Thursday, May 30 2024

Silverfort, provider of the world’s first Unified Identity Threat Protection platform, has closed $65m in Series C funding led by Greenfield Partners, alongside several VC’s and strategic investors, including GM Ventures, Acrew Capital, Vintage Investment Partners and existing investors StageOne Ventures, Singtel Innov8, Citi Ventures, Aspect Ventures and Maor Investments.

The new investment, which brings Silverfort’s total funding to over $100m, follows rapid growth which saw Annual Recurring Revenue triple with hundreds of customers – including Fortune 100 companies. The funding will be used to scale the business and team globally and continue to expand the platform’s unique technological advantage.

“The company has spent years building a best-in-class platform to solve holistically a growing security problem now gaining mainstream awareness,” said Avery Schwartz, Partner at Greenfield Partners who will join the company’s board of directors. “We are energized both by the positive impact the company’s technology is having and by the leadership’s vision and passion. It is clear to us that Silverfort’s strong momentum in the market is just the start, and we are excited to join them on this journey.”

Silverfort delivers Identity Threat Detection and Response (ITDR) and Identity Threat Prevention (ITP) capabilities as a unified layer on top of a customer’s existing Identity and Access Management (IAM) infrastructure, including both modern and legacy solutions, to stop identity-based attacks across the enterprise. Silverfort’s patented technology achieves this in a way that doesn’t require modifications to the customer’s endpoints, servers or applications – a capability which is currently unmatched in the market. It also enables customers to extend security controls such as Multi-Factor Authentication (MFA) from any vendor to previously unsupported resources and environments, or even consolidate their hybrid IAM stack by ‘bridging’ legacy systems and protocols into modern identity platforms like Azure AD.

“Identity security can no longer be a ‘feature’ that works in silos within each IAM platform, while leaving many sensitive resources out of scope,” said Hed Kovetz, Silverfort’s Co-Founder and CEO. “This lack of end-to-end identity threat protection has turned identity into today’s #1 attack surface, with compromised credentials being leveraged in 80% of all data breaches and ransomware campaigns. This problem required a new approach to identity security: a unified Zero Trust security layer that works on top of all modern and legacy IAM infrastructure, and covers all users, resources and environments.”

According to Gartner®, in the Top Trends in Cybersecurity 2022 report (February 2022), “Many IAM tools are operating in silos that are not visible to incident responders. Organizations must re-evaluate their IAM infrastructure with a goal of identifying opportunities for detecting compromise and immediately investigating and responding… This year, we are introducing a new term, ’identity threat detection and response’ (ITDR) to describe the collection of tools and best practices to successfully defend identity systems from endemic levels of attacks.”

“We are uniquely positioned to become the leader in ITDR and identity security in general, having spent years building and perfecting our unique platform for this exact purpose,” Kovetz added. “Our agentless and proxyless technology consolidates detection, response and prevention across all IAM platforms – even in places where it was completely missing. Many of our customers have reported cases where the platform detected and stopped account takeover, lateral movement and ransomware propagation attempts. Our approach is already changing the identity security market and will gradually reshape it completely. The numbers speak for themselves: over 90% of those who trial our platform become customers, and we are adding a double-digit number of customers every month.”

Silverfort’s platform also enables customers to protect previously ‘unprotectable’ resources without requiring agents, proxies or application changes. This includes legacy systems, command-line interfaces, industrial OT systems (including air-gapped networks), IT infrastructure, service accounts (machine-to-machine access) and more. “These previously unprotected assets are often viewed as the weakest link in enterprise security,” said Yaron Kassner, Silverfort’s Co-Founder and CTO. “By enabling secure authentication and access to these assets, Silverfort allows companies to close their deepest security gaps, and to comply with regulations and cyber insurance requirements.”

“The need for robust threat protection across the enterprise is more prevalent today than ever before, as traditional network parameters rapidly change and new threats emerge,” said Wade Sheffer, Managing Director, GM Ventures. “Our investment in Silverfort underscores GM Ventures’ commitment to identifying next generation technologies that will enhance a business’ digital enterprise while supporting GM’s transformation to a technology leader and platform innovator. We are optimistic about Silverfort’s growth and believe their technology has the potential to stop future identity-based threats at GM and beyond.”

Hed Kovetz
Hed Kovetz, co-founder and chief executive officer at SIlverfort
Previous

Thoma Bravo Acquires SailPoint for $6.9B

Next

KKR to Acquire Barracuda Networks

Check Also

Widget

Don’t Miss

Best Cloud Security Posture Management (CSPM) Software

Ellie Buscemi

What is Cloud Security Posture Management and how does it work? Cloud Security Posture Management (CSPM) is a product, service or platform that allows a business to protect their cloud infrastructure through the prevention, detection and response of cyber risks. A CSPM offering uses known and effective frameworks, regulatory standards and company policies to confirm […]

Best Privileged Access Management (PAM) Products

Lara Oporto

What is Privileged Access Management and how does it work? Privileged Access Management (PAM) products stand as a crucial fortress in fortifying your company’s digital landscape. Functioning as a meticulous guardian, PAM offerings orchestrate the establishment of access protocols, meticulously determining who holds privileged access to critical data and the specific circumstances under which such […]

Best Automated Moving Target Defense (AMTD) Offerings

Ellie Buscemi

What is Automated Moving Target Defense and how does it work? Automated Moving Target Defense (AMTD) is a recent innovation in cybersecurity that focuses on flexibility, deception and attack prevention. AMTD has four main components: it provides proactive cyber defense mechanisms, contains automation to change the attack surface, utilizes deception technology and can execute preplanned […]

Third-Party Risk Management Solutions

Lara Oporto

What is Third-Party Risk Management? Third-Party Risk Management (TPRM) software assists organizations in managing risks associated with their relationships with suppliers, vendors and service providers. The products offer a range of features to automate and streamline various aspects of third-party risk management. They typically include tools for risk assessment, due diligence, contract management and ongoing […]

Best Industrial Internet of Things (IIoT) Platforms

Lara Oporto

Industrial Internet of Things (IIoT) offerings are technological solutions empowering businesses to connect, manage and analyze data from a multitude of devices and systems within industrial settings, such as manufacturing, energy, transportation, logistics and healthcare. What are Industrial Internet of Things (IIoT) platforms and how do they work? Industrial Internet of Things (IIoT) platforms are […]

The words Endpoint Detection and Response (EDR) on a green background with lines on the right side of the image

Best Endpoint Detection & Response Platforms

Lara Oporto

Endpoint Detection & Response platforms continuously monitor endpoints for signs of malicious activities, such as unauthorized access or unusual behavior, enabling rapid detection and response to potential cyber threats to safeguard organizational assets. What is Endpoint Detection and Response and how does it work? Endpoint Detection and Response (EDR) is a cornerstone in modern cybersecurity […]