Security Experts:

Connect with us

Hi, what are you looking for?


Cloud Security

Cloud Data Security Startup Theom Emerges From Stealth With $16 Million in Funding

Cloud data security company Theom has emerged from stealth mode with an oversubscribed $16.4 million seed funding round.

Cloud data security company Theom has emerged from stealth mode with an oversubscribed $16.4 million seed funding round.

The investment was led by Ridge Ventures and Microsoft’s M12 venture fund, and it will help the company expand its cloud data security solution.Theom cloud data security

Founded by former executives from Google, Cisco and Yahoo, Theom has developed a product designed to help organizations secure data in the cloud and SaaS data stores.

The company’s platform inventories data, prioritizes identified risks based on data value and who has access to it, and ensures that security controls follow the data when it’s stored, moved, copied or transacted.

“Theom’s approach to cloud data security takes inspiration from how the Secret Service protects high-value assets– the president and VIPs,” said Navindra Yadav, CEO and co-founder of Theom.

“Theom ensures controls follow the data like a bodyguard – just like the Secret Service bodyguards do – by identifying high-value assets, assessing risks continuously, ensuring that protection always follows, and adapting the security as environments change,” Yadav added.

Related: Eureka Emerges From Stealth With Cloud Data Security Platform

Related: Cloud Data Security Firm Dig Emerges From Stealth With $11 Million in Funding

Related: Data Protection and Privacy Firm Titaniam Raises $6 Million in Seed Funding

Related: Data Security Firm Sotero Raises $8 Million in Seed Funding

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Data Protection

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.


More than 450 cybersecurity-related mergers and acquisitions were announced in 2022, according to an analysis conducted by SecurityWeek


Twenty-one cybersecurity-related M&A deals were announced in December 2022.