Client-side web security provider Source Defense this week announced raising $10.5 million in a Series A+ funding round.
Founded in 2014, the company provides a website security solution aimed at delivering real-time protection against attacks originating at website supply-chain vendors.
The company says it can keep sites safe from third-party scripts such as Magecart and Formjacking attacks, thus helping businesses and government organizations alike avoid interruptions.
The company’s VICE Client-side Web Security Platform leverages machine learning and industry best practices to deliver a fully automated solution to control access and permissions of various dynamic components on a website.
Source Defense says it will use the new funding to accelerate growth and improve its platform to better meet growing demand on the market.
Over the past 12 months, its sales more than tripled, and the company expanded its research and development team, established partnerships, and added more people to its executive team.
“The demand for combining premium online shopping experience with the state-of-the-art security controls has proved an urgent need for our solution,” said Source Defense CEO Dan Dinnar. “Our success with several Fortune 500 companies, including a most recent deployment at a Fortune 50 company is proof of the value we can provide industry leaders, in view of rampant activity by attackers.”
The new funding round added Capital One Ventures as an investor, but also saw participation from existing investors JVP, Allegis Cyber, Global Brain, and NightDragon.
Related: Data Governance Startup Okera Raises $15 Million in Series B Funding
Related: Data Privacy Firm Privitar Raises $80 Million in Series C Funding Round
Related: IoT Security Firm Ordr Increases Funding to $50 Million

More from Ionut Arghire
- Vulnerabilities in OpenEMR Healthcare Software Expose Patient Data
- Russia-Linked APT29 Uses New Malware in Embassy Attacks
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- 820k Impacted by Data Breach at Zacks Investment Research
- US Government Agencies Warn of Malicious Use of Remote Management Software
Latest News
- Russian Millionaire on Trial in Hack, Insider Trade Scheme
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Vulnerabilities in OpenEMR Healthcare Software Expose Patient Data
- Russia-Linked APT29 Uses New Malware in Embassy Attacks
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- The Effect of Cybersecurity Layoffs on Cybersecurity Recruitment
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
