Search company, investor...

Founded Year

2014

Stage

Loan | Alive

Total Raised

$680K

Last Raised

$680K | 3 yrs ago

Mosaic Score
The Mosaic Score is an algorithm that measures the overall financial health and market potential of private companies.

+150 points in the past 30 days

About Atakama

Atakama is a service for both private and institutional investors that creates effective investment strategies by selecting profitable trading algorithms developed by an open community from all over the world.

Headquarters Location

200 Park Ave 17 Floor

New York, New York, 10166,

United States

272-282-5262

CB Insights
Looking for a leg up on competitive, customer and technology insights?
CB Insights puts confidence and clarity into your most strategic decisions.
See how. Join a demo.
Join a demo
Trusted by the world's smartest companies to:
  • Predict emerging trends
  • See competitors' playbooks
  • Stalk the smart money
  • Identify tomorrow's challengers
  • Spot growing industries
  • Kill analyst data work
Let's see how we can help you!
MicrosoftWalmartWells Fargo

Atakama's Product Videos

Atakama's Products & Differentiators

    Atakama

    Encryption for data at rest and in transit.

You're one click away from the most comprehensive, unmatched analyst expertise in tech, in-depth private company data and a platform that brings it all together.
Click Now. Join a live demo
Join a demo

Expert Collections containing Atakama

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Atakama is included in 1 Expert Collection, including Fintech.

F

Fintech

8,086 items

Companies and startups in this collection provide technology to streamline, improve, and transform financial services, products, and operations for individuals and businesses.

Atakama Patents

Atakama has filed 13 patents.

The 3 most popular patent topics include:

  • Cryptography
  • Key management
  • Cryptographic attacks
patents chart

Application Date

Grant Date

Title

Related Topics

Status

2/22/2022

8/29/2023

Cryptography, Cryptographic attacks, Disk encryption, Key management, Cryptographic protocols

Grant

Application Date

2/22/2022

Grant Date

8/29/2023

Title

Related Topics

Cryptography, Cryptographic attacks, Disk encryption, Key management, Cryptographic protocols

Status

Grant

Latest Atakama News

Infosec products of the month: March 2023

Apr 3, 2023

Infosec products of the month: March 2023 Here’s a look at the most interesting products from the past month, featuring releases from: 1Password, Appdome, Atakama, BreachLock, Elevate Security, Fastly, Forescout, ForgeRock, GrammaTech, HackNotice, Hornetsecurity, HYPR, Kensington, LOKKER, ManageEngine, Nile, Palo Alto Networks, Persona, ReversingLabs, Tausight, Vectra, Veeam Software, Verosint, Vumetric, Waterfall Security Solutions. Forescout XDR enables SOC teams to reduce the attack surface Forescout XDR is an eXtended detection and response solution that converts telemetry and logs into high fidelity, SOC-actionable probable threats. It automates the detection, investigation, hunt for and response to advanced threats across all connected assets – IT, OT/ICS, IoT and IoMT – from campus to cloud to data center to edge. Appdome ThreatScope Mobile XDR provides threat intelligence for mobile apps Appdome’s ThreatScope Mobile XDR gathers thousands of threat signals from mobile app security, hacking, fraud, malware, cheat and bot attacks from inside each of 100M deployed mobile apps and translates that data into brand relevant views that cyber, fraud and business teams can use to evaluate and respond to mobile threats and attacks in real time. ManageEngine adds security and risk posture management dashboard to Log360 ManageEngine has added a security and risk posture management dashboard to Log360, its unified SIEM solution with integrated DLP and CASB capabilities. Enterprises can leverage this new feature to implement proactive security strategies and prevent cyberattacks before they occur. Veeam Backup for Microsoft 365 v7 strengthens data protection The latest version of Veeam Backup for Microsoft 365 improves data protection by enabling immutability, delivering advanced monitoring and analytics across the backup infrastructure environment, along with increased control for BaaS (back up as a service) through a deeper integration with Veeam Service Provider Console. Fastly Managed Security Service protects enterprises from web application attacks Fastly introduced Fastly Managed Security Service , a service for threat detection and response available around the clock, aimed at assisting businesses in mitigating the risk of web application attacks and minimizing the costs incurred due to lost transactions. New Kensington privacy screens protect against visual hacking The SA270 Privacy Screen for Studio Display (K50740WW), SA240 Privacy Screen for iMac 24” (K55170WW), and MagPro Elite Magnetic Privacy Screen for MacBook Air 2022 (K58374WW), expand Kensington’s extensive portfolio of privacy screens that enable businesses to reduce the potential loss of confidential and sensitive data through visual hacking from laptops and computer screens. Palo Alto Networks enhances cybersecurity capabilities with AI-powered ITDR module Palo Alto Networks released new Identity Threat Detection and Response (ITDR) module for Cortex XSIAM, enabling customers to ingest user identity and behavior data and deploy AI technology to detect identity-driven attacks within seconds. The module further strengthens XSIAM’s ability to consolidate multiple security operations capabilities into a unified, AI-driven security operations center (SOC) platform. 1Password Unlock with SSO helps enterprises secure their employees 1Password has launched Unlock with Single Sign-On (SSO) which enables enterprise customers to use Okta for unlocking their 1Password accounts, with Azure AD and Duo integration to follow in the coming months. It helps IT teams improve their security posture while reducing daily login hassles and stress for employees. GrammaTech unveils new versions of its CodeSentry binary SCA platform CodeSentry is now available in three editions which allows customers to choose the application security capabilities that align with their requirements for software inventory, vulnerability assessment or security intelligence. Persona Graph proactively surfaces and blocks hidden fraud rings Graph is a fraud investigation tool that pairs identity data with sophisticated link analysis to fight fraud at scale. Companies can investigate Persona-collected data as well as bring in their own proprietary data into Graph, allowing them to automatically connect the dots between identity data points in order to assess the threat of the fraud ring. Hornetsecurity VM Backup V9 protects users against ransomware threats VM Backup V9 has an easy-to-use, intuitive interface that gives individuals full control, allowing them to monitor and manage all Hyper-V and VMware VMs from a single console. V9 can now handle larger infrastructure setups. Its overhauled backup repository optimises disk space, ensuring more robust long-term storage. ReversingLabs adds secrets detection capabilities to SSCS platform ReversingLabs has unveiled new secrets detection features within its Software Supply Chain Security (SSCS) platform. It enables teams to securely control the release of software via the detection of software supply chain threats, malware, malicious behaviors, tampering, and secrets exposures Atakama Enterprise protects unstructured data against exfiltration Atakama unveiled its new Multifactor Encryption platform, Atakama Enterprise , featuring the Atakama Intelligence Center. Atakama’s Multifactor Encryption combines Distributed Key Management (DKM) with the proven concept of multi-device authentication for a progressive security solution that challenges the status quo of conventional data protection. HYPR launches Enterprise Passkeys for Microsoft Azure HYPR announced its newest offering, Enterprise Passkeys for Microsoft Azure . This new technology turns any smartphone into a FIDO2 virtual security key, providing authentication flexibility, user convenience and security while eliminating the complexity and cost of a hardware security key. Elevate Identity enables security teams to automate customization of conditional access policies Elevate Security released Elevate Identity , its SaaS offering for Identity and Access Management (IAM) Professionals that integrates Elevate’s user risk profiling capability with IAM tools such as Cisco Duo, Crowdstrike Falcon, and Microsoft Azure AD to add a full 360° perspective of each individual’s cyber risk to the authentication and authorization process. Waterfall Security Solutions launches WF-600 Unidirectional Security Gateway Waterfall Security Solutions launched the WF-600 Unidirectional Security Gateway , an OT security protection against remote cyber attacks. The WF-600 includes a self-contained, integrated software platform, with no external software needed on industrial or enterprise computers, and with the entire platform designed together with the 600 series hardware. Vumetric PTaaS platform simplifies cybersecurity assessments for organizations The Vumetric PTaaS platform provides self-service capabilities that allow organizations to schedule and manage assessments on-demand. The platform’s interactive reporting provides a comprehensive view of identified risks and prioritized remediation strategies. Stakeholders can access results, track improvements over time, and analyze project results without additional effort. Verosint introduces account fraud detection and prevention solution Verosint announced a new solution that helps organizations secure their online businesses and protect their customers in the face of ever-growing account fraud. Verosint addresses account fraud by detecting and preventing access by malicious users, protecting the accounts of true customers, and allowing businesses to safely and confidently do business online. ForgeRock Enterprise Connect Passwordless reduces the risk of password-based attacks ForgeRock Enterprise Connect Passwordless helps large enterprises proactively defend against costly cyber-attacks and unauthorized access by providing a passwordless experience to legacy applications, systems and services. Vectra Match helps security teams accelerate threat hunting and investigation workflows Vectra Match brings intrusion detection signature context to Vectra Network Detection and Response (NDR), enabling security teams to accelerate their evolution to AI-driven threat detection and response without sacrificing investments already made in signatures. HackNotice Actions helps people to understand the extent of their data exposure HackNotice is offering additional tailored protection via its new service, HackNotice Actions . Further empowering employees, HackNotice Actions reaches out to any company where a person’s PII or other data has been compromised, and asks for a full report on or erasure of the person’s data, in addition to other functionalities. LOKKER Web Privacy Risk Score helps organizations measure and mitigate online privacy threats LOKKER has released its LOKKER Web Privacy Risk Score , the assessment tool that provides businesses with a clear, numeric rating of their privacy risk across a global portfolio of websites, individual websites within that portfolio, and the individual web pages of each website. It gives IT, legal, and marketing teams a clear view of their organizations’ website risks across all their web properties. BreachLock API Penetration Testing Service prevents exploits of unpatched APIs BreachLock’s API pentesting service is conducted by 100% in-house, certified expert pentesters that leverage AI and automation to accelerate the process and deliver more accurate results that closely correlate with OWASP best practices. Clients receive evidence-backed pentest reports with guided remediation on critical vulnerabilities, along with 12 months of access to retest, generate reports, and run scans inside the client portal. Tausight expands its AI-based PHI Security Intelligence platform to cover new attack vectors Tausight 2.0 includes a robust infrastructure now built on Google Cloud, a new agentless offering for cloud and network infrastructure, and a third-party API that can be leveraged to embed Tausight’s AI-based PHI intelligence engine into other security solutions. Nile unveils series of new security capabilities to secure users and devices against threats Nile announced a series of new security capabilities designed to protect against threats that have long plagued wired and wireless networks. Based on the principles of zero trust, Nile’s secure-by-design approach removes the complexities that have exponentially increased the cost and effort required to secure users and devices against advanced threats. More about

Atakama Frequently Asked Questions (FAQ)

  • When was Atakama founded?

    Atakama was founded in 2014.

  • Where is Atakama's headquarters?

    Atakama's headquarters is located at 200 Park Ave, New York.

  • What is Atakama's latest funding round?

    Atakama's latest funding round is Loan.

  • How much did Atakama raise?

    Atakama raised a total of $680K.

  • Who are the investors of Atakama?

    Investors of Atakama include Paycheck Protection Program and THINK Accelerate.

  • Who are Atakama's competitors?

    Competitors of Atakama include Phalanx and 6 more.

  • What products does Atakama offer?

    Atakama's products include Atakama.

CB Insights
Looking for a leg up on competitive, customer and technology insights?
CB Insights puts confidence and clarity into your most strategic decisions.
See how. Join a demo.
Join a demo
Trusted by the world's smartest companies to:
  • Predict emerging trends
  • See competitors' playbooks
  • Stalk the smart money
  • Identify tomorrow's challengers
  • Spot growing industries
  • Kill analyst data work
Let's see how we can help you!
MicrosoftWalmartWells Fargo

Compare Atakama to Competitors

Zoho Logo
Zoho

Zoho is a software development company that offers solutions for several areas, such as finance, IT, and many more. It apps in nearly every major business category, including sales, marketing, customer support, accounting, and back-office operations, and an array of productivity and collaboration tools. The company was founded in 1996 and is based in Tamil Nadu, India.

DuoKey Logo
DuoKey

DuoKey provides digital security services and helps users move data and workloads to the cloud. DuoKey aims to provide encryption solutions and security controls that meet internal and external compliance requirements. DuoKey enables users to encrypt documents directly and store them in Microsoft Office365 or any other cloud services.

Grip Security Logo
Grip Security

Grip Security provides software-as-a-service (SaaS) identity risk management solutions. The company’s SaaS security control plane platform helps companies discover, prioritize, secure and orchestrate the mitigation and remediation of risks. It was founded in 2021 and is based in Boston, Massachusetts.

GenRocket Logo
GenRocket

GenRocket is a test data generation system.

Virtru Logo
Virtru

Virtru provides data-centric privacy solutions. It offers email privacy through a single plug-in. It allows individuals and businesses to control, receive, review, and retain their digital information. It was founded in 2012 and is based in Washington, DC.

Shibumi Logo
Shibumi

Shibumi helps organizations manage strategic business improvement initiatives, measure performance, and ensure success. Shibumi focuses on providing customers with the transparency, alignment, and accountability they need to execute their business improvement objectives. The company was founded in 2011 and is based in Norwalk, Connecticut.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Join a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.