Security Experts:

Connect with us

Hi, what are you looking for?


Application Security

Adaptive Shield Raises $30M for SaaS Security Posture Management

Adaptive Shield, an Israeli cybersecurity startup that specializes in software-as-a-service (SaaS) application security, on Tuesday announced the closing of a $30 million Series A funding round to expand operations around the world.

Adaptive Shield, an Israeli cybersecurity startup that specializes in software-as-a-service (SaaS) application security, on Tuesday announced the closing of a $30 million Series A funding round to expand operations around the world.

The latest investment was led by Insight Partners with participation from Okta Ventures and previous lead investor Vertex Ventures.

Adaptive Shield, the brainchild of ex-Proofpoint cloud research expert Maor Bin, came out of stealth one year ago with technology to automate the security of SaaS applications scattered throughout enterprise networks.

The Tel Aviv, Israel-based startup sells technology that automates the management of SaaS applications to pinpoint misconfigurations and other basic errors that expose organizations to major data breaches.

[ READ: Adaptive Shield Emerges From Stealth to Secure SaaS Applications ]

In an interview with SecurityWeek, Adaptive Shield CEO Maor Bin said the company has gained traction with large enterprises that typically deploy multiple SaaS applications at scale. “We’re doing very well with Fortune 500s that deploy 80 SaaS applications, on average. We’re exceeding targets and seeing huge growth.”

Bin said CISOs are desperate for reliable tools to continuously monitor SaaS applications like Salesforce, Office 365, GitHub, Slack and Zoom for the types of misconfigurations targeted by malicious hackers.

“Expecting security teams to stay on top of SaaS Security misconfigurations without a proper SSPM solution in place is like expecting a bodyguard to protect an invisible person,” Bin said.

He argued that “deep visibility and continuous maintenance” of SaaS security hygiene have become crucial parts of security programs globally. 

Bin said Adaptive Shield’s flagship SSPM Suite supports more than 50 software-as-a-service applications with plans to triple this over the next year.

He said the company’s technology has been engineered “as a SaaS that integrates with SaaS,” an advantage that means the product can be set up and running live within minutes in a large enterprise. 

Once in place, the technology provides visibility — and continuous observability —  into an organization’s entire SaaS ecosystem, sending detailed alerts at the first sign of a security misconfiguration and proactively fixing these for all global settings and user privileges.  

Related: Adaptive Shield Emerges From Stealth to Secure SaaS Applications 

Related: GreyNoise Raises $4.8 Million in Seed Funding to Combat Alert Fatigue

Related: The Race to Find Profits in Securing Email

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


The North Korean APT tracked as TA444 is either moonlighting from its previous primary purpose, expanding its attack repertoire, or is being impersonated by...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.