Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

DoControl Emerges From Stealth With SaaS Security Platform

DoControl emerged from stealth mode on Monday with an automated data access controls platform for SaaS applications, and more than $13 million in funding.

DoControl emerged from stealth mode on Monday with an automated data access controls platform for SaaS applications, and more than $13 million in funding.

The company was founded in 2020 and it’s headquartered in New York City. It raised $3.35 million in seed funding and it recently raised another $10 million in a Series A funding round led by RTP Global, with participation from StageOne Ventures, Cardumen Capital and CrowdStrike’s early stage investment fund, Falcon Fund.

DoControl says it will use the money for its go-to-market strategy and accelerating global expansion. The firm plans on hiring people for its sales, marketing and R&D departments.

DoControl has developed a platform designed to provide data access monitoring, orchestration, and remediation for important SaaS applications, including BambooHR, Box, Google Drive, GitHub, Jira, OneDrive, Salesforce, and Slack.

The platform provides asset management and security policy enforcement capabilities, and it also includes Slack and Microsoft Teams bots that engage with end-users on behalf of IT or security teams for self-service remediation guidance in the case of data leakage, malicious activity and human errors.

“In the last 10 months, the DoControl team has created a category-defining product that helps organizations prevent data breaches by balancing security with business enablement on the world’s most popular SaaS applications. Equally important, we have strongly invested in our security & compliance program to protect our customers’ data at best practice,” Adam Gavish, DoControl co-founder and CEO, said in a blog post on Monday.

Gavish, an Israeli military intelligence veteran, previously served at Google Cloud Cybersecurity, Amazon Consumer Payments, eXelate, and Skyfence.

Related: SaaS Application Backup Firm Rewind Raises $15 Million

Related: Adaptive Shield Emerges From Stealth to Secure SaaS Applications

Related: SaaS Security Platform Provider ReliaQuest Raises $300 Million

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.