Cybersecurity Funding

No-Code Security Automation Company ContraForce Emerges From Stealth

McKinney, Texas-based security automation and compliance solutions provider ContraForce on Tuesday announced emerging from stealth mode with $2 million in seed funding from cyber foundry DataTribe.

<p><strong><span><span>McKinney, Texas-based security automation and compliance solutions provider ContraForce on Tuesday announced emerging from stealth mode with $2 million in seed funding from cyber foundry DataTribe.</span></span></strong></p>

McKinney, Texas-based security automation and compliance solutions provider ContraForce on Tuesday announced emerging from stealth mode with $2 million in seed funding from cyber foundry DataTribe.

ContraForce has developed a no-code security automation platform that is designed to help small and medium-sized businesses that might not have a dedicated security team detect threats and respond to them without having to write complex detection code.

ContraForce says customers can easily integrate any security data source and create playbook response workflows. The platform orchestrates detection and provides a visualization of the attack.

The company was founded by Stan Golubchik, who serves as CEO, and Ricky Melendez, CTO. They both previously worked at Armor and McAfee.

“By providing a sort of security and compliance ‘easy button’, ContraForce is filling a really significant gap,” said John Funge, managing director at DataTribe. “Just because an organization is small does not mean that it does not possess vital data, IP, or access to strategic networks. It is paramount that smaller organizations overcome the resource barriers to robust security. ContraForce’s unique approach dramatically lowers these barriers.”

Related: Low Code/No Code App Security Firm Zenity Emerges From Stealth

Related: Threat Monitoring Firm FYEO Announces Acquisition as It Emerges From Stealth

Related: Gravwell Emerges From Stealth With Data Fusion Platform for Security Teams

Advertisement. Scroll to continue reading.

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version