Start Left® Security Revolutionizes Software Delivery and Risk Management: Oversubscribes Seed Round to Drive Transparency and Secure Product Development from the Start

June 27, 2023

Gula Tech Adventures, Lytical Ventures, and Dasein Capital lead Seed investment in Start Left® Security, supported by other strong investors: DeepWork Capital, Florida Opportunity Fund, and Bootleg Advisors.


JACKSONVILLE, FL, June 27, 2023—Start Left® Security, powered by a multi-patented, AI-driven Application Security Posture Management (ASPM) Platform and Behavioral Analytics, today announced that it has oversubscribed and closed $3.0 million Seed financing led by notable cybersecurity, data analytics, and artificial intelligence (AI) venture capitalists and industry experts. This demonstrates the market’s confidence in Start Left® Security's vision and its ability to deliver innovative solutions that address evolving security threats.


This funding will enable us to enhance our offerings of enabling software-driven organizations to improve visibility, better manage vulnerabilities, and enforce controls. We are excited to further our mission to improving application security by empowering people across Development, Security, CloudOps, and GRC to better manage risk at the speed of innovation," said Jeremy Vaughan, CEO and Founder of Start Left™ Security. "We are thrilled to have such strong support from some of the most notable cybersecurity venture capitalists and industry experts."


According to Gartner’s ‘Innovation Insight for Application Security Posture Management, 2023’ report, “54% of Engineering Leaders know they need to secure the development environment but applications have become more complex, and with security tools and responsibilities spanning multiple groups, visibility into the overall security posture of applications becomes vastly more difficult to obtain.”


Start Left® Security’s ASPM platform solves that problem. The platform further differentiates itself from point solutions by providing a holistic and comprehensive approach to scaling application security programs, offering end-to-end coverage on every product team, centralized management, and compliance reporting, along with the ability to integrate cloud security posture management (CSPM).


"Start Left™ Security's platform enables development teams to ship applications without vulnerabilities. We are investing because the platform mitigates vulnerabilities and security weaknesses inherited from many sources such as the software supply chain and malicious insiders, in a highly effective and unique approach we've not seen available previously," said Ron Gula, CEO of Gula Tech Adventures. 


The funding will be utilized to accelerate the company’s go-to-market efforts and R&D investments for Start Left® Security’s ASPM Platform, build more risk insights and threat predictions into their SPACE™ Behavioral Analytics, and unify a unique approach to protecting cloud-native applications – the right way – “start left, not ‘shift left’.”


Embracing the "start left" philosophy to embed secure coding practices from the beginning opens the door to empowering the human element. Start Left® Security provides innovative solutions by equipping developers with AI-driven remediation guidance and individualized secure code training. Security leaders now can be a part of making it easier for people to work together to close security holes and give teams the tools they need to build safe and resilient software products.


Start Left® Security’s ASPM Platform features include:


  • Inline CI/CD Software Component Analysis (SCA)
  • Seamless Dynamic Software Bill of Materials (SBOM)
  • Asset Discovery, Inventory & Risk Management
  • Product-Centric Vulnerability Management
  • AI-Driven Remediation Guidance & Secure Code Training
  • Governance, Risk & Compliance  Performance
  • Executive Dashboards & Continuous Monitoring


Start Left® Security's ASPM Platform stands out from AppSec Testing aggregators even more by using big data analytics in its technology, which uses behavior-based threat identification to find threats. The behavioral analytics engine processes and analyzes massive amounts of data via pre-built correlations and machine learning (ML) approaches. This enables the automated discovery of patterns across tools and time, retrospective and real-time, identifying risks and threats that typically go unnoticed by vulnerability scanners to proactively give actionable insights.


"We are excited to partner with Start Left® Security and support their mission of delivering proactive security solutions to cloud-native organizations," said Lucas Nelson, Partner at Lytical Ventures. “With ASPM and CSPM correlation, an organization can finally facilitate the true spirit of DevSecOps. We believe that Start Left™ Security has the potential to become a significant player in the cybersecurity space, and we look forward to supporting their growth and innovation."


Start Left® Security’s ASPM Platform is in GA (General Availability) now and is available through all channels: Direct Sales, Distributors, Resellers and MSSPs (Managed Security Service Providers) globally.


About Start Left® Security

Start Left® Security is a pioneering cybersecurity company that revolutionizes the software development landscape. By emphasizing the importance of building software securely from the start, Start Left® empowers organizations to proactively address security challenges and embed best practices throughout the development process. With an innovative and patented platform, Start Left® helps businesses mitigate risks and build software that is robust, resilient, and secure. For more information, visit www.startleftsecurity.com.


About Gula Tech Adventures
Founded by cybersecurity entrepreneurs Ron and Cyndi Gula, Gula Tech Adventures invests in companies and nonprofits that help close the gap in needed technology and workforce to defend the country in cyberspace. They work directly with cybersecurity startups, investment funds and nonprofit organizations. Since 2017, the Gula's have made more than 40 investments in cybersecurity startups like Automox, Cybrary, Huntress and Scythe, cybersecurity funds including Inner Loop Capital, DataTribe and Forgepoint Capital, and also supported cybersecurity nonprofits like Defending Digital Campaigns and voting.works.


For media inquiries, please contact media@startleftsecurity.com.


EIN Newswire: Start Left® Security Revolutionizes Software Delivery and Risk Management: Oversubscribes Seed Round to Drive Transparency and Secure Product Development from the Start

SHARE!

More Resources

By Start Left® Security December 13, 2024
Discover the hidden costs of ignoring Security by Design. Learn why embedding security into your software development process is essential to avoid compliance risks, customer trust issues, and operational inefficiencies. Explore best practices to safeguard your growth and future-proof your business.
November 5, 2024
Start Left® Security centers product security as the heart of true business risk management.
November 1, 2024
Start Left® Application Security Posture Management (ASPM) & OWASP SAMM Alignment
October 20, 2024
The adoption of Start Left methodologies not only transforms security into a profit center but also directly enhances the achievement of the true value proposition of DevOps . The primary goal of DevOps is to break down silos between development and operations, enabling continuous integration, delivery, and collaboration to produce high-quality software at speed. Start Left® takes this even further by embedding security into the core of this collaboration , ensuring that high-quality software isn’t just fast but also secure and resilient from the ground up.
October 18, 2024
For decades, cybersecurity has been viewed as a cost center —an unavoidable yet necessary expense. Security was often seen as the department that says "no," adding layers of complexity and slowing down innovation. However, the paradigm shift toward "Start Left" methodologies is turning this traditional view on its head. For the first time ever, security can be transformed into a profit center by enhancing development and product teams' performance, reducing costs, and driving better business outcomes.
October 17, 2024
Today, organizations are not only battling external cyber threats but also facing increasing risks from insider threats —whether through negligence or malicious intent. Fraud often originates from within, leveraging access, knowledge, and loopholes in processes that go undetected by traditional security measures. Start Left® Security's unique PIRATE® model empowers organizations to tackle these insider threats before they escalate, bringing advanced capabilities that offer unparalleled insights and control.
October 16, 2024
The rise of sophisticated cyber threats, insider risks, and software supply chain vulnerabilities has pushed security models to adopt a new approach: Zero-Trust Architecture (ZTA) . One of the core pillars of Zero-Trust is micro-segmentation and least privilege access—ensuring that no one, not even trusted internal actors, has unfettered access to systems, data, or processes.
October 15, 2024
Monitoring and detection are crucial for preventing threats before they can cause damage. At Start Left® Security, our patented PIRATE® (Product Integrated Risk Analytics & Threat Evaluation) model plays a pivotal role in contextualizing monitoring and detection across the entire software development lifecycle (SDLC). While PIRATE® doesn’t directly enforce Role-Based Access Control (RBAC) , it plays an essential role in strengthening RBAC policies and improving the overall security posture of your organization.
October 14, 2024
Relying on traditional security models is no longer sufficient, but many organizations still operate under the assumption that users or systems within their network can be trusted by default. Zero-Trust Architecture (ZTA) flips this approach on its head, operating under the mantra, "trust no one, verify everything." It requires rigorous verification of every user, device, and action within a network—no inherent trust, only continuous verification.
Show more
Share by: