Security Experts:

Connect with us

Hi, what are you looking for?


Application Security

Software Development Security Firm Argon Emerges From Stealth Mode

Argon, an Israel-based company that provides solutions for securing the software development process, on Tuesday announced emerging from stealth mode.

Argon, an Israel-based company that provides solutions for securing the software development process, on Tuesday announced emerging from stealth mode.

The company has developed a solution that provides visibility, security and integrity capabilities to help DevOps and security teams ensure that their development environment has not been compromised.

Argon says its product enables organizations to secure their continuous integration/continuous delivery (CI/CD) pipeline by mapping tools, assets and user activity to provide visibility into their entire DevOps process and ensure that code has not been tampered with. The solution can be integrated with many popular software development tools.

The platform continuously monitors the customer’s environment to identify security risks, anomalies and misconfigurations. Identified issues are prioritized and remediation is automated in accordance with compliance rules and best practices.

The startup has raised more than $4 million in seed funding from Hyperwise Ventures and several cybersecurity angel investors.

“The way companies release software has evolved from a manual, controlled and timed process to one that is fully automated, distributed and complex,” said Eylam Milner, CTO of Argon. “Vendors deploy new code on a daily basis, and it’s irrational for them to expect their DevOps and security teams to protect their release pipelines without a dedicated solution.”

Related: DevSecOps Company apiiro Emerges From Stealth With $35 Million in Funding

Related: Emerges From Stealth With Authorization Policy Management Platform

Related: 1Kosmos Emerges from Stealth Mode With $15 Million in Funding

Related: Online Infrastructure Security Firm Cyberpion Emerges From Stealth

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.


More than 450 cybersecurity-related mergers and acquisitions were announced in 2022, according to an analysis conducted by SecurityWeek


Twenty-one cybersecurity-related M&A deals were announced in December 2022.