Search company, investor...
Search

Founded Year

2014

Stage

Series A | Alive

Total Raised

$17.62M

Last Raised

$16M | 2 yrs ago

About Rangeforce

Rangeforce is a cloud-based platform for developing, selling, and executing live, hands-on cyber trainings on real systems, ultimately creating a marketplace for security trainings.

Rangeforce Headquarters Location

10432 Balls Ford Rd Suite 300

Manassas, Virginia, 20109,

United States

ESPs containing Rangeforce

The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.

EXECUTION STRENGTHMARKET STRENGTHLEADERHIGHFLIEROUTPERFORMERCHALLENGER
Financial Services / Cybersecurity

In this market, companies reduce the risk associated with the cybersecurity X-factor — human behavior — by providing cyber training solutions, insider risk detection, phishing defense, and employee risk mapping.

Rangeforce named as Outperformer among 8 other companies, including Proofpoint, IRONSCALES, and Area 1 Security.

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Expert Collections containing Rangeforce

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Rangeforce is included in 2 Expert Collections, including Education Technology (Edtech).

E

Education Technology (Edtech)

2,591 items

C

Cybersecurity

5,100 items

Latest Rangeforce News

Infosec products of the month: July 2022

Aug 1, 2022

Infosec products of the month: July 2022 Here’s a look at the most interesting products from the past month, featuring releases from: Action1, Aqua Security, Cato Networks, CertiK, CoSoSys, CyberArk, Darktrace, Deloitte, EnGenius, Flashpoint, Fusion Risk Management, G-Core Labs, Kingston Digital, LogRhythm, N-able, NetApp, Orca Security, Persona, Rafay Systems, RangeForce, Rapid7, Resecurity, Runecast, Socura, and Teleport. Resecurity Digital Identity Protection defends individuals and businesses from identity theft The Digital Identify Protection solution leverages Resecurity’s threat intelligence data from dark web activity, data leaks, credentials compromise, hacking activity, cyberespionage, supply chain and third-party data breaches — all of which are catalysts for major security incidents. Darktrace PREVENT proactively protects enterprises against sophisticated cyber threats Darktrace launched Darktrace PREVENT , an interconnected set of AI products that deliver a proactive cyber security capability to help organizations pre-empt future cyber-attacks. PREVENT uses AI to ‘think like an attacker,’ finding pathways to an organization’s most critical assets from inside and outside. Fusion Risk Management announces new capabilities to improve incident response for organizations By providing a dynamic approach to incident response, Fusion’s new functionalities enable organizations to understand the full impact of disruption and engage teams, critical partners, and response automation in response and recovery efforts. Organizations now have the power to protect important services and products by resolving incidents faster and preventing future occurrences. RangeForce platform updates enable users to conduct offensive and defensive attack scenarios RangeForce announced it has enhanced its team threat exercises platform with new capabilities that make it easier for organizations to accelerate the skills development of their security teams through multi-user detection and response exercises of emulated attacks. G-Core Labs’ stand-alone solution offers protection against SYN Flood DDoS attacks To provide its customers with better protection against SYN Flood DDoS attacks, G-Core Labs, in cooperation with Intel, have developed a stand-alone solution based on 3rd generation Intel Xeon Scalable processors. This new type of solution removes the need for a dedicated DDoS protection server and evenly distributes volumetric attacks across CDN servers, decreasing the performance requirements for every individual CDN node. Rafay Systems Paralus helps users achieve secure access to Kubernetes clusters Paralus offers access management for developers, architects, and CI/CD tools to remote K8s clusters by consolidating zero-trust access principles such as transaction level authentication and authorization into a single open-source tool. Kingston IronKey Locker+ 50 protects sensitive personal or business data Kingston Digital released IronKey Locker+ 50 (LP50) USB Flash drive that provides consumer-grade security with AES hardware-encryption in XTS mode to safeguard against BadUSB with digitally-signed firmware and Brute Force password attacks. Socura launches Managed Vulnerability Scanning service to help users identify potential vulnerabilities Socura’s MVS service has been designed to help clients identify potential vulnerabilities and misconfigurations across all on- and off-premises systems, including their local network, cloud applications, web applications and mobile devices. LogRhythm platform enhancements accelerate threat response for security teams LogRhythm launched version 7.9 of the LogRhythm SIEM Platform and updates to LogRhythm NDR and LogRhythm UEBA. LogRhythm arms security teams with intelligent analytics and automated responses to reduce cybersecurity exposure, eliminate blind spots and shut down attacks. Updated Action1 RMM enables MSPs and IT departments to automate critical tasks Action1 released a new version of Action1 RMM, empowering MSPs and IT departments to mitigate and remediate security vulnerabilities on their managed endpoints more efficiently — as required to secure and support today’s work-from-anywhere workforce. Flashpoint Automate accelerates repeatable security-related processes Combined with the Flashpoint Intelligence Platform, Flashpoint Automate’s capabilities provide security teams with the additional context needed to ensure they take action on intelligence, prioritize which threats or risks to work on, and remediate those risks from their organization. Deloitte Zero Trust Access protects sensitive enterprise data Deloitte is launching a new managed service, Zero Trust Access . The service is designed to help businesses address the evolving requirements of enterprises to confidently protect their applications, infrastructure and data. It offers a cloud-native service that secures communications between end user devices, and enterprise applications, wherever they may reside. CertiK launches new web3 security features for addressing risk on crypto projects CertiK launched several web3 Skynet security features to bolster end-to-end security for the web3 world. A new Skynet features provide further transparency to consumers around project risk, while also giving credit to projects where needed through badges and honors. N-able N-sight RMM enables MSPs to manage and secure their small to medium enterprise customers N-able announced that it has launched N-able N-sight RMM , the complete solution for growing managed services providers (MSPs). N-sight RMM (RMM, MSP Manager, and Take Control) allow teams to safely access tools and information from nearly anywhere and also enables them to reduce manual efforts and increase operational performance. CyberArk Secrets Hub enables enterprises to accelerate transition to AWS Secrets Hub , part of the CyberArk Identity Security Platform, was developed in cooperation with the AWS Secrets Manager team to deliver effective secrets management in hybrid environments. CyberArk Secrets Hub works by automatically replicating CyberArk-managed secrets (that are intended for use on AWS) to AWS Secrets Manager. CoSoSys Endpoint Protector v5.6 enables users to protect sensitive information CoSoSys launched v5.6 of its Endpoint Protector solution, adding a host of new features to help organizations better protect their sensitive data from insider threats, accidental loss, and compliance breaches. Orca Security helps enterprises detect cloud attacks with Cloud Detection and Response capabilities Orca Security, added Cloud Detection and Response (CDR) capabilities to its agentless Cloud Security Platform. The Orca Platform analyzes cloud provider logs and threat intelligence feeds using machine learning and rules-based heuristics, while also providing automated remediation to prevent security issues from progressing across the software development lifecycle (SDLC). Cato DLP secures and optimizes access to all applications Cato Networks introduced Cato DLP , a Data Loss Prevention (DLP) engine to protect data across all enterprise applications without complex, cumbersome DLP rules. Cato’s access control layer ensures user can only access authorized applications and prevents them from accessing unauthorized resources or malicious sites. Persona Dynamic Flow enables users to verify sensitive identity information Persona launched “ Dynamic Flow ,” a risk response and verification engine that customizes the identity verification (IDV) process in real time for each user and use case. The new release ingests live signals throughout the verification process and uses these signals to adjust each individual’s experience based on their risk profile and the company’s risk tolerance. EnGenius security gateway series helps IT teams protect business networks EnGenius Technologies released its first-ever security gateway product line, bringing enterprise features, enhanced security, and cloud management from anywhere. The ESG series will work seamlessly with any third-party vendor network—all without the complex setup and configuration. Runecast announces new capabilities to simplify Kubernetes security and speed up operations Runecast announced that its patented enterprise platform Runecast has expanded its current Kubernetes Security Posture Management (KSPM) capabilities with advanced image scanning . Running securely on-premises, Runecast automates security compliance checks for Kubernetes with insights into what is happening both on-premises and in the cloud. Rapid7 adds layered context capabilities to its InsightCloudSec platform Rapid7’s addition of layered context provides organizations with a consolidated, resource-oriented view of the most critical risks in their environment, enabling them to more effectively prioritize and remediate issues. Aqua Runtime Protection detects sophisticated attacks in real time Aqua Security launches runtime protection with minimal configuration to stop attacks in real time on running workloads. Protection is composed of new curated and optimised default security controls, as well as threat intel from observations of real attacks on cloud native environments. NetApp Spot Security identifies and assesses cloud security posture risks Spot Security ’s agentless technology analyzes cloud resource relationships to provide clear visibility and prioritized actions, automatically determining the prospective exposure of each cloud resource and surfacing critical security threats based on their potential impact to the organization. These automated actions mitigate alert fatigue and keep cloud infrastructure secure and operations teams efficient. Teleport 10 enables single sign-on to any infrastructure resource without passwords or usernames Teleport 10 features passwordless access, a single sign-on infrastructure access solution that eliminates the need for usernames, passwords, private keys, and other secrets. Integrating secure biometric solutions such as TouchID, Windows Hello, Yubikey BIO, and other biometric hardware, Teleport 10 offers scalable identity-based access while reducing the probability of lost, shared or stolen credentials. Daily Newsletter - E-mail sent every business day with a recap of the last 24 hours Weekly Newsletter - E-mail sent every Monday with a recap of the last 7 days (IN)SECURE Magazine - E-mail sent when a new issue is released

Rangeforce Web Traffic

Rank
Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

Rangeforce Rank

  • When was Rangeforce founded?

    Rangeforce was founded in 2014.

  • Where is Rangeforce's headquarters?

    Rangeforce's headquarters is located at 10432 Balls Ford Rd, Manassas.

  • What is Rangeforce's latest funding round?

    Rangeforce's latest funding round is Series A.

  • How much did Rangeforce raise?

    Rangeforce raised a total of $17.62M.

  • Who are the investors of Rangeforce?

    Investors of Rangeforce include Paladin Capital Group, Trind Ventures, Energy Impact Partners, Cisco Investments, Pitch@Palace and 3 more.

  • Who are Rangeforce's competitors?

    Competitors of Rangeforce include Armorblox, KnowBe4, GoCoach, Guild Education, Mimecast, Material Security, Abnormal Security, Area 1 Security, IRONSCALES, PhishLabs and 19 more.

You May Also Like

Immersive Labs Logo
Immersive Labs

Immersive Labs streams real, practical cyber labs on demand. It has built a gamified, social platform that streams cyber labs to end-users, enabling them to acquire and develop practical skills that are measured and reported to the business's C-suite. The labs span multiple disciplines including secure coding, reverse engineering, ethical hacking, security investigation and response, open-source investigation, and IOT/embedded.

Tessian Logo
Tessian

Tessian is an email security platform that uses machine learning to make sure sensitive or confidential data cannot be sent to the wrong individual. The solution scans historical email data to understand conventional usage patterns and behaviors in companies' email systems. By leveraging machine learning, the platform spots anomalies and give users a chance to correct problems before sending without requiring administration or end user behavior change.

Elevate Security Logo
Elevate Security

Elevate Security is a platform that focuses on shifting human behavior and responses to security threats to prevent breaches.

Proofpoint Logo
Proofpoint

Proofpoint offers an integrated suite of on-demand data protection solutions, including threat protection, regulatory compliance, archiving and governance, and secure communication. Proofpoint's solutions are built on a flexible, cloud-based platform and leverage a number of technologies, including big data analytics, machine learning, deep content inspection, secure storage, and advanced encryption, to address today's threat landscape.On August 31st, 2021, Proofpoint was acquired by Thoma Bravo at a valuation of $12.3B.

Cofense Logo
Cofense

Cofense provides threat management for organizations concerned about human susceptibility to advanced targeted attacks. Cofense's intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. The company's open approach ensures that Cofense integrates easily into the security technology stack, demonstrating measurable results to help inform an organization's security decision making process.

IRONSCALES Logo
IRONSCALES

IRONSCALES enables organizations to mitigate the risk associated with the technological, operational and human challenges inherent to phishing attacks. The company's multi-layered and automated approach to prevent, detect, and respond to phishing emails combines micro-learning phishing simulation and awareness training (IronSchool), with mailbox-level phishing detection (IronSights), automated incident response (IronTraps) and real-time automated intelligence sharing (Federation) technologies.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.