Search company, investor...
StackRox company logo

The profile is currenly unclaimed by the seller. All information is provided by CB Insights.

Founded Year



Acquired | Acquired

Total Raised


About StackRox

StackRox provides adaptive threat protection for containers. StackRox delivers a security platform using instrumentation and sophisticated machine learning to protect the agile enterprise.On January 7, 2021, StackRox was acquired by Red Hat. The terms of the transaction were not disclosed.

StackRox Headquarters Location

100 View Street Suite 204

Mountain View, California, 94041,

United States


Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Research containing StackRox

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned StackRox in 1 CB Insights research brief, most recently on Jan 20, 2021.

Expert Collections containing StackRox

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

StackRox is included in 3 Expert Collections, including Cyber Defenders.


Cyber Defenders

28 items

Our selected startups are early- to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity.Unicorns valued at $1B+, companies that have raised funding past the Series C stage, and companies that have not raised funding since 2017 are


Artificial Intelligence

9,391 items

This collection includes startups selling AI SaaS, using AI algorithms to develop their core products, and those developing hardware to support AI workloads.



4,937 items

StackRox Patents

StackRox has filed 1 patent.

patents chart

Application Date

Grant Date


Related Topics




Linux kernel features, Operating system technology, Software architecture, Operating system security, Computer network security


Application Date


Grant Date



Related Topics

Linux kernel features, Operating system technology, Software architecture, Operating system security, Computer network security



Latest StackRox News

Why Kubernetes is riding high... and why complexity may be its undoing

Jun 1, 2022

Why Kubernetes is riding high... and why complexity may be its undoing Jun 1, 2022 It’s been around for a while but is now being adopted at speed for managing applications at the edge But many believe that Kubernetes was written to maximise developer productivity at the expense of security That apparent drawback may already be slowing adoption Kubernetes is popping up everywhere this year and by now should be a very bright blip on the digital service provider (DSP) radar. Whatever roles and alliances form at the busy intersection of 5G, cloud, the edge and corporate networks, it’s now clear that Kubernetes will likely play a huge part in the way the applications, and the ways in which they are used, evolves. That, in turn, means that telcos with aspirations to “go beyond connectivity” need to be taking notice of what looks like the primary way of getting those manageable and secure applications out to users via edge platforms and containers. Kubernetes was originally Google’s own container orchestration platform, enabling it to horizontally scale its applications to ensure availability. Google Cloud claims the Kubernetes mission was, and is, to “automate the operational tasks of container management, and it includes built-in commands for deploying applications, rolling out changes, scaling them up and down to fit changing needs, and monitoring them for ease of management.” Google ‘open sourced’ the code in 2014 and it’s now being developed and administered by the Cloud Native Computing Foundation (CNCF). The CNCF claims its research shows that one sign of Kubernetes’ increasing adoption is the rate at which back-end developers have made it the most widely used orchestration platform, with around a third of them having adopted it. According to Daniel Bartholomew, the founder and CTO at ‘edge-as-a-service’ specialist Section , the finding shouldn’t come as a surprise. Writing a post in Thenewstack – which is sponsored by the CNCF – he outlines why he thinks edge developers in particular are embracing Kubernetes (or K8s as it is known – eight letters in the name after ‘K’ and before ‘s’) having chalked up an 11% increase in adoption in the past year. For context, Bartholomew says that the level of new adoption is three times the overall increase in the number of developers. Why so popular? Bartholomew maintains the key is that “the light-weight portability of containers makes them ideally suited to distribution, while their abstraction means they can be deployed to heterogeneous computer networks.” Kubernetes provides the much-needed orchestration required to coordinate the “distributed multi-region, multi-cluster, multi-provider topology” that is increasingly the norm. So, the industry and its users appear to be adopting Kubernetes, and developers, being a bright bunch, have sensed the way the wind is blowing and are getting to grips with Kubernetes to be on hand as the industry scrambles to find the necessary expertise. But it’s not all unfettered growth and sunny uplands. Kubernetes as currently arrayed comes with an alleged complexity and security downside, according to Red Hat and others. Red Hat says its OpenShift 4.10 Application platform was actually built around containers and Kubernetes, but it reports that deployment is difficult and that much of the problem centres on security. Its State of Kubernetes security for 2022 report compiled from responses by 300 DevOps, engineering, and security professionals, found that 55% of the respondents said they’d had to delay the launch of an application during the past year because of security concerns, with more than 90% reporting at least one security incident in their Kubernetes environment in the past 12 months. The report concludes that Kubernetes and containers, while powerful, were often designed for developer productivity at the expense of security. Respondents said they worried far more about misconfigurations in their container and Kubernetes environments than about cyberattacks. Red Hat says it’s working hard to overcome these problems by giving its OpenShift platform some extra capabilities: top of the list is configuration management automation, which it claims should radically reduce the impact of human error. And it has decided to open source its Advanced Cluster Security (ACS) for Kubernetes, acquired last year via its purchase of StackRox. Red Hat claims the StackRox project aims to help simplify DevSecOps (DevOps with security built in) by integrating security capabilities within the development and deployment lifecycle. Complexity Central But the complexity problem may run deeper than this fix might imply. According to Bartholomew, security is at risk wherever complexity starts to get out of hand. What happens, he asks, when you have an evolving and growing ‘distributed edge’ with its hundreds of endpoints, with different microservices being served from different edge locations at different times, running across heterogeneous infrastructure and a multiplicity of different providers? On top of this there is significant developer specialization which compounds the problem since engineers tend to become extremely adept in specific areas where they focus on higher-level languages, tools and applications. When you add in machine learning specialization you end up with teams skilled at pushing models into production but possessing little expertise on the interactions of applications, hardware and networking to troubleshoot issues when they arise. This might mean that some potential users of the distributed edge are “shying away” from the approach. But at present, interest in Kubernetes appears to have solidified and user growth and industry support is strong and growing. For instance Microsoft says it’s looking to enable Kubernetes for “lightweight Windows edge devices,” powering Linux and Windows containerized workloads: The details of this move – known as Project Haven – were discussed at the recent Microsoft's ‘Build 2022’ event . We’ll be discussing the MS move in our next article on K8s. Related Topics

  • When was StackRox founded?

    StackRox was founded in 2014.

  • Where is StackRox's headquarters?

    StackRox's headquarters is located at 100 View Street, Mountain View.

  • What is StackRox's latest funding round?

    StackRox's latest funding round is Acquired.

  • How much did StackRox raise?

    StackRox raised a total of $65.5M.

  • Who are the investors of StackRox?

    Investors of StackRox include Red Hat, Sequoia Capital, Redpoint Ventures, Menlo Ventures, Highland Capital Partners and 5 more.

  • Who are StackRox's competitors?

    Competitors of StackRox include Salt Security, AppOmni, BetterCloud, JupiterOne, VMware, Traceable AI, Obsidian Security, Ermetic, Lacework, Sysdig and 17 more.

You May Also Like

Lacework Logo

Lacework is a late-stage technology firm that develops a complete security platform for the entire IT infrastructure, from DevOps and orchestration environments to cloud and hybrid workloads. Lacework is designed to self-adapt to the cloud's ever-changing configurations to provide visibility and intrusion detection that helps enterprises keep their data and resources safe. The firm serves a wide variety of industries that require intrusion detection. Lacework was founded in 2015 and is based in San Jose, California.


Wiz operates as a cloud security company that allows companies to secure their cloud infrastructure at scale. Wiz delivers a contextual risk assessment of a client's cloud with the aims of enabling a reduction in security alerts, a clear action plan, and cloud hygiene at scale.

Aqua Security Logo
Aqua Security

Aqua Security enables enterprises to secure their virtual container environments from development to production, accelerating container adoption and bridging the gap between DevOps and IT security. Aqua's Container Security Platform provides full visibility into container activity, allowing organizations to detect and prevent suspicious activity and attacks in real time. Integrated with container lifecycle and orchestration tools, the Aqua platform provides transparent, automated security while helping to enforce policy and simplify regulatory compliance. Aqua customers are within financial services, software, media, manufacturing and retail, with implementations across a broad range of cloud providers and modern technology stacks spanning containers, serverless functions and cloud VMs. The company was formerly known as Scalock and changed its name to Aqua Security. It was founded in 2015 and is based in Ramat Gan, Israel.

Salt Security Logo
Salt Security

Salt Security is an API security platform that prevents zero-day API breaches. It detects attack attempts before other solutions alarms are tripped. Its API protection platform helps prevent API attacks, using machine learning and AI to automatically and continuously identify and protect APIs by learning the granular behavior of a company's API. The company was founded in 2016 and is based in Palo Alto, California.

Obsidian Security Logo
Obsidian Security

Obsidian Security is applying artificial intelligence to enable user security for enterprise hybrid-cloud environments. Obsidian Security was founded in 2017 and is based in Newport Beach, California.

Orca Security Logo
Orca Security

Orca Security is a cloud visibility company. Its Orca Cloud Visibility Platform utilizes its SideScanning technology to deliver full-stack visibility into the entire cloud infrastructure and assets.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.