Thursday, June 13 2024

BlueVoyant, an industry-leading internal and external cyber defense platform, announced today the close of its Series D round. Liberty Strategic Capital, a private equity firm founded and led by former U.S. Secretary of the Treasury Steven T. Mnuchin, led the $250-million round with participation from new investors as well as existing investors, including ISTARI (a Temasek company), Eden Global Partners (a New York-based growth equity investment firm), and 8VC, among others. Eden’s registered broker-dealer affiliate, Eden Global Capital Partners, served as a strategic advisor and together with Morgan Stanley as co-placement agent for the round. Secretary Mnuchin will join BlueVoyant’s Board of Directors.

This investment will enable the firm to continue deepening its advanced technical capabilities, accelerate its global expansion, and build upon a record-setting 2021 that included triple-digit growth momentum, key acquisitions, and an 80% increase in customer count. In addition, in 2021, the company increased its existing global footprint by expanding into more than 10 countries. Since 2018, BlueVoyant has grown annual recurring revenues at 117% on average.

“When we started BlueVoyant, we knew that cybersecurity was quickly becoming one of the most significant threats businesses and government agencies face, and something our team was uniquely prepared to address,” said Jim Rosenthal, CEO, BlueVoyant. “In just over four years, we have grown to more than 560 employees, and have earned the trust of more than 700 customers. The market demand we are seeing is tremendous and we see this trend accelerating as security professionals pivot to our outcomes-based cybersecurity solutions.”

Said Tom Glocer, executive chairman and co-founder of BlueVoyant: “As lead director at two Fortune 100 companies, I see the growing demand for advanced cybersecurity solutions. This demand will only grow over the coming years, and BlueVoyant is uniquely equipped to meet both the internal and external needs of organizations large and small.”

Despite an exhaustive array of cybersecurity tools available on the market, cyber defenders continue struggling to stop adversaries from stealing their intellectual property and customer data, prevent ransomware attacks, and keep their networks and business systems operational. BlueVoyant’s renowned team comes from some of the most advanced cyber defense environments in the world, including government agencies, defense, and mission-critical enterprises.

BlueVoyant’s vision is to give cyber defenders the advantage over attackers by delivering the technology, telemetry, and expertise required to defend against sophisticated cyber attacks. The company’s approach is outcomes-based and its technology is purpose-built to converge internal and external cybersecurity capabilities into a single, unified platform. All backed by elite cybersecurity experts who know how to deploy, defend, and respond.

“As cyber threats increase, BlueVoyant has positioned itself as a differentiated leader in managed detection and response, third-party cyber risk management, digital risk protection, and cybersecurity professional services,” said Secretary Mnuchin. “We’re thrilled to partner with BlueVoyant and its top-tier management team as they continue to drive growth in this critical and rapidly expanding market.”

BlueVoyant plans continued expansion of its key lines of business, which include:

Jim Rosenthal, co-founder and chief executive officer of BlueVoyant
Previous

How will SEC's Cybersecurity rules affect funds?

Next

Zero Networks Closes $20M Series A Funding Round

Check Also

Widget

Don’t Miss

One Cloud

Trend Micro Cloud One: A Comprehensive Review

Ellie Buscemi

What is Cloud One by Trend Micro? The Cloud One platform by Trend Micro is a cloud posture security management (CPSM) product that focuses on providing security in the cloud to businesses. Trend One is designed for businesses whose infrastructure relies on a mix of cloud applications and older device-based programs. Examining the security capabilities […]

Best Security Information and Event Management (SIEM) Solutions

Lara Oporto

A Security Information and Event Management system (SIEM) is typically most needed in larger organizations or those with complex IT infrastructures where there’s a high volume of security events and logs generated from various sources. Companies often invest in SIEM when they require comprehensive visibility into their network activities and want to centralize security monitoring […]

Best Browser Security Products

Ellie Buscemi

What is Browser Security and how does it work? Browser Security is a subcategory of cybersecurity that focuses on minimizing a user’s vulnerability to cyber threats while they use the worldwide web. These cyber threats include phishing web pages, session hijacking and malware, which can be injected onto a device by means of tamped-with web […]

Headshot of BastionZero CEO Sharon Goldberg

Cloudflare Acquires BastionZero to Enhance SASE Offering

Nico Davidoff

Acquisition Aims to Boost Cloudflare One’s Capabilities Amidst Growing SASE Market Competition Cloudflare has acquired BastionZero, a zero trust infrastructure platform, in a move aimed at enhancing its Cloudflare One secure access service edge (SASE) offering. The acquisition underscores Cloudflare’s commitment to expanding its presence in the growing SASE market. Cloudflare reported first-quarter revenue of […]

Best Secure Access Service Edge Platforms

Lara Oporto

What is SASE and how does it work? Secure Access Service Edge (SASE) is an architectural model that combines network connectivity with security functions, all delivered through a unified cloud platform or centralized policy control. In contrast to the traditional approach, where network security relies on a multitude of distinct functionalities like firewalls, Virtual Private […]

Best Data Security Posture Management (DSPM) Products

Ellie Buscemi

What is Data Security Posture Management and how does it work? Data Security Posture Management (DSPM) tools focus on protecting data by continuously tracking where it is located and who has access to it. DSPM refers to a set of methods that cybersecurity professionals use to better understand their sensitive data like what it is, […]