Israeli Cybersecurity Company, Cider Security, Raises $38M To Secure Software Development Environments

funding, growth

Cider Security, the Israeli AppSec Operating System security company, emerged from stealth mode announcing that it has raised $38 million in funding after completing a Series A financing round led by Tiger Global Management. Lead investor from Cider Security’s seed financing, Glilot Capital Partners, also joined with participation from Glilot’s early growth fund, Glilot+.

The new funding will be used to accelerate R&D operations in Israel and establish new offices worldwide globally to support growing demand. According to Cider Security, dozens of companies already use its platform to secure their software development environments.

Cider Security aims to provide Security teams with an in-depth understanding and comprehensive view of the technologies, systems, and processes unique to every engineering environment. The platform provides a set of controls and solutions to optimize security and achieve full resilience across the entire CI/CD pipeline – from code to deployment.

Cider Security’s platform scans the company’s CI/CD pipeline mapping out all the software tools the pipeline includes. It then searches for potential security vulnerabilities that could be used by hackers. Cider Security also detects if a software tool has an insecure configuration and suggests ways to remediate the issue.

The platform can find security issues not only in a CI/CD pipeline, but also the software code that it’s used to develop by providing access to a catalog of third-party code scanning tools that are capable of detecting vulnerabilities. Cider Security then aggregates results from the company’s code scanning tools in a centralized interface to make it easier for developers to find and fix software code security issues.

Don't miss out great stories, subscribe to our newsletter.

Buoyant Adds New Automated Failover Functionality For Multi-Cluster Kubernetes Deployments

Previous article

‘Dirty Pipe’ Linux Vulnerability Allows Overwriting Data In Arbitrary Read-Only Files

Next article
Login/Sign up