Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Valence Emerges From Stealth to Address Business App Connectivity Risks

Another Israel-based cybersecurity startup has emerged from stealth mode. The company, Valence, claims to have developed a platform that leverages zero trust principles to help organizations manage risks associated with the connectivity between various business applications.

Another Israel-based cybersecurity startup has emerged from stealth mode. The company, Valence, claims to have developed a platform that leverages zero trust principles to help organizations manage risks associated with the connectivity between various business applications.

Valence emerged from stealth with $7 million in seed funding. The funding round was led by YL Ventures, with participation from several cybersecurity executives and serial entrepreneurs.

The company, founded by Yoni Shohet (CEO) and Shlomi Matichin (CTO), aims to provide a solution that can secure what it has named the Business Application Mesh, which represents SaaS and self-hosted business applications interconnected through APIs, SaaS marketplaces, and low-code/no-code development platforms such as Workato and Zapier.

Valence describes the Business Application Mesh as a “complex and ever-growing network of connections, automated business processes and data exchanges,” and says its goal is to address risks associated with third-party integrations and secure app-to-app connectivity.

The startup says this “shadowy connectivity” between business applications can lead to data exposure, misconfigurations, and supply chain attacks.

Once it’s deployed, the Valence platform maps the Business Application Mesh risk surface, and then continuously monitors it in an effort to identify malicious activity, misconfigurations, and other anomalies.

“Valence applies zero-trust principles to the Business Application Mesh, securing it while mitigating risk as it grows. It delivers comprehensive access visibility into the risk surface while identifying and mitigating the internal and third-party access risks associated with it,” the company explained. “Delivering quick, continuous and non-intrusive Business Application Mesh risk surface management, the platform streamlines collaboration between business application teams and enterprise IT security teams.”

Related: Application Security Posture Management Firm Enso Security Emerges From Stealth

Related: Application Security Startup ArmorCode Emerges From Stealth

Related: SaaS Security Company Grip Security Emerges From Stealth

Related: Neosec Emerges From Stealth With $20.7 Million in Funding

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

Microsoft making a multiyear, multibillion dollar investment in the artificial intelligence startup OpenAI, maker of ChatGPT and other tools.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Funding/M&A

Thoma Bravo will spend $1.3 billion to acquire Canadian software firm Magnet Forensics, expanding a push into the lucrative cybersecurity business.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.

Cybersecurity Funding

Forward Networks, a company that provides network security and reliability solutions, has raised $50 million from several investors.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.