><tr><td>OpenDNS<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/internet-security-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">Internet security<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2009<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Cisco<\/td><\/tr><tr><td>Palo Alto Networks<\/td><td>Cloud and network security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2006<\/td><td class=\"has-text-align-center\" data-align=\"center\">NYSE: PANW<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.InsightPartners.png\" alt=\"Insight Partners logo.\" class=\"wp-image-21727\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.InsightPartners.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.InsightPartners-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"insight\">Insight Partners<\/h3>\n\n\n\n<p>New York-based Insight Partners is a top VC firm serving international entrepreneurs across the spectrum of technology sectors. Insight&#8217;s portfolio goes beyond cybersecurity, serving IT verticals in data, fintech, healthcare, and logistics. Launched in 1995, Insight&#8217;s record includes more than 600 direct investments resulting in over 200 acquisitions and 100 strategic exits. Insight has a remarkable $90 billion in assets under management (AUM), and a combined $30 billion in capital commitments.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include BeyondTrust, Duck Creek Technologies, New Relic, and Tenable; and Insight&#8217;s other successful investments include Alibaba Group, BMC, Cvent, DocuSign, SolarWinds, Tumblr, and Twitter.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Insight Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>Perimeter81<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-vpn-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">VPN<\/a> and zero trust<\/td><td class=\"has-text-align-center\" data-align=\"center\">2020<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Wiz<\/td><td>Cloud security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2020<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>OneTrust<\/td><td>Privacy management<\/td><td class=\"has-text-align-center\" data-align=\"center\">2019<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Darktrace<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/threats\/ai-ml-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">AI network security<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2017<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Recorded Future<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat intelligence<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2017<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Insight<\/td><\/tr><tr><td>Thycotic<\/td><td>Access management<\/td><td class=\"has-text-align-center\" data-align=\"center\">2015<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Checkmarx<\/td><td>Application security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2015<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: P.E.<\/td><\/tr><tr><td>Mimecast<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-secure-email-gateways\/\" target=\"_blank\" rel=\"noreferrer noopener\">Email security<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2012<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nasdaq: MIME<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.KleinerPerkins.png\" alt=\"Kleiner Perkins logo.\" class=\"wp-image-21728\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.KleinerPerkins.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.KleinerPerkins-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<p><strong>Read more<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\" target=\"_blank\" rel=\"noreferrer noopener\">Best Next-Generation Firewall (NGFW) Vendors<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"kp\">Kleiner Perkins<\/h3>\n\n\n\n<p>Menlo Park-based Kleiner Perkins is a seed, early-stage, and growth VC firm with a long list of successful exits in its 50-year history. Kleiner Perkins has proven to find market potential and emerging technologies through each decade. Over 900 investments later, the firm continues to target entrepreneurs in consumer, enterprise, hard tech, healthcare, and fintech segments.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include AppDynamics, Netscape, and Palo Alto Networks; and Kleiner Perkins&#8217; other successful investments include Amazon, EA, Google, Square, Sun Microsystems, and Twitter.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Kleiner Perkins Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>Apiiro<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/applications\/trojan-source-a-threat-to-all-source-code-languages\/\" target=\"_blank\" rel=\"noreferrer noopener\">Code risk<\/a> platform<\/td><td class=\"has-text-align-center\" data-align=\"center\">2020<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>OpenRaven<\/td><td>Data security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2020<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Area 1<\/td><td>Cloud email security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2014<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Google<\/td><td>Web services<\/td><td class=\"has-text-align-center\" data-align=\"center\">1999<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nasdaq: GOOG<\/td><\/tr><tr><td>Juniper Networks<\/td><td>Network infrastructure<\/td><td class=\"has-text-align-center\" data-align=\"center\">1996<\/td><td class=\"has-text-align-center\" data-align=\"center\">NYSE: JNPR<\/td><\/tr><tr><td>Netscape<\/td><td>Internet services<\/td><td class=\"has-text-align-center\" data-align=\"center\">1994<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Yahoo!<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.Lightspeed.jpeg\" alt=\"Lightspeed logo.\" class=\"wp-image-21729\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.Lightspeed.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.Lightspeed-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"lightspeed\">Lightspeed Venture Partners<\/h3>\n\n\n\n<p>In 1999, four investment professionals founded Lightspeed Ventures to serve entrepreneurs in enterprise and consumer markets. Lightspeed&#8217;s enterprise sectors beyond cybersecurity include big data, SaaS, crypto, and IT services. Two decades later, Lightspeed is a prominent VC with an international presence investing in companies across five continents and 16 IT solution sectors. Partnering with over 400 companies in its tenure, a third have been acquired or gone public.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include Avi Networks, Fireglass, and Zscaler; and Lightspeed&#8217;s other successful investments include Alooma, AppDynamics, Brocade, GrubHub, Masergy, MuleSoft, Nutanix, and Snap.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">LVP Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>Exabeam<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-user-and-entity-behavior-analytics-ueba-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">UEBA<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Cato Networks<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/networks\/sase\/\" target=\"_blank\" rel=\"noreferrer noopener\">SASE<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2020<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Confluera<\/td><td>Cloud <a href=\"https:\/\/www.esecurityplanet.com\/products\/xdr-security-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">XDR<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2019<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Aqua<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/container-and-kubernetes-security-vendors\/\" target=\"_blank\" rel=\"noreferrer noopener\">Container security<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2017<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Netskope<\/td><td>SASE<\/td><td class=\"has-text-align-center\" data-align=\"center\">2017<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Zscaler<\/td><td>Zero trust<\/td><td class=\"has-text-align-center\" data-align=\"center\">2012<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nasdaq: ZS<\/td><\/tr><tr><td>Sailpoint<\/td><td>Identity management<\/td><td class=\"has-text-align-center\" data-align=\"center\">2007<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.NEA_.png\" alt=\"NEA logo.\" class=\"wp-image-21730\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.NEA_.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.NEA_-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"nea\">New Enterprise Associates (NEA)<\/h3>\n\n\n\n<p>New Enterprises Associates, referred to as NEA, is another leading VC committed to IT entrepreneurs in technology and healthcare. Started in 1977, today, the firm boasts a bi-coastal presence, with priority offices in Menlo Park, San Francisco, New York, and Washington, DC. NEA&#8217;s long history includes working with more than 800 companies, over half of which are now public or acquired business units.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include Bitglass, Cleversafe, and Cloudflare; and NEA&#8217;s other successful investments include Acquia, BlueJeans, Coursera, MongoDB, NGINX, Pentaho, Robinhood, and Upwork.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">NEA Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>Beyond Identity<\/td><td>Identity management<\/td><td class=\"has-text-align-center\" data-align=\"center\">2020<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Expel<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/mssp\/\" target=\"_blank\" rel=\"noreferrer noopener\">Managed security service<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2016<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Tigera<\/td><td>Zero trust for <a href=\"https:\/\/www.esecurityplanet.com\/applications\/tips-for-container-and-kubernetes-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">K8s<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2016<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Intrinsic<\/td><td>Application security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2016<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: VMware<\/td><\/tr><tr><td>HackerOne<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-penetration-testing\/\" target=\"_blank\" rel=\"noreferrer noopener\">Penetration testing<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2015<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Virtru<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">Data encryption<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2014<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Cloudflare<\/td><td>Cloud infrastructure<\/td><td class=\"has-text-align-center\" data-align=\"center\">2010<\/td><td class=\"has-text-align-center\" data-align=\"center\">NYSE: NET<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.Nightdragon.jpeg\" alt=\"NightDragon logo.\" class=\"wp-image-21718\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.Nightdragon.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.Nightdragon-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"nd\">NightDragon<\/h3>\n\n\n\n<p>Named after the infamous string of nation-state cyber attacks during the late 2000s, NightDragon was established in 2016 by former McAfee CEO Dave DeWalt. With a portfolio dedicated to cybersecurity, safety, security, and privacy innovations, NightDragon has a smaller but impressive portfolio of exited and active companies in the security space.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include FireEye, ForgeRock, Forescout, Jask, Mandiant, McAfee, and PhantomCyber.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">NightDragon Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>McAfee<\/td><td>Cybersecurity solutions<\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Intel<\/td><\/tr><tr><td>Claroty<\/td><td>Industrial cybersecurity<\/td><td class=\"has-text-align-center\" data-align=\"center\">2020<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Illusive Networks<\/td><td>Threat detection and response<\/td><td class=\"has-text-align-center\" data-align=\"center\">2020<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Jask<\/td><td>Autonomous <a href=\"https:\/\/www.esecurityplanet.com\/networks\/soc-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">SOC<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2018<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Sumo Logic<\/td><\/tr><tr><td>RiskSense<\/td><td>Vulnerability management<\/td><td class=\"has-text-align-center\" data-align=\"center\">2018<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Ivanti<\/td><\/tr><tr><td>Phantom Cyber<\/td><td>SOAR<\/td><td class=\"has-text-align-center\" data-align=\"center\">2017<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Splunk<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.Norwest.png\" alt=\"Norwest logo.\" class=\"wp-image-21731\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.Norwest.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.Norwest-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<p><strong>Also read<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/it-security-policies\/\" target=\"_blank\" rel=\"noreferrer noopener\">Written IT Security Policies: Why You Need Them &amp; How to Create Them<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"norwest\">Norwest<\/h3>\n\n\n\n<p>With technology opportunities on the rise in the 1960s, Norwest Venture Partners started as a subsidiary of what is now Wells Fargo in Minneapolis, Minnesota. Sixty years later, Norwest calls Palo Alto and San Francisco home like many top VCs in cybersecurity. The company&#8217;s history includes over 600 company investments across consumer, enterprise, and healthcare segments in North America, India, and Israel.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include Agari, CyberX, FireEye, Fireglass, Galvanize, and KACE; and Norwest&#8217;s other successful investments include Apigee, BlueJeans, Brocade, LendingClub, Rackspace, Spotify, and Uber.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Norwest Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>Obsidian Security<\/td><td>Cloud security and compliance<\/td><td class=\"has-text-align-center\" data-align=\"center\">2022<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Cynet<\/td><td>Enterprise cybersecurity<\/td><td class=\"has-text-align-center\" data-align=\"center\">2018<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Shape Security<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/prevent-web-attacks-using-input-sanitization\/\" target=\"_blank\" rel=\"noreferrer noopener\">Web security<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2018<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>CyberX<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">IoT and ICS security<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2018<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Microsoft<\/td><\/tr><tr><td>Galvanize<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/grc-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">Governance, risk, compliance<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2017<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Diligent<\/td><\/tr><tr><td>Agari<\/td><td>Email security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2016<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Bitglass<\/td><td>Mobile cloud security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2014<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>FireEye<\/td><td>Cybersecurity services<\/td><td class=\"has-text-align-center\" data-align=\"center\">2005<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: P.E.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.Paladin.jpeg\" alt=\"Paladin logo.\" class=\"wp-image-21732\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.Paladin.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.Paladin-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"paladin\">Paladin Capital Group<\/h3>\n\n\n\n<p>Since 2001, Paladin Capital Group has been a prominent VC serving businesses as a value-added partner in North America, Europe, South America, and Australia. Though Paladin has a smaller portfolio relative to other top contenders with 75 companies, the company has a substantial stack of strategic investments in technology, telecommunications, and more. In 2008, the Washington, DC-based firm made a prudent decision by shifting its focus to cybersecurity.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include CloudShield, Endgame, PhishMe, RiskSense, Trustwave, and White Ops; and Paladin&#8217;s other successful investments include Cogent, Good Technology, Initiate, QuantaLife, and VistaScape.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Paladin Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>Virtuoso<\/td><td>Codeless <a href=\"https:\/\/www.esecurityplanet.com\/applications\/neural-fuzzing-software-security-testing\/\" target=\"_blank\" rel=\"noreferrer noopener\">software testing<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Vetrix<\/td><td>Security scanning<\/td><td class=\"has-text-align-center\" data-align=\"center\">2020<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Cloudflare<\/td><\/tr><tr><td>Karamba Security<\/td><td>Embedded security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2017<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Acalvio<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/networks\/deception-technology\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat deception<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2014<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Bugcrowd<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/applications\/bug-bounty-program-guide\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bug bounties<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2013<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Endgame<\/td><td>Security intelligence<\/td><td class=\"has-text-align-center\" data-align=\"center\">2013<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Elastic<\/td><\/tr><tr><td>Neohapsis<\/td><td>Mobile and cloud security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2006<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Cisco<\/td><\/tr><tr><td>Trustwave<\/td><td>Managed services and IT<\/td><td class=\"has-text-align-center\" data-align=\"center\">2004<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Singtel<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.RedpointVentures.jpeg\" alt=\"Redpoint Ventures logo.\" class=\"wp-image-21716\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.RedpointVentures.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.RedpointVentures-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"redpoint\">Redpoint Ventures<\/h3>\n\n\n\n<p>Investing in technology companies since 1999, Redpoint Ventures&#8217; focus is on entrepreneurs in the application, blockchain, fintech, healthcare, and infrastructure sectors. Redpoint offers seed up to growth series funding with a knack for partnering with startup founders early. In all, Redpoint\u2019s over 700 investments have led to almost 300 exits. Based in Menlo Park, California, the technology VC also has a growing funding presence in China.&nbsp;<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include Duo Security, Fortinet, and Caspida; and Redpoint&#8217;s other successful investments include Snowflake, Springpath, and Cloud.com.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Redpoint Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>Cyberhaven<\/td><td class=\"has-text-align-left\" data-align=\"left\">Data security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Orca Security<\/td><td class=\"has-text-align-left\" data-align=\"left\">Cloud security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Duo Security<\/td><td class=\"has-text-align-left\" data-align=\"left\">Data security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2015<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Cisco<\/td><\/tr><tr><td>Caspida<\/td><td class=\"has-text-align-left\" data-align=\"left\"><a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-hackers-evade-detection\/\">Threat detection<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2014<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Splunk<\/td><\/tr><tr><td>Lastline<\/td><td class=\"has-text-align-left\" data-align=\"left\">Network security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2013<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Pindrop<\/td><td class=\"has-text-align-left\" data-align=\"left\"><a href=\"https:\/\/www.esecurityplanet.com\/mobile\/oauth\/\" target=\"_blank\" rel=\"noreferrer noopener\">Authentication<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2013<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>ArcticWolf<\/td><td class=\"has-text-align-left\" data-align=\"left\">Managed security service<\/td><td class=\"has-text-align-center\" data-align=\"center\">2012<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Fortinet<\/td><td class=\"has-text-align-left\" data-align=\"left\">Network security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2003<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nasdaq: FTNT<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.Sequoia.jpg\" alt=\"Sequoia logo.\" class=\"wp-image-21733\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.Sequoia.jpg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.Sequoia-150x150.jpg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"sequoia\">Sequoia Capital<\/h3>\n\n\n\n<p>Sequoia Capital is arguably the top VC in cybersecurity, with five decades of experience investing in some of the biggest names in IT. Outside the United States, Sequoia&#8217;s international presence includes funds specific to Israel, India, China, Southeast Asia, and Europe and serves companies across the enterprise, consumer, and technology-enabled solution sectors. From Apple and Atari to the latest in security solutions, Sequoia\u2019s presence is undeniable.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include Barracuda Networks, Palo Alto Networks, and Skyhigh; and Sequoia&#8217;s other successful investments include Cisco, Google, LinkedIn, NVIDIA, Oracle, PayPal, Snowflake, and UiPath.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Sequoia Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>Wiz<\/td><td>Cloud security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2020<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Evervault<\/td><td>Developer encryption<\/td><td class=\"has-text-align-center\" data-align=\"center\">2019<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Verkada<\/td><td>Security surveillance<\/td><td class=\"has-text-align-center\" data-align=\"center\">2019<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Armis<\/td><td>IoT network security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2015<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Sumo Logic<\/td><td>Threat intelligence<\/td><td class=\"has-text-align-center\" data-align=\"center\">2014<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nasdaq: SUMO<\/td><\/tr><tr><td>Okta<\/td><td>Identity management<\/td><td class=\"has-text-align-center\" data-align=\"center\">2013<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nasdaq: OKTA<\/td><\/tr><tr><td>Barracuda<\/td><td>Enterprise security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2006<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.ShastaVentures.jpeg\" alt=\"Shasta Ventures logo.\" class=\"wp-image-21717\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.ShastaVentures.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.ShastaVentures-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<p><strong>Read more<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-hackers-use-reconnaissance\/\" target=\"_blank\" rel=\"noreferrer noopener\">How Hackers Use Reconnaissance \u2013 and How to Protect Against It<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"shasta\">Shasta Ventures<\/h3>\n\n\n\n<p>Shasta Ventures specializes in early-stage investments with a robust portfolio covering consumers, hardware, computer vision, data intelligence, infrastructure, and SaaS. Started in 2004, Shasta offers its Elevate program to help founders navigate growth with proven go-to-market methodologies. The San Francisco-based VC has almost 100 active investments and 47 exits.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include SentinelOne, Skycure, Watchdog, and Zenrpise; and Shasta&#8217;s other successful investments include Anaplan, Lithium, Makara, Mint.com, Nest Labs, Spiceworks, and Taskrabbit.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Shasta Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>TrueFort<\/td><td>Zero trust platform<\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Cequence Security<\/td><td>Application security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2019<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>SentinelOne<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/antivirus-vs-epp-vs-edr\/\" target=\"_blank\" rel=\"noreferrer noopener\">Endpoint protection<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2019<\/td><td class=\"has-text-align-center\" data-align=\"center\">NYSE: S<\/td><\/tr><tr><td>Mocana<\/td><td>Security software<\/td><td class=\"has-text-align-center\" data-align=\"center\">2019<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: DigitCert<\/td><\/tr><tr><td>ISARA<\/td><td>Quantum security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2018<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>CloudPassage<\/td><td>Security <a href=\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/\" target=\"_blank\" rel=\"noreferrer noopener\">automation<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2014<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>eSentire<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/top-mdr-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">Managed detection and response<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2014<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Zenprise<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-mobility-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mobile device management<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2005<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Citrix<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.TenElevenVentures.jpeg\" alt=\"TenEleven Ventures logo.\" class=\"wp-image-21734\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TenElevenVentures.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TenElevenVentures-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"teneleven\">Ten Eleven Ventures<\/h3>\n\n\n\n<p>One of the youngest VC firms to make the list, Ten Eleven Ventures started in 2014 to invest in the best and brightest cybersecurity entrepreneurs. With just over 30 investments, the upstart VC already has an impressive track record in identifying innovative security companies and helping partners reach their exit. The San Francisco-based firm includes a team of industry and startup leaders, and a joint investment alliance with private equity firm KKR.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include Black Horse, Cylance, Darktrace, Hexadite, Ionic, Jask, KnowBe4, Ping Identity, Revelock, Twistlock, and Verodin.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">TenEleven Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>Cyware<\/td><td>SOAR and threat intelligence<\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Axis Security<\/td><td>Security and analytics<\/td><td class=\"has-text-align-center\" data-align=\"center\">2020<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>ReliaQuest<\/td><td>Enterprise cybersecurity<\/td><td class=\"has-text-align-center\" data-align=\"center\">2020<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>KnowBe4<\/td><td><a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\" target=\"_blank\" rel=\"noreferrer noopener\">Awareness training<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2019<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Vulcan<\/td><td>Vulnerability management<\/td><td class=\"has-text-align-center\" data-align=\"center\">2019<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Offensive Security<\/td><td>Penetration testing<\/td><td class=\"has-text-align-center\" data-align=\"center\">2018<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Cylance<\/td><td>Tech-enabled cybersecurity<\/td><td class=\"has-text-align-center\" data-align=\"center\">2015<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Blackberry<\/td><\/tr><tr><td>Ping Identity<\/td><td>Identity management<\/td><td class=\"has-text-align-center\" data-align=\"center\">2014<\/td><td class=\"has-text-align-center\" data-align=\"center\">NYSE: PING<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.TigerGlobal.png\" alt=\"Tiger Global logo.\" class=\"wp-image-21719\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TigerGlobal.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TigerGlobal-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"tg\">Tiger Global Management<\/h3>\n\n\n\n<p>Almost twenty years after Tiger Global Management started its private equity business, the VC ranks among the most active investment firms globally. The New York-based company has an extensive presence in Asia and focuses on companies in the financial, consumer, software, and web sectors. Since 2003, Tiger Global Management has made over 900 investments with 120 exits.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include Crowdstrike and SentinelOne; and Tiger Global&#8217;s other successful investments include Alibaba, Block, GitLab, Glassdoor, LinkedIn, and Meta.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Tiger Global Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>CHEQ<\/td><td>Marketing cybersecurity<\/td><td class=\"has-text-align-center\" data-align=\"center\">2022<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Securden<\/td><td>Zero trust platform<\/td><td class=\"has-text-align-center\" data-align=\"center\">2022<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Forter<\/td><td>Fraud prevention<\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Guardio<\/td><td>Browser security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>DoubleVerify<\/td><td>Fraud and web scanning<\/td><td class=\"has-text-align-center\" data-align=\"center\">2020<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Crowdstrike<\/td><td>Enterprise security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2020<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nasdaq: CRWD<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.YLVentures.jpeg\" alt=\"YL Ventures logo.\" class=\"wp-image-21720\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.YLVentures.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.YLVentures-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"yl\">YL Ventures<\/h3>\n\n\n\n<p>Based in Tel Aviv and Silicon Valley, YL Ventures was launched in 2007 to bring cybersecurity innovation coming out of Israel to a global customer base. YL offers hands-on support for startup leaders in addition to an extensive network of cybersecurity industry leaders and CISOs. The Israeli security specialist boasts 23 investments with 11 exits; don&#8217;t miss the firm&#8217;s interactive map of the country&#8217;s cybersecurity startup space: <a href=\"https:\/\/www.cybermap.co\/\" target=\"_blank\" rel=\"noreferrer noopener\">CyberMap<\/a>.<\/p>\n\n\n\n<p>Notable cybersecurity exits for the company include Build Security, Hexadite, Medigate, and Seculert.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">YL Ventures Investments<\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Sector<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Year<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Status<\/strong><\/td><\/tr><tr><td>Cycode<\/td><td>Code detection and response<\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Grip<\/td><td>SaaS cybersecurity<\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Hunters<\/td><td>XDR<\/td><td class=\"has-text-align-center\" data-align=\"center\">2021<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Enso<\/td><td>Application security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2020<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Twistlock<\/td><td>Enterprise cloud<\/td><td class=\"has-text-align-center\" data-align=\"center\">2019<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: PAN<\/td><\/tr><tr><td>Orca Security<\/td><td>Cloud security<\/td><td class=\"has-text-align-center\" data-align=\"center\">2019<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><tr><td>Hexadite<\/td><td>Cybersecurity orchestration<\/td><td class=\"has-text-align-center\" data-align=\"center\">2019<\/td><td class=\"has-text-align-center\" data-align=\"center\">Acquired: Microsoft<\/td><\/tr><tr><td>Axonius<\/td><td>Asset management<\/td><td class=\"has-text-align-center\" data-align=\"center\">2017<\/td><td class=\"has-text-align-center\" data-align=\"center\">Private<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Also read<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/products\/cyber-insurance-companies\/\" target=\"_blank\" rel=\"noreferrer noopener\">Top Cyber Insurance Companies<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.TopCybersecurityVCs-1-1024x1024.png\" alt=\"An infographic collage showing the logos of the picks for top cybersecurity venture capital firms of 2022. These are the top VCs in cybersecurity.\" class=\"wp-image-21760\" style=\"width:740px;height:740px\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopCybersecurityVCs-1-1024x1024.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopCybersecurityVCs-1-300x300.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopCybersecurityVCs-1-150x150.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopCybersecurityVCs-1-768x768.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopCybersecurityVCs-1-1536x1536.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopCybersecurityVCs-1-696x696.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopCybersecurityVCs-1-1068x1068.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopCybersecurityVCs-1.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"honorable\">Honorable Mention Cybersecurity VCs<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Battery Ventures<\/li>\n\n\n\n<li>Data Collective Venture Capital (DCVC)<\/li>\n\n\n\n<li>Foundation Capital<\/li>\n\n\n\n<li>Gula Tech Adventures<\/li>\n\n\n\n<li>Index Ventures<\/li>\n\n\n\n<li>Jerusalem Venture Partners (JVP)<\/li>\n\n\n\n<li>Lytical Ventures<\/li>\n\n\n\n<li>RRE Ventures<\/li>\n\n\n\n<li>SoftBank<\/li>\n\n\n\n<li>Sorenson Ventures<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"917\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.TopVCs.HonorableMention-1024x917.png\" alt=\"An infographic showing the honorable mention firms for top cybersecurity VCs of 2022, including Battey, Index, JVP, SoftBank, DCVC, GulaTech, Lytical, Sorenson, Foundation Capital, and RRE Ventures.\" class=\"wp-image-21871\" style=\"width:768px;height:688px\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.HonorableMention-1024x917.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.HonorableMention-300x269.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.HonorableMention-768x688.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.HonorableMention-1536x1376.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.HonorableMention-150x134.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.HonorableMention-696x624.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.HonorableMention-1068x957.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.HonorableMention.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"company\">Top Company-Linked VCs in Cybersecurity<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Capital One Ventures<\/li>\n\n\n\n<li>Cisco Investments<\/li>\n\n\n\n<li>Citi Ventures<\/li>\n\n\n\n<li>Dell Technologies Capital<\/li>\n\n\n\n<li>GV<\/li>\n\n\n\n<li>Intel Capital<\/li>\n\n\n\n<li>MassMutual Ventures<\/li>\n\n\n\n<li>Microsoft Ventures<\/li>\n\n\n\n<li>Salesforce Ventures<\/li>\n\n\n\n<li>Samsung Next<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"917\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.TopVCs.CompanyLinked-1024x917.png\" alt=\"An infographic showing the company-linked firms for top cybersecurity VCs of 2022 including Dell, GV, Intel, M12, Capital One, Cisco, Citi, MassMutual, Samsung Next, and Salesforce.\" class=\"wp-image-21869\" style=\"width:768px;height:688px\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.CompanyLinked-1024x917.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.CompanyLinked-300x269.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.CompanyLinked-768x688.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.CompanyLinked-1536x1376.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.CompanyLinked-150x134.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.CompanyLinked-696x624.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.CompanyLinked-1068x957.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.CompanyLinked.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"early\">Top Seed and Early Stage VCs in Cybersecurity<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Acrew Capital<\/li>\n\n\n\n<li>Blumberg Capital<\/li>\n\n\n\n<li>Boldstart Ventures<\/li>\n\n\n\n<li>Charles River Ventures<\/li>\n\n\n\n<li>DataTribe<\/li>\n\n\n\n<li>Dreamit Ventures<\/li>\n\n\n\n<li>Floodgate<\/li>\n\n\n\n<li>General Catalyst<\/li>\n\n\n\n<li>Wing Venture Capital<\/li>\n\n\n\n<li>Y Combinator<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"917\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.TopVCs.SeedEarlyStage-1-1024x917.png\" alt=\"An infographic showing the seed and early stage top cybersecurity VCs of 2022 including Blumberg, Dreamit, General Catalyst, Y Combinator, Acrew, Boldstart, DataTribe, Wing, Floodgate, and CRV.\" class=\"wp-image-21873\" style=\"width:768px;height:688px\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.SeedEarlyStage-1-1024x917.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.SeedEarlyStage-1-300x269.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.SeedEarlyStage-1-768x688.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.SeedEarlyStage-1-1536x1376.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.SeedEarlyStage-1-150x134.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.SeedEarlyStage-1-696x624.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.SeedEarlyStage-1-1068x957.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs.SeedEarlyStage-1.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what\"><strong>What are Venture Capital Firms?<\/strong><\/h2>\n\n\n\n<p>Venture capital (VC) firms are investment management companies dedicated to funding promising business opportunities for a specified amount of equity. With expertise in discovering talented entrepreneurs and developing business infrastructure, VCs raise exorbitant money, most often through private investors.<\/p>\n\n\n\n<p>Venture capital firms play an essential role as engines for connecting ideas and business models with the funding necessary to develop new products and services and reach new audiences or communities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Types of VC Funding<\/strong><\/h3>\n\n\n\n<p>Though there is some variation in terminology, most entrepreneurs and VCs recognize the following breakdown in funding types and purposes.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Pre-Seed: <\/strong>Initial funding from non-institutional investors.<\/li>\n\n\n\n<li><strong>Seed<\/strong>: First funding stage where a VC receives an equity stake.<\/li>\n\n\n\n<li><strong>Series A<\/strong>: Extended development funding to bolster the company&#8217;s business model.<\/li>\n\n\n\n<li><strong>Series B<\/strong>: Additional financing to scale business infrastructure and market reach.<\/li>\n\n\n\n<li><strong>Series C<\/strong>: Proven track record justifies additional funding for continued growth.<\/li>\n\n\n\n<li><strong>Series D and E<\/strong>: Less frequent and strategic in addressing business growth trajectory.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Venture Capital vs Private Equity<\/strong><\/h3>\n\n\n\n<p>Whereas most citizens, workers, and retirees hold some portion of the public stock market, <strong>private equity<\/strong> refers to equity investments made by private individuals and private equity firms. Private equity manages the entire lifecycle of private assets, from venture capital and growth equity to managed and leveraged buyouts.<\/p>\n\n\n\n<p>Venture capital is a form of private equity focusing on early investing opportunities; meanwhile, notable private equity firms like Blackstone, KKR, and Thoma Bravo are known for post-IPO acquisitions.<\/p>\n\n\n\n<p><strong>Read more<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/trends\/protect-assets-when-employees-leave\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to Protect Company Data &amp; Assets When Employees Leave<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how\"><strong>How Do VC Firms Work?<\/strong><\/h2>\n\n\n\n<p>VC firms are often limited partnerships (LP) led by General Partners (GPs) and made up of a staff managing the VC fund. Through an existing or new network of investors known as Limited Partners (LP), VC funds can raise capital for investing in a general or domain-specific portfolio of companies.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"727\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/ESP.VCFundStructure-1024x727.png\" alt=\"An infographic showing a generic VC structure from the National Venture Capital Association.\" class=\"wp-image-21739\" style=\"width:652px;height:463px\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.VCFundStructure-1024x727.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.VCFundStructure-300x213.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.VCFundStructure-768x545.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.VCFundStructure-150x106.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.VCFundStructure-696x494.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.VCFundStructure-1068x758.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.VCFundStructure.png 1291w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">An infographic showing a generic VC structure from the National Venture Capital Association.<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Opening the Door to Outside<\/strong> Influence<\/h3>\n\n\n\n<p>Though funding sounds nice, many startup nightmares come to mind. When accepting VC funding, entrepreneurs are giving up some level of control over the present or future of their company. Equity is the most evident cost to bear. Still, the fine print of VC agreements could also mean additional control over a prospective Board of Directors, management, business model, and more.<\/p>\n\n\n\n<p>VCs are ultimately accountable to the wishes of their GPs and LPs and not afraid to make decisions to their benefit.&nbsp;<\/p>\n\n\n\n<p>There&#8217;s a broad spectrum of just how active partners are in guiding or managing their investments. As VCs want their investments to succeed, hands-on partners may ask a lot of their invested companies. Founders and startup leaders can often feel the temperature and pressure rise.<\/p>\n\n\n\n<p><strong>Also read<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-outlook-2022-ransomware-and-ai-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity Outlook 2022: Third-Party, Ransomware, and AI Attacks Will Get Worse<\/a><\/p>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n\n<h2 class=\"wp-block-heading\" id=\"land\"><strong>How to Land a Round of Funding<\/strong><\/h2>\n\n\n\n<p>Landing a funding round is no easy task and can take months, if not years, to achieve.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Business Model<\/strong><\/h3>\n\n\n\n<p>Business models have long been the cornerstone for profiling a company commercially. By enumerating foundational business components like core operations, products and services, financing, and revenue sources, startup leaders can communicate their strategic plan for launching and growing a business in a single document or presentation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Business Data<\/strong><\/h3>\n\n\n\n<p>Data is king, and VCs only have an entrepreneur&#8217;s word to trust without it. With data offering insight into sales, KPIs, and growth rates, startup leaders can justify their funding with reliable data points. With a high failure rate, startups with existing business metrics to cite are in a superior position to earn funding.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Networking<\/strong><\/h3>\n\n\n\n<p>Though an exceptional business model and data can&#8217;t hurt, they mean little without access to potential funding. Local funding opportunities and accelerator programs are convenient methods of initial financing for startups. At the same time, reaching firms like the above will mean existing connections or perseverance on top of an ironclad business plan.<\/p>\n\n\n\n<p>With an extensive VC presence split between Silicon Valley and New York, it&#8217;s no surprise entrepreneurs lean toward starting their businesses in these locations. With proximity to multiple funding partners, opportunities to reach and earn funding are more accessible.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Timing<\/strong><\/h3>\n\n\n\n<p>Timing is critical to market success in the competitive landscape, especially within the ever-evolving IT ecosystem. Go-to-market strategies are an essential indicator of investment potential, and the timing of a business&#8217;s funding proposal or launch can and does make the difference. VCs seek the most innovative and new opportunities with the rare allowance for a unique spin on traditional solutions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Questions to Consider<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What is the economic viability of the company?<\/li>\n\n\n\n<li>How is the solution distinct in the cybersecurity industry? Proposition value<\/li>\n\n\n\n<li>What are the revenue model and product deployment strategy?<\/li>\n\n\n\n<li>Is the solution compatible with other popular applications and security systems?<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"hot\"><strong>Securing Data and Infrastructure is Hot<\/strong><\/h2>\n\n\n\n<p>If the last couple of years is any indication, there is no shortage of funding for cybersecurity entrepreneurs. The above VCs and more continue to look for the latest emerging technologies across industries, and securing the next generation of IT infrastructure is hot.<\/p>\n\n\n\n<p>Entrepreneurs with a worthwhile idea or business should consider how additional funding might further develop or expand their operation. With caution in mind, VCs can offer financial support and business and industry expertise to achieve meaningful growth and profit.<\/p>\n\n\n\n<p><strong>Read more<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity Employment in 2022: Solving the Skills Gap<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6fd8724c9a-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fd8724c9a\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fd8724c9a\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fd8724c9a\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fd8724c9a\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fd8724c9a\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fd8724c9a\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Whether it&#8217;s a startup or established organization seeking funding, the right venture capital (VC) firm can make the difference in financial and operational success. Navigating the funding landscape takes time, preparation, and the innovative spirit to convince VC partners to invest in a new or unrecognized business opportunity. Achieving funding is no simple task, and [&hellip;]<\/p>\n","protected":false},"author":250,"featured_media":21735,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[16],"tags":[3790,9651],"b2b_audience":[33,34],"b2b_industry":[],"b2b_product":[149,382,225,385,314,306,429,394,378,377,31779,67,389,286,143,391,375,376,519,68,379,513,31775,392],"class_list":["post-21714","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trends","tag-cybersecurity","tag-faq","b2b_audience-awareness-and-consideration","b2b_audience-evaluation-and-selection","b2b_product-accounting-and-finance","b2b_product-application-security-vulnerability-management","b2b_product-cloud-security","b2b_product-cloud-saas-and-hosted-security-services","b2b_product-consumer-network-security-software","b2b_product-consumer-networking","b2b_product-database-security","b2b_product-email-security","b2b_product-endpoint-security","b2b_product-gateway-and-network-security","b2b_product-iot-security","b2b_product-it","b2b_product-managed-security-services","b2b_product-mobile-security","b2b_product-security","b2b_product-security-appliances","b2b_product-security-management","b2b_product-security-services","b2b_product-security-training-certifications","b2b_product-staffing-training-and-certifications","b2b_product-threats-and-vulnerabilities","b2b_product-training-and-certification-events","b2b_product-web-applications-security","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top 20 Venture Capital (VC) Firms in Cybersecurity<\/title>\n<meta name=\"description\" content=\"Venture Capital firms or VCs are the strategic investors funding innovative ideas in cybersecurity and beyond. Learn more now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 20 Venture Capital (VC) Firms in Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Venture Capital firms or VCs are the strategic investors funding innovative ideas in cybersecurity and beyond. Learn more now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-26T10:46:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-16T23:48:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sam Ingalls\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/SamIngalls\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Ingalls\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"23 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/\"},\"author\":{\"name\":\"Sam Ingalls\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\"},\"headline\":\"Top 20 Venture Capital (VC) Firms in Cybersecurity\",\"datePublished\":\"2022-04-26T10:46:56+00:00\",\"dateModified\":\"2023-10-16T23:48:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/\"},\"wordCount\":3850,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs-scaled.jpg\",\"keywords\":[\"cybersecurity\",\"FAQ\"],\"articleSection\":[\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/\",\"name\":\"Top 20 Venture Capital (VC) Firms in Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs-scaled.jpg\",\"datePublished\":\"2022-04-26T10:46:56+00:00\",\"dateModified\":\"2023-10-16T23:48:45+00:00\",\"description\":\"Venture Capital firms or VCs are the strategic investors funding innovative ideas in cybersecurity and beyond. Learn more now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs-scaled.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"A picture of two professionals shaking hands as this article is about the Top Venture Capital or VC firms in the cybersecurity landscape. Which investors are funding the next-generation of cybersecurity innovation? Read on to learn more.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 20 Venture Capital (VC) Firms in Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\",\"name\":\"Sam Ingalls\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"caption\":\"Sam Ingalls\"},\"description\":\"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/singalls\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls\"],\"url\":\"https:\/\/www.esecurityplanet.com\/author\/singalls\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 20 Venture Capital (VC) Firms in Cybersecurity","description":"Venture Capital firms or VCs are the strategic investors funding innovative ideas in cybersecurity and beyond. Learn more now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/","og_locale":"en_US","og_type":"article","og_title":"Top 20 Venture Capital (VC) Firms in Cybersecurity","og_description":"Venture Capital firms or VCs are the strategic investors funding innovative ideas in cybersecurity and beyond. Learn more now.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/","og_site_name":"eSecurity Planet","article_published_time":"2022-04-26T10:46:56+00:00","article_modified_time":"2023-10-16T23:48:45+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs-scaled.jpg","type":"image\/jpeg"}],"author":"Sam Ingalls","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/SamIngalls","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sam Ingalls","Est. reading time":"23 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/"},"author":{"name":"Sam Ingalls","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2"},"headline":"Top 20 Venture Capital (VC) Firms in Cybersecurity","datePublished":"2022-04-26T10:46:56+00:00","dateModified":"2023-10-16T23:48:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/"},"wordCount":3850,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs-scaled.jpg","keywords":["cybersecurity","FAQ"],"articleSection":["Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/","url":"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/","name":"Top 20 Venture Capital (VC) Firms in Cybersecurity","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs-scaled.jpg","datePublished":"2022-04-26T10:46:56+00:00","dateModified":"2023-10-16T23:48:45+00:00","description":"Venture Capital firms or VCs are the strategic investors funding innovative ideas in cybersecurity and beyond. Learn more now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs-scaled.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/ESP.TopVCs-scaled.jpg","width":2560,"height":1707,"caption":"A picture of two professionals shaking hands as this article is about the Top Venture Capital or VC firms in the cybersecurity landscape. Which investors are funding the next-generation of cybersecurity innovation? Read on to learn more."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Top 20 Venture Capital (VC) Firms in Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2","name":"Sam Ingalls","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","caption":"Sam Ingalls"},"description":"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.","sameAs":["https:\/\/www.linkedin.com\/in\/singalls\/","https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls"],"url":"https:\/\/www.esecurityplanet.com\/author\/singalls\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21714"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=21714"}],"version-history":[{"count":1,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21714\/revisions"}],"predecessor-version":[{"id":32394,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21714\/revisions\/32394"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/21735"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=21714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=21714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=21714"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=21714"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=21714"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=21714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}