hero

Join brilliant startups.

YL Ventures
YL Ventures
14
companies
48
Jobs
Powered by Getro
Showing 14 companies
Security
Software
51 - 200
Series B

Cycode is the industry’s first source code control, detection, and response platform. Its Source Path Intelligence engine seamlessly delivers comprehensive visibility into all of your code and automatically detects and responds to anomalies in its access, movement, and usage. With Cycode, organizations are “Secured to The Source”; its solution empowers security teams to rapidly and dramatically reduce the risk of source code loss without impacting developer access or productivity.

Professional Services
Security
11 - 50
Seed

Eureka is an Israeli startup offering holistic security across cloud data stores. The Eureka Cloud Data Security Posture Management platform enables security teams to successfully navigate the ongoing and often chaotic expansion and growth of cloud data.

Security
Software
51 - 200
Series B

Grip Security, the pioneer in SaaS security, brings the industry’s most comprehensive visibility across an enterprise’s entire SaaS portfolio – known or unknown for SaaS applications, users, and their interactions – with extreme accuracy and deployment in minutes

Security
Software
201 - 1000
Series C+

Hunters’ autonomous threat hunting solution detects cyberattacks that bypass existing controls in every IT environment. Hunters.AI extends threat detection and response across every attack surface – a capability increasingly known as ‘XDR.’ It ingests rich security telemetry and intelligence from a wide array of data sources and IT environments like cloud and network, and enriches threat signals with unique tactics, techniques and procedure-based (TTP) attack intelligence. It then applies ML and cloud-based analytics to correlate threat patterns, and provide high fidelity attack stories for cybersecurity team response. Learn more at: Hunters.AI.

Security
Software
Transportation
11 - 50
Series B

Karamba Security's patented software detects and prevents cyberattacks on a wide variety of connected devices and systems, including automotive ECUs, Industry 4.0 controllers, enterprise edge devices, and IoT endpoints. Karamba's security solutions are embedded within devices and work automatically, without any need for customer operation and with negligible performance impact.

Security
11 - 50

𝗢𝗽𝘂𝘀 is a singular, overarching Cloud Security Orchestration and Remediation platform, transforming the way remediation is conducted in the cloud. 𝗢𝗽𝘂𝘀 empowers cloud security teams to see beyond alerts and threats and gain control, knowledge, and capabilities to resolve them. 𝗢𝗽𝘂𝘀 integrates with existing security tools and orchestrates the entire remediation process across all stakeholders and organizational environments, based on tried-and-tested, easily-deployed guidelines and playbooks. Leveraging selective automation, 𝗢𝗽𝘂𝘀 knows when sensitive issues demand human involvement and allows automation to resolve the rest, cutting down the time from detection to mitigation and conserving valuable resources. Finally, 𝗢𝗽𝘂𝘀 provides security and business executives with immediate and tangible insights based on remediation metrics, with comprehensive visibility into the state of their risk. For more information on how to reimagine your remediation in the cloud, visit opus.security.

Legal
Professional Services
Security
Software
201 - 1000
Series C+

Cloud Security, Cloud Compliance, Vulnerability Management, AWS Security, Microsoft Azure Security, Google Cloud Platform Security. Orca’s cloud-native solution reads a company’s cloud configuration and can detect malware, misconfigurations, and other vulnerabilities. It was founded in 2019 and headquartered in Los Angeles, California.

Piiano
Piiano
1 jobs
Security
11 - 50
Seed

Piiano's mission is to fight data breaches and data exfiltration at the code level! We build developer infrastructure for data protection and compliance. You're always as good as your infrastructure. With the Piiano Vault, you can easily protect your most sensitive data assets (such as PII/PCI/PHI/KYC and documents). Our vault redefines how enterprises build and approach privacy and security by resolving the inherent risks of sensitive data handling. Thanks to our Code Analyzer, you can easily gain the compliance, visibility, and control your organization needs over sensitive customer data.

Data and Analytics
DeepTech
Hardware
Mobile, Platforms, and Apps
Software
Transportation
11 - 50
Series A

Ride Vision was created by technologists by day, motorbike riders by road, to give any motorcycle Predictive Vision. Ride Vision’s computer vision and neural network based CAT - Collision Aversion Technology leverages standard hardware and cameras to sense, predict and warn riders of threats on the road. Ride Vision can be incorporated into any new or traded motorbikes of any price range.

Security
51 - 200
Series A

Satori Cyber’s Secure Data Access Cloud helps organizations maximize their data-driven competitive advantage by removing barriers to broad data access and usage while ensuring security, privacy, and compliance. The Satori Cyber Secure Data Access Cloud provides: - Continuous visibility and mapping for data flows and data stores - Activity-based discovery and classification of data in real-time - Data security through granular, field-level data access controls and anomaly detection - Compliance through continuous monitoring and enforcement of data privacy policies - Seamless integration into any cloud or hybrid environment without impacting existing user and application access

Spera
Spera
1 jobs
Security
11 - 50
Seed

Prevent account takeovers, stolen credentials, and phishing attacks with Spera: The first comprehensive Identity Security Posture Management platform that acts as a force multiplier for identity teams - helping detect, prioritize, and remediate identity-driven breaches.

Security
Software
11 - 50
Series A

Valence Security is the first Business Application Mesh security company focused on managing the risks from third-party integrations and securing app-to-app connectivity.