In this installment of our 9-part series, we feature our portfolio company, Axonius, a cybersecurity asset management platform that provides a single point of view into every device. It is agentless, deploys in minutes and has over 100 pre-built integrations.
1. Vertex Perspectives
Asset Management Platform
Axonius believes that the solution to
fragmentation starts with visibility – a
cybersecurity asset management platform to
provide a single point of view into every device
2. TEAM INVESTORS HIGHLIGHTS
Founders • Founded in 2017
• HQ: US
• R&D: Tel Aviv, Israel
• Series A
• Recognitions include
• Named “Most innovative startup” at
2019 RSA Conference Innovation
Sandbox contest
• Wins 2019 SC Magazine award for
Rookie Security Company
Company Snapshot
Dean Sysman, CEO
World renowned expert in
cybersecurity who has spoken at
major conferences including
Blackhat and Defcon. Before
Axonius, he co-founded Cymmetria,
a cyber deception company with
Fortune 500 customers.
Avidor Bartov, CTO
Security researcher in Israel’s elite
8200 unit where he won many
awards for his classified work.
Ofir Shur, CPO
Over 13 years experience of hands-on
experience in the cybersecurity field
and 8 years in the IDF intelligence
corps where he led more than 40
engineers and researchers in R&D.
3. Industry Challenges
You can’t secure what you can’t see.
Is your agent everywhere it should be?
Are your cloud instances covered?
Which unmanaged devices are connected to privileged networks?
6 essential questions about every asset –
1. Is the asset known and managed?
2. Where is it?
3. What is it?
4. Is the core software up to date?
5. What additional software is installed?
6. Does it adhere to my security policy?
Asset management is the most fundamental requirement security
teams need to enhance security operations amidst expanding
threats they face daily.
4. Solution Overview
Axonius is the only cybersecurity asset management
platform that provides actionable visibility and security
policy enforcement for all assets and users by
aggregating business data from 100+ management and
security solutions.
The Axonius approach helps users –
(i) Understand what they have
(ii) Discover coverage gaps
(iii) Validate and enforce policies
Key features –
• Deployment in minutes
• Agentless
• Virtual appliance
• Connects to solutions using adapters
• Over 100 pre-built integrations
6. Case Studies
#3 Customer Spotlight: Leading Cybersecurity Firm
• Use Case: Missing Endpoint Agents
• Background: Global EDR/EPP provider had limited visibility into
internal deployment of their own solution
• Options: 1) Invest months in development/ maintenance of
scripts 2) Deploy Axonius to solve the problem in one week
#1 Customer Spotlight: New York Times
• Use Case: Audit
• Background: As part of their transformation to the
cloud, and allowing more IoT and BYOD access,
security needed a complete asset inventory and
security policy, which was accelerated through their
audit process.
• Results: Security gaps identified and they now have
a comprehensive asset inventory. From 2 users in
trial (security), now at 27 including cloud,
networking, IT and audit teams
#2 Customer Spotlight: Schneider Electric
• Use Case: Unmanaged Devices, Agent Health, Cloud Security
• Background: As a Fortune Global 500 company, Schneider Electric is
focused on understanding which of its assets are unmanaged, the agent
health of managed devices, and making sure that all cloud instances are
covered by its security tools to meet the overall security policy
• Results: Schneider Electric uses the Axonius platform to identify
unmanaged devices, rectify security coverage gaps, and validate their
security policies for all assets
7. Competitive Advantage
Universal Device Visibility
Get a universal view of all devices to
see all devices for what they are
Connect Existing Solutions
Easily integrates with management
and security technologies
Go from Visibility to Action
An extensible platform with plugins for
cross-device functionality
All other tools are collectors.
What is needed is an aggregator.
• Covers >100M endpoints for companies like AppsFlyer,
Natera and The New York Times
• Integrated with 100+ management and security solutions
• Only cybersecurity asset management platform that provides
visibility and policy enforcement for all assets and users
8. Thanks for reading!
About Vertex Ventures
Vertex Ventures is a global network of operator-investors who manage portfolios
in the US, China, Israel, India and Southeast Asia. Vertex teams combine first-hand
experience in transformational technologies, on-the-ground knowledge in the
world’s major innovation centers and global context, connections and customers.
Contributors
Disclaimer
This presentation has been compiled for informational purposes only. It does not constitute a recommendation to any party. The presentation relies on data and insights from a wide range of sources including public and private companies, market research firms, government agencies and
industry professionals. We cite specific sources where information is public. The presentation is also informed by non-public information and insights. Information provided by third parties may not have been independently verified. Vertex Holdings believes such information to be reliable and
adequately comprehensive but does not represent that such information is in all respects accurate or complete. Vertex Holdings shall not be held liable for any information provided. Any information or opinions provided in this report are as of the date of the report and Vertex Holdings is
under no obligation to update the information or communicate that any updates have been made.
Please stay tuned and do let us know if you’d like to subscribe to future issues of Vertex Perspectives.
Vertex Perspectives: Cybersecurity Series
• Cybersecurity | Risk. Impact. Innovations.
• Cybersecurity | Axonius: Asset Management Platform
• Cybersecurity | Cylus: Railway Cybersecurity
• Cybersecurity | Cymulate: Breach & Attack Simulation
• Cybersecurity | D-fend: Counter-Drone Solutions for Urban Environments
• Cybersecurity | Indegy: Industrial Cybersecurity
• Cybersecurity | Meta Networks: NaaS Software Defined Perimeter
• Cybersecurity | PerimeterX: Next Generation Bot Defense
• Cybersecurity | Very Good Security: SaaS Platform for Data Security