Tigera company logo

The profile is currenly unclaimed by the seller. All information is provided by CB Insights.

tigera.io

Founded Year

2016

Stage

Series B - II | Alive

Total Raised

$53M

Last Raised

$30M | 3 yrs ago

Mosaic Score

+20 points in the past 30 days

What is a Mosaic Score?
The Mosaic Score is an algorithm that measures the overall financial health and market potential of private companies.

About Tigera

Tigera is a provider of integrated, secure, policy-driven cloud-native networking solutions for enterprises looking for secure application and workload delivery across private, public and hybrid clouds. Tigera is solving the networking and security problems inherent in deploying and enforcing policy in large private, public, and hybrid enterprise clouds.

Tigera Headquarter Location

58 Maiden Lane 5th Floor

San Francisco, California, 94108,

United States

415-612-9546

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Research containing Tigera

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned Tigera in 1 CB Insights research brief, most recently on Mar 26, 2020.

Expert Collections containing Tigera

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Tigera is included in 2 Expert Collections, including Cyber Defenders.

C

Cyber Defenders

29 items

Our selected startups are early- to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. Unicorns valued at $1B+, companies that have raised funding past the Series C stage, and companies that have not raised funding since 2016 ar

C

Cybersecurity

4,886 items

Tigera Patents

Tigera has filed 17 patents.

The 3 most popular patent topics include:

  • Cloud computing
  • Cloud infrastructure
  • Cloud platforms
patents chart

Application Date

Grant Date

Title

Related Topics

Status

12/17/2019

3/29/2022

Key management, Cryptography, Transport Layer Security, Cryptographic protocols, Public key infrastructure

Grant

Application Date

12/17/2019

Grant Date

3/29/2022

Title

Related Topics

Key management, Cryptography, Transport Layer Security, Cryptographic protocols, Public key infrastructure

Status

Grant

Latest Tigera News

Container Security Challenges Impacting Pace of App Dev

May 4, 2022

Container Security Challenges Impacting Pace of App Dev A global survey finds 96% of respondents reporting their companies are experiencing cloud-native application challenges that are leading to slower deployment cycles, with more than two-thirds (67%) naming security as the top challenge. The survey was conducted by Tigera, a provider of a cloud-native application protection platform (CNAPP) based on open source Project Calico software, and polled 304 security and IT professionals. A full 98% of respondents noted they needed to invest in container security, with runtime security topping the list. A full 99% of companies also require network security, with well over two-thirds (69%) also identifying container-level firewalls as the top need. The survey also suggests organizations are encountering significant compliance challenges. A total of 87% of respondents said meeting compliance requirements is critical, with 84% of respondents reporting that meeting compliance requirements for cloud-native applications is challenging. Nearly two-thirds (63%) said their organization must provide container-level information for compliance requirements, with 90% saying audit reports are challenging to produce. Overall, the survey finds three-quarters of respondents (75%) reporting that their organizations are focusing on development on cloud-native applications. The survey also finds 97% of respondents encountering observability challenges with cloud-native applications, with three-quarters (76%) needing visualization into container runtimes. A full 99% of respondents said containers require access to other applications and services. Utpal Bhatt, chief marketing officer for Tigera, says the survey makes it clear that while securing container runtimes is the highest priority, there is now a greater appreciation for the need for container firewalls, as well. The fundamental challenge is that a lack of visibility into container environments makes it challenging to enforce security policies that might prohibit one microservice from interacting with another, he adds. That issue will only become more pressing as the number of workloads being deployed on container platforms continues to grow. Gartner estimates that by 2025 more than 95% of new digital workloads will be deployed on cloud-native platforms, up from 30% in 2021. The primary security challenge containers create is that it is simply too easy for developers to inadvertently employ containers to encapsulate software components with known vulnerabilities. In theory, organizations are embracing DevSecOps best practices to shift more responsibility for application security further left toward developers. However, it’s not likely developers will broadly acquire the cybersecurity expertise required to ensure the integrity of software supply chains. At the same time, cybercriminals are starting to take advantage of the lack of observability into container runtime environments to inject rogue containers loaded with malware. IT and security teams need to make sure only validated containers are allowed to run. The issue, of course, is that the need for additional security may require development teams to slow down so those policies can be consistently enforced. Mike Vizard Mike Vizard is a seasoned IT journalist with over 25 years of experience. He also contributed to IT Business Edge, Channel Insider, Baseline and a variety of other IT titles. Previously, Vizard was the editorial director for Ziff-Davis Enterprise as well as Editor-in-Chief for CRN and InfoWorld. TechStrong TV – Live Email* 17 May 2022 According to the 2022 Open Source Security and Risk Analysis (OSSRA) report, the overwhelming majority of software development organizations are leveraging open source to build their applications. However, the scale of use creates a growing management challenge. While development and risk management teams scramble to patch vulnerabilities, decipher complex license terms governing obligations associated with […] The post Applying the 2022 OSSRA Findings to Software Supply Chain Risk Management appeared first on DevOps.com. [...] 17 May 2022 Jenkins is widely adopted for continuous integration (CI). Many organizations extend Jenkins with scripts and plug-ins to perform continuous delivery (CD) and deployments. Whether deploying to Kubernetes, VM, hybrid or multi-cloud environments, there is a better approach to implementing CD on top of Jenkins than using scripts and manual processes. The post Modernizing Jenkins Pipelines With CD Automation appeared first on DevOps.com. [...] 12 May 2022 Wondering why a vulnerable plugin was installed? Having difficulties operating efficiently with disk utilization and performance issues, even teams that have gone rogue and created their own sprawl of Jenkins instances? Scaling for growth is not easy with the hardships presented in open -source CI software. At CloudBees, we make it seamless. The post Managing CI at Scale With CloudBees appeared first on DevOps.com. [...] 11 May 2022 Imagine a world in which applications automatically get the precise infrastructure they require, cloud environments are fully optimized and cloud teams are free from tedious, manual tasks and instead focus on work that drives innovation. That’s the promise of CloudOps. The post CloudOps: Achieving Continuously Optimized Cloud Infrastructure appeared first on DevOps.com. [...] 11 May 2022 Kubernetes is hard, and it can be easy for imposter syndrome to rear its head when you’re trying to figure out how all the different pieces fit together and interact. This happens over and over in organizations at all stages of maturity, and common mistakes are made in the areas of security, networking, scalability, storage […] The post Kubernetes Open Source Validation appeared first on DevOps.com. [...] 1 June 2022 Cloud and DevOps practices blur the boundary between application development and the production cloud environment. Solutions that satisfy the needs of only the development team or the security and operations teams in isolation don’t help where organizations need it the most: reducing security risk while also increasing the speed of application delivery. The post Security From Code to Cloud and Back to Code appeared first on Security Boulevard. [...] 1 June 2022 Protecting applications and APIs has always been hard. Now, with an ever-evolving tech stack, it’s even harder. This webinar will outline a clear plan for your application and API security program. The post The 2022 Guide to API Security appeared first on Security Boulevard. [...] 26 May 2022 Despite the vast array of security measures adopted by organizations, we continue to see the repercussions of software vulnerabilities. Drawing insights from the recent report, “The State of Developer-Driven Security Survey 2022,” Secure Code Warrior co-founders Pieter Danhieux and Matias Madou will discuss the findings and challenges around current secure coding practices and identify opportunities.. The post Challenges and Opportunities for Improving Secure Coding Practices appeared first on Security Boulevard. [...] 23 May 2022 If you think ransomware is bad now, well, just wait—it’s going to get a whole lot worse. As ransomware attacks and attackers become more sophisticated, cybercriminal gangs will rely less on broad-based attacks and more on remote code execution using malware designed for specific targets. Essentially, cybercriminals that launch ransomware attacks are becoming more efficient... The post Defending Against Emerging Ransomware Threats appeared first on Security Boulevard. [...] 19 May 2022 There’s been an alarming increase in software supply chain attacks in the past few years. And while you never know exactly when and how the next attack will unfold, it’s certain that more software supply chain attacks will happen. Based on industry research and real-world stories from the trenches, we will examine the different types.. The post The Hidden Software Supply Chain Risks That Can Ruin Your 2022 appeared first on Security Boulevard. [...]

Tigera Web Traffic

Rank
Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

Tigera Rank

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.