Monday, July 22 2024

Cybersecurity Venture Funding and Mergers: This week’s deals involved cloud security services, data privacy, and industrial cybersecurity companies.

Funding

Cloud cybersecurity firm Mesh Security has secured $4.5 million in venture funding. The round was led by Booster Ventures with participation from other investors.

Spin Technology, a firm providing SaaS security solutions, raised $16 million in a Series A funding round. This round was led by Blueprint Equity with participation from Santa Barbara Venture Partners and Blu Venture Investors.

Safe-T Group, a global provider of cybersecurity and privacy solutions for consumers and enterprises, closed a non-dilutive strategic funding agreement of up to $4 million to support the further growth of its consumer privacy solutions and its customer acquisition program.

Mergers and Acquisitions

Andy Mane, CEO of Avantus Federal

CyberArk, an identity security and access management company, has acquired C3M, a cloud security and compliance company to accelerate cloud privilege security innovation.

Industrial cybersecurity firm GrayMatter announced a strategic merger with process automation and machine control company HSTE. The acquisition will help expand GreyMatter’s Industrial Intelligence platform.

Managed services and solutions company ATSG acquired Vology, Inc., a managed IT, cloud, and security services provider.

SixGen Inc., a cybersecurity services and products provider, acquired technology management consulting company Fourcast Management and Analysis Inc.

Read more cybersecurity M&A and funding updates from SecureDisruptions here.

Previous

Cyber Deals: Cybrary, Ping Identity, Axio Global

Next

Cyber Deals: Drata, Field Effect investments, and Veracode acquisition

Check Also

Widget

Don’t Miss

Sevco Security Platform Product Review

Ellie Buscemi

What is the Sevco Security Platform? The Sevco Security Platform is a cyber asset attack service management (CAASM) product that focuses on aggregating and correlating data from across a company’s cybersecurity infrastructure to give cybersecurity professionals a better sense of what the company’s infrastructure looks like as a whole. The platform’s sources include a company’s […]

Cyber Deals: Huntress, Cyberhaven, and SpyCloud

CISOstack

Cybersecurity Surge: Top Funding Rounds and Strategic Acquisitions Fuel Growth in AI, Cloud Security, and Threat Prevention Solutions

Fidelis Elevate: A Deep Dive

Ellie Buscemi

What is Fidelis Elevate? Fidelis Elevate is an open extended detection and response (open XDR) solution focusing on network protection, endpoint security, and cyber attacker deception. The platform aims to protect various elements of a company’s infrastructure, such as devices and servers while tracking suspicious behavior and preventing access to cyber criminals. What features does […]

Partially closed laptop screen

Best Extended Detection and Response (XDR) Solutions

Lara Oporto

What is Extended Detection and Response and how does it work? Extended Detection and Response (XDR) is a cybersecurity system that gathers information from different places like computers, networks and emails. Unlike other security tools that focus on one area like computers or networks, XDR looks at everything together. The comprehensive approach helps to find […]

Close up of computer chip

Best Managed Detection and Response (MDR) Solutions

Lara Oporto

What is Managed Detection and Response? Managed Detection and Response (MDR) is a cybersecurity service that provides continuous monitoring, threat detection and incident response capabilities. MDR achieves these capabilities through the deployment of advanced technologies such as machine learning and behavioral analytics as well as analysis from security professionals. MDR is a cybersecurity service that […]

Best Hyperconverged Infrastructure Software

Ellie Buscemi

What is Hyperconverged Infrastructure and how does it work? Hyperconverged infrastructure (HCI) is a software that provides computing, storage and network operations for a company from a single point on a company’s hardware. Originally, computing, storage and network operations were divided in a company’s hardware infrastructure and potentially provided by separate vendors with different management […]