Four startups for hot network security with powerful multicloud solutions


Networking is a challenge for modern businesses that rely on cloud-native technologies, and network security is particularly difficult in multicloud environments. In this article, we’ll look at four startups that have recently raised funding and are doing everything they can to secure the network structure of organizations large and small.


GreyMatter is ReliaQuest’s main product. It brings together security data across SIEM, endpoints, cloud and applications. It can get overwhelming with data from these many sources, but GreyMatter promises ease of use along with its powerful integration capabilities.

The challenge with complex networks is to identify a security gap at an early stage. With the number of moving parts to be monitored and the large amount of data, detecting threats is illusory. GreyMatter specializes in threat detection. It performs intrusion detection which looks for new personal devices and new users to connect to the network. Firewalls are also checked for weaknesses. The advantage of collecting a large pool of security data from various sources is that GreyMatter can identify vulnerabilities more quickly. In fact, GreyMatter enables real-time network security that can detect and remediate threats as soon as they occur.

GreyMatter simulates attacks to test a company’s security controls and help them build a better security situation. These “hunts” are conducted using machine learning to automate and scale security scanning. It would be a relief for his customers to finally be on the other side of the hunt, where they switch roles from being hunted to being hunter. This proactive approach is required for state-of-the-art security today.

ReliaQuest relies not only on ML, but also on a human team of security experts who augment the algorithms at work. This would allow them to apply the learning to all customers so that everyone benefits from the knowledge gained.

GreyMatter can fight modern threats for which traditional network security tools are not equipped. For example, it can detect abnormal network traffic, which can help identify problems like cryptomining. These are new types of threats that will surprise even security professionals. With a robust network security and threat detection solution like ReliaQuest, organizations can rest assured that they are exposed to such attacks.

ReliaQuest is on a high growth path and has just received $ 300 million to support its expansion efforts.

128 technology

128 Technology innovates in networking, and security is an important part of their mission to modernize connectivity. 128 Technology believes that software-based routers (not physical routers) are key to transforming network security today.

128 Technology sees that the network has changed dramatically due to the changes in applications, resources, and user consumption. Applications are microservice-based and container-controlled. The resources are distributed across multiple public clouds and also across physical data centers. Users now access apps and data through mobile devices, edge devices, and an integrated network of applications.

With all this change, the network should have followed suit. Unfortunately, network and network security are still hardware-based. Network security is still perimeter based and out of date. Current virtual networks are based on VPNs, which have the same limitations as physical routers. They are not sufficient to secure networks that cover today’s multicloud, mobile and edge use cases.

Instead, 128 technology offers a better alternative – Smart Session Routing technology. This is a software-centric approach to routers that is meant to be cloud-native, software-driven, elastic, mobile-first, and experience-based. 128 Technology focuses on sessions, which are defined as the “temporary association between a user and an experience”. Every interaction of a user with a software system can be viewed as a session. This includes activities like a click, call, or download – all sessions. They create experiences for users.

In terms of security, 128 Technology enforces security policies based on the router. They call it Secure Vector Routing. It tracks the unique path of every session on a network and communicates with the server that powers the session. This approach includes hop-by-hop authentication, selective encryption, and granular segmentation. The main difference to conventional network security is that it is not only integrated into the scope but also into the network structure.

128 Technology has just raised $ 30 million in Series D funding and is already attracting customers looking for a trustless security solution.

Scope 81

Perimeter 81 points out the inadequacy of physical appliances to secure today’s cloud-based networks. Older network hardware is location-based and cannot be adequately scaled or secured.

Perimeter 81 counteracts this with its SaaS service for network security, which focuses on medium-sized companies. Perimeter 81 manages the routing of traffic through secure IPSec tunnels. The software-defined perimeter (SDP) ensures one-to-one access between the user and the resources he wants to access, making the rest of the system invisible in every session.

Perimeter 81 promises no-touch onboarding that enables companies to deploy a secure network in less than 15 minutes. Once the network is provisioned, ops teams can manage the network in the Perimeter 81 SaaS app.

Perimeter 81 deals with the need to operate secure multicloud networks as well. It securely connects multiple public cloud services and brings visibility to the traffic that flows between these clouds.

Perimeter 81 has patented WiFi security features that focus on securing remote user access over unsecured WiFi networks. This is very important for today’s remote work environment. Two-factor authentication is also treated as an additional security measure.

The main goal of Perimeter 81 is to get companies that rely on hardware-based solutions to work comfortably in software-defined network stacks. It has a tight-knit solution that does this well and its main function is to secure communication between just the user and the server being accessed at any given time.

Perimeter 81 recently raised $ 40 million in Series D funding, demonstrating investor confidence in its approach to network security.


Cycognito takes a completely external approach to securing networks. It thinks like an attacker and simulates what he would do to find critical vulnerabilities in a company’s network.
Cycognito knows that attackers are looking for the path of least resistance when targeting an organization. They identify a handful of critical vulnerabilities that allow them to access a company’s data. Cycognito can find out what these critical attack methods are and give organizations an attacker’s view of their system.

Cycognito describes what they do as “eliminating shadow risks”, evaluating unknowns in relation to an organization and exposing critical risks. To do this, they first identify the IP address, server, SSL certificates, logos and other “fingerprints” of an organization that are unique to the organization. Then a mathematical diagram is made of all objects related to the organization but not owned by the organization. For example, an affiliate can use the company logo and IP for completely legitimate purposes and they will not be flagged as suspicious. However, if Cycognito discovers that an unidentified source has the unique “fingerprints” of an organization, it is flagged as suspicious and the organization is asked to protect its system from this threat.

Cycognito uses this data to carry out attack simulations and can give CIOs and CISOs a very real overview of their security situation from the outside in. They do not believe in the reduction of the attack surface, but in the elimination of the few critical attack methods that are externally visible. This reduces data congestion for security professionals and enables companies to make network security more strategic.

Cycognito recently raised $ 30 million in Series B funding.

The cloud is complicated, and much of the complication lies in the network layer. Fortunately, companies with innovative network security startups like ReliaQuest, 128 Technology, Perimeter 81, and Cycognito now have a good chance of outsmarting their seedy opponents.

Selected image: Pixabay

Post Views:

EzoicReport this ad