Founded Year

2015

Stage

Unattributed VC | Alive

Total Raised

$265M

About Aqua Security

Aqua Security enables enterprises to secure their virtual container environments from development to production, accelerating container adoption and bridging the gap between DevOps and IT security. Aqua's Container Security Platform provides full visibility into container activity, allowing organizations to detect and prevent suspicious activity and attacks in real time. Integrated with container lifecycle and orchestration tools, the Aqua platform provides transparent, automated security while helping to enforce policy and simplify regulatory compliance.

Aqua Security Headquarter Location

40 Tuval St. Sapir Tower, 35th floor

Ramat Gan, 525224,

Israel

+972-3-688-8799

Aqua Security's Product Videos

ESPs containing Aqua Security

The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.

EXECUTION STRENGTHMARKET STRENGTHLEADERHIGHFLIEROUTPERFORMERCHALLENGER
Healthcare / Cybersecurity

These solutions secure cloud infrastructure (e.g., containers, microservices), control cloud access, and ensure appropriate cloud configurations and security policies.

Aqua Security named as Highflier among 9 other companies, including Netskope, Wiz, and Menlo Security.

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Aqua Security's Products & Differentiation

See Aqua Security's products and how their products differentiate from alternatives and competitors

  • Aqua Platform

    The Aqua Platform provides prevention, detection, and response automation across the entire application lifecycle to secure the build, secure cloud infrastructure and secure running workloads wherever they are deployed, across containers, serverless, and VMs, in private, hybrid, and public clouds.

    Differentiation

    The most integrated Cloud Native Application Protection Platform (CNAPP) on the market 

Expert Collections containing Aqua Security

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Aqua Security is included in 4 Expert Collections, including Unicorns- Billion Dollar Startups.

U

Unicorns- Billion Dollar Startups

1,180 items

R

Regtech

1,499 items

Technology that addresses regulatory challenges and facilitates the delivery of compliance requirements in FIs. Regulatory technology helps FIs and regulators address challenges ranging from traditional compliance and risk management to data reporting and transmission.

C

Cyber Defenders

29 items

Our selected startups are early- to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. Unicorns valued at $1B+, companies that have raised funding past the Series C stage, and companies that have not raised funding since 2016 ar

C

Cybersecurity

4,937 items

Latest Aqua Security News

Aqua Security Finds New Cryptojacking Technique

Aug 11, 2022

Aqua Security Finds New Cryptojacking Technique Aqua Security this week issued an alert about a new type of cryptojacking attack that uses containers to consume network bandwidth rather than CPU resources to mine cryptocurrencies. Assaf Morag, lead data analyst for Aqua Security, says while the company has found instances of this new attack vector in the wild there have been no reports of this type of attack actually being launched. However, this attack vector is likely to prove significant because this new approach results in only a moderate increase in CPU utilization. That approach allows cryptominers to stay under the radar of security tools that rely on CPU utilization rates to identify these attacks, notes Morag. The containers embed a piece of software called packetcrypt that was created to enable a decentralized blockchain platform, dubbed PKT cash, that allows individuals to earn money by sharing their internet bandwidth. Cryptojackers are now using that tool to mine cryptocurrencies by consuming network resources. While cryptojacking is often viewed as a nuisance crime, it can lead to more lethal attacks being launched later, if not identified early and stopped. It’s not uncommon for purveyors of cryptomining attacks to resell the techniques they employed to compromise an IT environment to other cybercriminals looking to, for example, launch a ransomware attack by embedding more lethal malware in a similar container. The cost of cryptojacking attacks also tends to increase over time as cryptominers inevitably consume more resources. In general, cryptojacking attacks are getting more difficult to detect as cybercriminals use a range of evasive techniques to avoid detection. They are also counting on organizations lacking extensive container security capabilities. Many container application environments are maintained by developers that have limited cybersecurity expertise. They often assume that because containers only run for a few seconds that cybercriminals won’t target them. However, the infrastructure used to run containers does present a fertile opportunity for cryptojackers that exploit containers to surreptitiously mine cryptocurrencies. As more organizations review the security of their software supply chains in the wake of a series of high-profile breaches, it’s likely more cryptojacking attacks will be discovered and blocked. As that starts to occur, however, organizations should assume cybercriminals will not simply go away. Instead, they will simply adjust their tactics. In the meantime, the appreciation for container security continues to grow. In fact, container adoption is one of the primary reasons more organizations are embracing DevSecOps practices to secure highly dynamic application environments. The challenge, of course, is that it may take months or even years to fully implement those practices and, even then, not every development team is going to have consistently implemented them. As such, it’s critical for IT operations and security teams to make sure security policies are implemented both during that application development process and at runtime. Otherwise, developers will continue to make mistakes that cybercriminals can exploit. Mike Vizard Mike Vizard is a seasoned IT journalist with over 25 years of experience. He also contributed to IT Business Edge, Channel Insider, Baseline and a variety of other IT titles. Previously, Vizard was the editorial director for Ziff-Davis Enterprise as well as Editor-in-Chief for CRN and InfoWorld. TechStrong TV – Live Email* 30 August 2022 Do DevOps teams see AI’s potential in their development pipelines? If so, where do they expect the most significant impact? Are there differences in value expectations from AI-infused DevOps based on DevOps maturity level or geographic region? Those questions and more are part of a new study from Techstrong Research: AI-Augmented DevOps: The Next Frontier. […] The post DevOps Unbound: Report on AI-Augmented DevOps appeared first on DevOps.com. [...] 24 August 2022 Continuous delivery is a best practice goal for many teams who want to innovate faster. But the risk of constantly exposing new code to end users is one that some organizations simply cannot tolerate. Production errors create costly downtime—leaving engineering teams frustrated, customers dissatisfied and the business at a loss. What if you could reap […] The post Modern Data Protection With Metallic DMaaS: Hybrid, Kubernetes and Beyond appeared first on DevOps.com. [...] 23 August 2022 ScyllaDB engineers will provide an inside look at innovations dev teams are using to squeeze every ounce of performance from modern cloud infrastructure, accommodate volatile traffic without over-provisioning, gain the advantage of external caching without the associated hassle and risks, and prioritize the performance of latency-sensitive transactional workloads over higher throughput analytics workloads in the […] The post Transforming the Database: Critical Innovations for Performance at Scale appeared first on DevOps.com. [...] 18 August 2022 Are you writing Terraform? Making the move to infrastructure-as-code (IaC)? Here are five things to look out for to make sure Terraform is secure and compliant by design as you’re building. In this workshop, we’ll identify common Terraform “gotchas” and best practices for: Building a workload Terraform modules Networking Data encryption and data at rest […] The post Best Practices For Writing Secure Terraform appeared first on DevOps.com. [...] 18 August 2022 During this webinar, Jeff McCollum, senior director of product development, and Wendy Flowers, senior value stream architect, Planview (formerly Tasktop), discuss the must-have integration capabilities your organization needs to measure and communicate a return on your investment. The post The ROI of Integration: Must-Have Capabilities to Maximize Efficiency and Communication appeared first on DevOps.com. [...] 30 August 2022 Join the CISO Talk Master Class live conversation. Part 6 brings all the elements into a cohesive, integrated strategy: continuous security strategy, leveraging frameworks, effective response strategies, growing next-gen security experts and communications that win and combat confusion. Join hosts Mitch Ashley and Mat Newfield and an elite panel of cybersecurity experts as they bring.. The post CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together appeared first on Security Boulevard. [...] 24 August 2022 Traditional security monitoring architecture is plagued with data silos, performance issues and delays in retrieving archived data—and has been haunting security teams for years. Many analysts that continue to operate with an antiquated SIEM architecture stack also experience a high volume of alerts—with many false positives. Luckily, the internal security team at Snowflake found a.. The post Implementing Identity Access Prioritization and Risk-Based Alerting for High-Fidelity Alerts appeared first on Security Boulevard. [...] 22 August 2022 Join us as we explore the rapidly evolving application and API landscape and offer concrete ways organizations can protect against threats to their application code, APIs and related components. The post API Security appeared first on Security Boulevard. [...] 17 August 2022 This webinar examines code tampering risks, shares lessons learned from recent incidents and proposes a four-pillar approach to reducing code tampering risk through: Integrity validation: Confirming files and artifacts across each phase of the SDLC Anomaly detection: Connecting dots from disparate systems to identify breaches Critical code monitoring: Determining which code to monitor for any.. The post Code Tampering: Four Keys to Pipeline Integrity appeared first on Security Boulevard. [...]

Aqua Security Web Traffic

Rank
Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

Aqua Security Rank

  • When was Aqua Security founded?

    Aqua Security was founded in 2015.

  • Where is Aqua Security's headquarters?

    Aqua Security's headquarters is located at 40 Tuval St., Ramat Gan.

  • What is Aqua Security's latest funding round?

    Aqua Security's latest funding round is Unattributed VC.

  • How much did Aqua Security raise?

    Aqua Security raised a total of $265M.

  • Who are the investors of Aqua Security?

    Investors of Aqua Security include Capital One Ventures, TLV Partners, M12, Lightspeed Venture Partners, Insight Partners and 6 more.

  • Who are Aqua Security's competitors?

    Competitors of Aqua Security include AppOmni, BetterCloud, JupiterOne, VMware, Traceable AI, Armo, Obsidian Security, Ermetic, Salt Security, Lacework and 26 more.

  • What products does Aqua Security offer?

    Aqua Security's products include Aqua Platform.

  • Who are Aqua Security's customers?

    Customers of Aqua Security include NCR, Thoughtworks and Gitlab.

You May Also Like

W
Wiz

Wiz operates as a cloud security company that allows companies to secure their cloud infrastructure at scale. Wiz delivers a contextual risk assessment of a client's cloud with the aims of enabling a reduction in security alerts, a clear action plan, and cloud hygiene at scale.

Lacework Logo
Lacework

Lacework is a late-stage technology firm that develops a complete security platform for the entire IT infrastructure, from DevOps and orchestration environments to cloud and hybrid workloads. Lacework is designed to self-adapt to the cloud's ever-changing configurations to provide visibility and intrusion detection that helps enterprises keep their data and resources safe. The firm serves a wide variety of industries that require intrusion detection. Lacework was founded in 2015 and is based in San Jose, California.

Orca Security Logo
Orca Security

Orca Security is a cloud visibility company. Its Orca Cloud Visibility Platform utilizes its SideScanning technology to deliver full-stack visibility into the entire cloud infrastructure and assets.

Salt Security Logo
Salt Security

Salt Security is an API security platform that prevents zero-day API breaches. Salt detects attack attempts before other solutions alarms are tripped.

Menlo Security Logo
Menlo Security

Menlo Security protects organizations from cyber attack by eliminating the threat of malware. Menlo Security's Isolation Platform isolates all Web content in the cloud, enabling users to safely interact with websites, links and documents online without compromising security. Its Adaptive Clientless Rendering (ACR) technology deploys within minutes and can scale to provide comprehensive protection across organizations of any size without impacting the user experience.

Ermetic Logo
Ermetic

Ermetic is a platform for managing user and service permissions across cloud environments.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.