Axonius, a well entrenched player in the attack surface management space, has banked another $200 million in late-stage funding from a roster of major investors.
The company, which has roots in Israel, described the financing as a Series E extension led by existing investors Accel and Lightspeed Venture Partners. Growth equity firm Stripes also took an equity position.
Axonius said the new funding round comes as it hit the $100 million ARR (annual recurring revenue) benchmark and will be used to accelerate innovation and scale across the globe.
Axonius has raised approximately $600 million since 2017 and is considered one of cybersecurity’s so-called unicorns with a valuation of $2.6 billion.
The company has built and marketed a cybersecurity asset management product capable of providing full inventory of all digital assets and the connections to people and projects in the workplace., their relationships, and business-level context.
Axonius said its product touches multiple pain points – Cyber Asset Attack Surface Management (CAASM), SaaS Security Posture Management (SSPM), and SaaS Management Platforms (SMP) – with more than 1,000 platform integrations to help identify security gaps, risk, misconfigurations and cost inefficiencies.
“[We’ve gone] from zero revenue to exceeding $100 million in ARR in just 4.5 years, making us one of the fastest growing cybersecurity companies,” said Dean Sysman, CEO and Co-founder at Axonius.
Sysman said corporate defenders at more than 500 hundred organizations use Axonius tools to manage the sprawl of devices, users, software, SaaS applications and cloud services.
“We provide a system of record for all their digital infrastructure so they can quickly mitigate threats, navigate risk, automate action, and inform business-level strategy,” Sysman added.
Related: Axonius Valued at $2.6 Billion After New $200 Million Funding Round
Related: IT Asset Management Firm Axonius Raises $100 Million
Related: Attack Surface Management Firm Axonius Raises $13 Million
Related: Axonius Uses Existing Tools to Find, Secure Devices
Source: Original Post
“An interesting youtube video that may be related to the article above”