{"id":22311,"date":"2022-06-14T23:55:37","date_gmt":"2022-06-14T23:55:37","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=22311"},"modified":"2022-06-15T00:01:16","modified_gmt":"2022-06-15T00:01:16","slug":"cybersecurity-startups-still-attract-funding","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/","title":{"rendered":"Some Cybersecurity Startups Still Attract Funding Despite Headwinds"},"content":{"rendered":"\n<p>With the plunge in tech stocks and the freeze in the IPO market, the funding environment for cybersecurity startups has come under pressure. According to Pitchbook, the amount of venture capital investment in the first quarter was off by 35.8% to $5.1 billion on a quarter-over-quarter basis. The median late-stage valuation fell by 26.1%.<\/p>\n\n\n\n<p>VCs are certainly getting pickier with their investments. There needs to be not just&nbsp; strong growth on the top line, but also a reasonable path to profitability.<\/p>\n\n\n\n<p>Despite those headwinds, there are some interesting deals getting done in the cybersecurity market.<\/p>\n\n\n\n<p>\u201cCybersecurity innovation is alive and well and cybersecurity continues to be a spending priority for public and private sector institutions,\u201d said Alberto Yepez, managing director and co-founder at Forgepoint Capital.<\/p>\n\n\n\n<p>Here we&#8217;ll take a look at four recent deals that stand out &#8211; and give you a quick rundown of last week&#8217;s RSA Innovation Sandbox startup contest while we&#8217;re at it.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-vc-firms\/\">Top VC Firms in Cybersecurity for 2022<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Laminar<\/h2>\n\n\n\n<p>Laminar <a href=\"https:\/\/www.businesswire.com\/news\/home\/20220602005058\/en\/Laminar-Doubles-Funding-in-Less-Than-Six-Months-to-67-Million-Leading-the-Way-in-Cloud-Data-Security\" target=\"_blank\" rel=\"noreferrer noopener\">raised $67 million<\/a> earlier this month, which came after a $37 million round in November 2021. The investors included Tiger Global Management and Salesforce Ventures.<\/p>\n\n\n\n<p>The company is fairly young. Amit Shaked and Oran Avraham co-founded the business in September 2020.<\/p>\n\n\n\n<p>They saw an opportunity in the public <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-security-best-practices\/\">cloud data security<\/a> market. Laminar\u2019s platform allows for protection across the hyperscaler solutions as well as cloud data warehouses, such as Snowflake&#8217;s. The system is API-only, and no private information leaves a customer\u2019s systems.<\/p>\n\n\n\n<p>Laminar has been innovating at a rapid clip. In the latest release, the company announced the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>SOC 2 Type II certification<\/li><li>Microsoft Azure support<\/li><li>Comprehensive data-centric security policies<\/li><li>Discovery and classification of \u201cshadow data,\u201d which is not tracked by IT<\/li><\/ul>\n\n\n\n<p>It\u2019s true that the market is highly competitive. But it is also a large category and the latest funding will certainly help drive the growth.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cnap-platforms-the-next-evolution-of-cloud-security\/\">CNAP Platforms: The Next Evolution of Cloud Security<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">CertiK<\/h2>\n\n\n\n<p>Web3 is one of the buzziest categories in technology today. Elite venture capital firms like Andreessen Horowitz and Sequoia Capital have been investing substantial amounts in this startup market.<\/p>\n\n\n\n<p>The belief is that Web3 is the next online platform and at its core is <a href=\"https:\/\/www.esecurityplanet.com\/applications\/cybersecurity-blockchain-applications\/\">blockchain<\/a>. This allows for a more decentralized system, in which users can better control their own data and even monetize it through crypto <a href=\"https:\/\/www.esecurityplanet.com\/threats\/tokenization-vs-encryption\/\">tokens<\/a>.<\/p>\n\n\n\n<p>But there is a problem: cyber breaches. Just look at Axie Infinity, which is a Web3 game. In March, a security breach resulted in the <a href=\"https:\/\/www.cnbc.com\/2022\/03\/29\/hackers-steal-over-615-million-from-network-running-axie-infinity.html\" target=\"_blank\" rel=\"noreferrer noopener\">theft of about $620 million in Ethereum and USD Coin<\/a>.<\/p>\n\n\n\n<p>In light of this, it\u2019s not surprising that funding for Web3 security startups has surged. Perhaps the most notable deal is CertiK. In April, the company <a href=\"https:\/\/www.businesswire.com\/news\/home\/20220422005030\/en\/Web3-Security-CertiK-Closes-Additional-60-Million-Funding-from-SoftBank-on-the-Heels-of-88-Million-Series-B3\" target=\"_blank\" rel=\"noreferrer noopener\">raised $88 million<\/a>, which included investors like SoftBank Vision Fund 2 and Tiger Global. During the prior nine months, CertiK has hauled in about $290 million in venture funding. Its valuation was at $2 billion.<\/p>\n\n\n\n<p>The CEO and cofounder is Ronghui Gu. He is still an assistant professor of Computer Science at Columbia University and is the developer of core Web3 security technology like CertiKOS and SeKVM.<\/p>\n\n\n\n<p>Among early-stage cybersecurity firms, CertiK is unique in that it is profitable. At the time of the funding, the company secured over $300 billion crypto assets and revenues had surged by 12X since 2021.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Devo Technology<\/h2>\n\n\n\n<p>In June, Devo Technology announced a Series F funding for <a href=\"https:\/\/www.globenewswire.com\/news-release\/2022\/06\/02\/2455286\/0\/en\/Devo-Announces-100-Million-Funding-Round-Led-by-Eurazeo-to-Fuel-Global-Expansion-and-Acquisitions.html\" target=\"_blank\" rel=\"noreferrer noopener\">$100 million at a $2 billion valuation<\/a>. The lead investor on the deal was Eurazeo. Since its founding in 2011, Devo Technology has raised over $500 million. The plan is to use the capital to expand into new countries, bolster R&amp;D, and acquire other startups.<\/p>\n\n\n\n<p>Devo has developed a cloud-native logging and security analytics platform. The system can manage a large number of security tools and provide real-time insights. What\u2019s more, AI is becoming a big part of the strategy. To this end, the company recently acquired Kognos. The company leverages <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ai-ml-cybersecurity\/\">AI<\/a> for <a href=\"https:\/\/www.esecurityplanet.com\/threats\/threat-hunting\/\">threat hunting<\/a>.<\/p>\n\n\n\n<p>In terms of the growth for Devo, it has been impressive. For the past fiscal year, the revenues jumped by nearly 100% as did the customer base, which includes companies like AT&amp;T and Sonos.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">JupiterOne<\/h2>\n\n\n\n<p>Just two weeks ago, JupiterOne &#8211; on our list of the <a href=\"https:\/\/www.esecurityplanet.com\/products\/hot-cybersecurity-startups\/\">Hottest Security Startups for 2022<\/a> &#8211; <a href=\"https:\/\/www.prnewswire.com\/news-releases\/jupiterone-achieves-valuation-of-over-1b-with-70m-series-c-funding-to-fuel-innovation-in-cybersecurity-and-democratize-access-for-all-301559956.html\" target=\"_blank\" rel=\"noreferrer noopener\">raised $70 million in a Series C funding round<\/a>. In all, the company has raised over $119 million and the valuation is more than $1 billion. The lead investor on the deal was Tribe Capital.<\/p>\n\n\n\n<p>Before founding JupiterOne in February 2018, Erkang Zheng had led various large organizations through their digital transformation efforts. What he found were major challenges with security, governance and compliance. He saw there was a need for a platform that would be a graph knowledgebase of all digital assets.<\/p>\n\n\n\n<p>The strategy was certainly a smart one. JupiterOne has become a top player in the fast-growing cloud-native cyber asset attack surface (CAASM) market. The company\u2019s platform, which is for the cloud and on-premises environments, allows for continuous mapping of IT networks.&nbsp; According to JupiterOne CEO and founder Zheng, \u201cWe provide our customers with valuable security context and true visibility of their organization&#8217;s cyber asset landscape using data and automation, to help them prioritize risks and protect their business.\u201d<\/p>\n\n\n\n<p>With the infusion of capital, the company plans to ramp its staffing for its enterprise sales organization. There will also be more investment in the self-service platform, which will expand the market into the small and midsize business segments.<\/p>\n\n\n\n<p>See also: <a href=\"https:\/\/www.esecurityplanet.com\/products\/grc-tools\/\">Top GRC Tools &amp; Software<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Talon Tops RSA Innovation Competition<\/h2>\n\n\n\n<p>Last week, 10 startups competed for recognition in RSA&#8217;s Innovation Sandbox contest. Five of them made our list of the <a href=\"https:\/\/www.esecurityplanet.com\/products\/hot-cybersecurity-startups\/\">top cybersecurity startups<\/a> &#8211; including the winner, <strong>Talon Cyber Security<\/strong>, which offers a secure browser purpose-built for enterprise visibility and control of SaaS applications.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">Zero trust<\/a> cloud infrastructure access provider <strong>BastionZero<\/strong> was the other finalist besides Talon.<\/p>\n\n\n\n<p>Other startups competing included:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Threat management solution vendor <strong>Araali Networks<\/strong><\/li><li>Cloud investigation and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/best-incident-response-tools-services\/\">incident response<\/a> platform vendor <strong>Cado Security<\/strong><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/\">Software supply chain security<\/a> solution provider <strong>Cycode<\/strong><\/li><li>DataGovOps provider <strong>Dasera<\/strong><\/li><li>Cloud <a href=\"https:\/\/www.esecurityplanet.com\/products\/devsecops-tools\/\">DevSecOps<\/a> provider <strong>Lightspin<\/strong><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-to-control-api-security-risks\/\">API security<\/a> provider <strong>Neosec<\/strong><\/li><li>Cloud-native asset intelligence vendor <strong>Sevco Security<\/strong><\/li><li>No-code security automation platform vendor <strong>Torq<\/strong><\/li><\/ul>\n\n\n\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-cybersecurity-companies\/\">Top Cybersecurity Companies for 2022<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6e27e04384-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6e27e04384\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6e27e04384\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6e27e04384\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6e27e04384\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6e27e04384\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6e27e04384\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>With the plunge in tech stocks and the freeze in the IPO market, the funding environment for cybersecurity startups has come under pressure. According to Pitchbook, the amount of venture capital investment in the first quarter was off by 35.8% to $5.1 billion on a quarter-over-quarter basis. The median late-stage valuation fell by 26.1%. VCs [&hellip;]<\/p>\n","protected":false},"author":294,"featured_media":22315,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[16],"tags":[2369,3790,3414,730,3797],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[225,377,82],"class_list":["post-22311","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trends","tag-cloud-security","tag-cybersecurity","tag-network-security","tag-security","tag-startups","b2b_audience-awareness-and-consideration","b2b_product-cloud-security","b2b_product-gateway-and-network-security","b2b_product-security-development"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Some Cybersecurity Startups Still Attract Funding Despite Headwinds | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"The bar is higher for most companies, but there is still plenty of capital available for quality security startups.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Some Cybersecurity Startups Still Attract Funding Despite Headwinds | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"The bar is higher for most companies, but there is still plenty of capital available for quality security startups.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-14T23:55:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-15T00:01:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/tech-workers.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"780\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Tom Taulli\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom Taulli\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/\"},\"author\":{\"name\":\"Tom Taulli\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3b50c3a2ede75b3614e53bf9964246cd\"},\"headline\":\"Some Cybersecurity Startups Still Attract Funding Despite Headwinds\",\"datePublished\":\"2022-06-14T23:55:37+00:00\",\"dateModified\":\"2022-06-15T00:01:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/\"},\"wordCount\":1038,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/tech-workers.png\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"network security\",\"security\",\"startups\"],\"articleSection\":[\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/\",\"name\":\"Some Cybersecurity Startups Still Attract Funding Despite Headwinds | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/tech-workers.png\",\"datePublished\":\"2022-06-14T23:55:37+00:00\",\"dateModified\":\"2022-06-15T00:01:16+00:00\",\"description\":\"The bar is higher for most companies, but there is still plenty of capital available for quality security startups.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/tech-workers.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/tech-workers.png\",\"width\":1170,\"height\":780},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Some Cybersecurity Startups Still Attract Funding Despite Headwinds\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3b50c3a2ede75b3614e53bf9964246cd\",\"name\":\"Tom Taulli\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/Taulli-Photo-150x150.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/Taulli-Photo-150x150.png\",\"caption\":\"Tom Taulli\"},\"description\":\"eSecurity Planet contributor Tom Taulli writes about AI security, startups and more. He is the author of Artificial Intelligence Basics: A Non-Technical Introduction, The Robotic Process Automation Handbook: A Guide to Implementing RPA Systems, and Modern Mainframe Development: COBOL, Databases, and Next-Generation Approaches. He also teaches online courses for Pluralsight.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/tom-taulli\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Some Cybersecurity Startups Still Attract Funding Despite Headwinds | eSecurity Planet","description":"The bar is higher for most companies, but there is still plenty of capital available for quality security startups.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/","og_locale":"en_US","og_type":"article","og_title":"Some Cybersecurity Startups Still Attract Funding Despite Headwinds | eSecurity Planet","og_description":"The bar is higher for most companies, but there is still plenty of capital available for quality security startups.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/","og_site_name":"eSecurity Planet","article_published_time":"2022-06-14T23:55:37+00:00","article_modified_time":"2022-06-15T00:01:16+00:00","og_image":[{"width":1170,"height":780,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/tech-workers.png","type":"image\/png"}],"author":"Tom Taulli","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Tom Taulli","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/"},"author":{"name":"Tom Taulli","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3b50c3a2ede75b3614e53bf9964246cd"},"headline":"Some Cybersecurity Startups Still Attract Funding Despite Headwinds","datePublished":"2022-06-14T23:55:37+00:00","dateModified":"2022-06-15T00:01:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/"},"wordCount":1038,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/tech-workers.png","keywords":["cloud security","cybersecurity","network security","security","startups"],"articleSection":["Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/","url":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/","name":"Some Cybersecurity Startups Still Attract Funding Despite Headwinds | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/tech-workers.png","datePublished":"2022-06-14T23:55:37+00:00","dateModified":"2022-06-15T00:01:16+00:00","description":"The bar is higher for most companies, but there is still plenty of capital available for quality security startups.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/tech-workers.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/tech-workers.png","width":1170,"height":780},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-startups-still-attract-funding\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Some Cybersecurity Startups Still Attract Funding Despite Headwinds"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3b50c3a2ede75b3614e53bf9964246cd","name":"Tom Taulli","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/Taulli-Photo-150x150.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/Taulli-Photo-150x150.png","caption":"Tom Taulli"},"description":"eSecurity Planet contributor Tom Taulli writes about AI security, startups and more. He is the author of Artificial Intelligence Basics: A Non-Technical Introduction, The Robotic Process Automation Handbook: A Guide to Implementing RPA Systems, and Modern Mainframe Development: COBOL, Databases, and Next-Generation Approaches. He also teaches online courses for Pluralsight.","url":"https:\/\/www.esecurityplanet.com\/author\/tom-taulli\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22311"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/294"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=22311"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22311\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/22315"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=22311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=22311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=22311"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=22311"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=22311"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=22311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}