Search company, investor...
Magalix company logo


Founded Year



Acquired | Acquired

Total Raised


About Magalix

Magalix provides a full-service tool to help users navigate Kubernetes, a cloud platform. The company looks to implement technologies and products by powering developers and security teams with tools to codify security and compliance in their software development cycle. On January 26th, 2022, Magalix was acquired by Weaveworks. The terms of the transaction were not disclosed.

Headquarters Location

10778 240th Avenue NE

Redmond, Washington, 98053,

United States


Missing: Magalix's Product Demo & Case Studies

Promote your product offering to tech buyers.

Reach 1000s of buyers who use CB Insights to identify vendors, demo products, and make purchasing decisions.

Missing: Magalix's Product & Differentiators

Don’t let your products get skipped. Buyers use our vendor rankings to shortlist companies and drive requests for proposals (RFPs).

Magalix Patents

Magalix has filed 1 patent.

The 3 most popular patent topics include:

  • Artificial neural networks
  • Cloud computing
  • Cloud infrastructure
patents chart

Application Date

Grant Date


Related Topics




Cloud infrastructure, Artificial neural networks, Cloud computing, Cloud platforms, Machine learning


Application Date


Grant Date



Related Topics

Cloud infrastructure, Artificial neural networks, Cloud computing, Cloud platforms, Machine learning



Latest Magalix News

Weaveworks Brings Policy-as-Code to GitOps for K8s

Mar 22, 2022

Weaveworks Brings Policy-as-Code to GitOps for K8s Weaveworks today announced general availability of an update that embeds policy-as-code capabilities into its continuous delivery (CD) platform to improve application security. Those capabilities are based on technologies the company gained with the acquisition of Magalix earlier this year. The Weave GitOps 2022.03 edition of the platform also makes it possible to use the profile catalog to define services that can be used across multiple application development teams. In addition, Weaveworks is making available technology previews of integrations with the open source Terraform tool for provisioning infrastructure-as-code and the Visual Studio Code integrated development environment (IDE) provided by Microsoft. Finally, Weaveworks has added a graphical observability tool for tracking the health of applications to Weave GitOps Core, which is an extension of the open source Flux tool for managing the delivery of container images that is at the core of the Weaveworks CD platform. Weaveworks COO Steve George says that as application development continues to evolve, it’s apparent that CD is becoming a separate DevOps discipline that stands apart from continuous integration (CI) platforms used by developers to manage the application build process. As that shift occurs, it’s critical to also enable IT operations teams to put guardrails in place so that organizations can manage security and compliance policies as code, notes George. The Weaveworks approach is to enable configuration and security policies to be held in a Git repository alongside the code created to manage infrastructure, adds George. Any changes can be made, reviewed and then pushed through an automated pipeline that verifies, deploys and monitors every update, he says. IT teams can then decide where and how custom policies are applied using a policy-as-code engine embedded within a pipeline, says George. The goal is to make it simpler to not only protect applications but also ensure the integrity of the software supply chain, he adds. The degree to which DevOps teams will manage CD apart from CI is now the subject of a fierce DevOps debate. Advocates of an approach that loosely couples CI and CD processes argue that very few DevOps teams are employing CD best practices because they are too difficult to implement across multiple platforms. Kubernetes, however, presents IT teams with a standard application programming interface (API) that makes it simpler to implement CD processes. George says as those CD processes evolve, a team of IT professionals with varying skill levels will manage those processes. In some cases, a site reliability engineer (SRE) will automate processes via an API. In other instances, an IT administrator will manage a task using a graphical tool. Sometimes, an SRE may even decide it is more expedient to use a graphical tool themselves. It’s clear a new approach to DevOps is evolving as GitOps processes mature. Each IT organization will need to determine the degree to which they want to shift to GitOps processes, given their previous commitments to legacy DevOps workflows. However, one thing that is certain is that Kubernetes, more than any other platform, makes it easier to embrace GitOps. Mike Vizard Mike Vizard is a seasoned IT journalist with over 25 years of experience. He also contributed to IT Business Edge, Channel Insider, Baseline and a variety of other IT titles. Previously, Vizard was the editorial director for Ziff-Davis Enterprise as well as Editor-in-Chief for CRN and InfoWorld. TechStrong TV – Live Email* 25 March 2022 Secure software delivery for modern applications requires security tooling that can be integrated neatly into the iterative DevOps model, automating security controls directly into the developer workflow to find and fix issues proactively, before those workloads reach production. The post Integrate Security Controls Wherever You Build Applications appeared first on [...] 24 March 2022 Everyone seems to be adopting low-code, but is it as customizable, secure and scalable as it needs to be for your organization to succeed? The low-code development market only began to take shape a decade ago but, as of last year, it accounted for 44% of software development activity. The dramatic shift is pushing companies […] The post 5 Pitfalls of Low-Code (and How to Avoid Them) appeared first on [...] 24 March 2022 Join our webinar to learn how JFrog and AWS can help you transform your DevOps and infrastructure to a more nimble and secure environment. In this webinar, you will gain insight on the strategies and best practices to help you overcome the challenges of legacy infrastructure and older application build and deployment approaches. The post Modernize When You Migrate: How Your DevOps Can Leap Ahead as You Move to the Cloud appeared first on [...] 24 March 2022 As security researchers, we geek out whenever we uncover new vulnerabilities, and we take our responsibility as a CNA very seriously. Recently, we’ve noticed some unsettling trends. Even though the majority of open source projects share security issues publicly, a significant portion of vulnerabilities in multiple flagship products go unreported. In this webinar, we dig […] The post Open Source Threat Hunting: Finding Unreported Vulnerabilities appeared first on [...] 24 March 2022 GitOps expands the use of DevOps best practices across the entire Kubernetes application life cycle, including deployment development/testing, infrastructure configuration and lifecycle management and resiliency. To enable this, administrators can configure and manage Red Hat OpenShift GitOps through ArgoCD. But regardless of whether your OpenShift clusters are hosted on-premises or in the cloud, unexpected downtime […] The post A Framework for GitOps App Recoverability With Red Hat OpenShift and TrilioVault appeared first on [...] 30 March 2022 DevOps teams have been tasked to deliver new applications rapidly and continuously, but security testing and remediation have failed to keep pace. Hackers have capitalized on this “speed over security” approach to AppSec and have developed new attack strategies targeted at the application layer. The post Top 3 Ways to Build Security Into DevOps appeared first on Security Boulevard. [...] 29 March 2022 By now, everyone has heard of the *AST scanning technologies. Most have been around for 15+ years, yet organizations are still struggling to eliminate AppSec issues like SQL injection and XSS vulnerabilities because these scanning tools look at vulnerabilities through a vulnerability lens, not a contextual risk lens. The post Improving AppSec With Application Security Posture Management appeared first on Security Boulevard. [...] 29 March 2022  Any mission-critical workloads require full lifecycle security coverage, and a zero-trust security approach can proactively protect your pipeline, supply chain, test environments and the critical production runtime environment. Container applications, the Kubernetes platform (API service, plugins, service mesh, etc.) and hosts themselves also need to be secured as a full cloud-native stack. In this webinar,.. The post Zero-Trust Security for Kubernetes and Container Workloads appeared first on Security Boulevard. [...] 28 March 2022 Cloud computing platforms are rife with misconfigurations, largely because they are provisioned by developers with little cybersecurity experience using infrastructure-as-code (IaC) tools. As a result, it’s up to cybersecurity teams to first discover these vulnerabilities and then define the workflow processes required to remediate them. The challenge is, the rate at which application workloads are.. The post Securing the Cloud appeared first on Security Boulevard. [...] 25 March 2022 Secure software delivery for modern applications requires security tooling that can be integrated neatly into the iterative DevOps model, automating security controls directly into the developer workflow to find and fix issues proactively, before those workloads reach production. The post Integrate Security Controls Wherever You Build Applications appeared first on Security Boulevard. [...]

Magalix Frequently Asked Questions (FAQ)

  • When was Magalix founded?

    Magalix was founded in 2017.

  • Where is Magalix's headquarters?

    Magalix's headquarters is located at 10778 240th Avenue NE, Redmond.

  • What is Magalix's latest funding round?

    Magalix's latest funding round is Acquired.

  • How much did Magalix raise?

    Magalix raised a total of $3.2M.

  • Who are the investors of Magalix?

    Investors of Magalix include Weaveworks, Trend Forward Capital, WTIA Founder Cohort Program and 500 Global.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.