CloudKnox Security, a Sunnyvale, Calif.-based provider of identity authorization solutions for hybrid and multi-cloud environments, raised $12M in new funding.
The round – which brought total funding to $22.75M – was led by Sorenson Ventures with participation from early investors, including ClearSky Security, Dell Technologies Capital and Foundation Capital. In conjunction with the funding, Stephen Ward, CISO at The Home Depot; Ken Elefant, managing partner at Sorenson Ventures and Suresh Batchu, co-founder and CTO at MobileIron, joined CloudKnox Security’s Board of Directors.
The company intends to use the funds to further accelerate product and go-to-market plans.
Led by Balaji Parimi, CEO and founder, and newly appointed John Donnelly vice president of sales, CloudKnox Security is a cloud security platform built from the ground-up to support the monitoring and management of identities, actions and resources across hybrid and multi-cloud environments using an Activity-based Authorization model.
The new investment comes on the heels of significant triple-digit growth in 2019 fueled by rising demand from enterprise organizations looking to protect their critical cloud resources from accidental and malicious insider threats. CloudKnox continues to add to its growing client roster while demonstrating award-winning product innovation.
“CloudKnox’s vision is compelling: enable security teams to proactively measure and mitigate the greatest risk from operating in the cloud,” said Stephen Ward. “It does so by delivering continuous detection and remediation of over-privileged identities while helping to understand and report on their cloud risk posture. I welcome the opportunity to join the board at a time of significant growth.”
The company recently introduced new privilege-on-demand, auto remediation and anomaly detection capabilities, integrated with AWS IAM Access Analyzer and added support for VMware Cloud on AWS. They were recently awarded two patents: the first for activity-based access control in heterogeneous environments; and the second for a method and system to detect discrepancy in infrastructure security configurations.