Cloud Security Firm Paladin Raises $3.3M in Seed Funding

data centers

Paladin Cloud, a cloud native, open source security company, has announced a $3.3 million seed financing round led by Okapi Venture Capital and Bowery Capital. The Security-as-Code platform, which now supports AWS, Microsoft Azure, and Google Cloud, leverages an extensible policy management plane to comprehensively enhance cloud security for developers and security teams.

The business was founded by CEO Daniel Deeney and CTO Steve Hull with the goal of assisting companies in finding and fixing misconfigurations in their cloud environments and lowering security risks. The PacBot open source community was founded by Hull, and together with him, they have developed a larger vision to use open source to engage the developer community with a “cutting-edge” security framework that includes an open architecture to connect into a wide range of cloud-based enterprise systems, including Kubernetes, container scanning, API gateways, and threat intelligence.

Loren Straub, General Partner, Bowery Capital
“Remote work has become a forcing function for digital transformation, leaving many larger enterprises exposed when it comes to cloud security,” said Loren Straub, General Partner, Bowery Capital.

The open source platform offers authoring ability to create unique policies and rules while also offering hundreds of best practice security policies. Self-healing auto-fixes and role-based access control (RBAC), which provide automated workflow and remediation, are among the platform’s core features and capabilities.

“We launched the company to change the security paradigm for developers and security teams by providing a holistic approach to cloud security through a modern open source platform that functions as a policy management plane across multi-cloud and enterprise systems,” said Daniel Deeney, Paladin Cloud’s Co-Founder and CEO.

“Our vision for the open source community is to provide developers a powerful platform with visibility into their cloud environments to identify key risks and protect their applications,” added Steve Hull, Paladin Cloud’s Co-Founder and CTO.

The $3.3 million seed investment round was led by Okapi Venture Capital and Bowery Capital, with participation from SaaS Ventures, Touchdown Ventures, Samsung Next, T-Mobile Ventures, and UST.

Identifying Blind Spots in Cloud Settings

In order to safeguard their applications and data, developers using Paladin Cloud are assisted in identifying blind spots in their cloud settings. In order to swiftly identify and address security concerns, the policy management plane’s single pane of glass would give users visibility into cloud assets through continuous, real-time monitoring. Paladin Cloud’s strong compliance reporting and visualization capabilities would offer security professionals immediate insight and context to help them prioritize the events that matter.

Businesses have traditionally relied on manual automation, relied on expensive closed source solutions, or been limited by their lack of expertise in integrating numerous open source technologies. According to Paladin Cloud, misconfiguration of cloud resources has emerged as a major security concern as cloud deployments become more complicated and dynamic. Paladin would offer an enterprise-grade, open source platform for cloud security and governance to effectively address these issues for developers and security teams.

To sum up, the key features of Paladin Cloud’s offering would include:

  • Modern, cloud-based UI management dashboard with actionable intelligence and context
  • Hundreds of best practice security policies across AWS, Azure and Google Cloud Platform
  • Extensible policy management plane to connect into cloud-based, enterprise systems
  • Plug & play connector-based (agentless) architecture and policy authoring capabilities
  • Severity-based prioritization of policy violations to drive automated workflows
  • Self-healing remediation which includes one-click fixes and auto-fixes
  • Custom asset groups and policies by business segment and geography
  • Role based access control (RBAC)

The open source product from Paladin Cloud is available for free download and use on GitHub. Through its Slack and Gitter channels, the organization provides help for its clients. The company provides annual support contracts if developers and security teams need a higher degree of help with service level agreements.

“Given the evolution of the cloud and the ever increasing complexities associated with protecting it, we are very excited to be able to work with Paladin Cloud,” said Marc Averitt, Co-Founder and Managing Director, Okapi Venture Capital. “We believe their cloud security policy management expertise, solution architecture, and open source approach will quickly make them the market leader and preferred choice among enterprises worldwide.”

“Remote work has become a forcing function for digital transformation, leaving many larger enterprises exposed when it comes to cloud security,” said Loren Straub, General Partner, Bowery Capital. Paladin Cloud is the easiest open-source option for cloud security policy management today and we believe the company is well-positioned to meet enterprises at the developer level with the tools they need to build and deploy securely.”

Management Summary

Paladin Cloud, a cloud native, open source security company, has announced a $3.3 million seed financing round led by Okapi Venture Capital and Bowery Capital
  • The company was founded by Daniel Deeney and Steve Hull with the goal of assisting companies in finding and fixing misconfigurations in their cloud environments and lowering security risks.
  • Security-as-Code platform leverages an extensible policy management plane to comprehensively enhance cloud security for developers and security teams.
Key features of Paladin Cloud
  • Modern, cloud-based UI management dashboard with actionable intelligence and context
  • Hundreds of best practice security policies across AWS, Azure and Google Cloud Platform
  • Extensible policy management plane
  • Plug & play connector-based (agentless) architecture and policy authoring capabilities
  • Severity-based prioritization of policy violations to drive automated workflows
  • Self-healing remediation which includes one-click fixes and auto-fixes