Dec 08, 2020
There wasn’t a dull moment these past few months. Since we announced our Round A seven months ago, we’ve more than doubled our team. While not easy—especially with everyone working from home—we had no alternative. Market demand for our platform left us no choice.
On top of securing our customers’ environment, our research team used the power of SideScanning technology to scan thousands of virtual appliances, helping hundreds of organizations (Dell, Cisco, IBM, Symantec, Splunk, Oracle, to name a few) to improve the security posture of their solutions and increase public visibility of issues in thousands of shipped software products. We chose to market Orca Security based on factual, hands-on product comparisons, and took a stance when Palo Alto Networks tried using legal threats to take down a product comparison, instead of accepting our findings and improving its offering.
Today, I’m excited to announce closing of a financing round led by ICONIQ Capital’s tech focused growth equity investment platform, ICONIQ Growth. With over $9 billion in capital commitments, ICONIQ Growth leverages ICONIQ Capital’s unique ecosystem of founders and thought leaders to help further their companies’ success and has made numerous investments in leading cloud companies. ICONIQ is joined in this round with participation from our existing investors—YL Ventures, GGV Capital, and SVCI—a group of CISOs who put their own money in Orca. They share our vision for cloud security that actually works, and we’re honored to work with them. This funding will help us to accelerate our product development and support growing demand for our platform.
Orca Security was founded with the vision that cloud security tools need to maximize the ‘3 Cs,’ as we call them:
Orca Security makes such challenges a thing of the past. We’ve built the worlds’ most comprehensive security platform, encompassing in one solution capabilities usually achieved using 3 – 5 distinct tools. With our unique, patent-pending SideScanning™ technology we’re providing 100% workload-deep coverage in minutes, using a one-time, read-only, impact-free integration process. And most importantly, we’re usually surfacing 3 – 4 orders of magnitude fewer critical alerts than competitive products. We do this by building a graph of your environment, prioritizing risk based not solely on the severity of underlying issues, but also taking into account their exposure and corresponding blast radius.
We, as an industry, have collectively learned that the lift and shift approach to the cloud is the wrong tactic. While it may work in the short term, the outcome is always suboptimal. The cloud is materially different from on-premise environments – and deserves better than iterating on agent based solutions that were never meant for the cloud. We’re here to provide that alternative.