California-based company Cerby on Monday announced that it has emerged from stealth mode with a security platform for unmanageable applications, as well as $12 million in seed funding.
Cerby aims to provide a solution that creates a balance between allowing employees to use the applications they need to do their job and the enterprise being able to address shadow IT risks and secure its systems.
The company has commissioned a survey of 500 business professionals in North America and the UK. The study found that a vast majority of respondents want to have full control over the applications they use for work-related purposes, and 51% said they have continued using preferred applications even after they were specifically banned by their employer.
Cerby wants to address this problem with a platform that can help organizations secure their systems while enabling employees to use the applications they need.
Employees can register their own applications and the platform helps ensure they are securely configured and that they don’t violate any security policies.
Cerby was founded by Belsasar Lepe (CEO) and Vidal González (CTO), and it has been operating in stealth mode since 2020. It claims several major companies, including Fox and L’Oréal, have been using its solutions.
Cerby has raised $12 million in seed funding from Ridge Ventures, Bowery Capital, Okta Ventures, Salesforce Ventures and others. This investment brings the total raised by the firm to $15.5 million.
Related: Application Security Firm ShiftLeft Raises $29 Million
Related: Web Application Security Firm Source Defense Raises $27 Million
Related: Application Security Company ArmorCode Raises $8 Million
Related: Application Security Firm ForAllSecure Raises $21 Million

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- Intel Co-founder, Philanthropist Gordon Moore Dies at 94
- Google Leads $16 Million Investment in Dope.security
- US Charges 20-Year-Old Head of Hacker Site BreachForums
- Tesla Hacked Twice at Pwn2Own Exploit Contest
- CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
