Argon, an Israel-based company that provides solutions for securing the software development process, on Tuesday announced emerging from stealth mode.
The company has developed a solution that provides visibility, security and integrity capabilities to help DevOps and security teams ensure that their development environment has not been compromised.
Argon says its product enables organizations to secure their continuous integration/continuous delivery (CI/CD) pipeline by mapping tools, assets and user activity to provide visibility into their entire DevOps process and ensure that code has not been tampered with. The solution can be integrated with many popular software development tools.
The platform continuously monitors the customer’s environment to identify security risks, anomalies and misconfigurations. Identified issues are prioritized and remediation is automated in accordance with compliance rules and best practices.
The startup has raised more than $4 million in seed funding from Hyperwise Ventures and several cybersecurity angel investors.
“The way companies release software has evolved from a manual, controlled and timed process to one that is fully automated, distributed and complex,” said Eylam Milner, CTO of Argon. “Vendors deploy new code on a daily basis, and it’s irrational for them to expect their DevOps and security teams to protect their release pipelines without a dedicated solution.”
Related: DevSecOps Company apiiro Emerges From Stealth With $35 Million in Funding
Related: build.security Emerges From Stealth With Authorization Policy Management Platform
Related: 1Kosmos Emerges from Stealth Mode With $15 Million in Funding
Related: Online Infrastructure Security Firm Cyberpion Emerges From Stealth

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- US Charges 20-Year-Old Head of Hacker Site BreachForums
- Tesla Hacked Twice at Pwn2Own Exploit Contest
- CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
- Watch on Demand: Supply Chain & Third-Party Risk Summit Sessions
- TikTok CEO Grilled by Skeptical Lawmakers on Safety, Content
