RevealSecurity (formerly TrackerDetect)

RevealSecurity (formerly TrackerDetect)

Discovers operational breaches executed by authenticated users within applications. Learn more

Launch date
Employees
Market cap
-
Enterprise valuation
€84—125m (Dealroom.co estimates Jun 2022.)
Ramat Gan Tel Aviv District (HQ)

Financials

Estimates*

Edit
Revenues, earnings & profits over time
USD20222023
Revenues3.4m4.5m
% growth-32 %
  • Edit
DateInvestorsAmountRound
*

$23.0m

Series A
*

N/A

-
Total Funding€20.9m

Recent News about RevealSecurity (formerly TrackerDetect)

Edit
More about RevealSecurity (formerly TrackerDetect)info icon
Edit

Reveal Security is a cybersecurity startup that specializes in detecting and mitigating identity threats in enterprise applications. The company operates in the cybersecurity market, serving businesses that use cloud-based or on-premise applications. Their primary clients are organizations that require robust security measures to protect their data and systems from identity threats and breaches.

Reveal Security's business model revolves around providing a comprehensive identity threat detection solution. This solution works with human users, APIs, and other entities, enabling organizations to protect against identity threats. The company's unique offering, TrackerIQ, utilizes patented User Journey Analytics to detect, alert, and defend against identity abuse and insider threats. Unlike traditional detection solutions that rely on known bad behavior, TrackerIQ provides contextual analysis to accurately detect the misuse of trusted identities.

The company generates revenue by selling its security solution to businesses. It offers proactive monitoring of user behavior and identities in applications to prevent data compromise. This approach allows businesses to detect threats early in the kill chain, whether malicious or negligent, and know immediately when an identity has been compromised.

Reveal Security's advantage lies in its ability to deliver accurate behavior-based user analytics without rules. This is particularly beneficial in an era where security threats are evolving faster than security technologies, and traditional security operations centers (SOCs) lack the necessary depth to counter identity attacks.

Keywords: Cybersecurity, Identity Threat Detection, Enterprise Applications, User Journey Analytics, TrackerIQ, Proactive Monitoring, Data Compromise, Behavior-Based User Analytics, Security Operations Centers, Contextual Analysis.

Tech stack

Group
Tech stackLearn more about the technologies and tools that this company uses.