Friday, July 19 2024

Paris-based Exclusive Networks IPO filing. Latest funding fuels Panoryas’s expansion in the US. LG’s latest buyout drives inroads towards connected car security, while Jungle Disk acquires new product divisions to immediately realize +100% growth. F5’s acquisition of Threat Stack buys real-time threat detection.

Funding

Exclusive Networks, a Paris-based cybersecurity and cloud solutions provider, filed its initial public offering on Euronext Paris. Shares were listed at €20 per share, a valuation at approximately €1.8 billion. The capital infusion allows Exclusive Networks to expand its geographic footprint and opens opportunities to pursue future M&A activities.

Sternum, an IoT cybersecurity startup, closes $27 million Series B funding to expand their footprint and their headcount, drive future R&D, and to grow their market share. Sternum’s Series B was led by Spark Capital, Square Peg Capital, the Hinrich Foundation, and others. With an estimated 21 billion IoT devices circulating the consumer market to date, Sternum seeks to secure those devices by identifying real time threats and delivering actionable directives.

Panorays, a third-party provider of security risk management, closes its Series B funding at $42 million headed by Greenfield Partners, existing investors Aleph and Oak HC/FT, and new investors BlueRed Partners (Singapore), Greenspring Associates, and Moneta VC. Funding is earmarked for Panorays’ expansion in the U.S. market and to scale its third-party security management processes.

Jscrambler, a cybersecurity firm focused on Java Script protection and real-time security monitoring, raises $15 million through its Series A funding. Led by Ace Capital Partners and existing investors, Jscambler’s Series A funds are earmarked for operational investment, including an expansion of its marketing and sales divisions, as well as expediting feature rollouts.

Ketch, a data control platform for privacy compliance, governance and security, closes a $20 million Series A1 funding round led by Acrew Capital, with notable mentions from CRV, super{set}, Ridge Ventures, and Silicon Valley Bank. Ketch’s automated operational systems and data governance protocols guides them to support large scale enterprises.

Metrika, a leading operation tasked with the operational monitoring of blockchain networks, finalizes Series A funding of $14 million led by Neotribe Ventures. Additional investors include Coinbase Ventures, Samsung NEXT, Nyca Partners, and SCB 10X. Metrika offers monitoring of blockchain networks, entity analytics and intelligence compilation, and provides network status for customer’s blockchain operations.

Oasano, a data privacy enterprise focusing on international regulation compliance, closes an $11 million funding round led by Jump Capital with an eye for international expansion and an intent to grow its workforce to service that expansion. A data privacy company to its core, Osano’s AI focuses on the compilation of personal date with a subsequent cross-referencing of each locale’s respective regulations.

The reclusive youngling, Stairwell, holds its coming out with a $20 million Series A led by Sequoia Capital and Accel. This cybersecurity company starts by analyzing a customer’s internal data and processes with an eye to guide the next step to stop external threats.

Saviynt closed another $130 million with latest funding round led by HPS Investment Partners and PNC Bank. With the intent to expand past its North American footprint, Saviynt eyes the major players in Europe and Asia. With its ongoing concentration as an identity and access governance vendor, this cash influx will guide future advancements in trust architecture and its identity analytics.

DeepFactor announces a $15 million influx via its Series A led by Insight Partners, Emergent Ventures, Security Leadership Capital, and Tricentis. This code observability startup intends to use these funds to feed the development of existing products and a future SaaS offering. With the ever-present adoption of cloud native architecture and the resulting universe of areas to attack, DeepFactor provides a defense through the detection of code anomalies in apps.

MERGERS AND ACQUISITIONS

OneTrust will acquire Tugboat Logic to further bolster its data privacy operation. Tugboat Logic brings a specialty in security certifications, which will assist One Trust’s focus on regulatory compliance and the downstream expectations of its customers’ end use customers.

LG acquires Cybellum, an Israeli based startup with an eye for vehicular security systems integrated in the field of connected cars, for $140 million with a future equity agreement of $20 million at a then determined valuation. This acquisition further expands LG’s bend towards an automotive flex.

Jungle Disk claims three product divisions from J2 Global – KeepItSafe, LiveVault, and Offsite Stat Sync – with an eye to expand its cybersecurity operations. Funding was provided by private equity Dry Line Partners, with additional backing by Porthcawl Holdings. Transaction details remain confidential.

F5 mints deal to acquire Threat Stack, a closely held provider of cloud security integration within Dev and Ops processes, to bolster its prowess for network security for $68 million. F5’s acquisition is expected to close by year’s end. Threat Stack’s integration will bring its real-time threat detection to bolster F5’s actionable security applications.

Read more cybersecurity M&A and funding updates from SecureDisruptions here.

Previous

Cyber Deal Update: Upstream Security, Hunters, build.security

Next

Cyber Deal Update: Coalition, Akamai, Fireeye & McAfee

Check Also

Widget

Don’t Miss

Sevco Security Platform Product Review

Ellie Buscemi

What is the Sevco Security Platform? The Sevco Security Platform is a cyber asset attack service management (CAASM) product that focuses on aggregating and correlating data from across a company’s cybersecurity infrastructure to give cybersecurity professionals a better sense of what the company’s infrastructure looks like as a whole. The platform’s sources include a company’s […]

Cyber Deals: Huntress, Cyberhaven, and SpyCloud

CISOstack

Cybersecurity Surge: Top Funding Rounds and Strategic Acquisitions Fuel Growth in AI, Cloud Security, and Threat Prevention Solutions

Fidelis Elevate: A Deep Dive

Ellie Buscemi

What is Fidelis Elevate? Fidelis Elevate is an open extended detection and response (open XDR) solution focusing on network protection, endpoint security, and cyber attacker deception. The platform aims to protect various elements of a company’s infrastructure, such as devices and servers while tracking suspicious behavior and preventing access to cyber criminals. What features does […]

Partially closed laptop screen

Best Extended Detection and Response (XDR) Solutions

Lara Oporto

What is Extended Detection and Response and how does it work? Extended Detection and Response (XDR) is a cybersecurity system that gathers information from different places like computers, networks and emails. Unlike other security tools that focus on one area like computers or networks, XDR looks at everything together. The comprehensive approach helps to find […]

Close up of computer chip

Best Managed Detection and Response (MDR) Solutions

Lara Oporto

What is Managed Detection and Response? Managed Detection and Response (MDR) is a cybersecurity service that provides continuous monitoring, threat detection and incident response capabilities. MDR achieves these capabilities through the deployment of advanced technologies such as machine learning and behavioral analytics as well as analysis from security professionals. MDR is a cybersecurity service that […]

Best Hyperconverged Infrastructure Software

Ellie Buscemi

What is Hyperconverged Infrastructure and how does it work? Hyperconverged infrastructure (HCI) is a software that provides computing, storage and network operations for a company from a single point on a company’s hardware. Originally, computing, storage and network operations were divided in a company’s hardware infrastructure and potentially provided by separate vendors with different management […]