SphereX, an Israeli cybersecurity startup, raised $8.2 million in Seed funding and launched SphereX Protect, the company’s advanced security solution for smart contracts. And Sweet Security, which was founded by three former senior ranking IDF officers who served in intelligence positions, raised $12 million in Seed funding and also launched its cloud runtime security suite.
SphereX boasts that its smart contract is backed by powerful ML engines and behavioral analysis of the protocol and is deployed and integrated into its customers’ protocols. SphereX blocks 0-day exploits and malicious transactions while approving legitimate transactions, preventing devastating hacks and loss of funds while preserving protocol continuity.
The firm says that its SphereX Protect is a smart contract that protects other smart contracts at runtime. By conducting off-chain ML analysis of contract’s behaviors and uploading safe behavioral patterns on-chain, SphereX Protect automatically detects and reverts suspicious transactions before they are finalized, while maintaining the contract’s continuity.
Will you offer us a hand? Every gift, regardless of size, fuels our future.
Your critical contribution enables us to maintain our independence from shareholders or wealthy owners, allowing us to keep up reporting without bias. It means we can continue to make Jewish Business News available to everyone.
You can support us for as little as $1 via PayPal at [email protected].
Thank you.
Sweet Security was founded by retired Brigadier General, Dror Kashti, former CISO of the Israel Defense Forces (IDF), retired Colonel, Eyal Fisher, former head of the Cyber Department at Unit 8200 and Orel Ben-Ishay, former Head of the Cybersecurity R&D center at Unit 81.
Sweet Security says that its Cloud Runtime Security Suite enables CISOs and security teams to level up their cloud security from partial to complete defense. Providing robust defenses across all stages of an attack, its feature set includes Detection & Response, Discovery and Prevention – all in runtime. Sweet’s runtime sensor takes under five minutes to deploy, immediately providing cloud-native cluster visibility. It streams key application data and business logic to its servers, using an innovative framework to profile workload behavior anomalies and contextualize them with traditional TTPs.
“‘Cybersecurity’ and ‘delightful’ are not words that normally go hand in hand, but we want our customers to use them in the same sentence when talking about our solution,” said Dror Kashti, co-founder and CEO, Sweet Security. “We feel our timing is right to make that happen. If SOC and IR teams don’t have to constantly tune their security products or sift through mountains of alerts, they’ll execute at a higher level, and they’ll be happier. Cloud detection and response may be complex, but it doesn’t have to be painful.”