Business Overview
Active
Status
2018
Founded
129
Team
-1.1%
Growth (Monthly CAGR)
$65M
Funding
Series B
Funding Stage
3
# Rounds
6
# Investors
0.1 years
Time Since Last Round
Vulcan Cyber® breaks down organizational cyber risk into measurable, manageable processes to help security teams go beyond their scan data and actually reduce risk. With powerful prioritization, orchestration and mitigation capabilities, the Vulcan Cyber risk management SaaS platform provides clear solutions to help manage risk effectively. Vulcan enhances teams’ existing cyber environments by connecting with all the tools they already use, supporting every stage of the cyber security lifecycle across cloud, IT and application attack surfaces. The unique capability of the Vulcan Cyber platform has garnered Vulcan recognition as a 2019 Gartner Cool Vendor and as a 2020 RSA Conference Innovation Sandbox finalist.
Employee Count
-1.1%
1-Month CAGR
1.9%
3-Month CAGR
19.3%
6-Month CAGR
Employee counts updated on a monthly basis.
Lists
News
Stock Chart
Founders (2)
Name | Position | Military | Classification | Contact |
---|---|---|---|---|
hiddenTal Morgenstern | CPO | MAMRAM, 8200, Talpiot | ||
hiddenYaniv Bardayan | CEO | 8200 |
Board and Advisors (3)
Name | Position | Contact |
---|---|---|
hiddenAndy Ellis | Advisor | |
hiddenHenry Mason | Board Member | |
hiddenMark Hatfield | Board Member |
Revenues (0)
Funding Rounds (3)
$65M
Equity Funding
Round | Date | Capital Raised | Valuation | Investors |
---|---|---|---|---|
November 2023 | hidden$34M | 4 | ||
March 2021 | hidden$21M | 4 | ||
June 2019 | hidden$10M | 2 |
M&A Events (0)
Investors (6)
Investor | Investor Type | Location |
---|---|---|
Venture Capital | United States | |
Venture Capital | Israel | |
Corporate Venture Capital | India | |
Venture Capital | United Kingdom | |
Angel | Israel | |
Angel | United States |
Patents (0)
Research Publications (0)
Certifications (0)
AI Technology Stack
3
AI Team
By leveraging machine-learning and cyber research the platform is able to identify and recommend the most efficient solution for every vulnerability, a solution that can be deployed automatically.