Preempt Security

Preempt delivers a one-two punch for securing identities and preventing threats like credential compromise and targeted attacks. We help enterprises optimize their identity health posture to reduce their attack surface and preempt threats in real time. Our patented technology continuously analyzes, adapts and responds to threats based on identity, behavior and risk to auto-resolve incidents.Preempt was founded in 2014 by global security and networking experts with a passion for making IT security teams more effective in protecting their organizations from breaches and internal threats.Preempt delivers a modern approach to authentication and securing identity with the markets first solution to deliver Conditional Access for continuously detecting and preempting threats based on identity, behavior and risk. Preempts patented technology empowers Enterprises to optimize Identity hygiene and stop attackers and insider threats in real-time before they can impact business.
Acquired
July 2014
Software

people
Ajit Sancheti
CEO
people
Roman Blachman
CTO

$27,500,000

Series B

June 27, 2018
Series B
$17,500,000

Date Announced

Round Stage

Round Size

Lead Investors

May 21, 2016
Series A
$8,000,000

Date Announced

Round Stage

Round Size

Lead Investors

July 1, 2014
Seed
$2,000,000

Date Announced

Round Stage

Round Size

Lead Investors

blackstone
Blackstone
Investment Firm, Private Equity
1985

Investor

Investor Type

Founded

Funds Raised

clearsky-cyber-security.png
ClearSky Security
Company
2010

Investor

Investor Type

Founded

Funds Raised

general-catalyst-logo
General Catalyst
Venture Capital
2000

Investor

Investor Type

Founded

Funds Raised

Preempt machine-learning models. The models get ongoing feedback that allows them to adapt to the unique character of the network. In addition to having supervised ML models, which are trained by data scientists, and unsupervised ML models, which detect deviations from a local baseline, we also use a hybrid technique called semi-supervised machine learning. In this case, the model is trained by real-time feedback from the end-user. This means that individual detections are far more reliable, but also the models themselves become far more attuned to the environment over time. LDAP anomaly detection, through pre-trained machine learning models, automate the detection of sophisticated attack patterns.
Machine Learning
Semi-Supervised Learning, Supervised Learning

Register Pro to view more

Pro

$50 per month

Sign up to keep browsing

You reached your pageview limit

  • Save profiles to your list
  • Basic search functionality
  • Browse our leading AI database

Select a Table to Export