Search company, investor...
Search

Founded Year

2015

Stage

Series C | Alive

Total Raised

$38M

Last Raised

$20M | 3 yrs ago

About Trusona

Trusona offers a fully passwordless authentication technology platform that enables organizations to mitigate virtually all risk associated with compromised credential attacks by reducing their attack surface. The company’s UI enables users to log in to any platform on any device without usernames or passwords across all enterprise use cases.

Trusona Headquarters Location

8767 East Via de Ventura

Scottsdale, Arizona, 85258,

United States

888-878-7662

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Trusona's Products & Differentiation

See Trusona's products and how their products differentiate from alternatives and competitors

  • Trusona for Workforce

    An enterprise-wide approach to workforce solutions results in authentication that integrates with all ends of the enterprise stack. From cloud software to VPN, Trusona has the ability to integrate with all existing systems for seamless identity proofing and multi-factor authentication.

    Differentiation

    Passwordless Identity Authentication for employees and consumers 

    Broadest enterprise-wide coverage 

    Authentication from: Trusona app, the customer app, or app-less 

    Patented Anti-Replay technology preventing session replay attacks 

    Step-up authentication with document-scanning 

    ID Proofing verification options: AAMVA, MNO, email, IP 

    Unmatched UX, without sacrificing security 

  • Subscribe to see more

    We're on a mission to enable every organization to make smarter decisions about tech. Whether it's finding a new game-changing vendor or understanding a new market, it's easier, faster and smarter with CB Insights. All made possible by the smartest, hardest-working team in tech. Subscribe to see more.

    Differentiation

    We're on a mission to enable every organization to make smarter decisions about tech. Whether it's finding a new game-changing vendor or understanding a new market, it's easier, faster and smarter with CB Insights. All made possible by the smartest, hardest-working team in tech. Subscribe to see more.

Research containing Trusona

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned Trusona in 2 CB Insights research briefs, most recently on Feb 24, 2022.

Expert Collections containing Trusona

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Trusona is included in 2 Expert Collections, including Banking.

B

Banking

1,133 items

C

Cybersecurity

4,937 items

Trusona Patents

Trusona has filed 18 patents.

The 3 most popular patent topics include:

  • Computer network security
  • Payment systems
  • Transaction processing
patents chart

Application Date

Grant Date

Title

Related Topics

Status

6/5/2019

12/7/2021

Oko, Computer network security, Password authentication, Authentication methods, Computer access control protocols

Grant

Application Date

6/5/2019

Grant Date

12/7/2021

Title

Related Topics

Oko, Computer network security, Password authentication, Authentication methods, Computer access control protocols

Status

Grant

Latest Trusona News

Infosec products of the month: May 2022

Jun 1, 2022

Infosec products of the month: May 2022 Here’s a look at the most interesting products from the past month, featuring releases from: AuditBoard, BIO-key, Cohesity, Corelight, Data Theorem, Deepfence, ForgeRock, Fortinet, Hunters, Enpass, iDenfy, Kasten by Veeam, Kingston Digital, Microsoft, N-able, Nasuni, Netenrich, Orca Security, PIXM, Qualys, SafeGuard Cyber, SecureAge, Skybox Security, Sonatype, Trusona, and Uptycs. Qualys Custom Assessment and Remediation empowers security teams to counter threats like zero-day attacks Qualys Custom Assessment and Remediation opens the Qualys Platform for security architects allowing the creation of custom scripts in popular scripting languages, user-defined controls and automation, all seamlessly integrated within existing programs to quickly assess, respond and remediate threats across your global hybrid environment. Microsoft announces Microsoft Defender for Business (for SMBs) Microsoft has announced the stand-alone version of Microsoft Defender for Business , which aims to bring enterprise-grade endpoint security to SMBs, including endpoint detection and response capabilities to protect against ransomware and other sophisticated cyberthreats. N-able Cove Data Protection provides cloud-first backup and disaster recovery for businesses Cove Data Protection provides streamlined, cloud-first backup, disaster recovery, and archiving for physical and virtual servers, workstations, and Microsoft 365 data, managed from a single web-based dashboard. It also delivers fully managed cloud storage, with 30 data centers to keep backups stored in region, to respect data sovereignty. BIO-key MobileAuth enhancements safeguard access to critical data BIO-key announced upgrades to BIO-key MobileAuth, a multi-factor authentication (MFA) mobile app that integrates the power of IBB across multiple authentication modalities, allowing customers to build a more complete MFA strategy. In addition to the newest IBB-powered modalities, MobileAuth supports device-based biometric authentication methods including Apple Face ID, Touch ID, and Android Biometrics, as well as support for push token authentication. Enpass Business allows organizations to choose where they store their data With Enpass Business , all passwords remain within the trusted boundaries of the organization’s local IT systems. Enterprises have the option to store data on employee devices, or use their existing cloud storage, enabling them to maintain control over their data without the need to host additional servers. Data Theorem Supply Chain Secure identifies third-party vulnerabilities across the application software stack Data Theorem’s new supply chain product can automatically categorize assets under known vendors, allow customers to add additional new vendors, curate individual assets under any vendor, and alert on increases in policy violations and high embed rates of third-party vendors within key applications. Uptycs helps users strengthen security posture with CIEM capabilities Uptycs announced new cloud infrastructure entitlement management (CIEM) capabilities that strengthen its cloud security posture management (CSPM) offering. These new capabilities provide Security and Governance, Risk, and Compliance teams with continuous monitoring of cloud services, identities, and entitlements so they can reduce their cloud risk. AuditBoard introduces enhanced automation capabilities to accelerate compliance management AuditBoard announced a set of new automation capabilities for its CrossComply solution. These features combine automation with scalability to accelerate security compliance programs with automated framework mapping, evidence collection, and continuous monitoring, as well as providing the ability for teams to leverage applications and data sources. SecureAge CatchPulse safeguards enterprises against complex security threats CatchPulse provides always-on, real-time protection to catch threats by simply blocking all unauthorised applications, processes or scripts from executing. It helps organisations stay one step ahead of unknown threats and offers a simple experience for users of all levels, from novice home users to IT professionals. Nasuni Ransomware Protection defends critical business data against ransomware attacks Nasuni announced Nasuni Ransomware Protection , a new add-on service to the latest release of the Nasuni File Data Platform that offers an in-line ransomware edge detection capabilities for file data. The new service gives businesses confidence that their file data can not only be quickly recovered following an attack, but that they can now detect live attacks and reduce the time and resources needed to uncover the source of the threat. ForgeRock Autonomous Access prevents identity-based cyber attacks and fraud Autonomous Access uses the power of artificial intelligence (AI) to monitor login requests in real time, blocking malicious attempts and adding authentication steps when it detects anomalous behaviors. Orca Security unveils Shift Left Security capabilities to prevent cloud application issues Orca Security announced a cloud security solution to provide context-aware Shift Left Security for cloud infrastructure and applications. Orca’s new command-line interface (CLI) called Orca CLI enables developers and DevOps teams to scan locally hosted images and IaC templates, view results directly in developer tools, and surface findings within the Orca platform. Sonatype launches solution to remediate malicious and outdated InnerSource components Sonatype announced a capability focused on identifying and remediating InnerSource components that contain vulnerable, malicious, or outdated open source dependencies. With InnerSource Insight , developers can manage their InnerSource components, see what open source packages they’re dependent on, remediate concerns immediately, and identify safe upgrade paths that won’t break builds. iDenfy introduces Business Verification platform to help customers detect bogus companies iDenfy’s Business Verification services will offer custom automatizations in one API, helping businesses to screen other companies and detect criminal activity. According to the images, iDenfy distinguishes whether it is a dormitory, a residential house, a commercial premise, or a luxury office. The new Business Verification services even determine the company’s office rental price. Cohesity FortKnox helps organizations combat sophisticated attacks and accelerate recovery Cohesity released Cohesity FortKnox — a SaaS data isolation and recovery solution, adding to the company’s Data Management as a Service portfolio of offerings that run on AWS. It is designed to provide an additional layer of off-site protection while simplifying operations and lowering costs compared to magnetic-tape and self-managed data vaults. Deepfence Cloud protects cloud native applications and infrastructure against cybersecurity threats Deepfence Cloud , built on the ThreatStryker offering from Deepfence, observes runtime indicators of attack (IoA) and indicators of compromise (IoC) and correlates events to tell the story of each attack as it evolves. With Deepfence Cloud, enterprises can easily tap into ThreatStryker to provide targeted security for their applications against known and unknown threats in real time. Kasten by Veeam K10 V5.0 provides secure backup and recovery for Kubernetes data and applications Kasten by Veeam announced the new Kasten by Veeam K10 V5.0 Kubernetes data management platform. Purpose-built for Kubernetes, this latest release is focused on delivering a comprehensive risk management strategy, streamlined CI/CD pipelines and new ecosystem advancement details that optimize and de-risk Kubernetes investments. Skybox Security unveils cyber risk quantification capabilities to help users prioritize critical threats Leveraging its proprietary network modeling techniques, Skybox will now quantify the business impact of cyber risks into economic impact. This new financial calculation enables customers to identify and prioritize the most critical threats based on the size of financial impact, among other risk analyses. Trusona Authentication Cloud delivers passwordless sign-ins without an app Trusona announced Trusona Authentication Cloud , a low-code, cloud-based service that enables users to authenticate without a password using smartphones, laptops and desktop computers. It can also serve as a secure, low-cost replacement for SMS OTP (one-time passcode) authentication. PIXM Mobile provides real-time protection from phishing attacks on mobile devices PIXM Mobile is a cloud-based mobile solution developed with Computer Vision (CV) cybersecurity technology to identify phishing attacks on mobile devices and stop them in real-time, as a user clicks on a malicious link. PIXM Mobile stops phishing on any app, including SMS (“smishing”), social media, and business collaboration apps, as well as email and web-based phishing pages. Kingston Digital releases external SSD with touch-screen and hardware-encryption Kingston Digital released the newest addition to its encrypted lineup, IronKey Vault Privacy 80 External SSD (VP80ES). Featuring a color touch-screen and FIPS 197 certified with XTS-AES 256-bit encryption, VP80ES is designed to protect data while also being user-friendly. It also safeguards against Brute Force attacks and BadUSB with digitally-signed firmware for users from small-to-medium businesses (SMB) to content creators. Corelight Investigator allows security teams to accelerate their threat hunting and investigations Corelight Investigator brings complete visibility of the network, both on-premise and in the cloud, with evidence that spans months and years, not days and weeks. Customers can leverage machine learning, behavioral analysis, threat intelligence and signatures, mapped to the MITRE ATT&CK framework, to enable broad coverage of network-centric threats. SafeGuard Cyber adds email protection for Microsoft 365 to defend customers against sophisticated attacks SafeGuard Cyber announces the addition of email protection for Microsoft 365 to its security suite of protected communication channels. This new release adds a cyber defense layer to the native security provided within Microsoft 365, giving SOC teams the tools to stop difficult to defend social engineering attacks, insider threats, ransomware intrusion, and other advanced threats across the email channel. Netenrich Resolution Intelligence platform allows analysts to view security status of critical assets With the Netenrich platform , security ops becomes proactive using a predict and prevent approach in anticipating risky behaviors, disrupting threats and insuring business resilience. Organizations improve their overall security posture while focusing on business growth. Hunters SOC Platform enhancements enable users to prioritize incidents based on their urgency Hunters announced new capabilities in the Hunters SOC Platform to enhance and accelerate security operations workflows for data ingestion and normalization, threat detection, investigation and response. The advances free up data engineers, security engineers and analysts in Security Operations Centers (SOC) to focus on higher value work, such as dealing with threats and challenges unique to their organizations. FortiNDR identifies cyberattacks based on anomalous network activity and limits threat exposure Fortinet announced FortiNDR , a new network detection and response offering that leverages artificial intelligence and pragmatic analytics to enable faster incident detection and an accelerated threat response. FortiNDR also features native integrations with the Fortinet Security Fabric as well as API integrations with third-party solutions for a coordinated response to discovered threats to minimize their impact. Daily Newsletter - E-mail sent every business day with a recap of the last 24 hours Weekly Newsletter - E-mail sent every Monday with a recap of the last 7 days (IN)SECURE Magazine - E-mail sent when a new issue is released

Trusona Web Traffic

Rank
Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

Trusona Rank

  • When was Trusona founded?

    Trusona was founded in 2015.

  • Where is Trusona's headquarters?

    Trusona's headquarters is located at 8767 East Via de Ventura, Scottsdale.

  • What is Trusona's latest funding round?

    Trusona's latest funding round is Series C.

  • How much did Trusona raise?

    Trusona raised a total of $38M.

  • Who are the investors of Trusona?

    Investors of Trusona include Kleiner Perkins Caufield & Byers, M12, Seven Peaks Ventures, Akamai, Georgian Partners and 3 more.

  • Who are Trusona's competitors?

    Competitors of Trusona include Beyond Identity and 4 more.

  • What products does Trusona offer?

    Trusona's products include Trusona for Workforce and 1 more.

  • Who are Trusona's customers?

    Customers of Trusona include Exeter Financial, Georgian Partners and Power Fashion.

You May Also Like

HYPR Logo
HYPR

HYPR specializes in decentralized biometric security to users across the Fortune 500. The company's FIDO -Certified software is integrated into employee and customer-facing applications to eliminate fraud, enhance user experience, and increase revenue. From banking to mobile payments and even connected cars, HYPR leverages biometric sensors across a fully interoperable architecture to ensure user data is kept private across the Internet of Things.

Stytch Logo
Stytch

Stytch's APIs make it simple to seamlessly onboard, authenticate, and engage users. It improves security and user experience with passwordless authentication.

Beyond Identity Logo
Beyond Identity

Beyond Identity provides computer and network security products and services, specifically passwordless zero trust multi-factor authentication (MFA).

Y
Yubico

Yubico specializes in login authentification, preventing unauthorized access to computers, servers, and internet accounts.The company's core product, YubiKey, protects access to user accounts for large enterprises, requires no driver or client software needed and supports multiple authentication and encryption protocols on all devices and platforms. The company serves enterprises, SMBs, individuals and developers. It was founded in 2007 and is based in Stockholm, Sweden.

strongDM Logo
strongDM

strongDM’s infrastructure access platform gives every business secure access controls in a way folks love to use. strongDM gives businesses the control and visibility they need at the speed they want with one platform that works for every environment.

B
Britive

Britive is a cloud-native security solution built for the most demanding cloud-forward enterprises. The software is based on the.Dynamic Permissioning model, which empowers users and machine IDs to grant themselves pre-authorized privileges Just-In-Time (JIT), returning to a state of Zero Standing Privileges (ZSP) once the admin task is completed to minimize the potential attack surface.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.