{"_id":"9A3uNxYvzrXcVbKLb08A1OhfCDaDyKC63BoYYk4PZ4sNOH4Mp8qKHh","lastupdate":"2024-04-17T00:00:00.000Z","update_date":"2024-04-17T00:00:00.000Z","lastModified":"May 26, 2025","active":1,"confidence_score":81,"confidence_score_reason":"sector, video or image, markets, not claimed","urlname":"vorlon-technologies","minimal_profile":null,"status":"","fullstatus":"","acquired":null,"hide_reason":null,"hide_reason_data":null,"hide_reasons":[{"id":"8257rxn4P8EFQOmS5hAAauHyYMhhxrA5u6yWX4XUShpybX3AMNo3Y9","reason":"Pending approval - External entity"},{"id":"aOIaOiiqfpA8UMw6VCTh8ueRmkG3lzDy1NGqEOaJbe11OrCzMTCCd6","reason":"The company is a service provider"},{"id":"ddgjKuc3GgH8E5UehSVJviRl471BCajL1plO8HtGoOojy2NivYqQ7x","reason":"Owner asked to delete"},{"id":"EjOKM211H1ira9J63oaGPuUxvr7Oba55TZo3NWsFO5uhbNu7o4x4zD","reason":"The company is not Israeli"},{"id":"J7fQJtnT3GdWWSE3MD8rzaW65LJ4jEIKxSZnneQiReONdZjG3zIqWe","reason":"Owner asked to hide in the meantime"},{"id":"NxlAC3ReFb5ksiYNLp2FnUyluoJzwRCYfcF7xpTZaPM53SdWQ5kv0B","reason":"Pending approval"},{"id":"RhC1tlwXzioK0MfzBII3H2wepEfQOfKVktmdwqeqTJjGi3ZaBWUqZo","reason":"The company is not innovative"},{"id":"S0Ed46vNI6vZYVxLedANWGjas23K6hY0QdsCtiGYL7lshqIEdLV3sA","reason":"The company ceased operations in Israel"},{"id":"VTANq7bEvlsEcPjp0ghelXfShaCosgndONGjgU730aAOxXtaDIF5j3","reason":"This is a product of an existing company"}],"type":"Startup","logokey":"$FrdKYjNvY0FPHMCihbzd3qGWbXQ16gscp7uTbvJKjOXadmBb1AZeHf","name":"Vorlon Technologies","oneliner":"AI-driven Platform Manages API Attack Surface","registrar":"516656626","website":"https://vorlon.io","careerspage":"https://vorlon.iocareers","founded_month":7,"founded_year":2022,"formernames":[],"sociallinks":{"twitter":"","youtube":"https://www.youtube.com/channel/UCFRjhB_Myo7ERpatGvnUHmQ","facebook":"","linkedin":"https://www.linkedin.com/company/93649070","instagram":""},"social":["https://www.youtube.com/channel/UCFRjhB_Myo7ERpatGvnUHmQ","https://www.linkedin.com/company/93649070"],"flattenedsociallinks":"https://www.youtube.com/channel/UCFRjhB_Myo7ERpatGvnUHmQ|https://www.linkedin.com/company/93649070","apps":{"appstore":"","googleplay":""},"is_claimed_by_owner":null,"employees":"11-50","employees_exact":26,"patent":null,"raised":15700000,"stage":"A","public_stage":"A","primary_sector_key":"agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","primary_sector":"Cyber Security","alternativenames":null,"about":"Vorlon has developed a way to quickly analyze third-party applications. Complete with detection, threat intelligence, and remediation capabilities, Vorlon enables security teams to significantly reduce the window of opportunity attackers have to exploit risks posed by third-party applications.","climatetech_description":null,"is_climatetech_relevant":null,"phone":null,"country":null,"address":{"israeli":[{"id":"UEpUbTc33ik62CagUrVvVMQS6g0T1vJuSQltDwnQApImlePxG8KvrK","city":"Tel Aviv-Yafo","type":null,"address":"Tel Aviv-Yafo, Israel","placeid":"ChIJH3w7GaZMHRURkD-WwKJy-8E","notactive":null,"openeddate":null,"registrarid":null,"firstrdcenter":null,"registrarname":null}],"officesabroad":[{"id":"kIHCkV3FQQYCEcdTth4bZ3ei0KIYqOCCvwyWoQbENPkS6HeQHc22gx","city":"Mountain View","address":"Mountain View, CA, USA","country":"United States","placeid":"ChIJiQHsW0m3j4ARm69rRkrUF3w"}]},"headquarter_address":null,"district":"Center District","news":[{"id":"K7tetHA00m6ASAAm4jZwJJO5ojbHqfQf3nLKmWcfo3bfyJk56qK823","date":"Apr 15, 2025","link":"https://www.globenewswire.com/news-release/2025/04/16/3062609/0/en/Vorlon-s-DataMatrix-Cracks-Open-Black-Box-of-SaaS-Ecosystem-Security-to-Eliminate-Blind-Spots.html","source":"www.globenewswire.com","visible":1,"analysis":{"tags":"SaaS security","round":null,"company":"Vorlon","layoffs":null,"summary":"Vorlon has introduced its patent-pending DataMatrix™ technology, which enhances SaaS security by providing visibility into API data flows and enabling real-time threat detection and response. This innovation addresses significant gaps in current SaaS security solutions, which often fail to monitor API connections and distinguish between human and machine activities. Vorlons platform unifies various security measures, offering a comprehensive solution for managing SaaS ecosystems. The companys approach is supported by Accel and is trusted by Fortune 500 companies. Vorlon will showcase its technology at the RSA Conference 2025.","partners":null,"customers":"ThoughtSpot","eventType":null,"investors":"Accel","confidence":9,"key_topics":["SaaS security","API visibility","DataMatrix","Threat detection","AI-driven"],"date_of_event":"April 16, 2025","product_stage":"released","investment_date":null,"acquired_company":null,"valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Product Stage","Partners"],"acquisition_amount":null,"FDA approved/pending approval":null,"AI technology developing/using":"using","structuredIssuesShow":"#Product Stage  #Partners","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"aLg4SzOXdErwAvesAQj5fD02VLhNc5dWuOg4yuB3i3nRhuqai5gFV2","news_summary":"Vorlon’s DataMatrix™ Cracks Open ‘Black Box’ of SaaS Ecosystem Security to Eliminate Blind Spots","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"j34vLUlw1hFjMdp4z7tSeLsNq20vt4I55wIQW8WLXwDVfrfR4Nlc7w","date":"Apr 17, 2024","link":"https://techcrunch.com/2024/04/17/cybersecurity-startup-vorlon-funding-api-breach","source":"techcrunch.com","visible":1,"analysis":{"tags":"Cybersecurity, Investment","company":"Vorlon","layoffs":"Not mentioned","summary":"Cybersecurity startup Vorlon has raised $15.7 million in a Series A funding round to improve its technology that protects businesses data from API abuse. The funding round was led by Accel, with participation from Shield Capital and cybersecurity angel investors. Vorlons platform analyzes network traffic to detect and remediate potential API abuse in real-time. The company, founded in 2022 by former Palo Alto Networks executives, uses AI to analyze and map all the API communication it monitors and translate it into human-readable language. Vorlon counts SafeBreach and presales engineering platform Vivun among its early customers.","partners":"Not mentioned","customers":["SafeBreach","Vivun"],"investors":["Accel","Shield Capital","Demisto co-founders Slavik Markovich, Rishi Bhargava, Dan Sarel and Guy Rinat","Former Exabeam CEO Nir Polak","Fox Corporation CTO Paul Cheesborough"],"confidence":9,"key_topics":["API Security","Investment","Customer Acquisition","Expansion","AI Technology"],"date_of_event":"Not mentioned","valuation_amount":"Not mentioned","impact_on_company":"growth-positive","investment_amount":"$15.7 million","structured_issues":["Investment","Customers","Expand"],"acquisition_amount":"Not mentioned","structuredIssuesShow":"#Investment  #Customers  #Expand","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"C43C3zlIGlun8ADWq6sko1LbeYegNkSP2xEF2Vir5MatD1Dvz73cs7","news_summary":"Vorlon is trying to stop the next big API breach | TechCrunch","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"}],"newsNumber":2,"techcommunityinvolvement":null,"mediagallery":[],"tags":["application-security","threat-intelligence","cyber-security"],"classificationIDs":["agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1wekIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA"],"technologysuccessstory":null,"usecases":[{"id":"2hgzoztpJB1Vo8Ob4nASxBBjFeaE3mieNEZVMyAyhpX7xLC0odX16K","link":"https://vorlonsecurity.com/use-cases/third-party-detection-and-response","name":"Third-Party Detection and Response","ai_analysis":{"Confidence":0.9,"created_at":"2025-07-22T18:35:00.559Z","Revenue Growth":2,"Risk Mitigation":5,"Industry Vertical":"Cybersecurity","ready_for_display":true,"Talent Development":2,"Agility & Innovation":4,"Customer Acquisition":3,"Operational Efficiency":3,"Short Solution Description":"Vorlon Technologies' Third-Party Detection and Response platform continuously monitors and identifies security risks (vulnerabilities, misconfigurations, data exposure) within an organization's third-party software ecosystem to enhance security posture and compliance."}},{"id":"39roHB5eFYpcb2godYihwZGwHExDdTNARdzMCvHxbs4A6zq9tVVL1m","link":"https://vorlonsecurity.com/use-cases/supply-chain-security","name":"Supply Chain Security","ai_analysis":{"Confidence":0.9,"created_at":"2025-07-22T18:38:47.705Z","Revenue Growth":2,"Risk Mitigation":5,"Industry Vertical":"Software & Cybersecurity","ready_for_display":true,"Talent Development":3,"Agility & Innovation":4,"Customer Acquisition":3,"Operational Efficiency":4,"Short Solution Description":"Vorlon Technologies provides software supply chain security solutions, focusing on open-source risk management, SBOM generation, vulnerability detection, and compliance to secure the software development lifecycle."}},{"id":"GFm1dF49XTbqouJn89MiU3t4lFM8sMW4fphpa3CLsLYYpbwzrvSw7d","link":"https://vorlonsecurity.com/use-cases/secrete-lifecycle-management","name":"Secret Lifecycle Management","ai_analysis":{"Confidence":0.9,"created_at":"2025-07-22T19:53:42.386Z","Revenue Growth":2,"Risk Mitigation":5,"Industry Vertical":"Cybersecurity","ready_for_display":true,"Talent Development":3,"Agility & Innovation":4,"Customer Acquisition":2,"Operational Efficiency":4,"Short Solution Description":"Vorlon Technologies' Secret Lifecycle Management solution automates the creation, rotation, and revocation of sensitive credentials (secrets) to prevent breaches, ensure compliance, and streamline security operations across an organization's infrastructure."}},{"id":"LdeVlEkGaSshw2VNwoiQH7GSlRRQ9JrF8QIcd0txFdHsBoaTNHDd8e","link":"https://vorlonsecurity.com/use-cases/third-party-api-protection","name":"Third-Party API Protection","ai_analysis":{"Confidence":0.9,"created_at":"2025-07-22T20:19:26.212Z","Revenue Growth":3,"Risk Mitigation":5,"Industry Vertical":"Cybersecurity","ready_for_display":true,"Talent Development":2,"Agility & Innovation":4,"Customer Acquisition":3,"Operational Efficiency":4,"Short Solution Description":"Vorlon Technologies provides a solution for discovering, monitoring, and securing third-party API integrations, preventing data breaches, unauthorized access, and compliance risks associated with these external connections."}},{"id":"O3TrFCoNoeqohkAiBO69xXARJmq7JBdDmjd4b7QXdNVHynaVNisuI2","link":"https://vorlonsecurity.com/use-cases/compliance-corner","name":"Compliance","ai_analysis":{"Confidence":0.9,"created_at":"2025-07-22T20:29:07.772Z","Revenue Growth":3,"Risk Mitigation":5,"Industry Vertical":"Cybersecurity & Compliance","ready_for_display":true,"Talent Development":3,"Agility & Innovation":4,"Customer Acquisition":3,"Operational Efficiency":4,"Short Solution Description":"Vorlon Security offers a continuous security validation and compliance platform that automates security testing, provides real-time visibility, and helps organizations maintain a strong security posture to meet regulatory requirements."}},{"id":"nu9luu3Du0RPIGwWj3X0FdsPjFQM1mAj1t1xSnJ2CQFlw7Sut8Jx7n","link":"https://vorlonsecurity.com/use-cases/attack-surface-reduction","name":"Attack Surface Reduction","ai_analysis":{"Confidence":0.95,"created_at":"2025-07-22T22:30:49.734Z","Revenue Growth":2,"Risk Mitigation":5,"Industry Vertical":"Cybersecurity","ready_for_display":true,"Talent Development":2,"Agility & Innovation":4,"Customer Acquisition":3,"Operational Efficiency":3,"Short Solution Description":"Vorlon Technologies' Attack Surface Reduction solution identifies, prioritizes, and remediates vulnerabilities and misconfigurations across an organization's digital assets (cloud, SaaS, on-premise, code) to minimize potential entry points for attackers through continuous monitoring and proactive security measures."}}],"businessmodels":["B2B"],"productstage":"R&D","products":[],"geomarkets":[],"targetmarkets":[],"marketcapital":null,"marketcapitaldate":null,"funding":{"investors":2,"lastfunding":"$15.7M","totalrounds":2,"fundingstage":"A","totalfunding":"$15.7M","publicinvestors":2,"lastpublicfunding":15700000,"totalpublicrounds":2,"totalpublicfunding":15700000},"team":[{"name":"Amir Khayat","email":"amir.khayat@vorlon.io","phone":"","gender":"Male","userid":"Tpx2Zq0LOcDeP5yVmStLNUDYB6nBOe5XXCAL4tF5w7OUPEwBmBGXxc","bounced":false,"claimed":null,"founder":1,"urlname":"amir-khayat","visible":1,"memberid":"8fGkSlePjw6Asng9RSdHDE837E9TaUd0uEwNyVknHZRzWbqiNSbPfq","position":"Co-founder & CEO","last_name":"Khayat","claimtoken":"TAEQbuqhTbnhBO8D3F3GFT328GI0A4GNtUyY50WRK03nQa07syS9RP","first_name":"Amir","picturekey":"$A85l0m8avQSKxyv6clrgzRFp02dsFzh7ZMRAc6OEXtrJx8ZPzRjQRQ.jpeg","claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/amir-khayat/","unsubscribed":false,"is_activeuser":0,"additionalemail":"","claimedemaildate":"2025-05-26 14:09:54.000000","initials":"","pictureurl":"https://storage.googleapis.com/clean-finder-353810/$A85l0m8avQSKxyv6clrgzRFp02dsFzh7ZMRAc6OEXtrJx8ZPzRjQRQ.jpeg","linkedin-display":"flex","teammembertagclass":"none","teammembertagcontent":"","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Amichay Spivak","email":"spivaka@vorlon.io","phone":"","gender":"Male","userid":"Cg090590Ggpl7C40y9PmdyZqlHOOEsm9RyMuwQpTZHGvaJ5iXEAXny","bounced":false,"claimed":null,"founder":1,"urlname":"amichay-spivak","visible":1,"memberid":"1KsIFE24R1aF4TArxmnHUHUVqg24QzoQwyiQ17yjkkhvBwSWJjvwV3","position":"Co-founder & CTO","last_name":"Spivak","claimtoken":"ZzCLMuyQrXbg0iUKTmOYq5M2YPVQnd50gebifEPFvKo71hepRm4KU8","first_name":"Amichay","picturekey":"$yGadjRDwIL4bSHqPMvmuUVlV18jEkibO318Y7fixtmwMY49tiT2ND2.jpeg","claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/amichay-spivak-2021b747/","unsubscribed":false,"is_activeuser":0,"additionalemail":"","claimedemaildate":"2024-04-17 15:38:07.000000","initials":"","pictureurl":"https://storage.googleapis.com/clean-finder-353810/$yGadjRDwIL4bSHqPMvmuUVlV18jEkibO318Y7fixtmwMY49tiT2ND2.jpeg","linkedin-display":"flex","teammembertagclass":"none","teammembertagcontent":"","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Eric Schlesener","email":"eric.Schlesener@vorlon.io","phone":"","gender":"Male","userid":"ZKtCumc4j28azuqUM1FzGzNpsU2cjrouDlBgQ1tGKe9JSVqKP502hm","bounced":false,"claimed":null,"founder":0,"urlname":"eric-schlesener","visible":1,"memberid":"2949pReNEQW7laajv8OCO4bmQkKeoUebA4AxvEhz1ThJI8ShDc4pIE","position":"VP OF SALES","last_name":"Schlesener","claimtoken":null,"first_name":"Eric","picturekey":null,"claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/ericschlesener/","unsubscribed":false,"is_activeuser":0,"additionalemail":"","claimedemaildate":null,"initials":"ES","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"none","teammembertagcontent":"","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Mike Cioffi","email":"mike.cioffi@vorlon.io","phone":"","gender":"Male","userid":"t2h4Nu1QRV3ElP6ljO7GSt7jU40uG5RET9IO9M58OwYTkeYm9pKHiL","bounced":false,"claimed":null,"founder":0,"urlname":"mike-cioffi","visible":1,"memberid":"CIeBTc6q7h5JWywMe63pmfkpSFJr0K1RQxFML7TZWIrQDDDWPbFOTc","position":"VP of Customers","last_name":"Cioffi","claimtoken":null,"first_name":"Mike","picturekey":null,"claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/mikecioffi/","unsubscribed":false,"is_activeuser":0,"additionalemail":"","claimedemaildate":null,"initials":"MC","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"none","teammembertagcontent":"","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Elias Terman","email":"elias.Terman@vorlon.io","phone":"","gender":"Male","userid":"ssTO5vgOQRL760yRvtcjqNbi5TeygJXrSmbdEFV3jbqFDvjh0JI4y8","bounced":false,"claimed":null,"founder":0,"urlname":"elias-terman-1","visible":1,"memberid":"nYTK3CdAG7pxbs4LImby2eiTU9eelCT8nxNG6J74A4dRG3cNumOcqz","position":"VP of Marketing","last_name":"Terman","claimtoken":null,"first_name":"Elias","picturekey":null,"claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/eliasterman/","unsubscribed":false,"is_activeuser":0,"additionalemail":"","claimedemaildate":null,"initials":"ET","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"none","teammembertagcontent":"","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Netta Drimer","email":"netta.drimer@vorlon.io","phone":"","gender":"Female","userid":"XQe3sfhb1WGMXwt9Dq4Kod4wN55MY85uabLQqwn02BC82d7SmvEUzj","bounced":false,"claimed":null,"founder":0,"urlname":"netta-drimer","visible":1,"memberid":"guTw66WuNu3ItM5nptiI6thwD87BI4zLTH6wAjqGCOMyB83FnzWhVx","position":"Head of Product","last_name":"Drimer","claimtoken":null,"first_name":"Netta","picturekey":null,"claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/nettadrimer/","unsubscribed":false,"is_activeuser":0,"additionalemail":"","claimedemaildate":null,"initials":"ND","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"none","teammembertagcontent":"","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Adam Burt","email":"adam.burt@vorlon.io","phone":"","gender":"Male","userid":"rnFEyiVPLF2pUC71jPcxb3S3lsb3mUrd64z3hv2agttVTohGP6wMps","bounced":false,"claimed":null,"founder":0,"urlname":"adam-burt","visible":1,"memberid":"qD6D6z40KoH1ROx9gsbdZoPuzYYKZ8x5F2EDh1t1TLvYT1pEBgzdWh","position":"Head of Research","last_name":"Burt","claimtoken":null,"first_name":"Adam","picturekey":null,"claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/adamhunterburt/","unsubscribed":false,"is_activeuser":0,"additionalemail":"","claimedemaildate":null,"initials":"AB","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"none","teammembertagcontent":"","channelId":"","visibilityClassName":"","visibilityTooltip":""}],"description_edited":null,"tag_line_edited":null,"sector":null,"sectorverify":null,"biverify":{"id":"c9EsgAuuvwml0IzyIKWmOxLUUF5GjptiIXjHR1tp2gTB0O2GoGTfCd","fullname":"Yanina Wainscheinker"},"biverifydate":"2024-05-28T00:00:00.000Z","crunchbaseid":"vorlon","lastupdator":null,"lastupdator_email":null,"creator":"Jenny Sotnik-Talisman","creator_email":"jenny.sotnik@sncentral.org","createdate":"2024-04-17T00:00:00.000Z","biverification":"Yanina Wainscheinker","sectorverification":null,"affiliatedOrganizations":null,"timeline":[{"id":"kv9pRcW0eqYVKtiePfUAikjMJsIwSkB7GqlyfBFBpmZrUKf5PvIEfR","date":"Apr 2024","amount":"$15.7M","source":"https://www.calcalistech.com/ctechnews/article/h1pilyaga","eventtype":"FundingRoundEvent","investment":[{"name":"Accel","type":"Investor","amount":null,"hidden":false,"country":"United States","fullurl":"/investor_page/accel-partners","logokey":"$ajrr1RoaTjZL82thTxQurK4NPeeciyRWtW1W4f186EClvTTa1zMXB9","tagline":null,"urlname":"/investor_page/accel-partners","isisraeli":0,"investorid":"agxzfmlsbGlzdHNpdGVyGAsSC05ld19Db21wYW55GICAwOSKqIQLDA","fundingtype":"VC and Private Equity","leadpartner":null,"investmentid":"1Fxva8Xn6kSdeH2ZYCwtICmSlr8PZUjiUwyzbeF4UumgJveyS0Iob5","fundingsubtype":"VC and Private Equity","investorislead":1,"amountvisibility":"Public","isextensionround":0,"leadpartneruserid":null,"investorisfollowon":1,"investorvisibility":"Public","leadpartnermemberid":null,"blurFinancialData":"","style":"","hiddenCompanyTooltip":"","logourl":"https://storage.googleapis.com/clean-finder-353810/$ajrr1RoaTjZL82thTxQurK4NPeeciyRWtW1W4f186EClvTTa1zMXB9","investmentVisibilityClassName":"","investmentVisibilityTooltip":"","leadcaption":"Lead&nbsp;","followupcaption":"Follow on&nbsp;"},{"name":"Shield Capital","type":"Investor","amount":null,"hidden":false,"country":"United States","fullurl":"/investor_page/shield-capital","logokey":null,"tagline":null,"urlname":"/investor_page/shield-capital","isisraeli":0,"investorid":"mzSCi8n8fdDYuE2AXw5XiRCN3gF3v7csehfuRsY3DtniiYEoEouXvS","fundingtype":"VC and Private Equity","leadpartner":null,"investmentid":"Wag1tpnAvi4Y2NhHPGs7aCqq6p9gQN3N2ggqOPm2tM3uJfnmpAmAdo","fundingsubtype":"VC and Private Equity","investorislead":0,"amountvisibility":"Public","isextensionround":0,"leadpartneruserid":null,"investorisfollowon":0,"investorvisibility":"Public","leadpartnermemberid":null,"blurFinancialData":"","style":"","hiddenCompanyTooltip":"","logourl":"/assets/investors-icon.svg","investmentVisibilityClassName":"","investmentVisibilityTooltip":"","leadcaption":"","followupcaption":""}],"eventvisibility":"Public","amountvisibility":"Public","fundingvisibility":"Public","fundingtypefundingtype":"A Round","style":"","hiddenCompanyTooltip":"","fundingvisibilityClassName":"","fundingvisibilityTooltip":"","amountvisibilityClassName":"","amountvisibilityTooltip":"","token_visibilityClassName":"","token_visibilityTooltip":"","sectionname":"Private Equity Funding","amountnumber":15700000,"capitalraised":"Undisclosed","valuation":"Undisclosed"},{"id":"PUxWULg7SLjoPJ7Tc7TsC1QzI3N6dYumKs5TgX283Ye3qmJya09rRq","date":"Sep 2022","amount":"Undisclosed","source":"https://www.calcalistech.com/ctechnews/article/h1pilyaga","eventtype":"FundingRoundEvent","investment":[{"name":"Accel","type":"Investor","amount":null,"hidden":false,"country":"United States","fullurl":"/investor_page/accel-partners","logokey":"$ajrr1RoaTjZL82thTxQurK4NPeeciyRWtW1W4f186EClvTTa1zMXB9","tagline":null,"urlname":"/investor_page/accel-partners","isisraeli":0,"investorid":"agxzfmlsbGlzdHNpdGVyGAsSC05ld19Db21wYW55GICAwOSKqIQLDA","fundingtype":"VC and Private Equity","leadpartner":null,"investmentid":"mGDOneiRl4mSzDmFW7SxmUFKCMP0YyNwn21ubSmCBaXswp8gMNaovy","fundingsubtype":"VC and Private Equity","investorislead":1,"amountvisibility":"Public","isextensionround":0,"leadpartneruserid":null,"investorisfollowon":0,"investorvisibility":"Public","leadpartnermemberid":null,"investmentVisibilityClassName":"","investmentVisibilityTooltip":"","blurFinancialData":"","style":"","hiddenCompanyTooltip":"","logourl":"https://storage.googleapis.com/clean-finder-353810/$ajrr1RoaTjZL82thTxQurK4NPeeciyRWtW1W4f186EClvTTa1zMXB9","leadcaption":"Lead&nbsp;","followupcaption":""}],"eventvisibility":"Public","amountvisibility":null,"fundingvisibility":"Public","fundingtypefundingtype":"Seed","fundingvisibilityClassName":"","fundingvisibilityTooltip":"","amountvisibilityClassName":"","amountvisibilityTooltip":"","token_visibilityClassName":"","token_visibilityTooltip":"","style":"","hiddenCompanyTooltip":"","sectionname":"Private Equity Funding","amountnumber":null,"capitalraised":"Undisclosed","valuation":"Undisclosed"}],"investmentstage":[],"exits":[],"investments":[],"portfolio":[],"funds":[],"founded":"7/2022","databases":[],"sharedspaces":[],"utilities":[],"contributors":[],"employeesworldwide":"","fundingtype":"Startup","parsedName":"Vorlon Technologies","logourl":"https://storage.googleapis.com/clean-finder-353810/$FrdKYjNvY0FPHMCihbzd3qGWbXQ16gscp7uTbvJKjOXadmBb1AZeHf","oglogourl":"https://storage.googleapis.com/clean-finder-353810/$FrdKYjNvY0FPHMCihbzd3qGWbXQ16gscp7uTbvJKjOXadmBb1AZeHf","seoabout":"Vorlon has developed a way to quickly analyze third-party applications. Complete with detection, threat intelligence, and remediation capabilities, Vorlon ...","seoTitle":"Israeli Startup","solutions":[{"title":"Cybersecurity","description":"Vorlon Technologies' Third-Party Detection and Response platform continuously monitors and identifies security risks (vulnerabilities, misconfigurations, data exposure) within an organization's third-party software ecosystem to enhance security posture and compliance.","items":[{"name":"Revenue Growth","value":2,"titleTooltip":"Revenue Growth & Profitability","meterTooltip":{"title":"Marginal / Localized","content":"Small, isolated improvement; measurable but not substantial."}},{"name":"Operational Efficiency","value":3,"titleTooltip":"Operational Excellence & Efficiency","meterTooltip":{"title":"Substantial / Core","content":"Clear, significant contribution; broad, tangible gains."}},{"name":"Customer Acquisition","value":3,"titleTooltip":"Customer Acquisition, Satisfaction & Loyalty","meterTooltip":{"title":"Substantial / Core","content":"Clear, significant contribution; broad, tangible gains."}},{"name":"Risk Mitigation","value":5,"titleTooltip":"Risk Mitigation & Business Resilience","meterTooltip":{"title":"Disruptive / Paradigm-Shifting","content":"Revolutionary, industry-leading change that sets new benchmarks and norms."}},{"name":"Talent Development","value":2,"titleTooltip":"Talent Development & Employee Empowerment","meterTooltip":{"title":"Marginal / Localized","content":"Small, isolated improvement; measurable but not substantial."}},{"name":"Agility & Innovation","value":4,"titleTooltip":"Strategic Agility & Innovation","meterTooltip":{"title":"Transformative / Strategic","content":"Fundamental, high-value enhancement with far-reaching strategic importance."}}]},{"title":"Software & Cybersecurity","description":"Vorlon Technologies provides software supply chain security solutions, focusing on open-source risk management, SBOM generation, vulnerability detection, and compliance to secure the software development lifecycle.","items":[{"name":"Revenue Growth","value":2,"titleTooltip":"Revenue Growth & Profitability","meterTooltip":{"title":"Marginal / Localized","content":"Small, isolated improvement; measurable but not substantial."}},{"name":"Operational Efficiency","value":4,"titleTooltip":"Operational Excellence & Efficiency","meterTooltip":{"title":"Transformative / Strategic","content":"Fundamental, high-value enhancement with far-reaching strategic importance."}},{"name":"Customer Acquisition","value":3,"titleTooltip":"Customer Acquisition, Satisfaction & Loyalty","meterTooltip":{"title":"Substantial / Core","content":"Clear, significant contribution; broad, tangible gains."}},{"name":"Risk Mitigation","value":5,"titleTooltip":"Risk Mitigation & Business Resilience","meterTooltip":{"title":"Disruptive / Paradigm-Shifting","content":"Revolutionary, industry-leading change that sets new benchmarks and norms."}},{"name":"Talent Development","value":3,"titleTooltip":"Talent Development & Employee Empowerment","meterTooltip":{"title":"Substantial / Core","content":"Clear, significant contribution; broad, tangible gains."}},{"name":"Agility & Innovation","value":4,"titleTooltip":"Strategic Agility & Innovation","meterTooltip":{"title":"Transformative / Strategic","content":"Fundamental, high-value enhancement with far-reaching strategic importance."}}]},{"title":"Cybersecurity","description":"Vorlon Technologies' Secret Lifecycle Management solution automates the creation, rotation, and revocation of sensitive credentials (secrets) to prevent breaches, ensure compliance, and streamline security operations across an organization's infrastructure.","items":[{"name":"Revenue Growth","value":2,"titleTooltip":"Revenue Growth & Profitability","meterTooltip":{"title":"Marginal / Localized","content":"Small, isolated improvement; measurable but not substantial."}},{"name":"Operational Efficiency","value":4,"titleTooltip":"Operational Excellence & Efficiency","meterTooltip":{"title":"Transformative / Strategic","content":"Fundamental, high-value enhancement with far-reaching strategic importance."}},{"name":"Customer Acquisition","value":2,"titleTooltip":"Customer Acquisition, Satisfaction & Loyalty","meterTooltip":{"title":"Marginal / Localized","content":"Small, isolated improvement; measurable but not substantial."}},{"name":"Risk Mitigation","value":5,"titleTooltip":"Risk Mitigation & Business Resilience","meterTooltip":{"title":"Disruptive / Paradigm-Shifting","content":"Revolutionary, industry-leading change that sets new benchmarks and norms."}},{"name":"Talent Development","value":3,"titleTooltip":"Talent Development & Employee Empowerment","meterTooltip":{"title":"Substantial / Core","content":"Clear, significant contribution; broad, tangible gains."}},{"name":"Agility & Innovation","value":4,"titleTooltip":"Strategic Agility & Innovation","meterTooltip":{"title":"Transformative / Strategic","content":"Fundamental, high-value enhancement with far-reaching strategic importance."}}]},{"title":"Cybersecurity","description":"Vorlon Technologies provides a solution for discovering, monitoring, and securing third-party API integrations, preventing data breaches, unauthorized access, and compliance risks associated with these external connections.","items":[{"name":"Revenue Growth","value":3,"titleTooltip":"Revenue Growth & Profitability","meterTooltip":{"title":"Substantial / Core","content":"Clear, significant contribution; broad, tangible gains."}},{"name":"Operational Efficiency","value":4,"titleTooltip":"Operational Excellence & Efficiency","meterTooltip":{"title":"Transformative / Strategic","content":"Fundamental, high-value enhancement with far-reaching strategic importance."}},{"name":"Customer Acquisition","value":3,"titleTooltip":"Customer Acquisition, Satisfaction & Loyalty","meterTooltip":{"title":"Substantial / Core","content":"Clear, significant contribution; broad, tangible gains."}},{"name":"Risk Mitigation","value":5,"titleTooltip":"Risk Mitigation & Business Resilience","meterTooltip":{"title":"Disruptive / Paradigm-Shifting","content":"Revolutionary, industry-leading change that sets new benchmarks and norms."}},{"name":"Talent Development","value":2,"titleTooltip":"Talent Development & Employee Empowerment","meterTooltip":{"title":"Marginal / Localized","content":"Small, isolated improvement; measurable but not substantial."}},{"name":"Agility & Innovation","value":4,"titleTooltip":"Strategic Agility & Innovation","meterTooltip":{"title":"Transformative / Strategic","content":"Fundamental, high-value enhancement with far-reaching strategic importance."}}]},{"title":"Cybersecurity & Compliance","description":"Vorlon Security offers a continuous security validation and compliance platform that automates security testing, provides real-time visibility, and helps organizations maintain a strong security posture to meet regulatory requirements.","items":[{"name":"Revenue Growth","value":3,"titleTooltip":"Revenue Growth & Profitability","meterTooltip":{"title":"Substantial / Core","content":"Clear, significant contribution; broad, tangible gains."}},{"name":"Operational Efficiency","value":4,"titleTooltip":"Operational Excellence & Efficiency","meterTooltip":{"title":"Transformative / Strategic","content":"Fundamental, high-value enhancement with far-reaching strategic importance."}},{"name":"Customer Acquisition","value":3,"titleTooltip":"Customer Acquisition, Satisfaction & Loyalty","meterTooltip":{"title":"Substantial / Core","content":"Clear, significant contribution; broad, tangible gains."}},{"name":"Risk Mitigation","value":5,"titleTooltip":"Risk Mitigation & Business Resilience","meterTooltip":{"title":"Disruptive / Paradigm-Shifting","content":"Revolutionary, industry-leading change that sets new benchmarks and norms."}},{"name":"Talent Development","value":3,"titleTooltip":"Talent Development & Employee Empowerment","meterTooltip":{"title":"Substantial / Core","content":"Clear, significant contribution; broad, tangible gains."}},{"name":"Agility & Innovation","value":4,"titleTooltip":"Strategic Agility & Innovation","meterTooltip":{"title":"Transformative / Strategic","content":"Fundamental, high-value enhancement with far-reaching strategic importance."}}]},{"title":"Cybersecurity","description":"Vorlon Technologies' Attack Surface Reduction solution identifies, prioritizes, and remediates vulnerabilities and misconfigurations across an organization's digital assets (cloud, SaaS, on-premise, code) to minimize potential entry points for attackers through continuous monitoring and proactive security measures.","items":[{"name":"Revenue Growth","value":2,"titleTooltip":"Revenue Growth & Profitability","meterTooltip":{"title":"Marginal / Localized","content":"Small, isolated improvement; measurable but not substantial."}},{"name":"Operational Efficiency","value":3,"titleTooltip":"Operational Excellence & Efficiency","meterTooltip":{"title":"Substantial / Core","content":"Clear, significant contribution; broad, tangible gains."}},{"name":"Customer Acquisition","value":3,"titleTooltip":"Customer Acquisition, Satisfaction & Loyalty","meterTooltip":{"title":"Substantial / Core","content":"Clear, significant contribution; broad, tangible gains."}},{"name":"Risk Mitigation","value":5,"titleTooltip":"Risk Mitigation & Business Resilience","meterTooltip":{"title":"Disruptive / Paradigm-Shifting","content":"Revolutionary, industry-leading change that sets new benchmarks and norms."}},{"name":"Talent Development","value":2,"titleTooltip":"Talent Development & Employee Empowerment","meterTooltip":{"title":"Marginal / Localized","content":"Small, isolated improvement; measurable but not substantial."}},{"name":"Agility & Innovation","value":4,"titleTooltip":"Strategic Agility & Innovation","meterTooltip":{"title":"Transformative / Strategic","content":"Fundamental, high-value enhancement with far-reaching strategic importance."}}]}],"teamMembersNumber":7,"primarySector":"Cyber Security","primary-sector-display":"block","classifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Application & Website Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA","classificationName":"sectorclassification"},{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"},{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"Software Development","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1wekIDA","classificationName":"targetcustomer"}],"classificationDelimited":["IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA>Software Development#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1wekIDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA>Application & Website Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA>Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA"],"classificationsViewModel":"|0:>IndustryClassificationModel|1:>IndustryClassificationModel/Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA|2:>IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA/Software Development#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1wekIDA|0:>SectorClassificationModel|1:>SectorClassificationModel/Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA|2:>SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA/Application & Website Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA|0:>TechnologyClassificationModel|1:>TechnologyClassificationModel/Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA|2:>TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA/Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA|","classificationTrees":{"sector":[{"title":"Cyber Security","key":"0-0","path":"SectorClassificationModel>Cyber Security","children":[{"title":"Application & Website Security","key":"0-0-0","path":"SectorClassificationModel>Cyber Security>Application & Website Security"}]}],"targetCustomer":[{"title":"Enterprise & Professional Services","key":"0-0","path":"IndustryClassificationModel>Enterprise & Professional Services","children":[{"title":"Software Development","key":"0-0-0","path":"IndustryClassificationModel>Enterprise & Professional Services>Software Development"}]}],"coreTechnology":[{"title":"Platforms & Interfaces","key":"0-0","path":"TechnologyClassificationModel>Platforms & Interfaces","children":[{"title":"Software","key":"0-0-0","path":"TechnologyClassificationModel>Platforms & Interfaces>Software"}]}]},"sectorClassifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Application & Website Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA","classificationName":"sectorclassification"}],"coreTechnologyClassifications":[{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"}],"targetCustomerClassifications":[{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"Software Development","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1wekIDA","classificationName":"targetcustomer"}],"classificationNames":{"sector":["Cyber Security","Application & Website Security"],"coreTechnology":["Platforms & Interfaces","Software"],"targetCustomer":["Enterprise & Professional Services","Software Development"]},"section":null,"sectionParams":"","queryParams":"","popup_claim_profile":"false","claimedBadge":"none","display":{"mainContact":"none","climateTag":"none","seeMoreSimilarCompanisDisplay":"none","similarCompaniesTitleFontSize":"3.2rem","similarCompaniesTitle":"Similar Companies","similar_companies":[]},"mainContact":{},"_eventview":{"publicoffering_exit":[],"privateequityfunding":[{"id":"kv9pRcW0eqYVKtiePfUAikjMJsIwSkB7GqlyfBFBpmZrUKf5PvIEfR","date":"Apr 2024","amount":"$15.7M","source":"https://www.calcalistech.com/ctechnews/article/h1pilyaga","eventtype":"FundingRoundEvent","investment":[{"name":"Accel","type":"Investor","amount":null,"hidden":false,"country":"United States","fullurl":"/investor_page/accel-partners","logokey":"$ajrr1RoaTjZL82thTxQurK4NPeeciyRWtW1W4f186EClvTTa1zMXB9","tagline":null,"urlname":"/investor_page/accel-partners","isisraeli":0,"investorid":"agxzfmlsbGlzdHNpdGVyGAsSC05ld19Db21wYW55GICAwOSKqIQLDA","fundingtype":"VC and Private Equity","leadpartner":null,"investmentid":"1Fxva8Xn6kSdeH2ZYCwtICmSlr8PZUjiUwyzbeF4UumgJveyS0Iob5","fundingsubtype":"VC and Private Equity","investorislead":1,"amountvisibility":"Public","isextensionround":0,"leadpartneruserid":null,"investorisfollowon":1,"investorvisibility":"Public","leadpartnermemberid":null,"blurFinancialData":"","style":"","hiddenCompanyTooltip":"","logourl":"https://storage.googleapis.com/clean-finder-353810/$ajrr1RoaTjZL82thTxQurK4NPeeciyRWtW1W4f186EClvTTa1zMXB9","investmentVisibilityClassName":"","investmentVisibilityTooltip":"","leadcaption":"Lead&nbsp;","followupcaption":"Follow on&nbsp;"},{"name":"Shield Capital","type":"Investor","amount":null,"hidden":false,"country":"United States","fullurl":"/investor_page/shield-capital","logokey":null,"tagline":null,"urlname":"/investor_page/shield-capital","isisraeli":0,"investorid":"mzSCi8n8fdDYuE2AXw5XiRCN3gF3v7csehfuRsY3DtniiYEoEouXvS","fundingtype":"VC and Private Equity","leadpartner":null,"investmentid":"Wag1tpnAvi4Y2NhHPGs7aCqq6p9gQN3N2ggqOPm2tM3uJfnmpAmAdo","fundingsubtype":"VC and Private Equity","investorislead":0,"amountvisibility":"Public","isextensionround":0,"leadpartneruserid":null,"investorisfollowon":0,"investorvisibility":"Public","leadpartnermemberid":null,"blurFinancialData":"","style":"","hiddenCompanyTooltip":"","logourl":"/assets/investors-icon.svg","investmentVisibilityClassName":"","investmentVisibilityTooltip":"","leadcaption":"","followupcaption":""}],"eventvisibility":"Public","amountvisibility":"Public","fundingvisibility":"Public","fundingtypefundingtype":"A Round","style":"","hiddenCompanyTooltip":"","fundingvisibilityClassName":"","fundingvisibilityTooltip":"","amountvisibilityClassName":"","amountvisibilityTooltip":"","token_visibilityClassName":"","token_visibilityTooltip":"","sectionname":"Private Equity Funding","amountnumber":15700000,"capitalraised":"Undisclosed","valuation":"Undisclosed"},{"id":"PUxWULg7SLjoPJ7Tc7TsC1QzI3N6dYumKs5TgX283Ye3qmJya09rRq","date":"Sep 2022","amount":"Undisclosed","source":"https://www.calcalistech.com/ctechnews/article/h1pilyaga","eventtype":"FundingRoundEvent","investment":[{"name":"Accel","type":"Investor","amount":null,"hidden":false,"country":"United States","fullurl":"/investor_page/accel-partners","logokey":"$ajrr1RoaTjZL82thTxQurK4NPeeciyRWtW1W4f186EClvTTa1zMXB9","tagline":null,"urlname":"/investor_page/accel-partners","isisraeli":0,"investorid":"agxzfmlsbGlzdHNpdGVyGAsSC05ld19Db21wYW55GICAwOSKqIQLDA","fundingtype":"VC and Private Equity","leadpartner":null,"investmentid":"mGDOneiRl4mSzDmFW7SxmUFKCMP0YyNwn21ubSmCBaXswp8gMNaovy","fundingsubtype":"VC and Private Equity","investorislead":1,"amountvisibility":"Public","isextensionround":0,"leadpartneruserid":null,"investorisfollowon":0,"investorvisibility":"Public","leadpartnermemberid":null,"investmentVisibilityClassName":"","investmentVisibilityTooltip":"","blurFinancialData":"","style":"","hiddenCompanyTooltip":"","logourl":"https://storage.googleapis.com/clean-finder-353810/$ajrr1RoaTjZL82thTxQurK4NPeeciyRWtW1W4f186EClvTTa1zMXB9","leadcaption":"Lead&nbsp;","followupcaption":""}],"eventvisibility":"Public","amountvisibility":null,"fundingvisibility":"Public","fundingtypefundingtype":"Seed","fundingvisibilityClassName":"","fundingvisibilityTooltip":"","amountvisibilityClassName":"","amountvisibilityTooltip":"","token_visibilityClassName":"","token_visibilityTooltip":"","style":"","hiddenCompanyTooltip":"","sectionname":"Private Equity Funding","amountnumber":null,"capitalraised":"Undisclosed","valuation":"Undisclosed"}],"nonequityfunding":[],"merger_acquisitions":[],"others":[]}}