Search company, investor...
Obsidian Security company logo

Obsidian Security

Founded Year



Series C | Alive

Total Raised


Last Raised

$90M | 1 yr ago

About Obsidian Security

Obsidian Security is applying artificial intelligence to enable user security for enterprise hybrid-cloud environments. Obsidian Security was founded in 2017 and is based in Newport Beach, California.

Headquarters Location

680 Newport Center Drive Suite 200

Newport Beach, California, 92660,

United States

Obsidian Security's Product Videos

Compete with Obsidian Security?

Ensure that your company and products are accurately represented on our platform.

Research containing Obsidian Security

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned Obsidian Security in 3 CB Insights research briefs, most recently on Jun 9, 2022.

Expert Collections containing Obsidian Security

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Obsidian Security is included in 3 Expert Collections, including AI 100.


AI 100

299 items


Artificial Intelligence

10,627 items

This collection includes startups selling AI SaaS, using AI algorithms to develop their core products, and those developing hardware to support AI workloads.



5,100 items

Obsidian Security Patents

Obsidian Security has filed 2 patents.

The 3 most popular patent topics include:

  • Cloud applications
  • Cloud computing
  • Cloud platforms
patents chart

Application Date

Grant Date


Related Topics




Cloud storage, Cloud platforms, Cloud computing, Cloud applications, Cloud infrastructure


Application Date


Grant Date



Related Topics

Cloud storage, Cloud platforms, Cloud computing, Cloud applications, Cloud infrastructure



Latest Obsidian Security News

Infosec products of the month: April 2023

May 1, 2023

Infosec products of the month: April 2023 Here’s a look at the most interesting products from the past month, featuring releases from: Abnormal Security, Arista Networks, Armorblox, BigID, Binarly, Cofense, Cyera, Cynalytica, D3 Security, Eclypsium, GitGuardian, Guardz, Halo Security, Immuta, Malwarebytes, ManageEngine, Netskope, Obsidian Security, Searchlight Cyber, Sotero, Stamus Networks, ThreatX, Traceable AI, Venafi, Veracode, Versa Networks, Wazuh, and Zyxel Networks. Malwarebytes unveils WorldBytes to help users reveal the hidden cyber threats around them Powered by Malwarebytes and AI technology, WorldBytes empowers users to use their mobile devices to scan the world around them and get real-time threat assessments of anything and everything – including questionable Tinder dates, the unlabeled sauce at the back of their fridge and their neighborhood cat. The responses, powered by ChatGPT, humorously explain the potential cyber risks lurking within. Guardz releases cybersecurity platform for MSPs and IT professionals Guardz’s new MSP cybersecurity platform is an all-in-one solution providing businesses with both 24/7 cyber protection and cyber insurance coverage. Within the platform, MSPs can seamlessly control multiple customers’ cyber posture, subscription plans, and remediation from a single, multi-tenant dashboard. Obsidian’s SSPM solution enables organizations to increase their SaaS security Obsidian Security released its latest suite of SaaS security solutions . This suite of solutions comprising Obsidian Compliance Posture Management, Obsidian Integration Risk Management, and Obsidian Extend will together enable security and GRC teams to increase their SaaS security and compliance posture measurably. Stamus Networks U39 uncovers hidden anomalies in a proactive threat hunt With U39 , Stamus Security Platform users now have access to 21 new guided threat hunting filters and additional sources of threat intelligence, including 2 lateral movement rulesets and 3 suspicious domain lists. SSP can now detect activity from a match on the media type (also known as mime-type) and can ingest additional third-party threat intelligence feeds to trigger a detection event based on a match on IP addresses and domain lists. Cynalytica OTNetGuard provides visibility into critical infrastructure networks Cynalytica has launced its Industrial Control System (ICS/SCADA) monitoring sensor, OTNetGuard , that passively and securely captures analog, serial, and IP communications closing the capabilities gap in complete monitoring of OT networks. GitGuardian Honeytoken helps companies secure their software supply chains With attackers increasingly targeting components in the software supply chain as entry points, GitGuardian’s Honeytoken offers a proactive and pragmatic approach to detect and limit the impact of data breaches. Honeytokens look like real credentials, but don’t grant access to actual customer data, instead only triggering alerts that report the intruder’s IP address. ThreatX Runtime API & Application Protection goes beyond basic observability With ThreatX RAAP , organizations can extend protections beyond the edge and address a myriad of risks to runtime environments, including insider threats, malware, web shells, remote access software, code injections and modifications, and malicious rootkits. BigID’s data minimization capabilities enable organizations to identify duplicate data With BigID’s data minimization and cleanup capabilities, organizations can now automatically find duplicate data quickly and delete it in accordance with retention policies – enabling full data lifecycle management across all of their data, everywhere. Netskope Endpoint SD-WAN helps enterprises accelerate edge networking Announced as the newest addition to the Netskope Borderless SD-WAN portfolio, Netskope Endpoint SD-WAN offers workers anywhere the same level of application experience and security from their laptops or other devices as they would receive in the corporate office, without requiring any hardware. Searchlight Cyber launches Stealth Browser for secure dark web access Stealth Browser eliminates these risks by automatically masking the investigator’s digital fingerprint, allowing both novice and experienced investigators to access Tor and I2P onions on the dark web without risk to themselves or their organization’s infrastructure. Wazuh 4.4 combats breaches, ransomware, and cyberattacks all from a single agent Wazuh launched Wazuh 4.4 , the latest version of its open source security platform. The latest version adds multiple new features, including IPv6 support for the enrollment process and agent-manager connection, and support for Azure integration within Linux agents. Binarly Transparency Platform identifies vulnerabilities and malicious threats in code At the core of the Transparency Platform is a Vulnerability Analysis engine that leverages deep code inspection to detect vulnerabilities within analyzed firmware images. This tool provides organizations with crucial insight into the existence of known vulnerabilities, allowing them to address potential threats before they can be exploited. Zyxel SCR 50AXE boosts network security for small businesses and remote workers The feature-rich SCR 50AXE is a secure cloud-managed router that incorporates a business-class firewall, VPN gateway, WiFi 6E connectivity, and built-in subscription-free security to protect the network from threats including ransomware and malware. Cofense Protect+ defends mid-size organizations from cyber threats Protect+ uses Cofense’s crowd-sourced intelligence and inspects emails in real-time to make instantaneous decisions as to whether emails are malicious. Email attacks are detected upon arrival and are automatically moved away from the user’s inbox. Armorblox releases Graymail and Recon Attack Protection to stop malicious emails Armorblox Graymail and Recon Attack Protection uses advanced machine learning algorithms and large language models to enable the precise detection and classification of graymail, such as newsletters and marketing emails, and unwanted solicitation from a legitimate source. Versa Zero Trust Everywhere strengthens security posture for onsite, remote and hybrid workers With Versa Zero Trust Everywhere , enterprises can now leverage Versa’s AI/ML-powered Unified SASE platform to enable in-line zero trust policy enforcement for both remote workers and onsite/hybrid workers in campus and branch offices. Veracode Fix helps organizations tackle software security issues Veracode Fix is a security-specialist machine learning solution, which uses the same transformer architecture on which Chat GPT is built. It generates secure code patches developers can review and implement to remediate security flaws, without manually coding a fix. D3 Security Smart SOAR improves response to incidents D3 Security has launched its Smart SOAR platform, which expands beyond traditional SOAR with hyperscalable, risk-based autonomous triage and incident remediation across the entire stack. Venafi Firefly enhances the security of machine identities for cloud-native applications Part of the Venafi Control Plane for Machine Identities, Firefly enables security teams to securely meet developer-driven machine identity management requirements for cloud native workloads by issuing machine identities, such as TLS and SPIFFE, locally at high speeds across any environment. Sotero Ransomware Protection encrypts data to prevent theft and extortion Sotero’s patented machine learning capabilities look at patterns or signatures of previously discovered threats at the disk level to identify new threats as they develop. Sotero utilizes a behavior-based approach to detect new strains of ransomware based on how they interact with files and data. Abnormal Security expands its platform and launches new products Abnormal Security launched three new products focused on expanding security detection for Slack, Microsoft Teams and Zoom. The new products will extend the power of the Abnormal platform to detect suspicious messages, remediate compromised accounts and provide insight into security posture across the three applications. ManageEngine releases MSSP Edition of Log360 Cloud ManageEngin launched the MSSP Edition of its cloud-based SIEM solution, Log360 Cloud, designed to address the unique business challenges of MSSPs and thereby drive up their profit margins. Cyera enhances its AI-powered data security platform to stop sensitive data exfiltration Cyera has introduced new operational capabilities in its AI-powered data security platform, to help security teams stop data exfiltration and remediate sensitive data exposures in real time. Immuta releases new data security features to help users accelerate remediation efforts Immuta announced new vulnerability risk assessment and dynamic query classification capabilities for the Immuta Data Security Platform. These new features enable customers to promptly identify and prioritize security gaps, protecting sensitive data based on the context and sensitivity levels. Traceable AI Zero Trust API Access detects and classifies the data that APIs are handling Traceable AI launched Zero Trust API Access to help organizations better protect sensitive data, stop API abuse, and align data security programs with broader innovation and business objectives. Halo Security detects exposed secrets and API keys in JavaScript Halo Security has unveiled a new feature that helps security teams detect unintended exposures. Its agentless solution identifies secrets in scripts used across the attack surface, no matter how they’ve been added, so security teams know what is dangerous and what isn’t. Eclypsium launches Supply Chain Security Platform with SBOM capability Eclypsium released Supply Chain Security Platform , enabling an organization’s IT security and operations teams to continuously identify and monitor the bill of materials, integrity and vulnerability of components and system code in each device, providing insight into the overall supply chain risk to the organization. Arista Networks unveils AI-driven network identity service Based on Arista’s CloudVision platform, Arista Guardian for Network Identity (CV AGNI) expands Arista’s zero trust networking approach to enterprise security. CV AGNI helps to secure IT operations with simplified deployment and cloud scale for all enterprise network users, their associated endpoints, and Internet of Things (IoT) devices. More about

Obsidian Security Frequently Asked Questions (FAQ)

  • When was Obsidian Security founded?

    Obsidian Security was founded in 2017.

  • Where is Obsidian Security's headquarters?

    Obsidian Security's headquarters is located at 680 Newport Center Drive, Newport Beach.

  • What is Obsidian Security's latest funding round?

    Obsidian Security's latest funding round is Series C.

  • How much did Obsidian Security raise?

    Obsidian Security raised a total of $119.5M.

  • Who are the investors of Obsidian Security?

    Investors of Obsidian Security include Greylock Partners, Google Ventures, Wing Venture Capital, Norwest Venture Partners, Menlo Ventures and 3 more.

  • Who are Obsidian Security's competitors?

    Competitors of Obsidian Security include Lightspin, Netskope, AppOmni, Normalyze, Lacework and 8 more.

Compare Obsidian Security to Competitors

Adaptive Shield Logo
Adaptive Shield

Adaptive Shield offers a software-as-a-service (SaaS) security posture management solution. It enables security teams to secure their entire SaaS stack through threat prevention, detection, and response. It was founded in 2019 and is based in Tel Aviv, Israel.

DoControl Logo

DoControl operates as a software as a service (or SaaS) security platform. It provides data access control, data loss prevention, shadow application governance, insider risk management, and more. It offers prevention of data overexposure and exfiltration, protects business-critical data and files, security platform, and more. It was founded in 2020 and is based in New York, New York.

Censornet Logo

Censornet enables organizations to fully embrace the use of the internet and web applications in an increasingly mobile work environment by enabling IT to consistently manage and control security policies across all devices regardless of whether they are in-office or on the move. The company's solutions address the productivity, security and audit issues associated with the growing use of mobile devices to access web applications and implementation of BYOD initiatives within the business environment.

Ermetic Logo

Ermetic is a platform for managing user and service permissions across cloud environments.

Uptycs Logo

Uptycs develops a fast way to deploy osquery at scale. The company provides a cloud solution for system management, anomaly detection, and incident response using a robust analytics platform and out-of-the-box integration with threat intelligence.

Tanium Logo

Tanium gives enterprises and government organizations the ability to secure, control, and manage millions of endpoints across the enterprise within seconds. Serving as the “central nervous system” for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of endpoints across the enterprise, retrieve data on their current and historical state, and execute change as necessary. The company was founded in 2007 and is based in Kirkland, Washington.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.